You are on page 1of 3

20156 Federal Register / Vol. 70, No.

73 / Monday, April 18, 2005 / Notices

applicable laws, rules and policies, DEPARTMENT OF HOMELAND access the Federal eRulemaking Portal
including the DHS Information SECURITY at http://www.regulations.gov.
Technology Security Program FOR FURTHER INFORMATION CONTACT:
Handbook. All records are protected Office of the Secretary Sandy Ford Page, Director, Disclosure
from unauthorized access through Office, Office of the Chief of Staff, Office
[DHS2005–0028]
appropriate administrative, physical, of the Under Secretary for Information
and technical safeguards. These Privacy Act of 1974; Systems of Analysis and Infrastructure Protection,
safeguards include restricting access to Records: Homeland Security Department of Homeland Security,
authorized personnel who have a need- Operations Center Database Washington, DC by telephone (202)
to-know, and using locks and password 282–8522 or facsimile (202) 282–9069;
protection identification features. OIG AGENCY: Privacy Office, Department of Nuala O’Connor Kelly, Chief Privacy
file areas are locked after normal duty Homeland Security. Officer, Department of Homeland
hours and facilities are protected from ACTION: Notice of Privacy Act systems of Security, Washington, DC 20528 by
the outside by security personnel. records. telephone (202) 772–9848 or facsimile
(202) 772–5036.
RETENTION AND DISPOSAL: SUMMARY: In accordance with the
SUPPLEMENTARY INFORMATION: The
Records are retained and disposed of Privacy Act of 1974, the Department of
Department of Homeland Security
in accordance with the National Homeland Security is giving notice that
(DHS) is composed of five directorates.
Archives and Records Administration it proposes to add a new system of
The mission of the Directorate for
General Records Schedule 1, Item 29, records to its inventory of record
Information Analysis and Infrastructure
Transmittal No. 12 (July 2004). Files systems, the Homeland Security
Protection (IAIP) is to help deter,
may be retained for up to five years. For Operations Center Database.
prevent, and mitigate acts of terrorism
requests that result in litigation, the files DATES: Comments must be received on by assessing vulnerabilities in the
related to that litigation will be retained or before May 18, 2005. context of changing threats. Within
for three years after final court ADDRESSES: You may submit comments, IAIP, the Homeland Security Operations
adjudication. identified by Docket Number DHS– Center (HSOC) serves as the
SYSTEM MANAGER(S) AND ADDRESSES:
2004-xxxx, by one of the following technological platform to receive threat
methods: information, integrate it and
The System Managers are System • EPA Federal Partner EDOCKET disseminate it in order to support the
Manager/OIG Office of Technology and Web site: http://www.epa.gov/ following activities of IAIP:
System Manager/OIG Office of Audits, feddocket. Follow instructions for a. Maintaining domestic situational
1120 Vermont Avenue, NW., submitting comments on the Web site. awareness;
Washington, DC 20528. • Federal eRulemaking Portal: http:// b. Facilitating homeland security
NOTIFICATION PROCEDURES:
www.regulations.gov. Follow the information sharing and operational
instructions for submitting comments. coordination with other operations
To determine whether this system • Fax: (202) 772–5036 (This is not a centers to include incident
contains records relating to you, write to toll-free number). management;
the System Manager identified above. • Mail: Sandy Ford Page, Director, c. Monitoring threats and assisting in
RECORD ACCESS PROCEDURES: Disclosure Officer, Office of the Chief Of dissemination of homeland security
Staff, Office of the Under Secretary for threat warnings, advisory bulletins, and
A request for access to records in this Information Analysis and Infrastructure other information pertinent to national
system may be made by writing to the Protection, Department of Homeland incident management;
System Manager identified above, in Security, Washington, DC 20528; Nuala d. Providing general situational
conformance with 6 CFR part 5, subpart O’Connor Kelly, Chief Privacy Officer, awareness and support to, and acting
B, which provides the rules for Department of Homeland Security, 245 upon, requests for information
requesting access to Privacy Act records Murray Lane, Building 410, generated by the Interagency Incident
maintained by DHS agencies. Washington, DC 20528. Management Group; and
CONTESTING RECORD PROCEDURES: • Hand Delivery / Courier: Nuala e. Facilitating domestic incident
O’Connor Kelly, DHS Chief Privacy awareness, prevention, deterrence, and
Same as ‘‘Record Access Procedures,’’
Officer, 245 Murray Lane, Building 410, response and recovery activities, as well
above.
Washington, DC 20528. as direction to DHS components.
RECORD SOURCE CATEGORIES: Instructions: All submissions received DHS is establishing a new system of
must include the agency name and records under the Privacy Act (5 U.S.C.
Information contained in this system
docket number for this notice. All 552a), which will be maintained in the
is obtained from OIG auditors and
comments received will be posted IAIP Directorate, the Homeland Security
government and non-government
without change to http://www.epa.gov/ Operations Center Database. The
entities conducting continuing
feddocket, including any personal Privacy Act embodies fair information
professional education courses and
information provided. For detailed principles in a statutory framework
conferences.
instructions on submitting comments governing the means by which the
EXEMPTIONS CLAIMED FOR THE SYSTEM: and additional information on the United States Government collects,
None. rulemaking process, see the ‘‘Public maintains, uses and disseminates
Participation’’ heading of the personally identifiable information. The
Dated: April 7, 2005. SUPPLEMENTARY INFORMATION section of Privacy Act applies to information that
Nuala O’Connor Kelly, this document. is maintained in a ‘‘system of records.’’
Chief Privacy Officer, Department of Docket: For access to the docket to A ‘‘system of records’’ is a group of any
Homeland Security. read background documents or records under the control of an agency
[FR Doc. 05–7703 Filed 4–15–05; 8:45 am] comments received, go to http:// from which information is retrieved by
BILLING CODE 4410–10–P www.epa.gov/feddocket. You may also the name of the individual or by some

VerDate jul<14>2003 16:08 Apr 15, 2005 Jkt 205001 PO 00000 Frm 00056 Fmt 4703 Sfmt 4703 E:\FR\FM\18APN1.SGM 18APN1
Federal Register / Vol. 70, No. 73 / Monday, April 18, 2005 / Notices 20157

identifying number, symbol, or other DHS/IAIP–001 AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
identifying particular assigned to the 5 U.S.C. 301, 552, 552a; Section 201
SYSTEM NAME:
individual. Individuals may request of the Homeland Security Act of 2002,
their own records that are maintained in Homeland Security Operations Center Pub. L. 107–296, 116 Stat. 2145 (Nov.
a system of records in the possession or Database 25, 2002), as amended (6 U.S.C. 121); 44
under the control of DHS by complying U.S.C. 3101; E.O. 12958; E.O. 9397.
with DHS Privacy Act regulations, 6 SECURITY CLASSIFICATION:
CFR part 5. PURPOSE(S):
Classified; sensitive
The Privacy Act requires that each This record system is maintained to
agency publish in the Federal Register SYSTEM LOCATION: collect, access, and analyze law
a description denoting the type and Records are maintained at the enforcement information, intelligence
character of each system of records in Homeland Security Operations Center, information, and other information from
order to make agency recordkeeping Office of the Undersecretary for agencies of the Federal Government,
practices transparent, to notify Information Analysis and Infrastructure foreign governments, international
individuals about the use to which Protection, Department of Homeland organizations, state and local
personally identifiable information is Security, Washington, DC 20528. government agencies (including law
put, and to assist the individual to more enforcement agencies), and private
easily find files within the agency. CATEGORY OF INDIVIDUALS COVERED BY THE sector entities or individuals; and to
This system of records notice SYSTEM: integrate such information in order to:
describes the HSOC database within detect, identify and assess the nature
Individuals who have been linked in
IAIP. The information in the HSOC and scope of terrorist or other threats to
any manner to potential terrorism, to
database includes intelligence the United States; and understand such
other domestic incidents with homeland
information and other information threats in light of actual and potential
security implications, or whose
received from agencies and components vulnerabilities of the homeland.
behavior arouses reasonable suspicion
of the Federal Government, foreign
of possible terrorist activity; individuals ROUTINE USES OF RECORDS MAINTAINED IN THE
governments, organizations or entities,
who are the subject of information SYSTEM:
international organizations, state and
pertaining to terrorism and/or homeland In addition to those disclosures
local government agencies (including
security; individuals who offer generally permitted under 5 U.S.C.
law enforcement agencies), and private
information pertaining to terrorism and/ 552a(b) of the Privacy Act, all or a
sector entities, as well as information
provided by individuals, regardless of or homeland security; individuals who portion of the records or information
the medium used to submit the request assistance or information; or contained in this system may be
information or the agency to which it individuals who make inquiries disclosed outside DHS as a routine use
was submitted. This system also concerning possible terrorist activity. pursuant to 5 U.S.C. 552a(b)(3) as
contains: information regarding persons The system will also contain follows:
on watch lists with possible links to information about individuals who are A. If the record, on its face or in
terrorism; the results of intelligence or have been associated with DHS conjunction with other information,
analysis and reporting; ongoing law homeland security operations or with indicates a violation or potential
enforcement investigative information, DHS administrative operations. violation of any law, regulation, rule,
information systems security analysis order, or contract, the record may be
CATEGORIES OF RECORDS IN THE SYSTEM:
and reporting; historical law disclosed to the appropriate entity,
enforcement information, operational Intelligence information obtained whether federal, state, local, joint, tribal,
and administrative records; financial from agencies and components of the foreign, or international, that is charged
information; and public-source data Federal Government, foreign with the responsibility of investigating,
such as that contained in media reports governments, organizations or entities, prosecuting and/or enforcing such law,
and commercial databases as international organizations, state and regulations, rule, order or contract.
appropriate to identify and assess the local government agencies (including B. To a Federal, state, local, joint,
nature and scope of terrorist threats to law enforcement agencies), and private tribal, foreign, international or other
the homeland, detect and identify sector entities; information provided by public agency or organization, or to any
threats of terrorism against the United individuals, regardless of the medium person or entity in either the public or
States, and understand such threats in used to submit the information; private sector, domestic or foreign,
light of actual and potential information obtained from the Terrorist where such disclosure may promote
vulnerabilities of the homeland. Data Screening Center or on terrorist watch assist or otherwise serve homeland or
about the providers of information, lists about individuals known or national security interests.
including the means of transmission of reasonably suspected to be engaged in C. To an organization or individual in
the data is also retained. conduct constituting, preparing for, either the public or private sector,
IAIP will use the information in the aiding, or relating to terrorism; results of where there is a reason to believe that
HSOC database to access, receive, and intelligence analysis and reporting; the recipient is or could become the
analyze law enforcement information, ongoing law enforcement investigative target of a particular terrorist activity or
intelligence information, and other information; information systems conspiracy, to the extent the
information and to integrate such security analysis and reporting; information is relevant to the protection
information in order to identify and historical law enforcement information; of life or property.
assess the nature and scope of terrorist operational and administrative records; D. To recipients under circumstances
or other threats to the homeland. financial information; and public source and procedures as are mandated by
In accordance with 5 U.S.C. 552a(r), data such as that contained in media Federal statute, treaty, or international
DHS has provided a report of this new reports and commercial databases. Data agreement.
system of records to the Office of about the providers of information, E. To the news media or members of
Management and Budget (OMB) and to including the means of transmission of the general public in furtherance of a
the Congress. the data, will also be retained. function related to homeland security as

VerDate jul<14>2003 16:08 Apr 15, 2005 Jkt 205001 PO 00000 Frm 00057 Fmt 4703 Sfmt 4703 E:\FR\FM\18APN1.SGM 18APN1
20158 Federal Register / Vol. 70, No. 73 / Monday, April 18, 2005 / Notices

determined by the system manager POLICIES AND PRACTICES FOR STORING, B, which provides the rules for
where disclosure could not reasonably RETRIEVING, ACCESSING, RETAINING, AND requesting access to Privacy Act records
DISPOSING OF RECORDS IN THE SYSTEM: maintained by DHS.
be expected to constitute an
unwarranted invasion of privacy. STORAGE:
CONTESTING RECORD PROCEDURES:
F. To the Department of Justice or Records in this system are stored
electronically at the HSOC in a secure Same as ‘‘Record Access Procedures,’’
other federal agency conducting above.
litigation or in proceedings before any facility. The records are stored on
court, adjudicative or administrative magnetic disc, tape, digital media, and RECORD SOURCE CATEGORIES:
body, when: (a) DHS, or (b) any CD-ROM, and may also be retained in Information contained in this system
hard copy format in secure folders. is obtained from subject individuals,
employee of DHS in his/her official
capacity, or (c) any employee of DHS in RETRIEVABILITY: other agencies and organizations, both
his/her individual capacity where DOJ Data may be retrieved by the domestic and foreign, media, including
or DHS has agreed to represent the individual’s name or other identifier. periodicals, newspapers, and broadcast
employee, or (d) the United States or transcripts and public and classified
any agency thereof, is a party to the
SAFEGUARDS: reporting, privacy organizations and
litigation or has an interest in such Information in this system is individuals, intelligence source
safeguarded in accordance with documents, investigative reports, and
litigation.
applicable rules and policies, including correspondence.
G. To a congressional office from the any applicable IAIP and DHS automated
record of an individual in response to EXEMPTIONS CLAIMED FOR THE SYSTEM:
systems security and access policies.
an inquiry from that congressional office Strict controls have been imposed to Portions of this system are exempt
made at the request of the individual to minimize the risks of compromising the under 5 U.S.C. 552a((j)(2), (k)(1), and
whom the record pertains. information that is being stored. Access (k)(2).
H. To the National Archives and to the computer system containing the Dated: April 7, 2005.
Records Administration or other federal records in this system is limited to those Nuala O’Connor Kelly,
government agencies pursuant to individuals specifically authorized and Chief Privacy Officer, Department of
records management inspections being granted access by DHS regulations, who Homeland Security.
conducted under the authority of 44 hold appropriate security clearances, [FR Doc. 05–7704 Filed 4–15–05; 8:45 am]
U.S.C. Sections 2904 and 2906. and who have a need to know the BILLING CODE 4410–10–P
information in the performance of their
I. To contractors, grantees, experts, official duties. The system also
consultants, volunteers, and others maintains a real-time auditing function DEPARTMENT OF HOMELAND
performing or working on a contract, of individuals who access the system. SECURITY
service, grant, cooperative agreement, or Classified information is appropriately
other assignment for the Federal stored in a secured facility, in secured Coast Guard
government, when necessary to databases and containers, and in [CGD08–05–020]
accomplish an agency function related accordance with other applicable
to this system of records. requirements, including those Houston/Galveston Navigation Safety
J. To an agency, organization, or pertaining to classified information. Advisory Committee
individual for the purposes of Access is limited to authorized
personnel only. AGENCY: Coast Guard, DHS.
performing authorized audit or
ACTION: Notice of meetings.
oversight operations. RETENTION AND DISPOSAL:
K. To a Federal, state, local, tribal, IAIP is working with the National SUMMARY: The Houston/Galveston
territorial, foreign, or international Archives and Records Administration to Navigation Safety Advisory Committee
agency, if necessary to obtain obtain approval of a records retention (HOGANSAC) and its working groups
information relevant to a Department of and disposal schedule to cover records will meet to discuss waterway
Homeland Security decision concerning in the HSOC database. IAIP has improvements, aids to navigation, area
the hiring or retention of an employee, proposed a short retention schedule for projects impacting safety on the
the issuance of a security clearance, the these records. Houston Ship Channel, and various
reporting of an investigation of any other navigation safety matters in the
SYSTEM MANAGER(S) AND ADDRESS:
employee, the letting of a contract, or Galveston Bay area. All meetings will be
Director, Disclosure Office, Office of open to the public.
the issuance of a license, grant, or other the Chief of Staff, Office of the
benefit. DATES: The next meeting of HOGANSAC
Undersecretary for Information Analysis will be held on Tuesday, May 24, 2005
L. To a Federal, state, local, tribal, and Infrastructure Protection, at 9 a.m. The meeting of the
territorial, foreign, or international Department of Homeland Security, Committee’s working groups will be
agency, in response to its request, in Washington, D.C. 20528. held on Tuesday, May 10, 2005 at 9 a.m.
connection with the hiring or retention The meetings may adjourn early if all
NOTIFICATION PROCEDURES:
of an employee, the issuance of a business is finished. Members of the
To determine whether this system
security clearance, the reporting of an public may present written or oral
contains records relating to you, write to
investigation of an employee, the letting statements at either meeting. Requests to
the System Manager identified above.
of a contract, or the issuance of a make oral presentations or distribute
license, grant, or other benefit by the RECORDS ACCESS PROCEDURES: written materials should reach the Coast
requesting agency, to the extent that the A request for access to records in this Guard five (5) working days before the
information is relevant and necessary to system may be made by writing to the meeting at which the presentation will
the requesting agency’s decision on the System Manager, identified above, in be made. Requests to have written
matter. conformance with 6 CFR Part 5, Subpart materials distributed to each member of

VerDate jul<14>2003 16:08 Apr 15, 2005 Jkt 205001 PO 00000 Frm 00058 Fmt 4703 Sfmt 4703 E:\FR\FM\18APN1.SGM 18APN1

You might also like