You are on page 1of 7

Federal Register / Vol. 72, No.

162 / Wednesday, August 22, 2007 / Notices 47073

supplement to the complaint on August Patent No. Re. 35,616, and whether an investigation will not be granted unless
8, 2007. The complaint, as industry in the United States exists as good cause therefor is shown.
supplemented, alleges violations of required by subsection (a)(2) of § 337; Failure of a respondent to file a timely
§ 337 in the importation into the United (2) For the purpose of the response to each allegation in the
States, the sale for importation, and the investigation so instituted, the following complaint and in this notice may be
sale within the United States after are hereby named as parties upon which deemed to constitute a waiver of the
importation of certain nitrile rubber this notice of investigation shall be right to appear and contest the
gloves by reason of infringement of U.S. served: allegations of the complaint and this
Patent No. Re. 35,616. The complaint (a) The complainant is— notice, and to authorize the
further alleges that an industry in the Tillotson Corporation, d/b/a, Best administrative law judge and the
United States exists as required by Manufacturing Company, 579 Edison Commission, without further notice to
subsection (a)(2) of § 337. Street, Menlo, Georgia 30731. the respondent, to find the facts to be as
The complainant requests that the (b) The respondents are the following alleged in the complaint and this notice
Commission institute an investigation entities alleged to be in violation of and to enter an initial determination
and, after the investigation, issue a section 337, and are the parties upon and a final determination containing
permanent exclusion order and a which the complaint is to be served: such findings, and may result in the
permanent cease and desist order. Cardinal Health, Inc., 7000 Cardinal issuance of a limited exclusion order or
Place, Dublin, Ohio 43017. cease and desist order or both directed
ADDRESSES: The complaint, except for
Cardinal Health 200, Inc., 1430 against the respondents.
any confidential information contained Waukegan Road (MP KB–1A), McGaw
therein, is available for inspection Park, Illinois 60085. Issued: August 16, 2007.
during official business hours (8:45 a.m. Cardinal Health Malaysia 211 Sdn. By order of the Commission.
to 5:15 p.m.) in the Office of the Bhd., Plot 87, Kampung Jawa 11900, Marilyn R. Abbott,
Secretary, U.S. International Trade Bayan Lepas, Malaysia. Secretary.
Commission, 500 E Street, SW., Room Henry Schein, Inc., 135 Duryea Road, [FR Doc. E7–16432 Filed 8–21–07; 8:45 am]
112, Washington, DC 20436, telephone Melville, New York 11747. BILLING CODE 7020–02–P
202–205–2000. Hearing impaired HSI Gloves Inc., 135 Duryea Road,
individuals are advised that information Melville, New York 11747.
on this matter can be obtained by Latexx Partners Berhad, Pt5054, Jalan DEPARTMENT OF JUSTICE
contacting the Commission’s TDD Perusahaan 3, Kamunting, Industrial
terminal on 202–205–1810. Persons Estate, 34600 Kamunting, Perak, Darul Federal Bureau of Investigation
with mobility impairments who will Ridzuan, Malaysia.
need special assistance in gaining access [AAG/A Order No. 028–2007]
Medtexx Partners Inc., 102 Engle St.
to the Commission should contact the FL2, Englewood, New Jersey 07631. Privacy Act of 1974; System of
Office of the Secretary at 202–205–2000. (c) The Commission investigative Records
General information concerning the attorney, party to this investigation, is
Commission may also be obtained by Vu Q. Bui, Esq., Office of Unfair Import AGENCY: Federal Bureau of
accessing its internet server at http:// Investigations, U.S. International Trade Investigation, DOJ.
www.usitc.gov. The public record for Commission, 500 E Street, SW., Suite ACTION: Notice to amend system of
this investigation may be viewed on the 401, Washington, DC 20436; and records.
Commission’s electronic docket (EDIS) (3) For the investigation so instituted,
at http://www.usitc.gov/secretary/ the Honorable Charles E. Bullock is SUMMARY: The Federal Bureau of
edis.htm. designated as the presiding Investigation proposes to amend its
administrative law judge. Terrorist Screening Records System,
FOR FURTHER INFORMATION CONTACT: Vu Justice/FBI–019, maintained by the
Q. Bui, Esq., Office of Unfair Import (4) The Commission has determined
to assign this investigation to Judge Terrorist Screening Center, to make
Investigations, U.S. International Trade several changes to its existing notice.
Commission, telephone (202) 205–2582. Bullock, who is the presiding
administrative law judge in Certain Public comments are invited.
Authority: The authority for institution of Nitrile Gloves, Inv. No. 337–TA–608, in DATES: The Privacy Act requires that the
this investigation is contained in section 337 public be given 30 days in which to
view of the overlapping subject matter
of the Tariff Act of 1930, as amended, and comment on any new or amended uses
in section 210.10 of the Commission’s Rules in the two investigations. The presiding
of Practice and Procedure, 19 CFR 210.10 administrative law judge is authorized of information in a system of records. In
(2006). to consolidate Inv. No. 337–TA–608 and addition, the Office of Management and
this investigation if he deems it Budget (OMB), which has oversight
Scope of Investigation: Having appropriate. responsibilities under the Act, and the
considered the complaint, the U.S. Responses to the complaint and the Congress must be given 40 days in
International Trade Commission, on notice of investigation must be which to review major changes to
August 15, 2007, ordered that— submitted by the named respondents in Privacy Act systems. Therefore, the
(1) Pursuant to subsection (b) of accordance with section 210.13 of the public, OMB, and the Congress are
section 337 of the Tariff Act of 1930, as Commission’s Rules of Practice and invited to submit written comments on
amended, an investigation be instituted Procedure, 19 CFR 210.13. Pursuant to this revised Privacy Act system of
to determine whether there is a 19 CFR 201.16(d) and 210.13(a), such records. Please submit any comments by
violation of subsection (a)(1)(B) of § 337 responses will be considered by the October 1, 2007.
in the importation into the United Commission if received not later than 20 ADDRESSES: Address all comments to
jlentini on PROD1PC65 with NOTICES

States, the sale for importation, or the days after the date of service by the Kenneth P. Mortensen, Deputy Privacy
sale within the United States after Commission of the complaint and the and Civil Liberties Officer, U.S.
importation of certain nitrile rubber notice of investigation. Extensions of Department of Justice, 950 Pennsylvania
gloves by reason of infringement of one time for submitting responses to the Ave., NW., Washington, DC 20530,
or more of claims 1 and 17–19 of U.S. complaint and the notice of facsimile number (202) 616–9627.

VerDate Aug<31>2005 16:26 Aug 21, 2007 Jkt 211001 PO 00000 Frm 00122 Fmt 4703 Sfmt 4703 E:\FR\FM\22AUN1.SGM 22AUN1
47074 Federal Register / Vol. 72, No. 162 / Wednesday, August 22, 2007 / Notices

FOR FURTHER INFORMATION CONTACT: TSDB, EMA, and other internal TSC ensure compliance with applicable laws
Kenneth P. Mortensen, (202) 514–3853. databases. In the future, the TSC plans and policy. A TSDB record history is a
SUPPLEMENTARY INFORMATION: On July to operate a query function permitting log of any previous changes to the
28, 2005, the Department of Justice, authorized individuals from screening current version of a TSDB record.
Federal Bureau of Investigation (FBI) agencies or entities to access TSC Archived TSDB records are TSDB
published a new Privacy Act System of systems directly from an external records that pertain to individuals who
Records notice, the Terrorist Screening location and submit search queries. are no longer eligible for inclusion in
Records System (TSRS), Justice/FBI– Collection and maintenance of the TSDB, because those individuals no
019, to cover records maintained by the information through audit logs about longer meet the criteria for inclusion in
Terrorist Screening Center (TSC), the authorized users will allow the TSC to the TSDB as a known or suspected
system owner. See 70 FR 43715. monitor who uses TSC information terrorist. The TSC retains these records
Records in the TSRS include the systems for what purpose, in order to in an archive that is logically separate
Terrorist Screening Database (TSDB), ensure compliance with applicable laws from other TSDB data and may be
records in the Encounter Management and policy. Therefore, the TSC is accessed only by a limited number of
Application (EMA) that document the modifying this system of records notice TSC personnel who have undergone
operational support TSC provides to to account for this fact. specialized training on the sensitivity of
agencies that screen for terrorists Additionally, the TSC is clarifying these records and the permissible
(‘‘screening agencies’’), and records that this system of records covers all reasons for access.
related to the TSC’s internal quality individuals whose names or identifying Pursuant to TSC policy, archived
assurance process to ensure the terrorist information is collected to perform a TSDB records may only be accessed for
data is thorough, accurate and current. query against TSC information systems, the following purposes: (1) Redress, (2)
The TSC also maintains records related such as TSDB, but who are not litigation, (3) quality assurance (e.g., to
to the resolution of terrorist watchlist- necessarily individuals whose determine if a record correction is
related redress complaints. information is generally maintained as required to an existing record in a TSC
The TSC now proposes modifications terrorist information in the TSDB. For or other agency system), (4) to respond
to the system to expand the scope of the example, in certain instances, to requests from oversight bodies and
system, and to increase the clarity of the individuals’ names are queried directly auditors, and to perform internal audits,
notice. The following explains the against the TSDB or EMA to see if there (5) to evaluate TSC performance and
proposed modifications: is a possible record match and, if there data in the event of another terrorist
is not, their names may be retained in attack or attempted attack, and to
General Changes an audit trail that records the activity of support any related investigation, and
The previous system notice used the authorized users of TSC information (6) when access is otherwise required by
terms ‘‘terrorist screening’’ and systems. The system notice is being law (e.g., Freedom of Information Act
‘‘terrorism screening’’ interchangeably modified to make clear that these (FOIA) request). Archived TSDB records
to describe the same process. This individuals’ information is also are not used or made available for any
notice is being modified so that only the included in this system of records. watchlisting purposes. The search
term ‘‘terrorism screening’’ is used, The TSC is adding a new category to function for the TSDB archive requires
making it consistent with the language cover individuals who accompany or that prior to accessing the TSDB archive
in Homeland Security Presidential travel with a person when that person authorized TSC personnel must identify
Directive 6 (HSPD 6). This system notice is an actual match to a known or an approved purpose with information
also makes use of the term Terrorism suspected terrorist identity in the TSDB supporting the need for access. This
Information as defined in section 1016 and when the TSC or screening agency information is maintained in a detailed
of the Intelligence Reform and or entity identifies that person as such audit log, which is routinely reviewed
Prevention Act of 2004 (Pub. L. 108– during a terrorism screening process. by TSC compliance personnel.
458). The TSC collects this information in the Additionally, the TSC is modifying
course of encounters with known or other descriptions of categories of
System Location suspected terrorists. For example, an records to clarify the types of
The current system of records notice encounter can include times when an information held in the TSC systems.
for Justice/FBI–019 states that the individual was in the car along with a The TSC is adding language to clarify
records are located at the TSC, Federal person matching an identity in the that records of encounters may include
Bureau of Investigation, Washington, TSDB during a traffic stop by state or information about individuals who
DC. The notice has been amended to local law enforcement officers. TSC accompany or travel with a person
reflect that records in Justice/FBI–019 maintains this information about such when that person is an actual match to
may also be located in secondary individuals in EMA and not in the a known or suspected terrorist identity
locations for system back-up and TSDB, and shares it as appropriate with in the TSDB and the TSC or screening
continuity-of-operations purposes. other agencies for law enforcement and agency or entity identifies that person as
intelligence purposes consistent with such during a terrorism screening
Categories of Individuals process.
the routine uses of this system of
The TSC is expanding the categories records. The TSC is also modifying Item (a) To
of individuals covered by this system to add ‘‘photograph’’ as a specific type of
cover individuals who are authorized Categories of Records identifying data that may be contained
users of the underlying information The TSC is adding new categories of in the TSRS. While a photograph may
systems described by this system of records to cover audit logs for TSC be considered a biometric, which is
records, such as the TSDB and EMA, systems, and archived records and already listed in Item (a), TSC is listing
jlentini on PROD1PC65 with NOTICES

since audit logs documenting their use record histories for the TSDB and other photographs as a separate item to ensure
will be maintained in connection with TSC systems. clarity.
the system. As discussed above, audit log records The TSC is modifying Item (b) By
Currently, only TSC personnel can allow the TSC to monitor who uses TSC changing the term ‘‘agency’’ to ‘‘entity’’
perform queries directly against the systems for what purpose in order to to reflect that entities other than a

VerDate Aug<31>2005 16:26 Aug 21, 2007 Jkt 211001 PO 00000 Frm 00123 Fmt 4703 Sfmt 4703 E:\FR\FM\22AUN1.SGM 22AUN1
Federal Register / Vol. 72, No. 162 / Wednesday, August 22, 2007 / Notices 47075

federal government agency may engage performed by a federal government be used during or in support of the
in terrorism screening. Item (b) is also agency. The word ‘‘authorized’’ was screening process, but indicates TSC
being modified by removing the added because all terrorism screening will use de-identified data whenever
language ‘‘terrorist encounters’’ and processes using TSC data must be possible. The TSC is modifying the
replacing it with ‘‘encounters with authorized by the TSC pursuant to the language of this Routine Use to clarify
known or suspected terrorists,’’ which is standard articulated in HSPD 6. that ‘‘de-identified data’’ means data
a more precise characterization, because The language in Item (g) Is being that cannot be used to derive an
Item (a) in the Categories of Individuals changed to add the word individual’s identity and to note that de-
defines the phrase ‘‘known or suspected ‘‘organizations’’ to the list of entities identified data will be used to the extent
terrorists.’’ and individuals that may receive practicable and possible.
The TSC is also modifying Item (c) to information about encounters with Routine Use E permits disclosure of
make clear that TSRS may also include known or suspected terrorists. This information to various agencies or
references to or information from other change is intended to better reflect the entities to assist in the coordination of
relevant databases that contain terrorism ongoing efforts by the federal terrorist threat awareness, assessment,
information, in the event such databases government to increase sharing of analysis, or response. The TSC is
are not considered law enforcement or intelligence, law enforcement and modifying this language to include
intelligence databases. terrorism information with the State and private sector entities in the list of
local governments, fusion centers, and entities that may receive information
Authority for Maintenance of the critical infrastructure owners and from TSRS for these purposes. This
System operators, consistent with the privacy change is intended to better reflect the
The TSC is adding the following legal protections required by the Privacy Act ongoing efforts by the federal
authorities: the National Security Act of and as articulated in this notice. government to increase sharing of
1947, as amended; the Intelligence The language in Item (h) is being intelligence, law enforcement, terrorism
Reform and Terrorism Prevention Act of changed by removing the word and threat information with State fusion
2004, Pub. L. 108–458, 18 Stat. 3638 ‘‘repeatedly’’ from the phrase ‘‘to assist centers and the private sector, such as
(December 17, 2004); and Executive persons repeatedly misidentified during critical infrastructure and key resource
Order 13388, ‘‘Further Strengthening a terrorism screening process.’’ This owners and operators, consistent with
the Sharing of Terrorism Information to change is intended to clarify that an the privacy protections required by the
Protect Americans,’’ (October 25, 2005). individual does not have to be Privacy Act.
TSC is removing the reference to misidentified more than once for the Routine Use H permits disclosure of
Executive Order 13356, which has been TSC to act to provide assistance through information in support of authorized
superseded by Executive Order 13388. a redress process or other means. audit or oversight operations of the DOJ,
Also, the TSC is adding language to Conforming changes are being made to including FBI and TSC, or any agency
provide notice that in the event that the the notice to remove the word engaged in or providing information
TSC’s continuity-of-operations plans are ‘‘repeatedly’’ from Routine Uses B, F, used for terrorism screening supported
invoked, the agency that assumes TSC and G, and the categories of individuals by the TSC. The TSC is modifying this
operational functions will have the (Item (d)). Routine Use to include authorized
authority to administer the Terrorist security operations as a permissible
Routine Uses
Screening Records System as necessary purpose for sharing information, thereby
to carry out those functions and will act Routine Use B listed for Justice/FBI– allowing the TSC to disclose
consistent with the obligations required 019 permits disclosure of information to information to the investigating entity in
by the Privacy Act of 1974 in the various entities in order to, among other the context of a security-related
maintenance of TSRS as a Privacy Act things ‘‘provide appropriate investigation or inquiry, such as a
System of Records. notifications of a positive terrorist personnel investigation or inquiry into a
encounter or a threat related to the breach of data security. Additionally,
Purpose Statement encounter.’’ The TSC is modifying this the TSC is expanding the scope of this
Consistent with the changes discussed language to clarify that the TSC may Routine Use by adding language that
above regarding auditing of TSC data notify an entity of not only a positive would allow disclosure if the subject of
systems, the TSC is expanding the match to the terrorist watchlist, but also the security, audit, or oversight
purpose of the system of records to a negative or inconclusive match. Also, operation was not a Federal agency but
clarify that one purpose is to conduct the TSC is modifying this Routine Use an organization or individual that was
appropriate oversight of the proper use to include ‘‘private sector entities with engaged in or providing information
of TSC data systems. a substantial bearing on homeland used for terrorism screening that is
The language in Item (e) Is being security’’ as described in HSPD–6 as supported by the TSC. These changes
modified to add the quoted language potential recipients of information. will allow the TSC to disclose
below to more accurately reflect TSC’s Finally, the TSC is modifying the information to support any oversight
mission, as set forth in HSPD 6, to language in purpose (2) of this Routine efforts into TSC-related activities.
provide support for private sector Use to make clear that a positive Routine Use K permits disclosure of
screening processes ‘‘that have a encounter means an encounter with an information to a governmental entity
substantial bearing on homeland individual who is identified in the lawfully engaged in collecting law
security.’’ TSDB, and to clarify purpose (3) of this enforcement, law enforcement
The language in Item (f) is being Routine Use by adding the modifiers intelligence, or national security
modified to remove the word ‘‘agency’s’’ ‘‘known or suspected’’ to the terms intelligence information for law
and insert the word ‘‘authorized’’ ‘‘terrorist’’ and ‘‘threat related to the enforcement or intelligence purposes.
jlentini on PROD1PC65 with NOTICES

preceding the term ‘‘screening process’’ encounter.’’ TSC is modifying this Routine Use by
to more accurately describe the type of Routine Use D permits disclosure of changing ‘‘national security intelligence
screening TSC may perform. The word information for the development, information’’ to ‘‘national security
‘‘agency’’ was removed because not all testing, or modification of information information’’ and ‘‘national
terrorism screening is necessarily technology systems used or intended to intelligence,’’ which are terms defined

VerDate Aug<31>2005 16:26 Aug 21, 2007 Jkt 211001 PO 00000 Frm 00124 Fmt 4703 Sfmt 4703 E:\FR\FM\22AUN1.SGM 22AUN1
47076 Federal Register / Vol. 72, No. 162 / Wednesday, August 22, 2007 / Notices

by Executive Order 12958, as amended, Record Source Categories e. Individuals about whom a terrorist
and the Intelligence Reform and The TSC is modifying this section to watchlist-related redress inquiry has
Terrorism Prevention Act amendments include ‘‘private sector entities engaged been made; and
to the National Security Act of 1947, in terrorism screening’’ as a record f. Individuals whose information is
respectively. Also, the TSC is specifying source category. This change is being collected and maintained for
counterterrorism as one of the purposes made to reflect that the TSC may receive information system user auditing and
for which information may be disclosed information for screening from the security purposes, such as individuals
under this Routine Use, which is private sector in support of the TSC’s who are authorized users of TSC
consistent with TSC’s counterterrorism mission, as set forth in HSPD 6, to information systems.
mission. support ‘‘private sector screening
CATEGORIES OF RECORDS IN THE SYSTEM:
The Department of Justice previously processes that have a substantial bearing
published a notice modifying all of the on homeland security.’’ a. Identifying information, such as
Department’s systems of records, name, date of birth, place of birth,
Public Comments Invited
including TSRS, to include a routine biometrics, photographs, passport and/
use to permit the disclosure of Public comments are invited on all or drivers license information, and other
information to appropriate persons and aspects of the revised system notice, available identifying particulars used to
entities for purposes of response and including the retention periods for compare the identity of an individual
remedial efforts in the event that there records and the new categories of being screened with a known or
has been a breach of the data contained individuals and records. See ADDRESSES suspected terrorist, including audit
in the Department’s systems of records. section above for information on how to records containing this information;
See 72 FR 3410 (Jan. 25, 2007). The TSC submit comments. b. Information about encounters with
In accordance with 5 U.S.C. 552a(r), individuals covered by this system,
is adding new Routine Use L to this
the Department of Justice has provided such as date, location, screening entity,
notice to reflect this change.
a report of this amended system of analysis, associated individuals, and
Retention and Disposal records to the Office of Management and results (positive or negative identity
Budget and to Congress. match), and, for encounters with known
Although TSC is a multi-agency
Dated: August 14, 2007. or suspected terrorists only, other
organization, the FBI administers TSC.
Recently, the FBI obtained approval Lee J. Lofthus, entities notified and details of any law
from the National Archives and Records Assistant Attorney General for enforcement, intelligence, or other
Administration for its request for
Administration. operational response;
records disposition authority for records JUSTICE/FBI–019 c. For known or suspected terrorists,
created and maintained by the TSC. The in addition to the categories of records
TSC is modifying this language to SYSTEM NAME: listed above, references to and/or
provide information on the approved Terrorist Screening Records System information from other government law
retention periods for TSC records (TSRS). enforcement and intelligence databases,
described in Justice/FBI–019. For or other relevant databases that may
SECURITY CLASSIFICATION:
records maintained in the Terrorist contain terrorism information;
Classified, unclassified (law
Screening Database (TSDB), active d. For misidentified persons, in
enforcement sensitive).
records are maintained for 99 years and addition to the categories of records
inactive (archived) records are SYSTEM LOCATION: listed above, additional identifying
maintained for 50 years. Encounter Records described in this notice are information that will be used during
Management Application (EMA) maintained at the Terrorist Screening screening only for the purpose of
records, which document positive, Center, Federal Bureau of Investigation, distinguishing them from a known or
negative, and inconclusive screening Washington, D.C., and at facilities suspected terrorist who has similar
encounters with individuals in the operated by other government entities identifying characteristics (such as
TSDB, are maintained for 99 years. TSC for terrorism screening, system back-up, name and date of birth);
maintains EMA records on negative and continuity of operations purposes. e. For redress matters, in addition to
encounters, i.e., a person who is the categories of records listed above,
CATEGORIES OF INDIVIDUALS COVERED BY THE
initially identified as a possible match SYSTEM:
information provided by individuals or
to a TSDB identity but ultimately their representatives, information
a. Individuals known or appropriately
determined not to be a match, in order provided by the screening agency, and
suspected to be or have been engaged in
to expedite future screening of those internal work papers and other
conduct constituting, in preparation for,
individuals and to support the redress documents related to researching and
in aid of, or related to terrorism
process. Records of redress inquiries resolving the matter;
(‘‘known or suspected terrorists’’);
and quality assurance matters are f. Information collected and compiled
b. Individuals who are the subject of
maintained for at least six years. Audit to maintain an audit trail of the activity
queries against TSC information
logs are maintained for 25 years and of authorized users of TSC information
systems;
records of user audits are maintained for c. Individuals identified during a systems, such as user name/ID, date/
ten years. terrorism screening process as a possible time, search query and results data, user
Contesting Record Procedures identity match to a known or suspected activity information (e.g., record
terrorist and other individuals who retrieval, modification, or deletion data),
The TSC is adding language to this accompany or travel with such and record numbers; and,
jlentini on PROD1PC65 with NOTICES

section to refer individuals to the TSC’s individuals; g. Archived records and record
public Web site for additional d. Individuals who are misidentified histories from the Terrorist Screening
information on the redress process and as a possible identity match to a known Database, Encounter Management
the procedures for filing a complaint or suspected terrorist (‘‘misidentified Application, and other TSC data
related to terrorism screening. persons’’); systems that are part of the TSRS.

VerDate Aug<31>2005 16:26 Aug 21, 2007 Jkt 211001 PO 00000 Frm 00125 Fmt 4703 Sfmt 4703 E:\FR\FM\22AUN1.SGM 22AUN1
Federal Register / Vol. 72, No. 162 / Wednesday, August 22, 2007 / Notices 47077

AUTHORITY FOR MAINTENANCE OF THE SYSTEM: complaints about the screening process D. To federal, state, local, tribal,
Homeland Security Presidential (redress). territorial, foreign, or multinational
Directive-6, ‘‘Integration and Use of i. To oversee the proper use, agencies or entities, or other
Screening Information to Protect maintenance, and security of TSC data organizations that are engaged in, or are
Against Terrorism’’ (Sept. 16, 2003); systems and TSC personnel. planning to engage in terrorism
Executive Order 13388, Further screening authorized by the U.S.
Strengthening the Sharing of Terrorism ROUTINE USES OF RECORDS MAINTAINED IN THE Government, for the purpose of the
Information to Protect Americans,’’ SYSTEM, INCLUDING CATEGORIES OF USERS AND development, testing, or modification of
THE PURPOSES OF SUCH USES: information technology systems used or
(October 25, 2005); the Intelligence
Reform and Terrorism Prevention Act of In addition to those disclosures intended to be used during or in support
2004, Pub. L. 108–458; the National generally permitted under 5 U.S.C. of the screening process; whenever
Security Act of 1947, as amended; and 552a(b) of the Privacy Act, the records practicable, however, TSC, to the extent
28 U.S.C. 533. In the event that the or information in this system may be possible, will substitute anonymized or
TSC’s continuity-of-operations plans are disclosed as a routine use, under 5 de-identified data, such that the identity
invoked, the agency that assumes TSC U.S.C. 552a(b)(3), in accordance with of the individual cannot be derived from
operational functions will have the blanket routine uses established for FBI the data.
authority to administer the Terrorist record systems. See Blanket Routine E. To federal, state, local, tribal,
Screening Records System as necessary Uses (BRU) Applicable to More Than territorial, foreign, multinational
to carry out those functions. One FBI Privacy Act System of Records, agencies or entities, or private sector
Justice/FBI–BRU, published on June 22, entities to assist in coordination of
PURPOSE(S): terrorist threat awareness, assessment,
2001 at 66 FR 33558 and amended on
a. To implement the U.S. February 14, 2005 at 70 FR 7513. In analysis or response.
Government’s National Strategy for addition, as routine uses specific to this F. To any person or entity in either
Homeland Security and Homeland system, the TSC may disclose relevant the public or private sector, domestic or
Security Presidential Directive-6, to system records to the following persons foreign, where reasonably necessary to
identify potential terrorist threats, to or entities and under the circumstances elicit information or cooperation from
uphold and enforce the law, and to or for the purposes described below, to the recipient for use by the TSC in the
ensure public safety. the extent such disclosures are performance of an authorized function,
b. To consolidate the government’s compatible with the purpose for which such as obtaining information from data
approach to terrorism screening and the information was collected. (Routine sources as to the thoroughness,
provide for the appropriate and lawful uses are not meant to be mutually accuracy, currency, or reliability of the
use of terrorist information in screening exclusive and may overlap in some data provided so that the TSC may
processes. cases.) review the quality and integrity of its
c. To maintain current, accurate and records for quality assurance or redress
A. To those federal agencies that have
thorough terrorist information in a purposes, and may also assist persons
agreed to provide support to TSC for
consolidated terrorist screening misidentified during a screening
purposes of ensuring the continuity of
database and determine which terrorism process.
TSC operations. G. To any federal, state, local, tribal,
screening processes will use each entry
B. To federal, state, local, tribal, territorial, foreign or multinational
in the database.
d. To ensure that appropriate territorial, foreign, multinational or agency, task force, or other entity or
information possessed by State, local, other public agencies or entities, to person that receives information from
territorial, and tribal governments, entities regulated by any such agency or the U.S. Government for terrorism
which is lawfully available to the entity, and to owners/operators of screening purposes, in order to facilitate
Federal Government, is considered in critical infrastructure or private sector TSC’s or the recipient’s review,
determinations made by the TSC as to entities with a substantial bearing on maintenance, and correction of TSC
whether a person is a match to a known homeland security and their agents, data for quality assurance or redress
or suspected terrorist. contractors or representatives, for the purposes, and to assist persons
e. To host mechanisms and make following purposes: (1) For use in and misidentified during a screening
terrorism information available to in support of terrorism screening process.
support appropriate domestic, and authorized by the U.S. Government, (2) H. To any agency, organization or
foreign terrorism screening processes, to provide appropriate notifications of person for the purposes of (1)
and private-sector screening processes the results of terrorism screening using performing authorized security, audit,
that have a substantial bearing on information from the Terrorist or oversight operations of the DOJ, FBI,
homeland security. Screening Database or a threat related to TSC, or any agency, organization, or
f. To provide continual operational a positive encounter with an individual person engaged in or providing
support to assist in the identification of identified in the Terrorist Screening information used for terrorism screening
persons screened and to facilitate an Database, (3) to facilitate any that is supported by the TSC, and (2)
appropriate and lawful response when a appropriate law enforcement or other meeting related reporting requirements.
known or suspected terrorist is response (e.g., medical and containment I. To a former employee of the TSC or
identified in an authorized screening response to a biological hazard) to a a former contractor supporting the TSC
process. known or suspected terrorist or a threat for purposes of: Responding to an
g. To provide appropriate government related to the encounter, and (4) to assist official inquiry by a federal, state, or
officials, agencies, or organizations with persons misidentified during a local government entity or professional
information about encounters with screening process. licensing authority, in accordance with
jlentini on PROD1PC65 with NOTICES

known or suspected terrorists. C. To any person, organization, or any applicable government regulations;
h. To assist persons misidentified governmental entity in order to notify or facilitating communications with a
during a terrorism screening process them of a serious terrorist threat for the former employee/contractor that may be
and to assist screening agencies or purpose of guarding against or necessary for personnel-related or other
entities in responding to individual responding to such a threat. official purposes where the TSC

VerDate Aug<31>2005 16:26 Aug 21, 2007 Jkt 211001 PO 00000 Frm 00126 Fmt 4703 Sfmt 4703 E:\FR\FM\22AUN1.SGM 22AUN1
47078 Federal Register / Vol. 72, No. 162 / Wednesday, August 22, 2007 / Notices

requires information and/or Physical security protections include with the envelope and the letter clearly
consultation assistance from the former guards and locked facilities requiring marked ‘‘Privacy Act Request.’’ Include
employee/contractor regarding a matter badges and passwords for access. in the request your full name and
within that person’s former area of Records are accessed only by authorized complete address. The requester must
responsibility. government personnel and contractors sign the request; and, to verify it, the
J. To any criminal, civil, or regulatory and are protected by appropriate signature must be notarized or
law enforcement authority (whether physical and technological safeguards to submitted under 28 U.S.C. 1746, a law
federal, state, local, territorial, tribal, prevent unauthorized access. All that permits statements to be made
multinational or foreign) where the Federal employees and contractors under penalty of perjury as a substitute
information is relevant to the recipient assigned to the TSC must hold an for notarization. You may submit any
entity’s law enforcement appropriate security clearance, sign a other identifying data you wish to
responsibilities. non-disclosure agreement, and undergo furnish to assist in making a proper
K. To a governmental entity lawfully privacy and security training. search of the system. Requests for access
engaged in collecting law enforcement, to information must be addressed to the
RETENTION AND DISPOSAL: Record Information Dissemination
law enforcement intelligence, national
security information, national Records in this system will be Section, Federal Bureau of Investigation,
intelligence, or terrorism information for retained and disposed of in accordance 935 Pennsylvania Avenue, NW.,
law enforcement, intelligence, or with the records schedule approved by Washington, DC 20535–0001.
counterterrorism purposes. the National Archives and Records
CONTESTING RECORD PROCEDURES:
L. To appropriate agencies, entities, Administration. For records maintained
in the Terrorist Screening Database, Because this system contains
and persons when (1) the Department of
active records are maintained for 99 classified intelligence and law
Justice suspects or has confirmed that
years and inactive (archived) records are enforcement information related to the
the security or confidentiality of
maintained for 50 years. Records of government’s counterterrorism, law
information in the system of records has
possible encounters with individuals on enforcement and intelligence programs,
been compromised; (2) the Department
the Terrorist Screening Database are records in this system are exempt from
of Justice has determined that as a result notification, access, and amendment to
of the suspected or confirmed maintained for 99 years. Records of
redress inquiries and quality assurance the extent permitted by subsections (j)
compromise there is a risk of harm to and (k) of the Privacy Act (5 U.S.C.
economic or property interests, identity matters are maintained for at least six
years. Audit logs are maintained for 25 552a). Requests for amendment should
theft or fraud, or harm to the security or be addressed to the FBI at the address
integrity of this system or other systems years and records of user audits are
maintained for ten years. and according to the requirements set
or programs (whether maintained by the forth above under the heading ‘‘Record
Department or another agency or entity) SYSTEM MANAGER(S) AND ADDRESS: Access Procedures.’’
that rely upon the compromised If, however, individuals are
information; and (3) the disclosure Director, Terrorist Screening Center,
Federal Bureau of Investigation, FBI experiencing repeated delays or
made to such agencies, entities, and difficulties during a government
persons is reasonably necessary to assist Headquarters, 935 Pennsylvania
Avenue, NW., Washington, DC 20535– screening process and believe that this
in connection with the Department of might be related to terrorist watch list
Justice’s efforts to respond to the 0001.
information, they may contact the
suspected or confirmed compromise NOTIFICATION PROCEDURE: Federal agency that is conducting the
and prevent, minimize, or remedy such Because this system contains screening process in question
harm. classified intelligence and law (‘‘screening agency’’). The screening
DISCLOSURE TO CONSUMER REPORTING enforcement information related to the agency is in the best position to
AGENCIES: government’s counterterrorism, law determine if a particular problem relates
None. enforcement, and intelligence programs, to a terrorist watch list entry or is due
records in this system have been to some other cause, such as a criminal
POLICIES AND PRACTICES FOR STORING, exempted from notification, access, and history, an immigration violation or
RETRIEVING, ACCESSING, RETAINING, AND amendment to the extent permitted by random screening. Some individuals
DISPOSING OF RECORDS IN THE SYSTEM: also experience repeated delays during
subsections (j) and (k) of the Privacy
STORAGE: Act. screening because their names and/or
Records in this system are stored in Requests for notification should be other identifying data, such as dates of
paper and/or electronic format. addressed to the FBI at the address and birth, are similar to those of known or
Electronic storage is on servers, CD– according to the requirements set forth suspected terrorists. These individuals,
ROMs, DVD–ROMs, and magnetic tapes. below under the heading ‘‘Record referred to as ‘‘misidentified persons,’’
Access Procedures.’’ often believe that they themselves are
RETRIEVABILITY: on a terrorist watch list, when in fact
RECORD ACCESS PROCEDURES: they only bear a similarity in name or
Records in this system are typically
retrieved by individual name, date of Because this system contains other identifier to an individual on the
birth, passport number, and other classified intelligence and law list. Most screening agencies have or are
identifying data, including unique enforcement information related to the developing procedures to expedite the
identifying numbers assigned by the government’s counterterrorism, law clearance of misidentified persons
TSC or other government agencies. enforcement and intelligence programs, during screening.
records in this system have been By contacting the screening agency
jlentini on PROD1PC65 with NOTICES

SAFEGUARDS: exempted from notification, access, and with a complaint, individuals will be
All records are maintained in a secure amendment to the extent permitted by able to take advantage of the procedures
government facility with access limited subsections (j) and (k) of the Privacy available to help misidentified persons
to only authorized personnel or Act. A request for access to a non- and others experiencing screening
authorized and escorted visitors. exempt record shall be made in writing problems. Check the agency’s

VerDate Aug<31>2005 16:26 Aug 21, 2007 Jkt 211001 PO 00000 Frm 00127 Fmt 4703 Sfmt 4703 E:\FR\FM\22AUN1.SGM 22AUN1
Federal Register / Vol. 72, No. 162 / Wednesday, August 22, 2007 / Notices 47079

requirements for submitting complaints Paperwork Reduction Act of 1995 • Evaluate the accuracy of the
but, at a minimum, individuals should (PRA95) [44 U.S.C. 3506(c)(2)(A)]. This agency’s estimate of the burden of the
describe in as much detail as possible program helps to ensure that requested proposed collection of information,
the problem they are having, including data can be provided in the desired including the validity of the
dates and locations of screening, and format, reporting burden (time and methodology and assumptions used;
provide sufficient information to financial resources) is minimized,
• Enhance the quality, utility and
identify themselves, such as full name, collection instruments are clearly
clarity of the information to be
citizenship status, and date and place of understood, and the impact of collection
birth. The TSC assists the screening requirements on respondents can be collected; and
agency in resolving any screening properly assessed. Currently, the • Minimize the burden of the
complaints that may relate to terrorist Employment Standards Administration collection of information on those who
watch list information, but does not is soliciting comments concerning the are to respond, including through the
receive or respond to individual proposed collection: Application for use of appropriate automated,
complaints directly. However, if TSC Continuation of Death Benefit for electronic, mechanical, or other
receives any such complaints, TSC will Student (LS–266). A copy of the technological collection techniques or
forward them to the appropriate proposed information collection request other forms of information technology,
screening agency. can be obtained by contacting the office e.g., permitting electronic submissions
Additional information about the listed below in the addresses section of of responses.
redress process and how to file a this Notice.
complaint with a screening agency is DATES: Written comments must be
III. Current Actions
available on TSC’s Web site at http:// submitted to the office listed in the The Department of Labor seeks the
www.fbi.gov/terrorinfo/counterrorism/ addresses section below on or before
redress.htm. approval of the extension of this
October 22, 2007. information collection in order to
RECORD SOURCE CATEGORIES ADDRESSES: Ms. Hazel M. Bell, U.S. ensure that eligible dependents may
Information in this system is obtained Department of Labor, 200 Constitution continue to receive benefits to which
from individuals covered by the system, Ave., NW., Room S–3201, Washington, they are entitled.
public sources, agencies and private DC 20210, telephone (202) 693–0418,
fax (202) 693–1451, E-mail Type of Review: Extension.
sector entities conducting terrorism
screening, law enforcement and bell.hazel@dol.gov. Please use only one Agency: Employment Standards
intelligence agency record systems, method of transmission for comments Administration.
government databases, and foreign (mail, fax, or E-mail). Title: Application for Continuation of
governments. SUPPLEMENTARY INFORMATION: Death Benefits for Student.
EXEMPTIONS CLAIMED FOR THE SYSTEM I. Background OMB Number: 1215–0073.
The Attorney General has exempted The Office of Workers’ Compensation Agency Number: LS–266.
this system from subsections (c)(3) and Programs (OWCP) administers the Affected Public: Individuals or
(4), (d)(1), (2), (3) and (4), (e)(1), (2), (3), Longshore and Harbor Workers’ households; Business or other for-profit.
(5) and (8), and (g) of the Privacy Act Compensation Act. The Act provides for
pursuant to 5 U.S.C. 552a(j) and (k). continuation of death benefits for a Total Respondents: 43.
These exemptions apply only to the child or certain other surviving Total Annual responses: 43.
extent that information in the system is dependents after the age of 18 (to age Time per Response: 30 minutes.
subject to exemption pursuant to 5 23) if the dependent qualifies as a
student as defined in Section 2 (18) of Estimated Total Burden Hours: 22.
U.S.C. 552a(j) and (k). Rules have been
promulgated in accordance with the the Act. Regulation 20 CFR 702.121 Frequency: On occasion.
requirements of 5 U.S.C. 553(b), (c) and addresses the use of forms for the Total Burden Cost (capital/startup):
(e). reporting of required information. The $0.
LS–266 is submitted by the parent or
[FR Doc. E7–16487 Filed 8–21–07; 8:45 am] Total Burden Cost (operating/
guardian of the dependent for whom
BILLING CODE 4410–02–P
continuation of benefits is sought. The maintenance): $0.
statements contained on the form must Comments submitted in response to
be verified by an official of the this notice will be summarized and/or
DEPARTMENT OF LABOR educational institution. The information included in the request for Office of
is used by the Department of Labor to Management and Budget approval of the
Employment Standards Administration
determine whether a continuation of the information collection request; they will
Proposed Collection; Comment benefits is justified. This information also become a matter of public record.
Request collection is currently approved for use
through December 31, 2007. Dated: August 16, 2007.
ACTION: Notice. Hazel M. Bell,
II. Review Focus
Acting Chief, Branch of Management Review
SUMMARY: The Department of Labor, as The Department of Labor is and Internal Control, Division of Financial
part of its continuing effort to reduce particularly interested in comments Management, Office of Management,
paperwork and respondent burden, which: Administration and Planning, Employment
conducts a preclearance consultation • Evaluate whether the proposed Standards Administration.
jlentini on PROD1PC65 with NOTICES

program to provide the general public collection of information is necessary [FR Doc. E7–16533 Filed 8–21–07; 8:45 am]
and Federal agencies with an for the proper performance of the BILLING CODE 4510–CF–P
opportunity to comment on proposed functions of the agency, including
and/or continuing collections of whether the information will have
information in accordance with the practical utility;

VerDate Aug<31>2005 16:26 Aug 21, 2007 Jkt 211001 PO 00000 Frm 00128 Fmt 4703 Sfmt 4703 E:\FR\FM\22AUN1.SGM 22AUN1

You might also like