[Title 6 CFR ]
[Code of Federal Regulations (annual edition) - January 1, 2024 Edition]
[From the U.S. Government Publishing Office]



[[Page i]]

          

          Title 6

Domestic Security

                         Revised as of January 1, 2024

          Containing a codification of documents of general 
          applicability and future effect

          As of January 1, 2024
                    Published by the Office of the Federal Register 
                    National Archives and Records Administration as a 
                    Special Edition of the Federal Register

[[Page ii]]

          U.S. GOVERNMENT OFFICIAL EDITION NOTICE

          Legal Status and Use of Seals and Logos
          
          
          The seal of the National Archives and Records Administration 
              (NARA) authenticates the Code of Federal Regulations (CFR) as 
              the official codification of Federal regulations established 
              under the Federal Register Act. Under the provisions of 44 
              U.S.C. 1507, the contents of the CFR, a special edition of the 
              Federal Register, shall be judicially noticed. The CFR is 
              prima facie evidence of the original documents published in 
              the Federal Register (44 U.S.C. 1510).

          It is prohibited to use NARA's official seal and the stylized Code 
              of Federal Regulations logo on any republication of this 
              material without the express, written permission of the 
              Archivist of the United States or the Archivist's designee. 
              Any person using NARA's official seals and logos in a manner 
              inconsistent with the provisions of 36 CFR part 1200 is 
              subject to the penalties specified in 18 U.S.C. 506, 701, and 
              1017.

          Use of ISBN Prefix

          This is the Official U.S. Government edition of this publication 
              and is herein identified to certify its authenticity. Use of 
              the 0-16 ISBN prefix is for U.S. Government Publishing Office 
              Official Editions only. The Superintendent of Documents of the 
              U.S. Government Publishing Office requests that any reprinted 
              edition clearly be labeled as a copy of the authentic work 
              with a new ISBN.

              
              
          U . S . G O V E R N M E N T P U B L I S H I N G O F F I C E

          ------------------------------------------------------------------

          U.S. Superintendent of Documents  Washington, DC 
              20402-0001

          http://bookstore.gpo.gov

          Phone: toll-free (866) 512-1800; DC area (202) 512-1800

[[Page iii]]




                            Table of Contents



                                                                    Page
  Explanation.................................................       v

  Title 6:
          Chapter I--Department of Homeland Security, Office 
          of the Secretary                                           3
          Chapter X--Privacy and Civil Liberties Oversight 
          Board                                                    379
  Finding Aids:
      Table of CFR Titles and Chapters........................     401
      Alphabetical List of Agencies Appearing in the CFR......     421
      List of CFR Sections Affected...........................     431

[[Page iv]]





                     ----------------------------

                     Cite this Code: CFR
                     To cite the regulations in 
                       this volume use title, 
                       part and section number. 
                       Thus, 6 CFR 3.1 refers to 
                       title 6, part 3, section 
                       1.

                     ----------------------------

[[Page v]]



                               EXPLANATION

    The Code of Federal Regulations is a codification of the general and 
permanent rules published in the Federal Register by the Executive 
departments and agencies of the Federal Government. The Code is divided 
into 50 titles which represent broad areas subject to Federal 
regulation. Each title is divided into chapters which usually bear the 
name of the issuing agency. Each chapter is further subdivided into 
parts covering specific regulatory areas.
    Each volume of the Code is revised at least once each calendar year 
and issued on a quarterly basis approximately as follows:

Title 1 through Title 16.................................as of January 1
Title 17 through Title 27..................................as of April 1
Title 28 through Title 41...................................as of July 1
Title 42 through Title 50................................as of October 1

    The appropriate revision date is printed on the cover of each 
volume.

LEGAL STATUS

    The contents of the Federal Register are required to be judicially 
noticed (44 U.S.C. 1507). The Code of Federal Regulations is prima facie 
evidence of the text of the original documents (44 U.S.C. 1510).

HOW TO USE THE CODE OF FEDERAL REGULATIONS

    The Code of Federal Regulations is kept up to date by the individual 
issues of the Federal Register. These two publications must be used 
together to determine the latest version of any given rule.
    To determine whether a Code volume has been amended since its 
revision date (in this case, January 1, 2024), consult the ``List of CFR 
Sections Affected (LSA),'' which is issued monthly, and the ``Cumulative 
List of Parts Affected,'' which appears in the Reader Aids section of 
the daily Federal Register. These two lists will identify the Federal 
Register page number of the latest amendment of any given rule.

EFFECTIVE AND EXPIRATION DATES

    Each volume of the Code contains amendments published in the Federal 
Register since the last revision of that volume of the Code. Source 
citations for the regulations are referred to by volume number and page 
number of the Federal Register and date of publication. Publication 
dates and effective dates are usually not the same and care must be 
exercised by the user in determining the actual effective date. In 
instances where the effective date is beyond the cut-off date for the 
Code a note has been inserted to reflect the future effective date. In 
those instances where a regulation published in the Federal Register 
states a date certain for expiration, an appropriate note will be 
inserted following the text.

OMB CONTROL NUMBERS

    The Paperwork Reduction Act of 1980 (Pub. L. 96-511) requires 
Federal agencies to display an OMB control number with their information 
collection request.

[[Page vi]]

Many agencies have begun publishing numerous OMB control numbers as 
amendments to existing regulations in the CFR. These OMB numbers are 
placed as close as possible to the applicable recordkeeping or reporting 
requirements.

PAST PROVISIONS OF THE CODE

    Provisions of the Code that are no longer in force and effect as of 
the revision date stated on the cover of each volume are not carried. 
Code users may find the text of provisions in effect on any given date 
in the past by using the appropriate List of CFR Sections Affected 
(LSA). For the convenience of the reader, a ``List of CFR Sections 
Affected'' is published at the end of each CFR volume. For changes to 
the Code prior to the LSA listings at the end of the volume, consult 
previous annual editions of the LSA. For changes to the Code prior to 
2001, consult the List of CFR Sections Affected compilations, published 
for 1949-1963, 1964-1972, 1973-1985, and 1986-2000.

``[RESERVED]'' TERMINOLOGY

    The term ``[Reserved]'' is used as a place holder within the Code of 
Federal Regulations. An agency may add regulatory information at a 
``[Reserved]'' location at any time. Occasionally ``[Reserved]'' is used 
editorially to indicate that a portion of the CFR was left vacant and 
not dropped in error.

INCORPORATION BY REFERENCE

    What is incorporation by reference? Incorporation by reference was 
established by statute and allows Federal agencies to meet the 
requirement to publish regulations in the Federal Register by referring 
to materials already published elsewhere. For an incorporation to be 
valid, the Director of the Federal Register must approve it. The legal 
effect of incorporation by reference is that the material is treated as 
if it were published in full in the Federal Register (5 U.S.C. 552(a)). 
This material, like any other properly issued regulation, has the force 
of law.
    What is a proper incorporation by reference? The Director of the 
Federal Register will approve an incorporation by reference only when 
the requirements of 1 CFR part 51 are met. Some of the elements on which 
approval is based are:
    (a) The incorporation will substantially reduce the volume of 
material published in the Federal Register.
    (b) The matter incorporated is in fact available to the extent 
necessary to afford fairness and uniformity in the administrative 
process.
    (c) The incorporating document is drafted and submitted for 
publication in accordance with 1 CFR part 51.
    What if the material incorporated by reference cannot be found? If 
you have any problem locating or obtaining a copy of material listed as 
an approved incorporation by reference, please contact the agency that 
issued the regulation containing that incorporation. If, after 
contacting the agency, you find the material is not available, please 
notify the Director of the Federal Register, National Archives and 
Records Administration, 8601 Adelphi Road, College Park, MD 20740-6001, 
or call 202-741-6010.

CFR INDEXES AND TABULAR GUIDES

    A subject index to the Code of Federal Regulations is contained in a 
separate volume, revised annually as of January 1, entitled CFR Index 
and Finding Aids. This volume contains the Parallel Table of Authorities 
and Rules. A list of CFR titles, chapters, subchapters, and parts and an 
alphabetical list of agencies publishing in the CFR are also included in 
this volume.
    An index to the text of ``Title 3--The President'' is carried within 
that volume.

[[Page vii]]

    The Federal Register Index is issued monthly in cumulative form. 
This index is based on a consolidation of the ``Contents'' entries in 
the daily Federal Register.
    A List of CFR Sections Affected (LSA) is published monthly, keyed to 
the revision dates of the 50 CFR titles.

REPUBLICATION OF MATERIAL

    There are no restrictions on the republication of material appearing 
in the Code of Federal Regulations.

INQUIRIES

    For a legal interpretation or explanation of any regulation in this 
volume, contact the issuing agency. The issuing agency's name appears at 
the top of odd-numbered pages.
    For inquiries concerning CFR reference assistance, call 202-741-6000 
or write to the Director, Office of the Federal Register, National 
Archives and Records Administration, 8601 Adelphi Road, College Park, MD 
20740-6001 or e-mail [email protected].

SALES

    The Government Publishing Office (GPO) processes all sales and 
distribution of the CFR. For payment by credit card, call toll-free, 
866-512-1800, or DC area, 202-512-1800, M-F 8 a.m. to 4 p.m. e.s.t. or 
fax your order to 202-512-2104, 24 hours a day. For payment by check, 
write to: U.S. Government Publishing Office Superintendent of Documents, 
P.O. Box 37082, Washington, DC 20013-7082.

ELECTRONIC SERVICES

    The full text of the Code of Federal Regulations, the LSA (List of 
CFR Sections Affected), The United States Government Manual, the Federal 
Register, Public Laws, Compilation of Presidential Documents and the 
Privacy Act Compilation are available in electronic format via 
www.govinfo.gov. For more information, contact the GPO Customer Contact 
Center, U.S. Government Publishing Office. Phone 202-512-1800, or 866-
512-1800 (toll-free). E-mail, [email protected].
    The Office of the Federal Register also offers a free service on the 
National Archives and Records Administration's (NARA) website for public 
law numbers, Federal Register finding aids, and related information. 
Connect to NARA's website at www.archives.gov/federal-register.
    The eCFR is a regularly updated, unofficial editorial compilation of 
CFR material and Federal Register amendments, produced by the Office of 
the Federal Register and the Government Publishing Office. It is 
available at www.ecfr.gov.

    Oliver A. Potts,
    Director,
    Office of the Federal Register
    January 1, 2024







[[Page ix]]



                               THIS TITLE

    Title 6--Domestic Security is composed of one volume. This volume 
contains Chapter I--Department of Homeland Security, Office of the 
Secretary and Chapter X--Privacy and Civil Liberties Oversight Board. 
The contents of this volume represent all current regulations codified 
under this title of the CFR as of January 1, 2024.

    For this volume, Gabrielle E. Burns was Chief Editor. The Code of 
Federal Regulations publication program is under the direction of John 
Hyrum Martinez, assisted by Stephen J. Frattini.

[[Page 1]]



                       TITLE 6--DOMESTIC SECURITY




  --------------------------------------------------------------------
                                                                    Part

chapter i--Department of Homeland Security, Office of the 
  Secretary.................................................           3

chapter x--Privacy and Civil Liberties Oversight Board......        1000

[[Page 3]]



   CHAPTER I--DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY




  --------------------------------------------------------------------
Part                                                                Page
1-2

[Reserved]

3               Petitions for rulemaking....................           5
4

[Reserved]

5               Disclosure of records and information.......           6
7               Classified national security information....         129
9               Restrictions upon lobbying..................         139
11              Claims......................................         150
13              Program fraud civil remedies................         156
15              Enforcement of nondiscrimination on the 
                    basis of disability in programs or 
                    activities conducted by the Department 
                    of Homeland Security....................         172
17              Nondiscrimination on the basis of sex in 
                    education programs or activities 
                    receiving Federal financial assistance..         178
19              Nondiscrimination in matters pertaining to 
                    faith-based organizations...............         195
21              Nondiscrimination on the basis of race, 
                    color, or national origin in programs or 
                    activities receiving Federal financial 
                    assistance from the Department of 
                    Homeland Security.......................         201
25              Regulations to support anti-terrorism by 
                    fostering effective technologies........         211
27              Chemical facility anti-terrorism standards..         226
29              Protected critical infrastructure 
                    information.............................         263
37              REAL ID driver's licenses and identification 
                    cards...................................         273
46              Protection of human subjects................         289
115             Sexual abuse and assault prevention 
                    standards...............................         307
126             Transportation security oversight board 
                    review panel process and procedures.....         338
158             Cybersecurity talent management system 
                    (CTMS)..................................         344
159-199

[Reserved]

[[Page 5]]

                          PARTS 1	2 [RESERVED]



PART 3_PETITIONS FOR RULEMAKING--Table of Contents



Sec.
3.1 Definitions.
3.3 Applicability.
3.5 Format and mailing instructions.
3.7 Content of a rulemaking petition.
3.9 Responding to a rulemaking petition.

    Authority: 5 U.S.C. 301, 553(e); 6 U.S.C. 112.

    Source: 81 FR 47286, July 21, 2016, unless otherwise noted.



Sec.  3.1  Definitions.

    As used in this part:
    Component means each separate organizational entity within the U.S. 
Department of Homeland Security (DHS) that reports directly to the 
Office of the Secretary.
    DHS means the U.S. Department of Homeland Security, including its 
components.
    Rulemaking petition means a petition to issue, amend, or repeal a 
rule, as described at 5 U.S.C. 553(e).



Sec.  3.3  Applicability.

    (a) General requirement. Except as provided in paragraph (b) of this 
section, this part prescribes the exclusive process for interested 
persons to submit a rulemaking petition on a matter within DHS's 
jurisdiction.
    (b) Exceptions--(1) U.S. Coast Guard. This part does not apply to 
any petition for rulemaking directed to the U.S. Coast Guard. Such 
petitions are governed by 33 CFR 1.05-20.
    (2) Federal Emergency Management Agency. This part does not apply to 
any petition for rulemaking directed to the Federal Emergency Management 
Agency. Such petitions are governed by 44 CFR 1.18.



Sec.  3.5  Format and mailing instructions.

    (a) Format. A rulemaking petition must include in a prominent 
location--
    (1) The words ``Petition for Rulemaking'' or ``Rulemaking 
Petition;'' and
    (2) The petitioner's name and a mailing address, in addition to any 
other contact information (such as telephone number or email) that the 
petitioner chooses to include.
    (b) Mailing instructions--(1) General mailing address. Any 
interested person may submit a rulemaking petition by sending it to the 
following address: U.S. Department of Homeland Security, Office of the 
General Counsel, Mail Stop 0485, Attn: Regulatory Affairs Law Division, 
245 Murray Lane SW., Washington, DC 20528-0485.
    (2) Transportation Security Administration mailing address. Any 
interested person may submit a rulemaking petition regarding a 
Transportation Security Administration program or authority directly to 
the Transportation Security Administration by sending it to the 
following address: Transportation Security Administration, Office of the 
Chief Counsel, TSA-2, Attn: Regulations and Security Standards Division, 
601 South 12th Street, Arlington, VA 20598-6002.
    (3) DHS does not accept rulemaking petitions delivered by courier.



Sec.  3.7  Content of a rulemaking petition.

    (a) DHS will be better positioned to understand and respond to a 
rulemaking petition if the petition describes with reasonable 
particularity the rule that the petitioner is asking DHS to issue, 
amend, or repeal, and the factual and legal basis for the petition. For 
instance, DHS would be better able to understand and respond to a 
petition that includes--
    (1) A description of the specific problem that the requested 
rulemaking would address;
    (2) An explanation of how the requested rulemaking would resolve 
this problem;
    (3) Data and other information that would be relevant to DHS's 
consideration of the petition;
    (4) A description of the substance of the requested rulemaking; and
    (5) Citation to the pertinent existing regulations provisions (if 
any) and pertinent DHS legal authority for taking action.
    (b) [Reserved]

[[Page 6]]



Sec.  3.9  Responding to a rulemaking petition.

    (a) Public procedure. DHS may, in its discretion, seek broader 
public comment on a rulemaking petition prior to its disposition under 
this section.
    (b) Disposition. DHS may respond to the petition by letter or by 
Federal Register publication. DHS may grant or deny the petition, in 
whole or in part.
    (c) Grounds for denial. DHS may deny the petition for any reason 
consistent with law, including, but not limited to, the following 
reasons: The petition has no merit, the petition is contrary to 
pertinent statutory authority, the petition is not supported by the 
relevant information or data, or the petition cannot be addressed 
because of other priorities or resource constraints.
    (d) Summary disposition. DHS may, by written letter, deny or 
summarily dismiss without prejudice any petition that is moot, 
premature, repetitive, or frivolous, or that plainly does not warrant 
further consideration.

                            PART 4 [RESERVED]



PART 5_DISCLOSURE OF RECORDS AND INFORMATION--Table of Contents



  Subpart A_Procedures for Disclosure of Records Under the Freedom of 
                             Information Act

Sec.
5.1 General provisions.
5.2 Proactive disclosures of DHS records.
5.3 Requirements for making requests.
5.4 Responsibility for responding to requests.
5.5 Timing of responses to requests.
5.6 Responses to requests.
5.7 Confidential commercial information.
5.8 Administrative appeals.
5.9 Preservation of records.
5.10 FOIA requests for information contained in a Privacy Act system of 
          records.
5.11 Fees.
5.12 Confidential commercial information; CBP procedures.
5.13 Other rights and services.

                          Subpart B_Privacy Act

5.20 General provisions.
5.21 Requests for access to records.
5.22 Responsibility for responding to requests for access to records.
5.23 Responses to requests for access to records.
5.24 Classified information.
5.25 Administrative appeals for access requests.
5.26 Requests for amendment or correction of records.
5.27 Requests for an accounting of record disclosures.
5.28 Preservation of records.
5.29 Fees.
5.30 Notice of court-ordered and emergency disclosures.
5.31 Security of systems of records.
5.32 Contracts for the operation of systems of records.
5.33 Use and collection of Social Security numbers.
5.34 Standards of conduct for administration of the Privacy Act.
5.35 Sanctions and penalties.
5.36 Other rights and services.

            Subpart C_Disclosure of Information in Litigation

5.41 Purpose and scope; definitions.
5.42 Service of summonses and complaints.
5.43 Service of subpoenas, court orders, and other demands or requests 
          for official information or action.
5.44 Testimony and production of documents prohibited unless approved by 
          appropriate Department officials.
5.45 Procedure when testimony or production of documents is sought; 
          general.
5.46 Procedure when response to demand is required prior to receiving 
          instructions.
5.47 Procedure in the event of an adverse ruling.
5.48 Considerations in determining whether the Department will comply 
          with a demand or request.
5.49 Prohibition on providing expert or opinion testimony.

Appendix A to Subpart C of Part 5--Service of Process of Summonses, 
          Complaints, and Subpoenas
Appendix A to Part 5--FOIA/Privacy Act Offices of the Department of 
          Homeland Security
Appendix B to Part 5 [Reserved]
Appendix C to Part 5--DHS Systems of Records Exempt From the Privacy Act

    Authority: 6 U.S.C. 101 et seq.; Pub. L. 107-296, 116 Stat. 2135; 5 
U.S.C. 301; 6 U.S.C. 142; DHS Del. No. 13001, Rev. 01 (June 2, 2020).
    Subpart A also issued under 5 U.S.C. 552.
    Subpart B also issued under 5 U.S.C. 552a and 552 note.

    Source: 68 FR 4056, Jan. 27, 2003, unless otherwise noted.

[[Page 7]]



  Subpart A_Procedures for Disclosure of Records Under the Freedom of 
                             Information Act

    Source: 81 FR 83632, Nov. 22, 2016, unless otherwise noted.



Sec.  5.1  General provisions.

    (a)(1) This subpart contains the rules that the Department of 
Homeland Security follows in processing requests for records under the 
Freedom of Information Act (FOIA), 5 U.S.C. 552 as amended.
    (2) The rules in this subpart should be read in conjunction with the 
text of the FOIA and the Uniform Freedom of Information Fee Schedule and 
Guidelines published by the Office of Management and Budget at 52 FR 
10012 (March 27, 1987) (hereinafter ``OMB Guidelines''). Additionally, 
DHS has additional policies and procedures relevant to the FOIA process. 
These resources are available at http://www.dhs.gov/freedom-information-
act-foia. Requests made by individuals for records about themselves 
under the Privacy Act of 1974, 5 U.S.C. 552a, are processed under 
subpart B of part 5 as well as under this subpart.
    (b) As referenced in this subpart, component means the FOIA office 
of each separate organizational entity within DHS that reports directly 
to the Office of the Secretary.
    (c) DHS has a decentralized system for processing requests, with 
each component handling requests for its records.
    (d) Unofficial release of DHS information. The disclosure of exempt 
records, without authorization by the appropriate DHS official, is not 
an official release of information; accordingly, it is not a FOIA 
release. Such a release does not waive the authority of the Department 
of Homeland Security to assert FOIA exemptions to withhold the same 
records in response to a FOIA request. In addition, while the authority 
may exist to disclose records to individuals in their official capacity, 
the provisions of this part apply if the same individual seeks the 
records in a private or personal capacity.



Sec.  5.2  Proactive disclosure of DHS records.

    Records that are required by the FOIA to be made available for 
public inspection in an electronic format are accessible on DHS's Web 
site, http://www.dhs.gov/freedom-information-act-foia-and-privacy-act. 
Each component is responsible for determining which of its records are 
required to be made publicly available, as well as identifying 
additional records of interest to the public that are appropriate for 
public disclosure, and for posting and indexing such records. Each 
component shall ensure that posted records and indices are updated on an 
ongoing basis. Each component has a FOIA Public Liaison who can assist 
individuals in locating records particular to a component. A list of 
DHS's FOIA Public Liaisons is available at http://www.dhs.gov/foia-
contact-information and in appendix A to this part. Requesters who do 
not have access to the internet may contact the Public Liaison for the 
component from which they seek records for assistance with publicly 
available records.

[81 FR 83632, Nov. 22, 2016, as amended at 87 FR 68601, Nov. 16, 2022]



Sec.  5.3  Requirements for making requests.

    (a) General information. (1) DHS has a decentralized system for 
responding to FOIA requests, with each component designating a FOIA 
office to process records from that component. All components have the 
capability to receive requests electronically, either through email or a 
web portal. To make a request for DHS records, a requester should write 
directly to the FOIA office of the component that maintains the records 
being sought. A request will receive the quickest possible response if 
it is addressed to the FOIA office of the component that maintains the 
records sought. DHS's FOIA Reference Guide contains or refers the reader 
to descriptions of the functions of each component and provides other 
information that is helpful in determining where to make a request. Each 
component's FOIA office and any additional requirements for submitting a 
request to a given component are listed

[[Page 8]]

in appendix A to this part. These references can all be used by 
requesters to determine where to send their requests within DHS.
    (2) A requester may also send his or her request to the Privacy 
Office, U.S. Department of Homeland Security, 245 Murray Lane SW STOP-
0655, or via the internet at http://www.dhs.gov/dhs-foia-request-
submission-form, or via fax to (202) 343-4011. The Privacy Office will 
forward the request to the component(s) that it determines to be most 
likely to maintain the records that are sought.
    (3) A requester who is making a request for records about him or 
herself must comply with the verification of identity provision set 
forth in subpart B of this part.
    (4) Where a request for records pertains to a third party, a 
requester may receive greater access by submitting either a notarized 
authorization signed by that individual, in compliance with the 
verification of identity provision set forth in subpart B of this part, 
or a declaration made in compliance with the requirements set forth in 
28 U.S.C. 1746 by that individual, authorizing disclosure of the records 
to the requester, or by submitting proof that the individual is deceased 
(e.g., a copy of a death certificate or an obituary). As an exercise of 
its administrative discretion, each component can require a requester to 
supply additional information if necessary in order to verify that a 
particular individual has consented to disclosure.
    (b) Description of records sought. Requesters must describe the 
records sought in sufficient detail to enable DHS personnel to locate 
them with a reasonable amount of effort. A reasonable description 
contains sufficient information to permit an organized, non-random 
search for the record based on the component's filing arrangements and 
existing retrieval systems. To the extent possible, requesters should 
include specific information that may assist a component in identifying 
the requested records, such as the date, title or name, author, 
recipient, subject matter of the record, case number, file designation, 
or reference number. Requesters should refer to appendix A to this part 
for additional component-specific requirements. In general, requesters 
should include as much detail as possible about the specific records or 
the types of records that they are seeking. Before submitting their 
requests, requesters may contact the component's FOIA Officer or FOIA 
public liaison to discuss the records they are seeking and to receive 
assistance in describing the records. If after receiving a request, a 
component determines that it does not reasonably describe the records 
sought, the component should inform the requester what additional 
information is needed or why the request is otherwise insufficient. 
Requesters who are attempting to reformulate or modify such a request 
may discuss their request with the component's designated FOIA Officer, 
its FOIA Public Liaison, or a representative of the DHS Privacy Office, 
each of whom is available to assist the requester in reasonably 
describing the records sought.
    (c) If a request does not adequately describe the records sought, 
DHS may at its discretion either administratively close the request or 
seek additional information from the requester. Requests for 
clarification or more information will be made in writing (either via 
U.S. mail or electronic mail whenever possible). Requesters may respond 
by U.S. Mail or by electronic mail regardless of the method used by DHS 
to transmit the request for additional information. In order to be 
considered timely, responses to requests for additional information must 
be postmarked or received by electronic mail within 30 working days of 
the postmark date or date of the electronic mail request for additional 
information or received by electronic mail by 11:59:59 p.m. ET on the 
30th working day. If the requester does not respond to a request for 
additional information within thirty (30) working days, the request may 
be administratively closed at DHS's discretion. This administrative 
closure does not prejudice the requester's ability to submit a new 
request for further consideration with additional information.

[81 FR 83632, Nov. 22, 2016, as amended at 87 FR 68601, Nov. 16, 2022]

[[Page 9]]



Sec.  5.4  Responsibility for responding to requests.

    (a) In general. Except in the instances described in paragraphs (c) 
and (d) of this section, the component that first receives a request for 
a record and maintains that record is the component responsible for 
responding to the request. In determining which records are responsive 
to a request, a component ordinarily will include only records in its 
possession as of the date that it begins its search. If any other date 
is used, the component shall inform the requester of that date. A record 
that is excluded from the requirements of the FOIA pursuant to 5 U.S.C. 
552(c), shall not be considered responsive to a request.
    (b) Authority to grant or deny requests. The head of a component, or 
designee, is authorized to grant or to deny any requests for records 
that are maintained by that component.
    (c) Re-routing of misdirected requests. Where a component's FOIA 
office determines that a request was misdirected within DHS, the 
receiving component's FOIA office shall route the request to the FOIA 
office of the proper component(s).
    (d) Consultations, coordination and referrals. When a component 
determines that it maintains responsive records that either originated 
with another component or agency, or which contains information provided 
by, or of substantial interest to, another component or agency, then it 
shall proceed in accordance with either paragraph (d)(1), (2), or (3) of 
this section, as appropriate:
    (1) The component may respond to the request, after consulting with 
the component or the agency that originated or has a substantial 
interest in the records involved.
    (2) The component may respond to the request after coordinating with 
the other components or agencies that originated the record. This may 
include situations where the standard referral procedure is not 
appropriate where disclosure of the identity of the component or agency 
to which the referral would be made could harm an interest protected by 
an applicable exemption, such as the exemptions that protect personal 
privacy or national security interests. For example, if a non-law 
enforcement component responding to a request for records on a living 
third party locates records within its files originating with a law 
enforcement agency, and if the existence of that law enforcement 
interest in the third party was not publicly known, then to disclose 
that law enforcement interest could cause an unwarranted invasion of the 
personal privacy of the third party. Similarly, if a component locates 
material within its files originating with an Intelligence Community 
agency, and the involvement of that agency in the matter is classified 
and not publicly acknowledged, then to disclose or give attribution to 
the involvement of that Intelligence Community agency could cause 
national security harms. In such instances, in order to avoid harm to an 
interest protected by an applicable exemption, the component that 
received the request should coordinate with the originating component or 
agency to seek its views on the disclosability of the record. The 
release determination for the record that is the subject of the 
coordination should then be conveyed to the requester by the component 
that originally received the request.
    (3) The component may refer the responsibility for responding to the 
request or portion of the request to the component or agency best able 
to determine whether to disclose the relevant records, or to the agency 
that created or initially acquired the record as long as that agency is 
subject to the FOIA. Ordinarily, the component or agency that created or 
initially acquired the record will be presumed to be best able to make 
the disclosure determination. The referring component shall document the 
referral and maintain a copy of the records that it refers.
    (e) Classified information. On receipt of any request involving 
classified information, the component shall determine whether 
information is currently and properly classified and take appropriate 
action to ensure compliance with 6 CFR part 7. Whenever a request 
involves a record containing information that has been classified or may 
be appropriate for classification by another component or agency under 
any

[[Page 10]]

applicable executive order concerning the classification of records, the 
receiving component shall refer the responsibility for responding to the 
request regarding that information to the component or agency that 
classified the information, or should consider the information for 
classification. Whenever a component's record contains information 
classified by another component or agency, the component shall 
coordinate with or refer the responsibility for responding to that 
portion of the request to the component or agency that classified the 
underlying information.
    (f) Notice of referral. Whenever a component refers any part of the 
responsibility for responding to a request to another component or 
agency, it will notify the requester of the referral and inform the 
requester of the name of each component or agency to which the records 
were referred, unless disclosure of the identity of the component or 
agency would harm an interest protected by an applicable exemption, in 
which case the component should coordinate with the other component or 
agency, rather than refer the records.
    (g) Timing of responses to consultations and referrals. All 
consultations and referrals received by DHS will be handled according to 
the date that the FOIA request initially was received by the first 
component or agency, not any later date.
    (h) Agreements regarding consultations and referrals. Components may 
establish agreements with other components or agencies to eliminate the 
need for consultations or referrals with respect to particular types of 
records.
    (i) Electronic records and searches--(1) Significant interference. 
The FOIA allows components to not conduct a search for responsive 
documents if the search would cause significant interference with the 
operation of the component's automated information system.
    (2) Business as usual approach. A ``business as usual'' approach 
exists when the component has the capability to process a FOIA request 
for electronic records without a significant expenditure of monetary or 
personnel resources. Components are not required to conduct a search 
that does not meet this business as usual criterion.
    (i) Creating computer programs or purchasing additional hardware to 
extract email that has been archived for emergency retrieval usually are 
not considered business as usual if extensive monetary or personnel 
resources are needed to complete the project.
    (ii) Creating a computer program that produces specific requested 
fields or records contained within a well-defined database structure 
usually is considered business as usual. The time to create this program 
is considered as programmer or operator search time for fee assessment 
purposes and the FOIA requester may be assessed fees in accordance with 
Sec.  5.11(c)(1)(iii). However, creating a computer program to merge 
files with disparate data formats and extract specific elements from the 
resultant file is not considered business as usual, but a special 
service, for which additional fees may be imposed as specified in Sec.  
5.11. Components are not required to perform special services and 
creation of a computer program for a fee is up to the discretion of the 
component and is dependent on component resources and expertise.
    (3) Data links. Components are not required to expend DHS funds to 
establish data links that provide real time or near-real-time data to a 
FOIA requester.



Sec.  5.5  Timing of responses to requests.

    (a) In general. Components ordinarily will respond to requests 
according to their order of receipt. Appendix A to this part contains 
the list of components that are designated to accept requests. In 
instances involving misdirected requests that are re-routed pursuant to 
Sec.  5.4(c), the response time will commence on the date that the 
request is received by the proper component, but in any event not later 
than ten working days after the request is first received by any DHS 
component designated in appendix A to this part.
    (b) Multitrack processing. All components must designate a specific 
track for requests that are granted expedited processing, in accordance 
with the standards set forth in paragraph (e) of this section. A 
component may also designate additional processing tracks

[[Page 11]]

that distinguish between simple and more complex requests based on the 
estimated amount of work or time needed to process the request. Among 
the factors a component may consider are the number of pages involved in 
processing the request or the need for consultations or referrals. 
Components shall advise requesters of the track into which their request 
falls, and when appropriate, shall offer requesters an opportunity to 
narrow their request so that the request can be placed in a different 
processing track.
    (c) Unusual circumstances. Whenever the statutory time limits for 
processing a request cannot be met because of ``unusual circumstances,'' 
as defined in the FOIA, and the component extends the time limits on 
that basis, the component shall, before expiration of the twenty-day 
period to respond, notify the requester in writing of the unusual 
circumstances involved and of the date by which processing of the 
request can be expected to be completed. Where the extension exceeds ten 
working days, the component shall, as described by the FOIA, provide the 
requester with an opportunity to modify the request or agree to an 
alternative time period for processing. The component shall make 
available its designated FOIA Officer and its FOIA Public Liaison for 
this purpose. The component shall also alert requesters to the 
availability of the Office of Government Information Services (OGIS) to 
provide dispute resolution services.
    (d) Aggregating requests. For the purposes of satisfying unusual 
circumstances under the FOIA, components may aggregate requests in cases 
where it reasonably appears that multiple requests, submitted either by 
a requester or by a group of requesters acting in concert, constitute a 
single request that would otherwise involve unusual circumstances. 
Components will not aggregate multiple requests that involve unrelated 
matters.
    (e) Expedited processing. (1) Requests and appeals will be processed 
on an expedited basis whenever the component determines that they 
involve:
    (i) Circumstances in which the lack of expedited processing could 
reasonably be expected to pose an imminent threat to the life or 
physical safety of an individual;
    (ii) An urgency to inform the public about an actual or alleged 
federal government activity, if made by a person who is primarily 
engaged in disseminating information;
    (iii) The loss of substantial due process rights; or
    (iv) A matter of widespread and exceptional media interest in which 
there exist possible questions about the government's integrity which 
affect public confidence.
    (2) A request for expedited processing may be made at any time. 
Requests based on paragraphs (e)(1)(i), (ii), and (iii) of this section 
must be submitted to the component that maintains the records requested. 
When making a request for expedited processing of an administrative 
appeal, the request should be submitted to the DHS Office of General 
Counsel or the component Appeals Officer. Address information is 
available at the DHS Web site, http://www.dhs.gov/freedom-information-
act-foia, or by contacting the component FOIA officers via the 
information listed in appendix A to part 5. Requests for expedited 
processing that are based on paragraph (e)(1)(iv) of this section must 
be submitted to the Senior Director of FOIA Operations, the Privacy 
Office, U.S. Department of Homeland Security, 245 Murray Lane SW STOP-
0655, Washington, DC 20598-0655. A component that receives a misdirected 
request for expedited processing under the standard set forth in 
paragraph (e)(1)(iv) of this section shall forward it immediately to the 
DHS Senior Director of FOIA Operations, the Privacy Office, for 
determination. The time period for making the determination on the 
request for expedited processing under paragraph (e)(1)(iv) of this 
section shall commence on the date that the Privacy Office receives the 
request, provided that it is routed within ten working days, but in no 
event shall the time period for making a determination on the request 
commence any later than the eleventh working day after the request is 
received by any component designated in appendix A to part 5.
    (3) A requester who seeks expedited processing must submit a 
statement,

[[Page 12]]

certified to be true and correct, explaining in detail the basis for 
making the request for expedited processing. For example, under 
paragraph (e)(1)(ii) of this section, a requester who is not a full-time 
member of the news media must establish that he or she is a person who 
primarily engages in information dissemination, though it need not be 
his or her sole occupation. Such a requester also must establish a 
particular urgency to inform the public about the government activity 
involved in the request--one that extends beyond the public's right to 
know about government activity generally. The existence of numerous 
articles published on a given subject can be helpful to establishing the 
requirement that there be an ``urgency to inform'' the public on the 
topic. As a matter of administrative discretion, a component may waive 
the formal certification requirement.
    (4) A component shall notify the requester within ten calendar days 
of the receipt of a request for expedited processing of its decision 
whether to grant or deny expedited processing. If expedited processing 
is granted, the request shall be given priority, placed in the 
processing track for expedited requests, and shall be processed as soon 
as practicable. If a request for expedited processing is denied, any 
appeal of that decision shall be acted on expeditiously.

[81 FR 83632, Nov. 22, 2016, as amended at 87 FR 68601, Nov. 16, 2022]



Sec.  5.6  Responses to requests.

    (a) In general. Components should, to the extent practicable, 
communicate with requesters having access to the Internet using 
electronic means, such as email or web portal.
    (b) Acknowledgments of requests. A component shall acknowledge the 
request and assign it an individualized tracking number if it will take 
longer than ten working days to process. Components shall include in the 
acknowledgment a brief description of the records sought to allow 
requesters to more easily keep track of their requests.
    (c) Grants of requests. Ordinarily, a component shall have twenty 
(20) working days from when a request is received to determine whether 
to grant or deny the request unless there are unusual or exceptional 
circumstances. Once a component makes a determination to grant a request 
in full or in part, it shall notify the requester in writing. The 
component also shall inform the requester of any fees charged under 
Sec.  5.11 and shall disclose the requested records to the requester 
promptly upon payment of any applicable fees. The component shall inform 
the requester of the availability of its FOIA Public Liaison to offer 
assistance.
    (d) Adverse determinations of requests. A component making an 
adverse determination denying a request in any respect shall notify the 
requester of that determination in writing. Adverse determinations, or 
denials of requests, include decisions that the requested record is 
exempt, in whole or in part; the request does not reasonably describe 
the records sought; the information requested is not a record subject to 
the FOIA; the requested record does not exist, cannot be located, or has 
been destroyed; or the requested record is not readily reproducible in 
the form or format sought by the requester. Adverse determinations also 
include denials involving fees, including requester categories or fee 
waiver matters, or denials of requests for expedited processing.
    (e) Content of denial. The denial shall be signed by the head of the 
component, or designee, and shall include:
    (1) The name and title or position of the person responsible for the 
denial;
    (2) A brief statement of the reasons for the denial, including any 
FOIA exemption applied by the component in denying the request;
    (3) An estimate of the volume of any records or information 
withheld, for example, by providing the number of pages or some other 
reasonable form of estimation. This estimation is not required if the 
volume is otherwise indicated by deletions marked on records that are 
disclosed in part, or if providing an estimate would harm an interest 
protected by an applicable exemption; and

[[Page 13]]

    (4) A statement that the denial may be appealed under Sec.  5.8(a), 
and a description of the requirements set forth therein.
    (5) A statement notifying the requester of the assistance available 
from the agency's FOIA Public Liaison and the dispute resolution 
services offered by OGIS.
    (f) Markings on released documents. Markings on released documents 
must be clearly visible to the requester. Records disclosed in part 
shall be marked to show the amount of information deleted and the 
exemption under which the deletion was made unless doing so would harm 
an interest protected by an applicable exemption. The location of the 
information deleted also shall be indicated on the record, if 
technically feasible.
    (g) Use of record exclusions. (1) In the event that a component 
identifies records that may be subject to exclusion from the 
requirements of the FOIA pursuant to 5 U.S.C. 552(c), the head of the 
FOIA office of that component must confer with Department of Justice's 
Office of Information Policy (OIP) to obtain approval to apply the 
exclusion.
    (2) Any component invoking an exclusion shall maintain an 
administrative record of the process of invocation and approval of the 
exclusion by OIP.



Sec.  5.7  Confidential commercial information.

    (a) Definitions--(1) Confidential commercial information means 
commercial or financial information obtained by DHS from a submitter 
that may be protected from disclosure under Exemption 4 of the FOIA.
    (2) Submitter means any person or entity from whom DHS obtains 
confidential commercial information, directly or indirectly.
    (b) Designation of confidential commercial information. A submitter 
of confidential commercial information must use good faith efforts to 
designate by appropriate markings, either at the time of submission or 
within a reasonable time thereafter, any portion of its submission that 
it considers to be protected from disclosure under Exemption 4. These 
designations will expire ten years after the date of the submission 
unless the submitter requests and provides justification for a longer 
designation period.
    (c) When notice to submitters is required. (1) A component shall 
promptly provide written notice to a submitter whenever records 
containing such information are requested under the FOIA if, after 
reviewing the request, the responsive records, and any appeal by the 
requester, the component determines that it may be required to disclose 
the records, provided:
    (i) The requested information has been designated in good faith by 
the submitter as information considered protected from disclosure under 
Exemption 4; or
    (ii) The component has a reason to believe that the requested 
information may be protected from disclosure under Exemption 4.
    (2) The notice shall either describe the commercial information 
requested or include a copy of the requested records or portions of 
records containing the information. In cases involving a voluminous 
number of submitters, notice may be made by posting or publishing the 
notice in a place or manner reasonably likely to accomplish it.
    (d) Exceptions to submitter notice requirements. The notice 
requirements of paragraphs (c) and (g) of this section shall not apply 
if:
    (1) The component determines that the information is exempt under 
the FOIA;
    (2) The information lawfully has been published or has been 
officially made available to the public;
    (3) Disclosure of the information is required by a statute other 
than the FOIA or by a regulation issued in accordance with the 
requirements of Executive Order 12600 of June 23, 1987; or
    (4) The designation made by the submitter under paragraph (b) of 
this section appears obviously frivolous, except that, in such a case, 
the component shall give the submitter written notice of any final 
decision to disclose the information and must provide that notice within 
a reasonable number of days prior to a specified disclosure date.

[[Page 14]]

    (e) Opportunity to object to disclosure. (1) A component will 
specify a reasonable time period, but no fewer than 10 working days, 
within which the submitter must respond to the notice referenced above. 
If a submitter has any objections to disclosure, it should provide the 
component a detailed written statement that specifies all grounds for 
withholding the particular information under any exemption of the FOIA. 
In order to rely on Exemption 4 as basis for nondisclosure, the 
submitter must explain why the information constitutes a trade secret, 
or commercial or financial information that is privileged or 
confidential.
    (2) A submitter who fails to respond within the time period 
specified in the notice shall be considered to have no objection to 
disclosure of the information. Information received by the component 
after the date of any disclosure decision will not be considered by the 
component. Any information provided by a submitter under this subpart 
may itself be subject to disclosure under the FOIA.
    (f) Analysis of objections. A component shall consider a submitter's 
objections and specific grounds for nondisclosure in deciding whether to 
disclose the requested information.
    (g) Notice of intent to disclose. Whenever a component decides to 
disclose information over the objection of a submitter, the component 
shall provide the submitter written notice, which shall include:
    (1) A statement of the reasons why each of the submitter's 
disclosure objections was not sustained;
    (2) A description of the information to be disclosed; and
    (3) A specified disclosure date, which shall be a reasonable time 
subsequent to the notice, but no fewer than 10 working days.
    (h) Notice of FOIA lawsuit. Whenever a requester files a lawsuit 
seeking to compel the disclosure of confidential commercial information, 
the component shall promptly notify the submitter.
    (i) Requester notification. The component shall notify a requester 
whenever it provides the submitter with notice and an opportunity to 
object to disclosure; whenever it notifies the submitter of its intent 
to disclose the requested information; and whenever a submitter files a 
lawsuit to prevent the disclosure of the information.
    (j) Scope. This section shall not apply to any confidential 
commercial information provided to CBP by a business submitter. Section 
5.12 applies to such information. Section 5.12 also defines 
``confidential commercial information'' as used in this paragraph.



Sec.  5.8  Administrative appeals.

    (a) Requirements for filing an appeal. (1) A requester may appeal 
adverse determinations denying his or her request or any part of the 
request to the appropriate Appeals Officer. A requester may also appeal 
if he or she questions the adequacy of the component's search for 
responsive records, or believes the component either misinterpreted the 
request or did not address all aspects of the request (i.e., it issued 
an incomplete response), or if the requester believes there is a 
procedural deficiency (e.g., fees were improperly calculated). For the 
address of the appropriate component Appeals Officer, contact the 
applicable component FOIA liaison using the information in appendix A to 
this part, visit www.dhs.gov/foia, or call 1-866-431-0486. An appeal 
must be in writing, and to be considered timely it must be postmarked 
or, in the case of electronic submissions, transmitted to the Appeals 
Officer within 90 working days after the date of the component's 
response. An electronically filed appeal will be considered timely if 
transmitted to the Appeals Officer by 11:59:59 p.m. ET or EDT on the 
90th working day. The appeal should clearly identify the component 
determination (including the assigned request number if the requester 
knows it) that is being appealed and should contain the reasons the 
requester believes the determination was erroneous. To facilitate 
handling, the requester should mark both the letter and the envelope, or 
the transmittal line in the case of electronic transmissions ``Freedom 
of Information Act Appeal.''
    (2) An adverse determination by the component appeals officer will 
be the final action of DHS.

[[Page 15]]

    (b) Adjudication of appeals. (1) The DHS Office of the General 
Counsel or its designee (e.g., component Appeals Officers) is the 
authorized appeals authority for DHS;
    (2) On receipt of any appeal involving classified information, the 
Appeals Officer shall consult with the Chief Security Officer, and take 
appropriate action to ensure compliance with 6 CFR part 7;
    (3) If the appeal becomes the subject of a lawsuit, the Appeals 
Officer is not required to act further on the appeal.
    (c) Appeal decisions. The decision on the appeal will be made in 
writing. A decision that upholds a component's determination will 
contain a statement that identifies the reasons for the affirmance, 
including any FOIA exemptions applied. The decision will provide the 
requester with notification of the statutory right to file a lawsuit and 
will inform the requester of the mediation services offered by the 
Office of Government Information Services, of the National Archives and 
Records Administration, as a non-exclusive alternative to litigation. 
Should the requester elect to mediate any dispute related to the FOIA 
request with the Office of Government Information Services, DHS and its 
components will participate in the mediation process in good faith. If 
the adverse decision is reversed or modified on appeal, in whole or in 
part, the requester will be notified in a written decision and the 
request will be thereafter be further processed in accordance with that 
appeal decision.
    (d) Time limit for issuing appeal decision. The statutory time limit 
for responding to appeals is generally 20 working days after receipt. 
However, the Appeals Officer may extend the time limit for responding to 
an appeal provided the circumstances set forth in 5 U.S.C. 
552(a)(6)(B)(i) are met.
    (e) Appeal necessary before seeking court review. If a requester 
wishes to seek court review of a component's adverse determination on a 
matter appealable under paragraph (a)(1) of this section, the requester 
must generally first appeal it under this subpart. However, a requester 
is not required to first file an appeal of an adverse determination of a 
request for expedited processing prior to seeking court review.

[81 FR 83632, Nov. 22, 2016, as amended at 87 FR 68601, Nov. 16, 2022]



Sec.  5.9  Preservation of records.

    Each component shall preserve all correspondence pertaining to the 
requests that it receives under this subpart, as well as copies of all 
requested records, until disposition or destruction is authorized 
pursuant to title 44 of the United States Code or the General Records 
Schedule 4.2 and/or 14 of the National Archives and Records 
Administration. Records will not be disposed of or destroyed while they 
are the subject of a pending request, appeal, or lawsuit under the FOIA.



Sec.  5.10  FOIA requests for information contained in a Privacy Act
system of records.

    (a) Information subject to Privacy Act. (1) If a requester submits a 
FOIA request for information about him or herself that is contained in a 
Privacy Act system of records applicable to the requester (i.e., the 
information contained in the system of records is retrieved by the 
component using the requester's name or other personal identifier, and 
the information pertains to an individual covered by the Privacy Act) 
the request will be processed under both the FOIA and the Privacy Act.
    (2) If the information the requester is seeking is not subject to 
the Privacy Act (e.g., the information is filed under another subject, 
such as an organization, activity, event, or an investigation not 
retrievable by the requester's name or personal identifier), the 
request, if otherwise properly made, will be treated only as a FOIA 
request. In addition, if the information is covered by the Privacy Act 
and the requester does not provide proper verification of the 
requester's identity, the request, if otherwise properly made, will be 
processed only under the FOIA.
    (b) When both Privacy Act and FOIA exemptions apply. Only if both a 
Privacy Act exemption and a FOIA exemption apply can DHS withhold 
information from a requester if the information sought by the requester 
is about him or herself and is contained in a Privacy

[[Page 16]]

Act system of records applicable to the requester.
    (c) Conditions for release of Privacy Act information to third 
parties in response to a FOIA request. If a requester submits a FOIA 
request for Privacy Act information about another individual, the 
information will not be disclosed without that person's prior written 
consent that provides the same verification information that the person 
would have been required to submit for information about him or herself, 
unless--
    (1) The information is required to be released under the FOIA, as 
provided by 5 U.S.C. 552a (b)(2); or
    (2) In most circumstances, if the individual is deceased.
    (d) Privacy Act requirements. See DHS's Privacy Act regulations in 5 
CFR part 5, subpart B for additional information regarding the 
requirements of the Privacy Act.



Sec.  5.11  Fees.

    (a) In general. Components shall charge for processing requests 
under the FOIA in accordance with the provisions of this section and 
with the OMB Guidelines. Components will ordinarily use the most 
efficient and least expensive method for processing requested records. 
In order to resolve any fee issues that arise under this section, a 
component may contact a requester for additional information. A 
component ordinarily will collect all applicable fees before sending 
copies of records to a requester. If you make a FOIA request, it shall 
be considered a firm commitment to pay all applicable fees charged under 
Sec.  5.11, up to $25.00, unless you seek a waiver of fees. Requesters 
must pay fees by check or money order made payable to the Treasury of 
the United States.
    (b) Definitions. Generally, ``requester category'' means one of the 
three categories in which agencies place requesters for the purpose of 
determining whether a requester will be charged fees for search, review 
and duplication; categories include commercial requesters, noncommercial 
scientific or educational institutions or news media requesters, and all 
other requesters. The term ``fee waiver'' means that processing fees 
will be waived, or reduced, if a requester can demonstrate that certain 
statutory standards are satisfied including that the information is in 
the public interest and is not requested for a primarily commercial 
interest. For purposes of this section:
    (1) Commercial use request is a request that asks for information 
for a use or a purpose that furthers a commercial, trade, or profit 
interest, which can include furthering those interests through 
litigation. A component's decision to place a requester in the 
commercial use category will be made on a case-by-case basis based on 
the requester's intended use of the information.
    (2) Direct costs are those expenses that an agency expends in 
searching for and duplicating (and, in the case of commercial use 
requests, reviewing) records in order to respond to a FOIA request. For 
example, direct costs include the salary of the employee performing the 
work (i.e., the basic rate of pay for the employee, plus 16 percent of 
that rate to cover benefits) and the cost of operating computers and 
other electronic equipment, such as photocopiers and scanners. Direct 
costs do not include overhead expenses such as the costs of space, and 
of heating or lighting a facility.
    (3) Duplication is reproducing a copy of a record or of the 
information contained in it, necessary to respond to a FOIA request. 
Copies can take the form of paper, audiovisual materials, or electronic 
records, among others.
    (4) Educational institution is any school that operates a program of 
scholarly research. A requester in this fee category must show that the 
request is made in connection with his or her role at the educational 
institution. Components may seek verification from the requester that 
the request is in furtherance of scholarly research.

    Example 1. A request from a professor of geology at a university for 
records relating to soil erosion, written on letterhead of the 
Department of Geology, would be presumed to be from an educational 
institution if the request adequately describes how the requested 
information would further a specific research goal of the educational 
institution.

[[Page 17]]

    Example 2. A request from the same professor of geology seeking 
immigration information from the U.S. Immigration and Customs 
Enforcement in furtherance of a murder mystery he is writing would not 
be presumed to be an institutional request, regardless of whether it was 
written on institutional stationery.
    Example 3. A student who makes a request in furtherance of their 
coursework or other school-sponsored activities and provides a copy of a 
course syllabus or other reasonable documentation to indicate the 
research purpose for the request, would qualify as part of this fee 
category.
    Note: These examples are provided for guidance purposes only. Each 
individual request will be evaluated under the particular facts, 
circumstances, and information provided by the requester.

    (5) Noncommercial scientific institution is an institution that is 
not operated on a ``commercial'' basis, as defined in paragraph (b)(1) 
of this section, and that is operated solely for the purpose of 
conducting scientific research the results of which are not intended to 
promote any particular product or industry. A requester in this category 
must show that the request is authorized by and is made under the 
auspices of a qualifying institution and that the records are sought to 
further scientific research and not for a commercial use.
    (6) Representative of the news media is any person or entity that 
actively gathers information of potential interest to a segment of the 
public, uses its editorial skills to turn the raw materials into a 
distinct work, and distributes that work to an audience. The term 
``news'' means information that is about current events or that would be 
of current interest to the public. Examples of news media entities 
include television or radio stations that broadcast ``news'' to the 
public at large and publishers of periodicals that disseminate ``news'' 
and make their products available through a variety of means to the 
general public, including but not limited to, news organizations that 
disseminate solely on the Internet. A request for records that supports 
the news-dissemination function of the requester shall not be considered 
to be for a commercial use. In contrast, data brokers or others who 
merely compile and market government information for direct economic 
return shall not be presumed to be news media entities. ``Freelance'' 
journalists must demonstrate a solid basis for expecting publication 
through a news media entity in order to be considered as working for a 
news media entity. A publication contract would provide the clearest 
evidence that publication is expected; however, components shall also 
consider a requester's past publication record in making this 
determination.
    (7) Review is the page-by-page, line-by-line examination of a record 
located in response to a request in order to determine whether any 
portion of it is exempt from disclosure. Review time includes processing 
any record for disclosure, such as doing all that is necessary to 
prepare the record for disclosure, including the process of redacting 
the record and marking the appropriate exemptions. Review costs are 
properly charged even if a record ultimately is not disclosed. Review 
time also includes time spent both obtaining and considering any formal 
objection to disclosure made by a confidential commercial information 
submitter under Sec.  5.7 or Sec.  5.12, but it does not include time 
spent resolving general legal or policy issues regarding the application 
of exemptions.
    (8) Search is the process of looking for and retrieving records or 
information responsive to a request. Search time includes page-by-page 
or line-by-line identification of information within records; and the 
reasonable efforts expended to locate and retrieve information from 
electronic records. Components shall ensure that searches are done in 
the most efficient and least expensive manner reasonably possible by 
readily available means.
    (c) Charging fees. In responding to FOIA requests, components shall 
charge the following fees unless a waiver or reduction of fees has been 
granted under paragraph (k) of this section. Because the fee amounts 
provided below already account for the direct costs associated with a 
given fee type, unless otherwise stated in Sec.  5.11, components should 
not add any additional costs to those charges.
    (1) Search. (i) Search fees shall be charged for all requests 
subject to the restrictions of paragraph (d) of this section. Components 
may properly charge for time spent searching even if

[[Page 18]]

they do not locate any responsive records or if they determine that the 
records are entirely exempt from disclosure.
    (ii) For each quarter hour spent by personnel searching for 
requested records, including electronic searches that do not require new 
programming, the fees will be as follows: Managerial--$10.25; 
professional--$7.00; and clerical/administrative--$4.00.
    (iii) Requesters will be charged the direct costs associated with 
conducting any search that requires the creation of a new computer 
program, as referenced in section 5.4, to locate the requested records. 
Requesters shall be notified of the costs associated with creating such 
a program and must agree to pay the associated costs before the costs 
may be incurred.
    (iv) For requests that require the retrieval of records stored by an 
agency at a federal records center operated by the National Archives and 
Records Administration (NARA), additional costs shall be charged in 
accordance with the Transactional Billing Rate Schedule established by 
NARA.
    (2) Duplication. Duplication fees will be charged to all requesters, 
subject to the restrictions of paragraph (d) of this section. A 
component shall honor a requester's preference for receiving a record in 
a particular form or format where it is readily reproducible by the 
component in the form or format requested. Where photocopies are 
supplied, the component will provide one copy per request at a cost of 
ten cents per page. For copies of records produced on tapes, disks, or 
other media, components will charge the direct costs of producing the 
copy, including operator time. Where paper documents must be scanned in 
order to comply with a requester's preference to receive the records in 
an electronic format, the requester shall pay the direct costs 
associated with scanning those materials. For other forms of 
duplication, components will charge the direct costs.
    (3) Review. Review fees will be charged to requesters who make 
commercial use requests. Review fees will be assessed in connection with 
the initial review of the record, i.e., the review conducted by a 
component to determine whether an exemption applies to a particular 
record or portion of a record. No charge will be made for review at the 
administrative appeal stage of exemptions applied at the initial review 
stage. However, when the appellate authority determines that a 
particular exemption no longer applies, any costs associated with a 
component's re-review of the records in order to consider the use of 
other exemptions may be assessed as review fees. Review fees will be 
charged at the same rates as those charged for a search under paragraph 
(c)(1)(ii) of this section.
    (d) Restrictions on charging fees. (1) No search fees will be 
charged for requests by educational institutions, noncommercial 
scientific institutions, or representatives of the news media, unless 
the records are sought for a commercial use.
    (2) If a component fails to comply with the FOIA's time limits in 
which to respond to a request, it may not charge search fees, or, in the 
instances of requests from requesters described in paragraph (d)(1) of 
this section, may not charge duplication fees, except as described in 
(d)(2)(i) through (iii).
    (i) If a component has determined that unusual circumstances as 
defined by the FOIA apply and the component provided timely written 
notice to the requester in accordance with the FOIA, a failure to comply 
with the time limit shall be excused for an additional 10 days.
    (ii) If a component has determined that unusual circumstances, as 
defined by the FOIA, apply and more than 5,000 pages are necessary to 
respond to the request, a component may charge search fees, or, in the 
case of requesters described in paragraph (d)(1) of this section, may 
charge duplication fees, if the following steps are taken. The component 
must have provided timely written notice of unusual circumstances to the 
requester in accordance with the FOIA and the component must have 
discussed with the requester via written mail, email, or telephone (or 
made not less than three good-faith attempts to do so) how the requester 
could effectively limit the scope of the request in accordance with 5. 
U.S.C. 552(a)(6)(B)(ii). If this exception is satisfied, the component 
may charge all

[[Page 19]]

applicable fees incurred in the processing of the request.
    (iii) If a court has determined that exceptional circumstances 
exist, as defined by the FOIA, a failure to comply with the time limits 
shall be excused for the length of time provided by the court order.
    (3) No search or review fees will be charged for a quarter-hour 
period unless more than half of that period is required for search or 
review.
    (4) Except for requesters seeking records for a commercial use, 
components will provide without charge:
    (i) The first 100 pages of duplication (or the cost equivalent for 
other media); and
    (ii) The first two hours of search.
    (5) When, after first deducting the 100 free pages (or its cost 
equivalent) and the first two hours of search, a total fee calculated 
under paragraph (c) of this section is $14.00 or less for any request, 
no fee will be charged.
    (e) Notice of anticipated fees in excess of $25.00. (1) When a 
component determines or estimates that the fees to be assessed in 
accordance with this section will exceed $25.00, the component shall 
notify the requester of the actual or estimated amount of the fees, 
including a breakdown of the fees for search, review and/or duplication, 
unless the requester has indicated a willingness to pay fees as high as 
those anticipated. If only a portion of the fee can be estimated 
readily, the component shall advise the requester accordingly. If the 
requester is a noncommercial use requester, the notice will specify that 
the requester is entitled to his or her statutory entitlements of 100 
pages of duplication at no charge and, if the requester is charged 
search fees, two hours of search time at no charge, and will advise the 
requester whether those entitlements have been provided. Two hours of 
search time will be provided free of charge to non-commercial requesters 
regardless of whether they agree to pay estimated fees.
    (2) In cases in which a requester has been notified that the actual 
or estimated fees are in excess of $25.00, the request shall not be 
considered received and further work will not be completed until the 
requester commits in writing to pay the actual or estimated total fee, 
or designates some amount of fees he or she is willing to pay, or in the 
case of a noncommercial use requester who has not yet been provided with 
his or her statutory entitlements, designates that he or she seeks only 
that which can be provided by the statutory entitlements. The requester 
must provide the commitment or designation in writing, and must, when 
applicable, designate an exact dollar amount the requester is willing to 
pay. Components are not required to accept payments in installments.
    (3) If the requester has indicated a willingness to pay some 
designated amount of fees, but the component estimates that the total 
fee will exceed that amount, the component will toll the processing of 
the request while it notifies the requester of the estimated fees in 
excess of the amount the requester has indicated a willingness to pay. 
The component shall inquire whether the requester wishes to revise the 
amount of fees he or she is willing to pay and/or modify the request. 
Once the requester responds, the time to respond will resume from where 
it was at the date of the notification.
    (4) Components will make available their FOIA Public Liaison or 
other FOIA professional to assist any requester in reformulating a 
request to meet the requester's needs at a lower cost.
    (f) Charges for other services. Although not required to provide 
special services, if a component chooses to do so as a matter of 
administrative discretion, the direct costs of providing the service 
will be charged. Examples of such services include certifying that 
records are true copies, providing multiple copies of the same document, 
or sending records by means other than first class mail.
    (g) Charging interest. Components may charge interest on any unpaid 
bill starting on the 31st day following the date of billing the 
requester. Interest charges will be assessed at the rate provided in 31 
U.S.C. 3717 and will accrue from the billing date until payment is 
received by the component. Components will follow the provisions of the 
Debt Collection Act of 1982 (Pub. L. 97-365, 96 Stat. 1749), as amended,

[[Page 20]]

and its administrative procedures, including the use of consumer 
reporting agencies, collection agencies, and offset.
    (h) Aggregating requests. When a component reasonably believes that 
a requester or a group of requesters acting in concert is attempting to 
divide a single request into a series of requests for the purpose of 
avoiding fees, the component may aggregate those requests and charge 
accordingly. Components may presume that multiple requests of this type 
made within a 30-day period have been made in order to avoid fees. For 
requests separated by a longer period, components will aggregate them 
only where there is a reasonable basis for determining that aggregation 
is warranted in view of all the circumstances involved. Multiple 
requests involving unrelated matters will not be aggregated.
    (i) Advance payments. (1) For requests other than those described in 
paragraphs (i)(2) and (3) of this section, a component shall not require 
the requester to make an advance payment before work is commenced or 
continued on a request. Payment owed for work already completed (i.e., 
payment before copies are sent to a requester) is not an advance 
payment.
    (2) When a component determines or estimates that a total fee to be 
charged under this section will exceed $250.00, it may require that the 
requester make an advance payment up to the amount of the entire 
anticipated fee before beginning to process the request. A component may 
elect to process the request prior to collecting fees when it receives a 
satisfactory assurance of full payment from a requester with a history 
of prompt payment.
    (3) Where a requester has previously failed to pay a properly 
charged FOIA fee to any component or agency within 30 calendar days of 
the billing date, a component may require that the requester pay the 
full amount due, plus any applicable interest on that prior request and 
the component may require that the requester make an advance payment of 
the full amount of any anticipated fee, before the component begins to 
process a new request or continues to process a pending request or any 
pending appeal. Where a component has a reasonable basis to believe that 
a requester has misrepresented his or her identity in order to avoid 
paying outstanding fees, it may require that the requester provide proof 
of identity.
    (4) In cases in which a component requires advance payment, the 
request shall not be considered received and further work will not be 
completed until the required payment is received. If the requester does 
not pay the advance payment within 30 calendar days after the date of 
the component's fee determination, the request will be closed.
    (j) Other statutes specifically providing for fees. The fee schedule 
of this section does not apply to fees charged under any statute that 
specifically requires an agency to set and collect fees for particular 
types of records. In instances where records responsive to a request are 
subject to a statutorily-based fee schedule program, the component will 
inform the requester of the contact information for that source.
    (k) Requirements for waiver or reduction of fees. (1) Records 
responsive to a request shall be furnished without charge or at a 
reduced rate below that established under paragraph (c) of this section, 
where a component determines, on a case-by-case basis, based on all 
available information, that the requester has demonstrated that:
    (i) Disclosure of the requested information is in the public 
interest because it is likely to contribute significantly to public 
understanding of the operations or activities of the government; and
    (ii) Disclosure of the information is not primarily in the 
commercial interest of the requester.
    (2) In deciding whether disclosure of the requested information is 
in the public interest because it is likely to contribute significantly 
to public understanding of operations or activities of the government, 
components will consider the following factors:
    (i) The subject of the request must concern identifiable operations 
or activities of the federal government, with a connection that is 
direct and clear, not remote or attenuated.
    (ii) Disclosure of the requested records must be meaningfully 
informative about government operations or

[[Page 21]]

activities in order to be ``likely to contribute'' to an increased 
public understanding of those operations or activities. The disclosure 
of information that already is in the public domain, in either the same 
or a substantially identical form, would not contribute to such 
understanding where nothing new would be added to the public's 
understanding.
    (iii) The disclosure must contribute to the understanding of a 
reasonably broad audience of persons interested in the subject, as 
opposed to the individual understanding of the requester. A requester's 
expertise in the subject area as well as his or her ability and 
intention to effectively convey information to the public shall be 
considered. It shall be presumed that a representative of the news media 
will satisfy this consideration.
    (iv) The public's understanding of the subject in question must be 
enhanced by the disclosure to a significant extent. However, components 
shall not make value judgments about whether the information at issue is 
``important'' enough to be made public.
    (3) To determine whether disclosure of the requested information is 
primarily in the commercial interest of the requester, components will 
consider the following factors:
    (i) Components shall identify any commercial interest of the 
requester, as defined in paragraph (b)(1) of this section, that would be 
furthered by the requested disclosure. Requesters shall be given an 
opportunity to provide explanatory information regarding this 
consideration.
    (ii) A waiver or reduction of fees is justified where the public 
interest is greater than any identified commercial interest in 
disclosure. Components ordinarily shall presume that where a news media 
requester has satisfied the public interest standard, the public 
interest will be the interest primarily served by disclosure to that 
requester. Disclosure to data brokers or others who merely compile and 
market government information for direct economic return shall not be 
presumed to primarily serve the public interest.
    (4) Where only some of the records to be released satisfy the 
requirements for a waiver of fees, a waiver shall be granted for those 
records.
    (5) Requests for a waiver or reduction of fees should be made when 
the request is first submitted to the component and should address the 
criteria referenced above. A requester may submit a fee waiver request 
at a later time so long as the underlying record request is pending or 
on administrative appeal. When a requester who has committed to pay fees 
subsequently asks for a waiver of those fees and that waiver is denied, 
the requester will be required to pay any costs incurred up to the date 
the fee waiver request was received.
    (6) Summary of fees. The following table summarizes the chargeable 
fees (excluding direct fees identified in Sec.  5.11) for each requester 
category.

--------------------------------------------------------------------------------------------------------------------------------------------------------
               Category                                Search fees                        Review fees                      Duplication fees
--------------------------------------------------------------------------------------------------------------------------------------------------------
Commercial-use.......................  Yes.......................................  Yes......................  Yes.
Educational or Non-Commercial          No........................................  No.......................  Yes (100 pages free).
 Scientific Institution.
News Media...........................  No........................................  No.......................  Yes (100 pages free).
Other requesters.....................  Yes (2 hours free)........................  No.......................  Yes (100 pages free).
--------------------------------------------------------------------------------------------------------------------------------------------------------



Sec.  5.12  Confidential commercial information; CBP procedures.

    (a) In general. For purposes of this section, ``commercial 
information'' is defined as trade secret, commercial, or financial 
information obtained from a person. Commercial information provided to 
CBP by a business submitter and that CBP determines is privileged or 
confidential commercial or financial information will be treated as 
privileged or confidential and will not be disclosed pursuant to a 
Freedom of Information Act request or otherwise made known in any manner 
except as provided in this section.
    (b) Notice to business submitters of FOIA requests for disclosure. 
Except as

[[Page 22]]

provided in paragraph (b)(2) of this section, CBP will provide business 
submitters with prompt written notice of receipt of FOIA requests or 
appeals that encompass their commercial information. The written notice 
will describe either the exact nature of the commercial information 
requested, or enclose copies of the records or those portions of the 
records that contain the commercial information. The written notice also 
will advise the business submitter of its right to file a disclosure 
objection statement as provided under paragraph (c)(1) of this section. 
CBP will provide notice to business submitters of FOIA requests for the 
business submitter's commercial information for a period of not more 
than 10 years after the date the business submitter provides CBP with 
the information, unless the business submitter requests, and provides 
acceptable justification for, a specific notice period of greater 
duration.
    (1) When notice is required. CBP will provide business submitters 
with notice of receipt of a FOIA request or appeal whenever:
    (i) The business submitter has in good faith designated the 
information as commercially- or financially-sensitive information. The 
business submitter's claim of confidentiality should be supported by a 
statement by an authorized representative of the business entity 
providing specific justification that the information in question is 
considered confidential commercial or financial information and that the 
information has not been disclosed to the public; or
    (ii) CBP has reason to believe that disclosure of the commercial 
information could reasonably be expected to cause substantial 
competitive harm.
    (2) When notice is not required. The notice requirements of this 
section will not apply if:
    (i) CBP determines that the commercial information will not be 
disclosed;
    (ii) The commercial information has been lawfully published or 
otherwise made available to the public; or
    (iii) Disclosure of the information is required by law (other than 5 
U.S.C. 552).
    (c) Procedure when notice given--(1) Opportunity for business 
submitter to object to disclosure. A business submitter receiving 
written notice from CBP of receipt of a FOIA request or appeal 
encompassing its commercial information may object to any disclosure of 
the commercial information by providing CBP with a detailed statement of 
reasons within 10 days of the date of the notice (exclusive of 
Saturdays, Sundays, and legal public holidays). The statement should 
specify all the grounds for withholding any of the commercial 
information under any exemption of the FOIA and, in the case of 
Exemption 4, should demonstrate why the information is considered to be 
a trade secret or commercial or financial information that is privileged 
or confidential. The disclosure objection information provided by a 
person pursuant to this paragraph may be subject to disclosure under the 
FOIA.
    (2) Notice to FOIA requester. When notice is given to a business 
submitter under paragraph (b)(1) of this section, notice will also be 
given to the FOIA requester that the business submitter has been given 
an opportunity to object to any disclosure of the requested commercial 
information.
    (d) Notice of intent to disclose. CBP will consider carefully a 
business submitter's objections and specific grounds for nondisclosure 
prior to determining whether to disclose commercial information. 
Whenever CBP decides to disclose the requested commercial information 
over the objection of the business submitter, CBP will provide written 
notice to the business submitter of CBP's intent to disclose, which will 
include:
    (1) A statement of the reasons for which the business submitter's 
disclosure objections were not sustained;
    (2) A description of the commercial information to be disclosed; and
    (3) A specified disclosure date which will not be less than 10 days 
(exclusive of Saturdays, Sundays, and legal public holidays) after the 
notice of intent to disclose the requested information has been issued 
to the business submitter. Except as otherwise prohibited by law, CBP 
will also provide a copy of the notice of intent to disclose to the FOIA 
requester at the same time.
    (e) Notice of FOIA lawsuit. Whenever a FOIA requester brings suit 
seeking to

[[Page 23]]

compel the disclosure of commercial information covered by paragraph 
(b)(1) of this section, CBP will promptly notify the business submitter 
in writing.



Sec.  5.13  Other rights and services.

    Nothing in this subpart shall be construed to entitle any person, as 
of right, to any service or to the disclosure of any record to which 
such person is not entitled under the FOIA.



                          Subpart B_Privacy Act

    Source: 87 FR 68601, Nov. 16, 2022, unless otherwise noted.



Sec.  5.20  General provisions.

    (a) Purpose and scope. (1) This subpart contains the rules that the 
Department of Homeland Security (Department or DHS) follows in 
processing records under the Privacy Act of 1974 (Privacy Act) (5 U.S.C. 
552a) and under the Judicial Redress Act of 2015 (JRA) (5 U.S.C. 552a 
note).
    (2) The rules in this subpart should be read in conjunction with the 
text of the Privacy Act and the JRA, 5 U.S.C. 552a and 5 U.S.C. 552a 
note, respectively (which provide additional information abo ut records 
maintained on individuals and covered persons), and JRA designations 
issued in the Federal Register. The rules in this subpart apply to all 
records in systems of records maintained by the Department. These rules 
also apply to all records containing Social Security Numbers regardless 
of whether such records are covered by an applicable system of records 
maintained by the Department. They describe the procedures by which 
individuals may request access to records about themselves, request 
amendment or correction of those records, and request an accounting of 
disclosures by Department personnel and contractors. In addition, the 
Department processes all Privacy Act and JRA requests for access to 
records under the Freedom of Information Act (FOIA) (5 U.S.C. 552), 
following the rules contained in subpart A of this part, which gives 
requesters the benefit of both statutes.
    (3) The provisions established by this subpart apply to all 
Department Components, as defined in paragraph (b)(1) of this section.
    (4) DHS has a decentralized system for processing requests, with 
each component handling requests for its records.
    (b) Definitions. As used in this subpart:
    (1) Component means the office that processes Privacy Act and JRA 
requests for each separate organizational entity within DHS that reports 
directly to the Office of the Secretary.
    (2) Request for access to a record means a request made under 
Privacy Act subsection (d)(1).
    (3) Request for amendment or correction of a record means a request 
made under Privacy Act subsection (d)(2).
    (4) Request for an accounting means a request made under Privacy Act 
subsection (c)(3).
    (5) Requester means an individual who makes a request for access, a 
request for amendment or correction, or a request for an accounting 
under the Privacy Act.
    (6) Individual means, as defined by the Privacy Act, 5 U.S.C. 
552a(a)(2), a citizen of the United States or an alien lawfully admitted 
for permanent residence. Also, an individual, for purposes of this 
subpart, but limited to the exclusive rights and civil remedies provided 
in the JRA, includes covered persons, as defined by the JRA, as a 
natural person (other than an individual) who is a citizen of a covered 
country, as designated by the Attorney General, with the concurrence of 
the Secretary of State, the Secretary of the Treasury, and the Secretary 
of Homeland Security.
    (7) Record has the same meaning as contained in the Privacy Act, 5 
U.S.C. 552a(a)(4), except that in cases covered by the JRA, the term 
``record'' has the same meaning as ``covered record'' in the JRA, 5 
U.S.C. 552a note.
    (c) Authority to request records for a law enforcement purpose. The 
head of a component or designee thereof is authorized to make written 
requests under subsection 552a(b)(7) of the Privacy Act for records 
maintained by other agencies that are necessary to carry out an 
authorized law enforcement activity.

[[Page 24]]

    (d) Notice on Departmental use of (b)(1) exception. As a general 
matter, when applying the Privacy Act (b)(1) exception for authorized 
disclosures within an agency on a need to know basis, the Department 
will consider itself a single entity, meaning that information may be 
disclosed between components of the Department under the (b)(1) 
exception.



Sec.  5.21  Requests for access to records.

    (a) How made and addressed. (1) DHS has a decentralized system for 
responding to Privacy Act and JRA requests, with each component 
designating an office to process records from that component.
    (2) An individual may make a request for access to a Department of 
Homeland Security record about that individual covered by a DHS or 
Component system of records notice (SORN) by writing directly to the 
Department component that maintains the record at the address listed in 
appendix A to this part or via the internet at http://www.dhs.gov/dhs-
foia-request-submission-form. A description of all DHS-wide and 
component SORNs may be found here: https://www.dhs.gov/system-records-
notices-sorns.
    (3) In most cases, a component's central FOIA office, as indicated 
in appendix A to this part, is the place to send a Privacy Act request. 
For records held by a field office of U.S. Customs and Border 
Protection, the U.S. Coast Guard, or other Department components with 
field offices other than the U.S. Secret Service and Transportation 
Security Administration, the requester must write directly to that U.S. 
Customs and Border Protection, Coast Guard, or other field office 
address, which can be found by calling the component's central FOIA 
office. Requests for U.S. Secret Service records should be sent only to 
the U.S. Secret Service central FOIA office, and requests for 
Transportation Security Administration records should be sent only to 
the Transportation Security Administration central FOIA office.
    (4) Requests for records held by the Cybersecurity and 
Infrastructure Security Agency (CISA) should be sent to the DHS Privacy 
Office.
    (5) DHS's FOIA website refers the reader to descriptions of the 
functions of each component and provides other information that is 
helpful in determining where to make a request. Each component's FOIA 
office and any additional requirements for submitting a request to a 
given component are listed in appendix A to this part. These references 
can all be used by requesters to determine where to send their requests 
within DHS.
    (6) An individual may also send a request to the Privacy Office, 
Mail Stop 0655, U.S. Department of Homeland Security, 2707 Martin Luther 
King Jr. Ave. SE, Washington DC 20528-0655, or via the internet at 
http://www.dhs.gov/dhs-foia-request-submission-form, or via fax to (202) 
343-4011. The Privacy Office will forward the request to the 
component(s) that it determines to be most likely to maintain the 
records that are sought. For the quickest possible handling, the 
requester should mark both the request letter and the envelope ``Privacy 
Act Request'' or ``Judicial Redress Act Request.''
    (b) Government-wide SORNs. A government-wide system of records is a 
system of records where one agency has regulatory authority over records 
in the custody of multiple agencies, and the agency with regulatory 
authority publishes a SORN that applies to all of the records regardless 
of their custodial location. If records are sought that are covered by a 
Government-wide SORN and requested of DHS, DHS will consult or refer 
such request, only as applicable and necessary, to the corresponding 
agency having authority over such records for further processing. DHS 
will acknowledge to the requester that it is referring the request to 
another agency or consulting with that agency when processing the 
request.
    (c) Description of records sought. A requester must describe the 
records sought in sufficient detail to enable Department personnel to 
locate the system of records covering them with a reasonable amount of 
effort. Whenever possible, the request should describe the records 
sought, the time periods in which the requester believes they were 
compiled, the office or location in which the requester believes the 
records are kept, and the name or identifying number of each system of

[[Page 25]]

records in which the requester believes they are kept. The Department 
publishes notices in the Federal Register that describe its components' 
systems of records. These notices can be found on the Department's 
website here: https://www.dhs.gov/system-records-notices-sorns. If a 
request does not adequately describe the records sought, DHS may at its 
discretion either administratively close the request or seek additional 
information from the requester. Requests for clarification or more 
information will be made in writing (either via U.S. mail or electronic 
mail whenever possible). Requesters may respond by U.S. Mail or by 
electronic mail regardless of the method used by DHS to transmit the 
request for additional information. To be considered timely, responses 
to requests for additional information must be postmarked or received by 
electronic mail within 30 working days of the postmark date or date of 
the electronic mail request for additional information. If the requester 
does not respond timely, the request may be administratively closed at 
DHS's discretion. This administrative closure does not prejudice the 
requester's ability to submit a new request for further consideration 
with additional information.
    (d) Agreement to pay fees. DHS and components shall charge for 
processing requests under the Privacy Act or JRA. DHS and components 
will ordinarily use the most efficient and least expensive method for 
processing requested records. DHS may contact a requester for additional 
information in order to resolve any fee issues that arise under this 
section. DHS ordinarily will collect all applicable fees before sending 
copies of records to a requester. If one makes a Privacy Act or JRA 
request for access to records, it will be considered a firm commitment 
to pay all applicable fees charged under Sec.  5.29, up to $25.00. The 
component responsible for responding to a request ordinarily will 
confirm this agreement in an acknowledgement letter. When making a 
request, an individual may specify a willingness to pay a greater or 
lesser amount. Requesters must pay fees by check or money order made 
payable to the Treasury of the United States.
    (e) Verification of identity. When an individual makes a request for 
access to their own records, their identity must be verified. The 
individual must provide their full name, current address, date and place 
of birth, and country of citizenship or residency. The individual must 
sign the request and provide a signature that must either be notarized 
or submitted by the requester under 28 U.S.C. 1746, a law that permits 
statements to be made under penalty of perjury, as a substitute for 
notarization. An individual may obtain more information about this 
process at http://www.dhs.gov/foia or 1-866-431-0486. In order to help 
the identification and location of requested records, an individual may 
also voluntarily include other identifying information that are relevant 
to the request (e.g., passport number, Alien Registration Number (A-
Number)).
    (f) Verification of guardianship. When making a request as the 
parent or guardian of a minor or as the guardian of someone determined 
by a court of competent jurisdiction to be incompetent due to physical 
or mental incapacity or age, for access to records about that 
individual, the individual submitting a request must establish:
    (1) The identity of the individual who is the subject of the record, 
by stating the name, current address, date and place of birth, and 
country of citizenship or residency of the individual;
    (2) The submitting individual's own identity, in the same manner as 
required in paragraph (e) of this section;
    (3) That the submitting individual is the parent or guardian of the 
subject of the record, which may be proven by providing a copy of the 
subject of the record's birth certificate showing parentage or by 
providing a court order establishing guardianship; and
    (4) That the submitting individual is acting on behalf of that 
individual that is the subject of the record.
    (g) Verification in the case of third-party information requests. 
Outside of requests made pursuant to paragraph (f) of this section, if a 
third party requests records about a subject individual, the third party 
requester must provide verification of the subject individual's identity 
in the manner provided in paragraph (e) of this section along with

[[Page 26]]

the subject individual's written consent authorizing disclosure of the 
records to the third party requester, or by submitting proof by the 
requester that the subject individual is deceased (e.g., a copy of a 
death certificate or an obituary). As an exercise of its administrative 
discretion, each component can require a third-party requester to supply 
additional information to verify that the subject individual has 
consented to disclosure or is deceased.



Sec.  5.22  Responsibility for responding to requests for access to 
records.

    (a) In general. Except as stated in paragraphs (c), (d), and (e) of 
this section, the component that first receives a request for access to 
a record, and has possession of that record, is the component 
responsible for responding to the request. In determining which records 
are responsive to a request, a component ordinarily will include only 
those records in its possession as of the date the component begins its 
search for them. If any other date is used, the component will inform 
the requester of that date.
    (b) Authority to grant or deny requests. The head of a component, or 
the component head's designee, is authorized to grant or deny any 
request for access or amendment to a record of that component.
    (c) Consultations, coordination, and referrals. All consultations, 
coordination, and referrals for requests of records subject to the 
Privacy Act or JRA will follow the same process and procedures as 
described in Sec.  5.4(d), including how to handle those requests that 
pertain to law enforcement information, as specified in Sec.  5.4(d)(2), 
and classified information, as specified in Sec.  5.4(d)(2) and (e). 
Further, whenever a request is made for access to a record containing 
information that has been classified by or may be appropriate for 
classification by another component or agency under any relevant 
executive order concerning the classification of records, the receiving 
component will refer to Sec.  5.24 for processing.
    (d) Release of medical records. (1) Generally, an individual has the 
right to access their medical records maintained by the Department. 
Special procedures for requests from an individual requesting medical 
records that include psychological records for which direct release may 
cause harm to the individual requesting access are set forth in 
paragraph (d)(2) of this section.
    (2) If a request is made for access to medical records that include 
psychological records, and a component medical practitioner or qualified 
designee determines that direct release is likely to adversely affect 
the individual who is requesting access, the component will request the 
individual to provide the name and contact information of a 
representative who is capable of ameliorating the potential adverse 
effect. The representative may be a physician or other health 
professional who will be willing to review the record and inform the 
requester of its contents. Once provided, the component FOIA office or 
designated component official will send the medical records to the 
individual's designated representative. The component will inform the 
subject individual in writing (either via U.S. mail or electronic mail 
whenever possible) that the record has been sent to that individual's 
chosen representative. The representative does not have the discretion 
to withhold any part of the individual's record. If the subject 
individual does not comply with the procedural requirement to designate 
a representative, the component may decline to release the requested 
information.
    (3) Paragraph (d)(2) of this section does not apply to Coast Guard 
records held by another agency.
    (e) Notice of referral. Whenever a component refers all or any part 
of the responsibility for responding to a request to another component 
or agency, it ordinarily will notify the requester of the referral and 
inform the requester of the name of each component or agency to which 
the request has been referred and of the part of the request that has 
been referred.
    (f) Timing of responses to consultations and referrals. All 
consultations and referrals received by DHS will be handled according to 
the date the Privacy Act or JRA access request was initially received by 
the first component or agency, not any later date.

[[Page 27]]

    (g) Agreements regarding consultations and referrals. Components may 
establish agreements with other components or agencies to eliminate the 
need for consultations or referrals with respect to types of records.



Sec.  5.23  Responses to requests for access to records.

    (a) In general. Components should, to the extent practicable, 
communicate with requesters having access to the internet using 
electronic means, such as email or web portal.
    (b) Acknowledgements of requests. Consistent with the procedures in 
subpart A of this part, a component will acknowledge the request and 
assign it an individualized tracking number if it will take longer than 
ten (10) working days to process. Components will include in the 
acknowledgement letter a brief description of the records sought to 
allow requesters to more easily keep track of their requests. Further, 
in the acknowledgment letter, the component will confirm the requester's 
agreement to pay fees under Sec. Sec.  5.21(d) and 5.29.
    (c) Grants of requests for access. Consistent with the procedures in 
subpart A to this part, a component will have twenty (20) working days 
from when a request is received to determine whether to grant or deny 
the request unless there are unusual or exceptional circumstances as 
defined by the FOIA and set out in Sec.  5.5(c). Once a component 
decides to grant a request for access to record(s) in whole or in part, 
it will notify the requester in writing. The component will inform the 
requester in the notice of any fee charged under Sec. Sec.  5.21(d) and 
5.29 and will disclose records to the requester promptly upon payment of 
any applicable fee. The component will inform the requester of the 
availability of its FOIA Liaison to offer assistance.
    (d) Adverse determinations of requests for access. A component 
making an adverse determination denying a request for access in any 
respect will notify the requester of that determination in writing. 
Adverse determinations, or denials of requests, include decisions that: 
the requested record is exempt, in whole or in part; the requested 
record does not exist or cannot be located; or the record requested is 
not subject to the Privacy Act or JRA. Further, adverse determinations 
also include disputes regarding fees, or denials of a request for 
expedited processing. The denial letter will be signed by the head of 
the component, or the component head's designee, and will include:
    (1) The name and title or position of the person responsible for the 
denial;
    (2) A brief statement of the reason(s) for the denial, including any 
Privacy Act exemption(s) applied by the component in denying the 
request; and
    (3) A statement that the denial may be appealed under Sec.  5.25(a) 
and a description of the requirements of Sec.  5.25(a).
    (e) JRA access requests. For purposes of responding to a JRA access 
request, a covered person is subject to the same limitations, including 
exemptions and exceptions, as an individual is subject to under section 
552a of title 5, United States Code, when pursuing access to records. 
The implementing regulations and reasons provided for exemptions can be 
found in appendix C to this part.



Sec.  5.24  Classified information.

    On receipt of any request involving classified information, the 
component will determine whether information is currently and properly 
classified and take appropriate action to ensure compliance with 6 CFR 
part 7. Whenever a request is made for access to a record that is 
covered by a system of records containing information that has been 
classified by or may be appropriate for classification by another 
component or agency under any applicable executive order, the receiving 
component will consult the component or agency that classified the 
information. Whenever a record contains information that has been 
derivatively classified by a component or agency because it contains 
information classified by another component or agency, the component 
will consult the component or agency that classified the underlying 
information. Information determined to no longer require classification 
will not be withheld from a requester based on exemption (k)(1) of the 
Privacy Act. On receipt of any appeal involving classified information, 
the DHS Office of the General Counsel, or its designee, shall

[[Page 28]]

take appropriate action to ensure compliance with 6 CFR part 7.



Sec.  5.25  Administrative appeals for access requests.

    (a) Requirements for filing an appeal. An individual may appeal an 
adverse determination denying the individual's request for access in any 
respect to the appropriate Appeals Officer. For the address of the 
appropriate component Appeals Officer, an individual may contact the 
applicable component FOIA Liaison using the information in appendix A to 
this part, visit www.dhs.gov/foia, or call 1-866-431-0486. An appeal 
must be in writing, and to be considered timely it must be postmarked 
or, in the case of electronic submissions, transmitted to the Appeals 
Officer within 90 working days, consistent with the procedures in 
subpart A to this part, after the date of the component's response. An 
electronically filed appeal will be considered timely if transmitted to 
the Appeals Officer by 11:59:59 p.m. EST or EDT on the 90th working day. 
The appeal should clearly identify the component determination 
(including the assigned request number if the requester knows it) that 
is being appealed and should contain the reasons the requester believes 
the determination was erroneous. For the quickest possible handling, an 
individual should mark both the appeal letter and the envelope ``Privacy 
Act Appeal'' or ``Judicial Redress Act Appeal.''
    (b) Adjudication of appeals. The DHS Office of the General Counsel, 
or its designee, (e.g., Component Appeals Officer) is the authorized 
appeals authority for DHS. On receipt of any appeal involving classified 
information, the Appeals Officer will consult with the Chief Security 
Officer and take appropriate action to ensure compliance with 6 CFR part 
7. If the appeal becomes the subject of a lawsuit, the Appeals Officer 
is not required to act further on the appeal.
    (c) Appeal decisions. Consistent with the procedures in subpart A to 
this part, the decision on an appeal will be made in writing generally 
twenty (20) working days after receipt. However, consistent with the 
procedures in subpart A to this part, the time limit for responding to 
an appeal may be extended provided the circumstances set forth in 5 
U.S.C. 552(a)(6)(B)(i) are met. A decision affirming an adverse 
determination in whole or in part will include a brief statement of the 
reason(s) for the affirmance, including any Privacy Act exemption 
applied, and will inform the requester of the Privacy Act provisions for 
court review of the decision. If the adverse determination is reversed 
or modified on appeal in whole or in part, the requester will be 
notified in a written decision and the request will be reprocessed in 
accordance with that appeal decision. An adverse determination by the 
DHS Office of the General Counsel or its designee or Component Appeals 
Officer will be the final action of the Department.
    (d) Appeal necessary before seeking court review. If an individual 
wishes to seek review by a court of any adverse determination or denial 
of a request by DHS within the allotted 20 working days to respond 
unless there are unusual or exceptional circumstances, that individual 
must first appeal it under this subpart. An appeal will not be acted on 
if the request becomes a matter of litigation.



Sec.  5.26  Requests for amendment or correction of records.

    (a) How made and addressed. Unless the record is not subject to 
amendment or correction as stated in paragraph (f) of this section, an 
individual may make a request for amendment or correction of a record of 
the Department about that individual by writing directly to the 
component that maintains the record, following the procedures in Sec.  
5.21. The request should identify each record in question, state the 
amendment or correction requested, and state the reason why the 
requester believes that the record is not accurate, relevant, timely, or 
complete. The requester may submit any documentation that the requester 
thinks would support the request. If the individual believes that the 
same record is in more than one system of records, the requester should 
state that and address the request to each component that maintains a 
system of records containing the record.

[[Page 29]]

    (b) Component responses. Within ten working days of receiving a 
request for amendment or correction of records, a component will send 
the requester a written acknowledgment of its receipt of the request, 
and it will promptly notify the requester whether the request is granted 
or denied. If the component grants the request in whole or in part, it 
will describe the amendment or correction made and will advise the 
requester of the right to obtain a copy of the corrected or amended 
record, in disclosable form. If the component denies the request in 
whole or in part, it will send the requester a letter signed by the head 
of the component, or the component head's designee, that will state:
    (1) The reason(s) for the denial; and
    (2) The procedure for appeal of the denial under paragraph (c) of 
this section, including the name and business address of the official 
who will act on the appeal.
    (c) Appeals. Within 90 working days after the date of the 
component's response, the requester may appeal a denial of a request for 
amendment or correction to the Component Appeals Officer or the DHS 
Office of the General Counsel or its designee. The Component Appeals 
Officer or the DHS Office of the General Counsel or its designee must 
complete its review and make a final determination on the requester's 
appeal no later than 30 days (excluding Saturdays, Sundays, and legal 
public holidays) from the date on which the individual requests such 
review unless good cause is shown, and communicated to the individual, 
for which the 30-day period may be extended for an additional 30 days. 
If the appeal is denied, the requester will be advised of the right to 
file a Statement of Disagreement as described in paragraph (d) of this 
section and of the right under the Privacy Act, 5 U.S.C. 552a(d)(3), for 
court review of the decision. If an individual wishes to seek review by 
a court of any adverse determination or denial of a request, that 
individual must first appeal it under this subpart. For purposes of 
responding to a JRA amendment request, a covered person is subject to 
the same limitations, including exemptions and exceptions, as an 
individual is subject to under section 552a of title 5, United States 
Code, when pursuing amendment to records. The implementing regulations 
and reasons provided for exemptions can be found in appendix C to this 
part, titled DHS Systems of Records Exempt from the Privacy Act.
    (d) Statements of Disagreement. If an individual's appeal under this 
section is denied in whole or in part, that individual has the right to 
file a Statement of Disagreement, unless exempt, that states the 
individual's reason(s) for disagreeing with the Department's denial of 
the request for amendment or correction. Statements of Disagreement must 
be concise, must clearly identify each part of any record that is 
disputed, and should be no longer than one typed page for each fact 
disputed. The individual's Statement of Disagreement must be sent to the 
component involved, which will place it in the system of records in 
which the disputed record is maintained and will mark the disputed 
record to indicate that a Statement of Disagreement has been filed and 
where in the system of records it may be found.
    (e) Notification of amendment/correction or disagreement. Within 30 
working days of the amendment or correction of a record, the component 
that maintains the record will, unless exempt, notify all persons, 
organizations, or agencies to which it previously disclosed the record, 
if an accounting of that disclosure was made or should have been made, 
that the record has been amended or corrected. If an individual has 
filed a Statement of Disagreement, the component will append a copy of 
it to the disputed record whenever the record is disclosed and may also 
append a concise statement of its reason(s) for denying the request to 
amend or correct the record.
    (f) Records not subject to amendment or correction. The following 
records are not subject to amendment or correction:
    (1) Transcripts of testimony given under oath or written statements 
made under oath;
    (2) Transcripts of grand jury proceedings, judicial proceedings, or 
quasi-judicial proceedings, which are the official record of those 
proceedings;

[[Page 30]]

    (3) Presentence records that originated with the courts; and
    (4) Records in systems of records that have been exempted from 
amendment and correction under the Privacy Act (5 U.S.C. 552a(j) or (k)) 
pursuant to a final rule published in the Federal Register.



Sec.  5.27  Requests for an accounting of record disclosures.

    (a) How made and addressed. Except where accountings of disclosures 
are not required to be kept (as stated in paragraph (b)(1) of this 
section), an individual may make a request for an accounting of any 
disclosure that has been made by the Department to another person, 
organization, or agency of any record about the requester. This 
accounting contains the date, nature, and purpose of each disclosure, as 
well as the name and address of the person, organization, or agency to 
which the disclosure was made. A request for an accounting should 
identify each record in question and should be made by writing directly 
to the Department component that maintains the record, following the 
procedures in Sec.  5.21.
    (b) Where accountings are not required. Components are not required 
to provide accountings to the requester where they relate to:
    (1) Disclosures for which accountings are, by statute (5 U.S.C. 
552a(c)(1)), not required to be kept, such as disclosures that are made 
to officers and employees within the agency and disclosures that are 
required to be made under the FOIA, or for records covered by the JRA;
    (2) Disclosures made to law enforcement agencies for authorized law 
enforcement activities in response to written requests from those law 
enforcement agencies specifying the law enforcement activities for which 
the disclosures are sought; or
    (3) Disclosures made from systems of records that have been exempted 
from accounting requirements by a rulemaking pursuant to 5 U.S.C. 
552a(j) or (k).
    (c) Appeals. A requester may appeal a denial of a request for an 
accounting to the Component Appeals Officer or the DHS Office of the 
General Counsel or its designee in the same manner as a denial of a 
request for access to records (see Sec.  5.25) and the same procedures 
will be followed.



Sec.  5.28  Preservation of records.

    Each component will preserve all correspondence pertaining to the 
requests that it receives under this subpart, as well as copies of all 
requested records, until disposition or destruction is authorized by 
title 44 of the United States Code or the National Archives and Records 
Administration's General Records Schedule 4.2. Records will not be 
disposed of while they are the subject of a pending request, appeal, 
lawsuit, or litigation or audit hold under the Act.



Sec.  5.29  Fees.

    (a) Fees for access requests granted in full under the Privacy Act 
are limited to duplication fees, which are chargeable to the same extent 
that fees are chargeable under subpart A of this part. An access request 
not granted in full under the Privacy Act will be processed under the 
FOIA and will be subject to all fees chargeable under the applicable 
FOIA regulations. Fees are not charged for processing amendment and 
accounting requests.
    (b) DHS will not process a request under the Privacy Act or JRA from 
persons with an unpaid fee from any previous Privacy Act or JRA request 
to any Federal agency until that outstanding fee has been paid in full 
to the agency.



Sec.  5.30  Notice of court-ordered and emergency disclosures.

    (a) Court-ordered disclosures. When the component discloses an 
individual's information covered by a system of records pursuant to an 
order from a court of competent jurisdiction, and the order is a matter 
of public record, the Privacy Act requires the component to send a 
notice of the disclosure to the last known address of the person whose 
record was disclosed. Notice will be given within a reasonable time 
after the component's receipt of the order, except that in a case in 
which the order is not a matter of public record, the notice will be 
given only after the order becomes public. This notice will be mailed to 
the individual's last known

[[Page 31]]

address and will contain a copy of the order and a description of the 
information disclosed. Notice will not be given if disclosure is made 
from a criminal law enforcement system of records that has been exempted 
from the notice requirement.
    (b) Court. For purposes of this section, a court is an institution 
of the judicial branch of the U.S. Federal Government consisting of one 
or more judges who seek to adjudicate disputes and administer justice. 
Entities not in the judicial branch of the Federal Government are not 
courts for purposes of this section.
    (c) Court order. For purposes of this section, a court order is any 
legal process which satisfies all the following conditions:
    (1) It is issued under the authority of a Federal court;
    (2) A judge or a magistrate judge of that court signs it;
    (3) It commands or permits DHS to disclose the Privacy Act protected 
information at issue; and
    (4) The court is a court of competent jurisdiction.
    (d) Court of competent jurisdiction. It is the view of DHS that 
under the Privacy Act the Federal Government has not waived sovereign 
immunity, which precludes state court jurisdiction over a Federal agency 
or official. Therefore, DHS will not honor state court orders as a basis 
for disclosure, unless DHS does so under its own discretion.
    (e) Conditions for disclosure under a court order of competent 
jurisdiction. The component may disclose information in compliance with 
an order of a court of competent jurisdiction if--
    (1) Another section of this part specifically allows such 
disclosure, or
    (2) DHS, the Secretary, or any officer or employee of DHS in their 
official capacity is properly a party in the proceeding, or
    (3) Disclosure of the information is necessary to ensure that an 
individual who is accused of criminal activity receives due process of 
law in a criminal proceeding under the jurisdiction of the judicial 
branch of the Federal Government.
    (f) In other circumstances. DHS may disclose information to a court 
of competent jurisdiction in circumstances other than those stated in 
paragraph (e) of this section. DHS will make its decision regarding 
disclosure by balancing the needs of a court while preserving the 
confidentiality of information. For example, DHS may disclose 
information under a court order that restricts the use and redisclosure 
of the information by the participants in the proceeding; DHS may offer 
the information for inspection by the court in camera and under seal; or 
DHS may arrange for the court to exclude information identifying 
individuals from that portion of the record of the proceedings that is 
available to the public.
    (g) Emergency disclosures. Upon disclosing a record pertaining to an 
individual made under compelling circumstances affecting the health or 
safety of an individual, the component will notify the individual to 
whom the record pertains of the disclosure. This notice will be mailed 
to the individual's last known address and will state the nature of the 
information disclosed; the person, organization, or agency to which it 
was disclosed; the date of disclosure; and the compelling circumstances 
justifying the disclosure.
    (h) Other regulations on disclosure of information in litigation. 
See subpart C to this part for additional rules covering disclosure of 
information and records governed by this part and requested in 
connection with legal proceedings.



Sec.  5.31  Security of systems of records.

    (a) In general. Each component will establish administrative and 
physical controls to prevent unauthorized access to its systems of 
records, to prevent unauthorized disclosure of records, and to prevent 
physical damage to or destruction of records. The stringency of these 
controls will correspond to the sensitivity of the records that the 
controls protect. At a minimum, each component's administrative and 
physical controls will ensure that:
    (1) Records are protected from public view;
    (2) The area in which records are kept is supervised during business 
hours to prevent unauthorized persons from having access to them;

[[Page 32]]

    (3) Records are inaccessible to unauthorized persons outside of 
business hours; and
    (4) Records are not disclosed to unauthorized persons or under 
unauthorized circumstances in either oral or written form.
    (b) Procedures required. Each component will have procedures that 
restrict access to records to only those individuals within the 
Department who must have access to those records to perform their duties 
and that prevent inadvertent disclosure of records.



Sec.  5.32  Contracts for the operation of systems of records.

    As required by 5 U.S.C. 552a(m), any approved contract for the 
operation of a system of records to accomplish an agency function will 
contain the standard contract requirements issued by the General 
Services Administration to ensure compliance with the requirements of 
the Privacy Act for that system. The contracting component will be 
responsible for ensuring that the contractor complies with these 
contract requirements.



Sec.  5.33  Use and collection of Social Security numbers.

    Each component will ensure that employees authorized to collect 
information are aware:
    (a) That individuals may not be denied any right, benefit, or 
privilege because of refusing to provide their Social Security numbers, 
unless the collection is authorized either by a statute or by a 
regulation issued prior to 1975; and
    (b) That individuals requested to provide their Social Security 
numbers must be informed of:
    (1) Whether providing Social Security numbers is mandatory or 
voluntary;
    (2) Any statutory or regulatory authority that authorizes the 
collection of Social Security numbers; and
    (3) The uses that will be made of the numbers.
    (c) Including Social Security numbers of an individual on any 
document sent by mail is not permitted unless the Secretary determines 
that the inclusion of the number on the document is necessary.



Sec.  5.34  Standards of conduct for administration of the Privacy Act.

    Each component will inform its employees of the provisions of the 
Privacy Act, including the Act's civil liability and criminal penalty 
provisions referenced in Sec.  5.35. Unless otherwise permitted by law, 
the Department will:
    (a) Maintain only such information about an individual as is 
relevant and necessary to accomplish a purpose of the Component or the 
Department that is required to be accomplished by statute or by 
Executive order of the President;
    (b) Collect information about an individual directly from that 
individual whenever practicable and when the information may result in 
adverse determinations about an individual's rights, benefits, and 
privileges under federal programs;
    (c) Inform each individual from whom information is collected of:
    (1) The legal authority to collect the information and whether 
providing it is mandatory or voluntary;
    (2) The principal purpose for which the Department intends to use 
the information;
    (3) The routine uses the Department may make of the information; and
    (4) The effects on the individual, if any, of not providing the 
information;
    (d) Ensure that the component maintains no system of records without 
public notice and that it notifies appropriate Department officials of 
the existence or development of any system of records that is not the 
subject of a current or planned public notice;
    (e) Maintain all records that are used by the Department in making 
any determination about an individual with such accuracy, relevance, 
timeliness, and completeness as is reasonably necessary to ensure 
fairness to the individual in the determination;
    (f) Except as to disclosures made to an agency or made under the 
FOIA, make reasonable efforts, prior to disseminating any record about 
an individual, to ensure that the record is accurate, relevant, timely, 
and complete;
    (g) Maintain no record describing how an individual exercises their 
First Amendment rights, unless it is expressly authorized by statute or 
by the individual about whom the record is

[[Page 33]]

maintained, or is pertinent to and within the scope of an authorized law 
enforcement activity;
    (h) When required by the Act, maintain an accounting in the 
specified form of all disclosures of records by the Department to 
persons, organizations, or agencies;
    (i) Maintain and use records with care to prevent the unauthorized 
or inadvertent disclosure of a record to anyone; and
    (j) Disclose Privacy Act or JRA records only as permitted by 5 
U.S.C. 552a(b).



Sec.  5.35  Sanctions and penalties.

    Each component will inform its employees and contractors of the 
Privacy Act's civil liability provisions (5 U.S.C. 552a(g)) and criminal 
penalty provisions (5 U.S.C. 552a(i)) as they apply to Privacy Act and 
JRA complaints.



 Sec.  5.36  Other rights and services.

    Nothing in this subpart will be construed to entitle any person, as 
of right, to any service or to the disclosure of any record to which 
such person is not entitled under the Privacy Act or JRA.



            Subpart C_Disclosure of Information in Litigation

    Source: 68 FR 4070, Jan. 27, 2003, unless otherwise noted.



Sec.  5.41  Purpose and scope; definitions.

    (a) This subpart C sets forth the procedures to be followed with 
respect to:
    (1) Service of summonses and complaints or other requests or demands 
directed to the Department of Homeland Security (Department) or to any 
Department employee or former employee in connection with federal or 
state litigation arising out of or involving the performance of official 
activities of the Department; and
    (2) The oral or written disclosure, in response to subpoenas, 
orders, or other requests or demands of federal or state judicial or 
quasi-judicial or administrative authority as well as state legislative 
authorities (collectively, ``demands''), whether civil or criminal in 
nature, or in response to requests for depositions, affidavits, 
admissions, responses to interrogatories, document production, 
interviews, or other litigation-related matters, including pursuant to 
the Federal Rules of Civil Procedure, the Federal Rules of Criminal 
Procedure, or applicable state rules (collectively, ``requests''), of 
any material contained in the files of the Department, any information 
relating to material contained in the files of the Department, or any 
information acquired while the subject of the demand or request is or 
was employed by the Department, or served as Secretary of the 
Department, as part of the performance of that person's duties or by 
virtue of that person's official status.
    (b) The provisions established by this subpart shall apply to all 
Department components that are transferred to the Department. Except to 
the extent a Department component has adopted separate guidance 
governing the subject matter of a provision of this subpart, the 
provisions of this subpart shall apply to each component of the 
Department. Departmental components may issue their own guidance under 
this subpart subject to the approval of the General Counsel of the 
Department.
    (c) For purposes of this subpart, and except as the Department may 
otherwise determine in a particular case, the term employee includes all 
former Secretaries of Homeland Security and all employees of the 
Department of Homeland Security or other federal agencies who are or 
were appointed by, or subject to the supervision, jurisdiction, or 
control of the Secretary of Homeland Security, whether residing or 
working in the United States or abroad, including United States 
nationals, foreign nationals, and contractors. The procedures 
established within this subpart also apply to former employees of the 
Department where specifically noted.
    (d) For purposes of this subpart, the term litigation encompasses 
all pre-trial, trial, and post-trial stages of all judicial or 
administrative actions, hearings, investigations, or similar proceedings 
before courts, commissions, boards (including the Board of Appellate 
Review), grand juries, or other judicial or quasi-judicial bodies or 
tribunals, whether criminal, civil, or administrative in nature. This 
subpart

[[Page 34]]

governs, inter alia, responses to discovery requests, depositions, and 
other pre-trial, trial, or post-trial proceedings, as well as responses 
to informal requests by attorneys or others in situations involving 
litigation. However, this subpart shall not apply to any claims against 
the Department by Department of Homeland Security employees (present or 
former), or applicants for Department employment, for which jurisdiction 
resides with the U.S. Equal Employment Opportunity Commission; the U.S. 
Merit Systems Protection Board; the Office of Special Counsel; the 
Federal Labor Relations Authority; the Foreign Service Labor Relations 
Board; the Foreign Service Grievance Board; or a labor arbitrator 
operating under a collective bargaining agreement between the Department 
and a labor organization representing Department employees; or their 
successor agencies or entities.
    (e) For purposes of this subpart, official information means all 
information of any kind, however stored, that is in the custody and 
control of the Department, relates to information in the custody and 
control of the Department, or was acquired by Department employees, or 
former employees, as part of their official duties or because of their 
official status within the Department while such individuals were 
employed by or served on behalf of the Department.
    (f) Nothing in this subpart affects disclosure of information under 
the Freedom of Information Act (FOIA), 5 U.S.C. 552, the Privacy Act, 5 
U.S.C. 552a, Executive Order 12958 on national security information (3 
CFR, 1995 Comp., p. 333), the Government in the Sunshine Act, 5 U.S.C. 
552b, the Department's implementing regulations or pursuant to 
congressional subpoena. Nothing in this subpart permits disclosure of 
information by the Department, its present and former employees, or the 
Secretary, that is protected or prohibited by statute or other 
applicable law.
    (g) This subpart is intended only to inform the public about 
Department procedures concerning the service of process and responses to 
demands or requests and is not intended to and does not create, and may 
not be relied upon to create any right or benefit, substantive or 
procedural, enforceable at law by a party against the Department or the 
United States.
    (h) Nothing in this subpart affects the rules and procedures, under 
applicable U.S. law and international conventions, governing diplomatic 
and consular immunity.
    (i) Nothing in this subpart affects the disclosure of official 
information to other federal agencies or Department of Justice attorneys 
in connection with litigation conducted on behalf or in defense of the 
United States, its agencies, officers, and employees, or litigation in 
which the United States has an interest; or to federal, state, local, or 
foreign prosecuting and law enforcement authorities in conjunction with 
criminal law enforcement investigations, prosecutions, or other 
proceedings, e.g., extradition, deportation.



Sec.  5.42  Service of summonses and complaints.

    (a) Only the Office of the General Counsel is authorized to receive 
and accept on behalf of the Department summonses or complaints sought to 
be served upon the Department, the Secretary, or Department employees. 
All such documents must be sent by registered or certified mail, to the 
appropriate address as indicated in appendix A to this subpart. The 
Office of the General Counsel may also in its discretion accept service 
of process in person or by registered or certified mail to other 
addresses, as announced on the DHS website as indicated in appendix A to 
this subpart. The authorization for receipt shall in no way affect the 
requirements of service elsewhere provided in applicable rules and 
regulations.
    (b) In the event any summons or complaint described in Sec.  5.41(a) 
is delivered to an employee of the Department other than in the manner 
specified in this part, the recipient thereof shall decline to accept 
the proffered service and may notify the person attempting to make 
service of the Departmental regulations set forth herein.
    (c) Except as otherwise provided Sec. Sec.  5.42(d) and 5.43(c), the 
Department is not an authorized agent for service of process with 
respect to civil litigation

[[Page 35]]

against Department employees purely in their personal, non-official 
capacity. Copies of summonses or complaints directed to Department 
employees in connection with legal proceedings arising out of the 
performance of official duties may, however, be served upon the Office 
of the General Counsel.
    (d) Although the Department is not an agent for the service of 
process upon its employees with respect to purely personal, non-official 
litigation, the Department recognizes that its employees should not use 
their official positions to evade their personal obligations and will, 
therefore, counsel and encourage Department employees to accept service 
of process in appropriate cases.
    (e) Documents for which the Office of the General Counsel accepts 
service in official capacity only shall be stamped ``Service Accepted in 
Official Capacity Only''. Acceptance of service shall not constitute an 
admission or waiver with respect to jurisdiction, propriety of service, 
improper venue, or any other defense in law or equity available under 
applicable laws or rules.

[68 FR 4070, Jan. 27, 2003, as amended at 85 FR 22582, Apr. 23, 2020]



Sec.  5.43  Service of subpoenas, court orders, and other demands or
requests for official information or action.

    (a) Except in cases in which the Department is represented by legal 
counsel who have entered an appearance or otherwise given notice of 
their representation, only the Office of the General Counsel is 
authorized to receive and accept subpoenas (consistent with paragraph 
(g) of this section) or other demands or requests directed to the 
Secretary, the Department, or any component thereof, or its employees, 
whether civil or criminal in nature, for:
    (1) Material, including documents, contained in the files of the 
Department;
    (2) Information, including testimony, affidavits, declarations, 
admissions, responses to interrogatories, or informal statements, 
relating to material contained in the files of the Department or which 
any Department employee acquired in the course and scope of the 
performance of his official duties;
    (3) Garnishment or attachment of compensation of current or former 
employees; or
    (4) The performance or non-performance of any official Department 
duty.
    (b) In the event that any subpoena, demand, or request is sought to 
be delivered to a Department employee other than in the manner 
prescribed in paragraph (a) of this section, such employee shall, after 
consultation with the Office of the General Counsel, decline service and 
direct the server of process to the Departmental regulations. If the 
subpoena, demand, or other request is nonetheless delivered to the 
employee, the employee shall immediately forward a copy of that document 
to the Office of the General Counsel.
    (c) Except as otherwise provided in this subpart, the Department is 
not an agent for service, or otherwise authorized to accept on behalf of 
its employees, any subpoenas, show-cause orders, or similar compulsory 
process of federal or state courts, or requests from private individuals 
or attorneys, which are not related to the employees' official duties 
except upon the express, written authorization of the individual 
Department employee to whom such demand or request is directed.
    (d) Acceptance of such documents by the Office of the General 
Counsel does not constitute a waiver of any defenses that might 
otherwise exist with respect to service under the Federal Rules of Civil 
or Criminal Procedure or other applicable rules.
    (e) Copies of any subpoenas, show cause orders, or similar 
compulsory process of federal or state courts, or requests from private 
individuals or attorneys, directed to former employees of the Department 
in connection with legal proceedings arising out of the performance of 
official duties shall also be served upon the Office of the General 
Counsel. The Department shall not, however, serve as an agent for 
service for the former employee, nor is the Department otherwise 
authorized to accept service on behalf of its former employees. If the 
demand involves their official duties, former employees who receive 
subpoenas, show

[[Page 36]]

cause orders, or similar compulsory process of federal or state courts 
should also notify in the component of the Department in which they were 
employed if the service involves their official duties while so 
employed.
    (f) If the subpoena, demand, or other request is nonetheless 
delivered to the employee, the employee shall immediately forward a copy 
of that document to the Office of the General Counsel.
    (g) Subpoenas must be delivered by personal service at the 
appropriate address as indicated in appendix A to this subpart, 
consistent with the Federal Rules of Civil Procedure, unless DHS has 
specified alternative means of service, in its discretion, on the DHS 
website as indicated in appendix A to this subpart. This paragraph (g) 
does not apply to other demands or requests for information under 
paragraph (a) of this section.

[68 FR 4070, Jan. 27, 2003, as amended at 85 FR 22582, Apr. 23, 2020]



Sec.  5.44  Testimony and production of documents prohibited unless
approved by appropriate Department officials.

    (a) No employee, or former employee, of the Department shall, in 
response to a demand or request, including in connection with any 
litigation, provide oral or written testimony by deposition, 
declaration, affidavit, or otherwise concerning any information acquired 
while such person is or was an employee of the Department as part of the 
performance of that person's official duties or by virtue of that 
person's official status, unless authorized to do so by the Office of 
the General Counsel, or as authorized in Sec.  5.44(b).
    (b) No employee, or former employee, shall, in response to a demand 
or request, including in connection with any litigation, produce any 
document or any material acquired as part of the performance of that 
employee's duties or by virtue of that employee's official status, 
unless authorized to do so by the Office of the General Counsel or the 
delegates thereof, as appropriate.



Sec.  5.45  Procedure when testimony or production of documents is sought;
general.

    (a) If official information is sought, through testimony or 
otherwise, by a request or demand, the party seeking such release or 
testimony must (except as otherwise required by federal law or 
authorized by the Office of the General Counsel) set forth in writing, 
and with as much specificity as possible, the nature and relevance of 
the official information sought. Where documents or other materials are 
sought, the party should provide a description using the types of 
identifying information suggested in Sec.  5.3(b). Subject to Sec.  
5.47, Department employees may only produce, disclose, release, comment 
upon, or testify concerning those matters which were specified in 
writing and properly approved by the appropriate Department official 
designated in Sec.  5.44. See United States ex rel. Touhy v. Ragen, 340 
U.S. 462 (1951). The Office of the General Counsel may waive the 
requirement of this subsection in appropriate circumstances.
    (b) To the extent it deems necessary or appropriate, the Department 
may also require from the party seeking such testimony or documents a 
plan of all reasonably foreseeable demands, including but not limited to 
the names of all employees and former employees from whom discovery will 
be sought, areas of inquiry, expected duration of proceedings requiring 
oral testimony, and identification of potentially relevant documents.
    (c) The appropriate Department official designated in Sec.  5.42 
will notify the Department employee and such other persons as 
circumstances may warrant of its decision regarding compliance with the 
request or demand.
    (d) The Office of the General Counsel will consult with the 
Department of Justice regarding legal representation for Department 
employees in appropriate cases.

[[Page 37]]



Sec.  5.46  Procedure when response to demand is required prior to 
receiving instructions.

    (a) If a response to a demand is required before the appropriate 
Department official designated in Sec.  5.44 renders a decision, the 
Department, if necessary, will request that the Department of Justice or 
the appropriate Department attorney take appropriate steps to stay, 
postpone, or obtain relief from the demand pending decision. If 
necessary, the attorney will:
    (1) Appear with the employee upon whom the demand has been made;
    (2) Furnish the court or other authority with a copy of the 
regulations contained in this subpart;
    (3) Inform the court or other authority that the demand has been, or 
is being, as the case may be, referred for the prompt consideration of 
the appropriate Department official; and
    (4) Respectfully request the court or authority to stay the demand 
pending receipt of the requested instructions.
    (b) In the event that an immediate demand for production or 
disclosure is made in circumstances which would preclude the proper 
designation or appearance of a Department of Justice or appropriate 
Department attorney on the employee's behalf, the employee, if 
necessary, shall respectfully request from the demanding court or 
authority for a reasonable stay of proceedings for the purpose of 
obtaining instructions from the Department.



Sec.  5.47  Procedure in the event of an adverse ruling.

    If a stay of, or other relief from, the effect of the demand in 
response to a request made pursuant to Sec.  5.46 is declined or not 
obtained, or if the court or other judicial or quasi-judicial authority 
declines to stay the effect of the demand in response to a request made 
pursuant to Sec.  5.46, or if the court or other authority rules that 
the demand must be complied with irrespective of the Department's 
instructions not to produce the material or disclose the information 
sought, the employee upon whom the demand has been made shall 
respectfully decline to comply with the demand, citing this subpart and 
United States ex rel. Touhy v. Ragen, 340 U.S. 462 (1951).



Sec.  5.48  Considerations in determining whether the Department will
comply with a demand or request.

    (a) In deciding whether to comply with a demand or request, 
Department officials and attorneys shall consider, among any other 
pertinent considerations:
    (1) Whether such compliance would be unduly burdensome or otherwise 
inappropriate under the applicable rules of discovery or the rules of 
procedure governing the case or matter in which the demand arose;
    (2) Whether compliance is appropriate under the relevant substantive 
law concerning privilege or disclosure of information;
    (3) The public interest;
    (4) The need to conserve the time of Department employees for the 
conduct of official business;
    (5) The need to avoid spending the time and money of the United 
States for private purposes;
    (6) The need to maintain impartiality between private litigants in 
cases where a substantial government interest is not implicated;
    (7) Whether compliance would have an adverse effect on performance 
by the Department of its mission and duties; and
    (8) The need to avoid involving the Department in controversial 
issues not related to its mission.
    (b) Among those demands and requests in response to which compliance 
will not ordinarily be authorized are those with respect to which any of 
the following factors, inter alia, exist:
    (1) Compliance would violate a statute or a rule of procedure;
    (2) Compliance would violate a specific regulation or Executive 
order;
    (3) Compliance would reveal information properly classified in the 
interest of national security;
    (4) Compliance would reveal confidential commercial or financial 
information or trade secrets without the owner's consent;
    (5) Compliance would reveal the internal deliberative processes of 
the Executive Branch; or
    (6) Compliance would potentially impede or prejudice an on-going law 
enforcement investigation.

[[Page 38]]



Sec.  5.49  Prohibition on providing expert or opinion testimony.

    (a) Except as provided in this section, and subject to 5 CFR 
2635.805, Department employees shall not provide opinion or expert 
testimony based upon information which they acquired in the scope and 
performance of their official Department duties, except on behalf of the 
United States or a party represented by the Department of Justice.
    (b) Any expert or opinion testimony by a former employee of the 
Department shall be excepted from 5.49(a) where the testimony involves 
only general expertise gained while employed at the Department.
    (c) Upon a showing by the requestor of exceptional need or unique 
circumstances and that the anticipated testimony will not be adverse to 
the interests of the United States, the appropriate Department official 
designated in Sec.  5.44 may, consistent with 5 CFR 2635.805, in their 
discretion and with the concurrence of the Office of the General 
Counsel, grant special, written authorization for Department employees, 
or former employees, to appear and testify as expert witnesses at no 
expense to the United States.
    (d) If, despite the final determination of the appropriate 
Department official designated in Sec.  5.44, a court of competent 
jurisdiction or other appropriate authority orders the appearance and 
expert or opinion testimony of a current or former Department employee, 
that person shall immediately inform the Office of the General Counsel 
of such order. If the Office of the General Counsel determines that no 
further legal review of or challenge to the court's order will be made, 
the Department employee, or former employee, shall comply with the 
order. If so directed by the Office of the General Counsel, however, the 
employee, or former employee, shall respectfully decline to testify.



Sec. Appendix A to Subpart C of Part 5--Service of Process of Summonses, 
                        Complaints, and Subpoenas

             1. Office of the General Counsel--Headquarters

    (a) In general. Pursuant to Sec.  5.42, the Office of the General 
Counsel Headquarters may accept service of process on behalf of the 
Department, including each of its components, regardless of whether such 
components are otherwise listed in this appendix.
    (b) Service of Process of Summonses and Complaints. Pursuant to 
Sec.  5.42, unless an alternative means of service is specified at 
https://www.dhs.gov/office-general-counsel, mail summonses and 
complaints against the Department or its personnel in their official 
capacity by registered or certified mail to Office of the General 
Counsel, U.S. Department of Homeland Security, 2707 Martin Luther King 
Jr. Ave SE, Washington, DC 20528-0485. To aid in prompt handling of any 
summons and complaint, parties are encouraged to also email a copy to 
[email protected].
    (c) Service of Process for Subpoenas. Pursuant to Sec.  5.43, unless 
an alternative means of service is specified at https://www.dhs.gov/
office-general-counsel, deliver service of process to the following 
address: Office of the General Counsel, U.S. Department of Homeland 
Security, 2707 Martin Luther King Jr. Ave SE, Gate 1, Washington, DC 
20016.

                2. U.S. Customs & Border Protection (CBP)

    (a) Service of Process of Summonses and Complaints. Pursuant to 
Sec.  5.42, unless an alternative means of service is specified at 
https://www.cbp.gov/service-of-process, mail summonses and complaints 
against CBP or its personnel in their official capacity by registered or 
certified mail to the following address: Office of Chief Counsel, U.S. 
Customs and Border Protection, 1300 Pennsylvania Avenue, Suite 4.4-B, 
Washington, DC 20229. To aid in prompt handling of any summons and 
complaint, parties are encouraged to also email a copy to CBP-Service-
[email protected].
    (b) Service of Process for Subpoenas. Pursuant to Sec.  5.43, unless 
an alternative means of service is specified at https://www.cbp.gov/
service-of-process, deliver service of process to the following address: 
Office of Chief Counsel, U.S. Customs and Border Protection, 1300 
Pennsylvania Avenue, Suite 4.4-B, Washington, DC 20229. To aid in prompt 
handling of any subpoena, parties are encouraged to also email a copy to 
[email protected].
    (c) Field Counsel. CBP field counsel may also accept service of 
process at their normal duty station, in their discretion.

       3. Cybersecurity and Infrastructure Security Agency (CISA)

    (a) Service of Process of Summonses and Complaints. Pursuant to 
Sec.  5.42, unless an alternative means of service is specified at 
https://www.cisa.gov/contact-us, mail summonses and complaints against 
CISA or its personnel in their official capacity by registered or 
certified mail to the following address: Office of the Chief Counsel, 
Cybersecurity and Infrastructure Security Agency, 1616 Fort Myer

[[Page 39]]

Drive, Arlington, VA 22209. To aid in prompt handling, parties are 
encouraged to also email a copy to [email protected].
    (b) Service of Process for Subpoenas. Pursuant to Sec.  5.43, unless 
an alternative means of service is specified at https://www.cisa.gov/
contact-us, deliver service of process to the following address: Office 
of the Chief Counsel, Cybersecurity and Infrastructure Security Agency, 
1616 Fort Myer Drive, Arlington, VA 22209. To aid in prompt handling, 
parties are encouraged to also email a copy to [email protected].

              4. Federal Emergency Management Agency (FEMA)

    (a) Service of Process of Summonses and Complaints. Pursuant to 
Sec.  5.42, mail summonses and complaints against FEMA or its personnel 
in their official capacity by registered or certified mail to the 
following address: Office of the Chief Counsel, Federal Emergency 
Management Agency, 500 C Street SW, Washington, DC 20472. To aid in 
prompt handling of any summons and complaint, parties are encouraged to 
also email a copy to [email protected].
    (b) Service of Process for Subpoenas. Pursuant to Sec.  5.43, 
deliver service of process to the address indicated at 44 CFR 5.83. To 
aid in prompt handling of any summons and complaint, parties are 
encouraged to also email a copy to [email protected].

          5. Federal Law Enforcement Training Centers (FLETCs)

    (a) Service of Process of Summonses and Complaints. Pursuant to 
Sec.  5.42, unless an alternative means of service is specified at 
https://www.fletc.gov/about/contact-us, mail summonses and complaints 
against FLETC or its personnel in their official capacity by registered 
or certified mail to the following address: Office of Chief Counsel, 
Federal Law Enforcement Training Centers, 1131 Chapel Crossing Rd., 
Bldg. 93, Glynco, GA 31524.
    (b) Service of Process for Subpoenas. Pursuant to Sec.  5.43, unless 
an alternative means of service is specified at https://www.fletc.gov/
about/contact-us, deliver service of process to the following address: 
Office of Chief Counsel, Federal Law Enforcement Training Centers, 1131 
Chapel Crossing Rd., Bldg. 93, Glynco, GA 31524.

        6. United States Immigration & Customs Enforcement (ICE)

    (a) Service of Process of Summonses and Complaints. Pursuant to 
Sec.  5.42, mail summonses and complaints against ICE or its personnel 
in their official capacity by registered or certified mail to the 
following address: U.S. Immigration and Customs Enforcement, Office of 
the Principal Legal Advisor, 500 12th St. SW, Mail Stop 5900, 
Washington, DC 20536-5900. To aid in prompt handling, parties are 
encouraged to email a courtesy copy of a summons or complaint properly 
served in accordance with local rules and this guidance to 
[email protected].
    (b) Service of Process for Subpoenas. Pursuant to Sec.  5.43, 
deliver service of process to the following address: U.S. Immigration 
and Customs Enforcement, Office of the Principal Legal Advisor, 500 12th 
St. SW, Mail Stop 5900, Washington, DC 20536-5900. To aid in prompt 
handling, parties are encouraged to email a courtesy copy to 
[email protected].

                  7. Office of Inspector General (OIG)

    (a) Service of Process of Summonses and Complaints. Pursuant to 
Sec.  5.42, unless an alternative means of service is specified at 
https://www.oig.dhs.gov/about/contact, mail summonses and complaints 
against OIG or its personnel in their official capacity by registered or 
certified mail to the following address: Office of Inspector General, 
245 Murray Lane SW, Stop 0305, Washington, DC 20528.
    (b) Service of Process for Subpoenas. Pursuant to Sec.  5.43, unless 
an alternative means of service is specified at https://www.oig.dhs.gov/
about/contact, deliver service of process to the following address: 
Office of Inspector General, 245 Murray Lane SW, Stop 0305, Washington, 
DC 20528.

             8. Transportation Security Administration (TSA)

    (a) Service of Process of Summonses and Complaints. Pursuant to 
Sec.  5.42, unless an alternative means of service is specified at 
https://www.TSA.gov/contacts, mail summonses and complaints against TSA 
or its personnel in their official capacity by registered or certified 
mail to the following address: TSA- Office of Chief Counsel (TSA-2), 601 
S 12th Street, Arlington, VA 20598-6002. To aid in prompt handling of 
any summons and complaint, parties are encouraged to also email a copy 
to [email protected].
    (b) Service of Process for Subpoenas. Pursuant to Sec.  5.43, unless 
an alternative means of service is specified at https://www.TSA.gov/
contacts, deliver service of process to the following address: TSA- 
Office of Chief Counsel (TSA-2), 601 S 12th Street, Arlington, VA 20598-
6002. Subpoenas or other judicial process directed to TSA or its 
officers/employees in an official capacity (not addressed in paragraph 
(a) of item 7 of this appendix) may also be sent by email to 
[email protected].
    (c) Field counsel. TSA field counsel may also accept service of 
process at their normal duty station, in their discretion.

[[Page 40]]

           9. U.S. Citizenship & Immigration Services (USCIS)

    (a) Service of Process of Summonses and Complaints. Pursuant to 
Sec.  5.42, unless an alternative means of service is specified at 
https://www.uscis.gov/about-us/contact-us, mail summonses and complaints 
against USCIS or its personnel in their official capacity by registered 
or certified mail to the following address: USCIS, Office of the Chief 
Counsel, 20 Massachusetts Ave. NW, Room 4210, Washington, DC 20529. To 
aid in prompt handling of any summons and complaint, parties are 
encouraged to also email a copy to [email protected].
    (b) Service of Process for Subpoenas. Pursuant to Sec.  5.43, unless 
an alternative means of service is specified at https://www.uscis.gov/
about-us/contact-us, deliver service of process to the following 
address: USCIS, Office of the Chief Counsel, 20 Massachusetts Ave. NW, 
Room 4210, Washington, DC 20529. To aid in prompt handling of subpoenas, 
parties are encouraged to also email a copy to 
[email protected].

                       10. U.S. Coast Guard (USCG)

    (a) Service of Process of Summonses and Complaints. Pursuant to 
Sec.  5.42, unless an alternative means of service is specified at 
https://www.uscg.mil/Resources/Legal/, mail summonses and complaints 
against USCG or its personnel in their official capacity by registered 
or certified mail to the following address: Commandant CG-LCL, US Coast 
Guard HQ, 2703 Martin Luther King Jr. Ave. SE, Stop 7213, Washington, DC 
20593-7213.
    (b) Service of Process for Subpoenas. Pursuant to Sec.  5.43, unless 
an alternative means of service is specified at https://www.uscg.mil/
Resources/Legal/, deliver service of process to the following address: 
Commandant CG-LCL, US Coast Guard HQ Visitor Center, Gate 4, 1790 Ash 
St. SE, Washington, DC 20032.

                 11. United States Secret Service (USSS)

    (a) Service of Process of Summonses and Complaints. Pursuant to 
Sec.  5.42, unless an alternative means of service is specified at 
https://www.secretservice.gov/contact/, mail summonses and complaints 
against USSS or its personnel in their official capacity by registered 
or certified mail to the following address: Communications Center, 245 
Murray Lane SW, Building T5, Washington, DC 20223, Attn: Office of Chief 
Counsel.
    (b) Service of Process for Subpoenas. Pursuant to Sec.  5.43, unless 
an alternative means of service is specified at https://
www.secretservice.gov/contact/, deliver service of process to the 
following address: Communications Center, 245 Murray Lane SW, Building 
T5, Washington, DC 20223, Attn: Office of Chief Counsel.

[85 FR 22582, Apr. 23, 2020]





Sec. Appendix A to Part 5--FOIA/Privacy Act Offices of the Department of 
                            Homeland Security

    I. For the following Headquarters Offices of the Department of 
Homeland Security, FOIA and Privacy Act requests should either be mailed 
to the Department's Privacy Office, Mail Stop 0655, U.S. Department of 
Homeland Security, 2707 Martin Luther King Jr. Ave. SE, Washington, DC 
20528-0655, or submitted electronically through https://
foiarequest.dhs.gov/. To respond to your FOIA or Privacy Act request as 
quickly as possible, we strongly encourage you to submit your request 
electronically. Additional contact information for questions: Phone: 
202-343-1743 or 866-431-0486, Fax: 202-343-4011, or Email: 
[email protected]. The Public Liaison may also be contacted using this 
information.
    The Headquarters Offices are:

Office of the Secretary
Office of the Deputy Secretary
Office of the General Counsel (OGC)
Office of the Executive Secretary (ESEC)
Office of Intelligence and Analysis (I&A)
Office of Legislative Affairs (OLA)
Office of Operations Coordination (OPS)
Office of Partnership and Engagement (OPE)
Office of Public Affairs (OPA)
Office of Strategy, Policy, and Plans (PLCY)
Citizenship and Immigration Services Ombudsman (CISOMB)
Civil Rights and Civil Liberties (CRCL) Countering Weapons of Mass 
Destruction Office (CWMD)
Federal Protective Service (FPS)
Management Directorate (MGMT), including the Office of Biometric 
Identity Management (OBIM)
Military Advisor's Office (MIL)
Privacy Office (PRIV)
Science and Technology Directorate (S&T)

    II. For the following components and offices of the Department of 
Homeland Security, FOIA and Privacy Act requests should be sent to the 
component's FOIA Office, unless otherwise noted below. For each 
component, the Public Liaison may also be contacted using the 
information below. The components are:

         Cybersecurity and Infrastructure Security Agency (CISA)

    All requests should be either be mailed to the Department's Privacy 
Office, Mail Stop 0655, U.S. Department of Homeland Security, 2707 
Martin Luther King Jr. Ave. SE, Washington, DC 20528-0655, or submitted 
electronically through https://foiarequest.dhs.gov/. To respond to your 
FOIA or Privacy Act request as quickly as possible, we strongly 
encourage you to submit your request electronically.

[[Page 41]]

Additional contact information for questions: Phone: 202-343-1743 or 
866-431-0486, Fax: 202-343-4011, or Email: [email protected].

                U.S. Customs and Border Protection (CBP)

    All requests should be mailed to U.S. Customs and Border Protection, 
Office of Privacy and Diversity Office, 90 K Street NE, Mail Stop 1181, 
9th Floor, or submitted electronically at https://foiaonline.gov/
foiaonline/action/public/home or [email protected]. 
Electronic requests should be made to https://foiarequest.dhs.gov/ once 
CBP is no longer listed as an agency on https://foiaonline.gov/
foiaonline/action/public/home. To respond to your FOIA or Privacy Act 
request as quickly as possible, we strongly encourage you to submit your 
request electronically. Additional contact information for questions: 
Phone: 202-325-0150.

               Federal Emergency Management Agency (FEMA)

    All requests should be mailed to FOIA Officer, 500 C Street SW, Room 
840, Washington, DC 20472, or submitted electronically through https://
foiarequest.dhs.gov/. To respond to your FOIA or Privacy Act request as 
quickly as possible, we strongly encourage you to submit your request 
electronically. Additional contact information for questions: Phone: 
202-646-3323, Fax: 202-646-3347, or Email: [email protected].

             Federal Law Enforcement Training Center (FLETC)

    All requests should be mailed to Freedom of Information Act Officer, 
Building 681, Suite B187, 1131 Chapel Crossing Road, Glico, GA 31524, 
or submitted electronically to https://foiarequest.dhs.gov/. To respond 
to your FOIA or Privacy Act request as quickly as possible, we strongly 
encourage you to submit your request electronically. Additional contact 
information for questions: Phone: 912-267-3103, Fax: 912-267-3113, or 
Email: [email protected].

                Immigration and Customs Enforcement (ICE)

    All requests should be mailed to Freedom of Information Act Office, 
500 12th Street SW, Stop 5009, Washington, DC 20536-5009, or submitted 
electronically through https://foiarequest.dhs.gov/. To respond to your 
FOIA or Privacy Act request as quickly as possible, we strongly 
encourage you to submit your request electronically. Additional contact 
information for questions: Phone: 866-633-1182, Fax: 202-732-4265, or 
Email: [email protected].

                       Office of Inspector General

    All requests should be mailed to the OIG Office of Counsel, 245 
Murray Lane SW, Mail Stop--0305, Washington, DC 20528-0305, or submitted 
electronically through https://foiarequest.dhs.gov/. To respond to your 
FOIA or Privacy Act request as quickly as possible, we strongly 
encourage you to submit your request electronically. Additional contact 
information for questions: Phone: 202-981-6100, Fax: 202-245-5217, or 
Email: [email protected].

              Transportation Security Administration (TSA)

    All requests should be mailed to Freedom of Information Act Branch, 
6595 Springfield Center Drive, Springfield, VA 20598-6020, or submitted 
electronically through https://foiarequest.dhs.gov/. To respond to your 
FOIA or Privacy Act request as quickly as possible, we strongly 
encourage you to submit your request electronically. Additional contact 
information for questions: Phone: 1-866-FOIA-TSA or 571-227-2300, Fax: 
571-227-1406, or Email: [email protected].

            U.S. Citizenship and Immigration Services (USCIS)

    All requests should be mailed to National Records Center, FOIA/PA 
Office, P. O. Box 648010, Lee's Summit, MO. 64064-8010 or submitted 
electronically through the USCIS FOIA Portal: https://first.uscis.gov/. 
To respond to your FOIA or Privacy Act request as quickly as possible, 
we strongly encourage you to submit your request electronically. 
Additional contact information for questions: Phone: 1-800-375-5283, 
USCIS Contact Center, or Email: [email protected].

                         U.S. Coast Guard (USCG)

    All requests should be mailed to Commandant (CG-6P), 2703 Martin 
Luther King Jr. Ave. SE, Stop 7710, Washington, DC 20593-7710, or 
submitted electronically through https://foiarequest.dhs.gov/. To 
respond to your FOIA or Privacy Act request as quickly as possible, we 
strongly encourage you to submit your request electronically. Additional 
contact information for questions: Phone: 202-475-3522, Fax: 202-372-
8413, or Email: [email protected].

                       U.S. Secret Service (USSS)

    All requests should be mailed to Freedom of Information Act and 
Privacy Act Branch, 245 Murray Lane SW, Building T-5, Washington, DC 
20223, or submitted electronically to [email protected]. To respond to 
your FOIA or Privacy Act request as quickly as possible, we strongly 
encourage you to submit your request electronically. Additional contact 
information for questions: Phone: 202-406-6370, Fax: 202-406-5586, or 
Email: [email protected].

[87 FR 68607, Nov. 16, 2022]

[[Page 42]]



                  Sec. Appendix B to Part 5 [Reserved]



   Sec. Appendix C to Part 5--DHS Systems of Records Exempt From the 
                               Privacy Act

    This appendix implements provisions of the Privacy Act of 1974 that 
permit the Department of Homeland Security (DHS) to exempt its systems 
of records from provisions of the Act. During the course of normal 
agency operations, exempt materials from other systems of records may 
become part of the records in these and other DHS systems. To the extent 
that copies of records from other exempt systems of records are entered 
into any DHS system, DHS hereby claims the same exemptions for those 
records that are claimed for the original primary systems of records 
from which they originated and claims any additional exemptions in 
accordance with this rule.
    Portions of the following DHS systems of records are exempt from 
certain provisions of the Privacy Act pursuant to 5 U.S.C. 552(j) and 
(k):
    1. The DHS/ALL--001 Freedom of Information Act and Privacy Act 
Records System of Records consists of electronic and paper records and 
will be used by DHS and its components. The DHS/ALL--001 Freedom of 
Information Act and Privacy Act Records System of Records is a 
repository of information held by DHS in connection with its several and 
varied missions and functions, including, but not limited to the 
enforcement of civil and criminal laws; investigations, inquiries, and 
proceedings there under; national security and intelligence activities; 
and protection of the President of the United States or other 
individuals pursuant to section 3056 and 3056A of Title 18. The DHS/
ALL--001 Freedom of Information Act and Privacy Act Records System of 
Records contains information that is collected by, on behalf of, in 
support of, or in cooperation with DHS and its components and may 
contain personally identifiable information collected by other federal, 
state, local, tribal, foreign, or international government agencies. The 
Secretary of Homeland Security has exempted this system from the 
following provisions of the Privacy Act, subject to limitations set 
forth in 5 U.S.C. 552a(c)(3) and (4): (d); (e)(1), (e)(2), (e)(3), 
(e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8), (e)(12); (f); (g)(1); 
and (h) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of 
Homeland Security has exempted this system from the following provisions 
of the Privacy Act, subject to limitations set forth in 5 U.S.C. 
552a(c)(3): (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) 
pursuant to 5 U.S.C. Sec.  552a(k)(1), (k)(2), (k)(3), (k)(5), and 
(k)(6). Exemptions from these particular subsections are justified, on a 
case-by-case basis to be determined at the time a request is made, for 
the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an unreasonable administrative burden by requiring 
investigations to be continually reinvestigated. In addition, permitting 
access and amendment to such information could disclose security-
sensitive information that could be detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f)

[[Page 43]]

(Agency Rules), because portions of this system are exempt from the 
individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.
    (g) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with subsection (e)(5) would 
preclude DHS agents from using their investigative training and exercise 
of good judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (e)(12) (Computer Matching) if the agency is a 
recipient agency or a source agency in a matching program with a non-
Federal agency, with respect to any establishment or revision of a 
matching program, at least 30 days prior to conducting such program, 
publish in the Federal Register notice of such establishment or 
revision.
    (j) From subsection (g)(1) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    (k) From subsection (h) (Legal Guardians) the parent of any minor, 
or the legal guardian of any individual who has been declared to be 
incompetent due to physical or mental incapacity or age by a court of 
competent jurisdiction, may act on behalf of the individual.
    2. The DHS/ALL-029 Civil Rights and Civil Liberties Records System 
of Records consists of electronic and paper records and will be used by 
DHS and its components. The DHS/ALL-029 Civil Rights and Civil Liberties 
Records System of Records is a repository of information held by DHS in 
connection with its several and varied missions and functions, 
including, but not limited to the enforcement of civil and criminal 
laws; investigations, inquiries, and proceedings thereunder; national 
security and intelligence activities; and protection of the President of 
the United States or other individuals pursuant to Section 3056 and 
3056A of Title 18. The DHS/ALL-029 Civil Rights and Civil Liberties 
Records System of Records contains information that is collected by, on 
behalf of, in support of, or in cooperation with DHS and its components 
and may contain personally identifiable information collected by other 
Federal, state, local, Tribal, foreign, or international government 
agencies. The Secretary of Homeland Security has exempted this system 
from the following provisions of the Privacy Act, subject to limitations 
set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), 
(e)(4)(I); and (f) pursuant to 5 U.S.C. Sec.  552a(k)(1), (k)(2), 
(k)(3), and (k)(5). Exemptions from these particular subsections are 
justified, on a case-by-case basis to be determined at the time a 
request is made, for the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the individual who 
is the subject of an investigation of an actual or potential criminal, 
civil, or regulatory violation to the existence of that investigation 
and reveal investigative interest on the part of DHS as well as the 
recipient agency. Disclosure of the accounting would, therefore, present 
a serious impediment to law enforcement efforts and/or efforts to 
preserve national security. Disclosure of the accounting would also 
permit the individual who is the subject of a record to impede the 
investigation, to tamper with witnesses or evidence, and to avoid 
detection or apprehension, which would undermine the entire 
investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the individual 
who is the subject of an investigation of an actual or potential 
criminal, civil, or regulatory violation to the existence of that 
investigation and reveal investigative interest on the part of DHS or 
another agency. Access to the records could permit the individual who is 
the subject of a record to impede the investigation, to tamper with 
witnesses or evidence, and to avoid detection or apprehension. Amendment 
of the records could interfere with ongoing investigations and law 
enforcement activities and would impose an unreasonable administrative 
burden by requiring investigations to be continually reinvestigated. In 
addition, permitting access and amendment to such information could 
disclose security-sensitive information that could be detrimental to 
homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain

[[Page 44]]

all information that may aid in establishing patterns of unlawful 
activity.
    (d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    3. DHS-ALL-005, Redress and Response Records System. A portion of 
the following system of records is exempt from 5 U.S.C. 552a(c)(3) and 
(4); (d)(1), (2), (3), and (4); (e)(1), (2), (3), (4)(G) through (I), 
(5), and (8); (f), and (g); however, these exemptions apply only to the 
extent that information in this system records is recompiled or is 
created from information contained in other systems of records subject 
to such exemptions pursuant to 5 U.S.C. 552a(j)(2), (k)(1), (k)(2), and 
(k)(5). Further, no exemption shall be asserted with respect to 
information submitted by and collected from the individual or the 
individual's representative in the course of any redress process 
associated with this system of records. After conferring with the 
appropriate component or agency, DHS may waive applicable exemptions in 
appropriate circumstances and where it would not appear to interfere 
with or adversely affect the law enforcement or national security 
purposes of the systems from which the information is recompiled or in 
which it is contained. Exemptions from the above particular subsections 
are justified, on a case-by-case basis to be determined at the time a 
request is made, when information in this system records is recompiled 
or is created from information contained in other systems of records 
subject to exemptions for the following reasons:
    (a) From subsection (c)(3) because making available to a record 
subject the accounting of disclosures from records concerning him or her 
would specifically reveal any investigative interest in the individual. 
Revealing this information could reasonably be expected to compromise 
ongoing efforts to investigate a known or suspected terrorist by 
notifying the record subject that he or she is under investigation. This 
information could also permit the record subject to take measures to 
impede the investigation, e.g., destroy evidence, intimidate potential 
witnesses, or flee the area to avoid or impede the investigation.
    (b) From subsection (c)(4) because portions of this system are 
exempt from the access and amendment provisions of subsection (d).
    (c) From subsections (d)(1), (2), (3), and (4) because these 
provisions concern individual access to and amendment of certain records 
contained in this system, including law enforcement counterterrorism, 
investigatory, and intelligence records. Compliance with these 
provisions could alert the subject of an investigation of the fact and 
nature of the investigation, and/or the investigative interest of 
intelligence or law enforcement agencies; compromise sensitive 
information related to national security; interfere with the overall law 
enforcement process by leading to the destruction of evidence, improper 
influencing of witnesses, fabrication of testimony, and/or flight of the 
subject; could identify a confidential source or disclose information 
which would constitute an unwarranted invasion of another's personal 
privacy; reveal a sensitive investigative or intelligence technique; or 
constitute a potential danger to the health or safety of law enforcement 
personnel, confidential informants, and witnesses. Amendment of these 
records would interfere with ongoing counterterrorism, law enforcement, 
or intelligence investigations and analysis activities and impose an 
impossible administrative burden by requiring investigations, analyses, 
and reports to be continuously reinvestigated and revised.
    (d) From subsection (e)(1) because it is not always possible for DHS 
or other agencies to know in advance what information is relevant and 
necessary for it to complete an identity comparison between the 
individual seeking redress and a known or suspected terrorist. Also, 
because DHS and other agencies may not always know what information 
about an encounter with a known or suspected terrorist will be relevant 
to law enforcement for the purpose of conducting an operational 
response.
    (e) From subsection (e)(2) because application of this provision 
could present a serious impediment to counterterrorism, law enforcement, 
or intelligence efforts in that it would put the subject of an 
investigation, study, or analysis on notice of that fact, thereby 
permitting the subject to engage in conduct designed to frustrate or 
impede that activity. The nature of counterterrorism, law enforcement, 
or intelligence investigations is such that vital information about an 
individual frequently can be obtained only from other persons who are 
familiar with such individual and his/her activities. In such 
investigations it is not feasible to rely upon information furnished by 
the individual concerning his own activities.
    (f) From subsection (e)(3), to the extent that this subsection is 
interpreted to require DHS to provide notice to an individual if DHS or 
another agency receives or collects

[[Page 45]]

information about that individual during an investigation or from a 
third party. Should the subsection be so interpreted, exemption from 
this provision is necessary to avoid impeding counterterrorism, law 
enforcement, or intelligence efforts by putting the subject of an 
investigation, study, or analysis on notice of that fact, thereby 
permitting the subject to engage in conduct intended to frustrate or 
impede that activity.
    (g) From subsections (e)(4)(G), (H) and (I) (Agency Requirements) 
because portions of this system are exempt from the access and amendment 
provisions of subsection (d).
    (h) From subsection (e)(5) because many of the records in this 
system coming from other system of records are derived from other 
domestic and foreign agency record systems and therefore it is not 
possible for DHS to vouch for their compliance with this provision; 
however, the DHS has implemented internal quality assurance procedures 
to ensure that data used in the redress process is as thorough, 
accurate, and current as possible. In addition, in the collection of 
information for law enforcement, counterterrorism, and intelligence 
purposes, it is impossible to determine in advance what information is 
accurate, relevant, timely, and complete. With the passage of time, 
seemingly irrelevant or untimely information may acquire new 
significance as further investigation brings new details to light. The 
restrictions imposed by (e)(5) would limit the ability of those 
agencies' trained investigators and intelligence analysts to exercise 
their judgment in conducting investigations and impede the development 
of intelligence necessary for effective law enforcement and 
counterterrorism efforts. The DHS has, however, implemented internal 
quality assurance procedures to ensure that the data used in the redress 
process is as thorough, accurate, and current as possible.
    (i) From subsection (e)(8) because to require individual notice of 
disclosure of information due to compulsory legal process would pose an 
impossible administrative burden on DHS and other agencies and could 
alert the subjects of counterterrorism, law enforcement, or intelligence 
investigations to the fact of those investigations when not previously 
known.
    (j) From subsection (f) (Agency Rules) because portions of this 
system are exempt from the access and amendment provisions of subsection 
(d).
    (k) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act.
    4. The Department of Homeland Security Automated Biometric 
Identification System (IDENT) consists of electronic and paper records 
and will be used by DHS and its components. IDENT is the primary 
repository of biometric information held by DHS in connection with its 
several and varied missions and functions, including, but not limited 
to: The enforcement of civil and criminal laws (including the 
immigration law); investigations, inquiries, and proceedings thereunder; 
and national security and intelligence activities. IDENT is a 
centralized and dynamic DHS-wide biometric database that also contains 
limited biographic and encounter history information needed to place the 
biometric information in proper context. The information is collected 
by, on behalf of, in support of, or in cooperation with DHS and its 
components and may contain personally identifiable information collected 
by other Federal, State, local, tribal, foreign, or international 
government agencies.
    Pursuant to exemptions 5 U.S.C. 552a(j)(2) of the Privacy Act, 
portions of this system are exempt from 5 U.S.C. 552a(c)(3) and (4); 
(d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and (e)(8); 
(f)(2) through (5); and (g). Pursuant to 5 U.S.C. 552a(k)(2), this 
system is exempt from the following provisions of the Privacy Act, 
subject to the limitations set forth in those subsections: 5 U.S.C. 552a 
(c)(3), (d), (e)(1), (e)(4)(G), and (e)(4)(H). Exemptions from these 
particular subsections are justified, on a case-by-case basis to be 
determined at the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation; and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could

[[Page 46]]

disclose security-sensitive information that could be detrimental to 
homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of an investigation, thereby interfering with the related 
investigation and law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise the existence of a confidential investigation or reveal the 
identity of witnesses or confidential informants.
    (f) From subsections (e)(4)(G) and (H) (Agency Requirements), and 
(f)(2 through 5) (Agency Rules) because portions of this system are 
exempt from the individual access provisions of subsection (d) and 
thereby would not require DHS to establish requirements or rules for 
records which are exempted from access.
    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
DHS agents from using their investigative training and exercise of good 
judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act.
    5. The DHS/OIG-002 Investigative Records System of Records consists 
of electronic and paper records and will be used by DHS and its 
components. The DHS/OIG-002 Investigative Records System of Records is a 
repository of information held by DHS in connection with its several and 
varied missions and functions, including, but not limited to the 
enforcement of civil and criminal laws; investigations, inquiries, and 
proceedings there under; national security and intelligence activities; 
and protection of the President of the U.S. or other individuals 
pursuant to Section 3056 and 3056A of Title 18. The DHS/OIG-002 
Investigative Records System of Records contains information that is 
collected by, on behalf of, in support of, or in cooperation with DHS 
and its components and may contain personally identifiable information 
collected by other Federal, State, local, tribal, foreign, or 
international government agencies. The Secretary of Homeland Security, 
pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the 
following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3), (c)(4); 
(d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), 
(e)(8), (f); and (g)(1). Additionally, the Secretary of Homeland 
Security, pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5), has 
exempted this system from the following provisions of the Privacy Act, 5 
U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and 
(f). Exemptions from these particular subsections are justified, on a 
case-by-case basis to be determined at the time a request is made, for 
the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and efforts to preserve national 
security. Disclosure of the accounting would also permit the individual 
who is the subject of a record to impede the investigation, to tamper 
with witnesses or evidence, and to avoid detection or apprehension, 
which would undermine the entire investigative process. When an 
investigation has been completed, information on disclosures made may 
continue to be exempted if the fact that an investigation occurred 
remains sensitive after completion.
    (b) From subsection (d) (Access and Amendment to Records) because 
access to the records contained in this system of records could inform 
the subject of an investigation of an actual or potential criminal, 
civil, or regulatory violation to the existence of that investigation 
and reveal investigative interest on the part of DHS or another agency. 
Access to the records could permit the individual who is the subject of 
a record to impede the investigation, to tamper with witnesses or 
evidence, and to avoid detection or apprehension. Amendment of the 
records could interfere with ongoing investigations and law enforcement 
activities and would impose an unreasonable administrative burden by 
requiring investigations to be continually reinvestigated. In addition, 
permitting access and amendment to such

[[Page 47]]

information could disclose security-sensitive information that could be 
detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements) 
and (f) (Agency Rules), because portions of this system are exempt from 
the individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.
    (g) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with subsection (e)(5) would 
preclude DHS agents from using their investigative training and exercise 
of good judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (j) From subsection (g)(1) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    6. The Immigration and Customs Enforcement (ICE) Pattern Analysis 
and Information Collection (ICEPIC) System consists of electronic and 
paper records and will be used by DHS and its components. ICEPIC is a 
repository of information held by DHS in connection with its several and 
varied missions and functions, including, but not limited to: The 
enforcement of civil and criminal laws (including the immigration law); 
investigations, inquiries, and proceedings there under; and national 
security and intelligence activities. ICEPIC contains information that 
is collected by, on behalf of, in support of, or in cooperation with DHS 
and its components and may contain personally identifiable information 
collected by other Federal, State, local, tribal, foreign, or 
international government agencies.
    Pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act, 
portions of this system are exempt from 5 U.S.C. 552a(c)(3) and (4); 
(d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and (e)(8); 
(f), and (g). Pursuant to 5 U.S.C. 552a(k)(2), this system is exempt 
from the following provisions of the Privacy Act, subject to the 
limitations set forth in those subsections: 5 U.S.C. 552a(c)(3), (d), 
(e)(1), (e)(4)(G), (e)(4)(H), and (f). Exemptions from these particular 
subsections are justified, on a case-by-case basis to be determined at 
the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an

[[Page 48]]

impossible administrative burden by requiring investigations to be 
continuously reinvestigated. In addition, permitting access and 
amendment to such information could disclose security-sensitive 
information that could be detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of an investigation, thereby interfering with the related 
investigation and law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise investigations by: revealing the existence of an otherwise 
confidential investigation and thereby provide an opportunity for the 
subject of an investigation to conceal evidence, alter patterns of 
behavior, or take other actions that could thwart investigative efforts; 
reveal the identity of witnesses in investigations, thereby providing an 
opportunity for the subjects of the investigations or others to harass, 
intimidate, or otherwise interfere with the collection of evidence or 
other information from such witnesses; or reveal the identity of 
confidential informants, which would negatively affect the informant's 
usefulness in any ongoing or future investigations and discourage 
members of the public from cooperating as confidential informants in any 
future investigations.
    (f) From subsections (e)(4)(G) and (H) (Agency Requirements), and 
(f) (Agency Rules) because portions of this system are exempt from the 
individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.
    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
DHS agents from using their investigative training and exercise of good 
judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act relating to individuals' 
rights to access and amend their records contained in the system. 
Therefore DHS is not required to establish rules or procedures pursuant 
to which individuals may seek a civil remedy for the agency's: Refusal 
to amend a record; Refusal to comply with a request for access to 
records; failure to maintain accurate, relevant timely and complete 
records; or failure to otherwise comply with an individual's right to 
access or amend records.
    7. The Office of Intelligence and Analysis (I&A) Enterprise Records 
System (ERS) consists of records including intelligence information and 
other properly acquired information received from agencies and 
components of the federal government, foreign governments, organizations 
or entities, international organizations, state and local government 
agencies (including law enforcement agencies), and private sector 
entities, as well as information provided by individuals, regardless of 
the medium used to submit the information or the agency to which it was 
submitted. This system also contains: Information regarding persons on 
watch lists with known or suspected links to terrorism; the results of 
intelligence analysis and reporting; ongoing law enforcement 
investigative information, information systems security analysis and 
reporting; active immigration, customs, border and transportation, 
security related records; historical law enforcement, operational, 
immigration, customs, border and transportation security, and other 
administrative records; relevant and appropriately acquired financial 
information; and public-source data such as that contained in media 
reports and commercially available databases, as appropriate. Data about 
the providers of information, including the means of transmission of the 
data, is also retained.
    (a) Pursuant to 5 U.S.C. 552a(k)(1), (2), (3), and (5), this system 
of records is exempt from 5 U.S.C. 552a(c)(3), (d)(1), (2), (3), (4), 
and (5), (e)(1), (e)(4)(G), (H), and (I), and (f). These

[[Page 49]]

exemptions apply only to the extent that information in this system is 
subject to exemption. Where compliance would not appear to interfere 
with or adversely affect the intelligence, counterterrorism, homeland 
security, and related law enforcement purposes of this system, the 
applicable exemption may be waived by DHS.
    (b) Exemptions from the particular subsections are justified for the 
following reasons:
    (1) From subsection (c)(3) (Accounting for Disclosures) because 
making available to a record subject the accounting of disclosures from 
records concerning him/her would specifically reveal any interest in the 
individual of an intelligence, counterterrorism, homeland security, or 
related investigative nature. Revealing this information could 
reasonably be expected to compromise ongoing efforts of the Department 
to identify, understand, analyze, investigate, and counter the 
activities of:
    (i) Known or suspected terrorists and terrorist groups;
    (ii) Groups or individuals known or believed to be assisting or 
associated with known or suspected terrorists or terrorist groups;
    (iii) Individuals known, believed to be, or suspected of being 
engaged in activities constituting a threat to homeland security, 
including (1) activities which impact or concern the security, safety, 
and integrity of our international borders, including any illegal 
activities that either cross our borders or are otherwise in violation 
of the immigration or customs laws and regulations of the United States; 
(2) activities which could reasonably be expected to assist in the 
development or use of a weapon of mass effect; (3) activities meant to 
identify, create, or exploit the vulnerabilities of, or undermine, the 
``key resources'' (as defined in section 2(9) of the Homeland Security 
Act of 2002) and ``critical infrastructure'' (as defined in 42 U.S.C. 
5195c(c)) of the United States, including the cyber and national 
telecommunications infrastructure and the availability of a viable 
national security and emergency preparedness communications 
infrastructure; (4) activities detrimental to the security of 
transportation and transportation systems; (5) activities which violate 
or are suspected of violating the laws relating to counterfeiting of 
obligations and securities of the United States and other financial 
crimes, including access device fraud, financial institution fraud, 
identity theft, computer fraud; and computer-based attacks on our 
nation's financial, banking, and telecommunications infrastructure; (6) 
activities, not wholly conducted within the United States, which violate 
or are suspected of violating the laws which prohibit the production, 
transfer, or sale of narcotics or substances controlled in accordance 
with Title 21 of the United States Code, or those associated activities 
otherwise prohibited by Titles 21 and 46 of the United States Code; (7) 
activities which impact, concern, or otherwise threaten the safety and 
security of the President and Vice President, their families, heads of 
state, and other designated individuals; the White House, Vice 
President's residence, foreign missions, and other designated buildings 
within the United States; (8) activities which impact, concern, or 
otherwise threaten domestic maritime safety and security, maritime 
mobility and navigation, or the integrity of the domestic maritime 
environment; (9) activities which impact, concern, or otherwise threaten 
the national operational capability of the Department to respond to 
natural and manmade major disasters and emergencies, including acts of 
terrorism; (10) activities involving the importation, possession, 
storage, development, or transportation of nuclear or radiological 
material without authorization or for use against the United States;
    (iv) Foreign governments, organizations, or persons (foreign 
powers); and
    (v) Individuals engaging in intelligence activities on behalf of a 
foreign power or terrorist group.
    Thus, by notifying the record subject that he/she is the focus of 
such efforts or interest on the part of DHS, or other agencies with whom 
DHS is cooperating and to whom the disclosures were made, this 
information could permit the record subject to take measures to impede 
or evade such efforts, including the taking of steps to deceive DHS 
personnel and deny them the ability to adequately assess relevant 
information and activities, and could inappropriately disclose to the 
record subject the sensitive methods and/or confidential sources used to 
acquire the relevant information against him/her. Moreover, where the 
record subject is the actual target of a law enforcement investigation, 
this information could permit him/her to take measures to impede the 
investigation, for example, by destroying evidence, intimidating 
potential witnesses, or avoiding detection or apprehension.
    (2) From subsections (d)(1), (2), (3), and (4) (Access to Records) 
because these provisions concern individual rights of access to and 
amendment of records (including the review of agency denials of either) 
contained in this system, which consists of intelligence, 
counterterrorism, homeland security, and related investigatory records 
concerning efforts of the Department, as described more fully in 
subsection (b)(1), above. Compliance with these provisions could inform 
or alert the subject of an intelligence, counterterrorism, homeland 
security, or investigatory effort undertaken on behalf of the 
Department, or by another agency with whom DHS is cooperating, of the 
fact and nature of such efforts, and/or the relevant intelligence,

[[Page 50]]

counterterrorism, homeland security, or investigatory interest of DHS 
and/or other intelligence, counterterrorism, or law enforcement 
agencies. Moreover, compliance could also compromise sensitive 
information either classified in the interest of national security, or 
which otherwise requires, as appropriate, safeguarding and protection 
from unauthorized disclosure; identify a confidential source or disclose 
information which would constitute an unwarranted invasion of another 
individual's personal privacy; reveal a sensitive intelligence or 
investigative technique or method, including interfering with 
intelligence or law enforcement investigative processes by permitting 
the destruction of evidence, improper influencing or intimidation of 
witnesses, fabrication of statements or testimony, and flight from 
detection or apprehension; or constitute a potential danger to the 
health or safety of intelligence, counterterrorism, homeland security, 
and law enforcement personnel, confidential sources and informants, and 
potential witnesses. Amendment of the records would interfere with 
ongoing intelligence, counterterrorism, homeland security, and law 
enforcement investigations and activities, including incident reporting 
and analysis activities, and impose an impossible administrative burden 
by requiring investigations, reports, and analyses to be continuously 
reinvestigated and revised.
    (3) From subsection (e)(1) (Relevant and Necessary) because it is 
not always possible for DHS to know in advance of its receipt the 
relevance and necessity of each piece of information it acquires in the 
course of an intelligence, counterterrorism, or investigatory effort 
undertaken on behalf of the Department, or by another agency with whom 
DHS is cooperating. In the context of the authorized intelligence, 
counterterrorism, and investigatory activities undertaken by DHS 
personnel, relevance and necessity are questions of analytic judgment 
and timing, such that what may appear relevant and necessary when 
acquired ultimately may be deemed unnecessary upon further analysis and 
evaluation. Similarly, in some situations, it is only after acquired 
information is collated, analyzed, and evaluated in light of other 
available evidence and information that its relevance and necessity can 
be established or made clear. Constraining the initial acquisition of 
information included within the ERS in accordance with the relevant and 
necessary requirement of subsection (e)(1) could discourage the 
appropriate receipt of and access to information which DHS and I&A are 
otherwise authorized to receive and possess under law, and thereby 
impede efforts to detect, deter, prevent, disrupt, or apprehend 
terrorists or terrorist groups, and/or respond to terrorist or other 
activities which threaten homeland security. Notwithstanding this 
claimed exemption, which would permit the acquisition and temporary 
maintenance of records whose relevance to the purpose of the ERS may be 
less than fully clear, DHS will only disclose such records after 
determining whether such disclosures are themselves consistent with the 
published ERS routine uses. Moreover, it should be noted that, as 
concerns the receipt by I&A, for intelligence purposes, of information 
in any record which identifies a U.S. Person, as defined in Executive 
Order 12333, as amended, such receipt, and any subsequent use or 
dissemination of that identifying information, is undertaken consistent 
with the procedures established and adhered to by I&A pursuant to that 
Executive Order. Specifically, I&A intelligence personnel may acquire 
information which identifies a particular U.S. Person, retain it within 
or disseminate it from ERS, as appropriate, only when it is determined 
that the personally identifying information is necessary for the conduct 
of I&A's functions, and otherwise falls into one of a limited number of 
authorized categories, each of which reflects discrete activities for 
which information on individuals would be utilized by the Department in 
the overall execution of its statutory mission.
    (4) From subsections (e)(4) (G), (H) and (I) (Access), and (f) 
(Agency Rules), inasmuch as it is unnecessary for the publication of 
rules and procedures contemplated therein since the ERS, pursuant to 
subsections (1) and (2), above, will be exempt from the underlying 
duties to provide to individuals notification about, access to, and the 
ability to amend or correct the information pertaining to them in, this 
system of records. Furthermore, to the extent that subsection (e)(4)(I) 
is construed to require more detailed disclosure than the information 
accompanying the system notice for ERS, as published in today's Federal 
Register, exemption from it is also necessary to protect the 
confidentiality, privacy, and physical safety of sources of information, 
as well as the methods for acquiring it. Finally, greater specificity 
concerning the description of categories of sources of properly 
classified records could also compromise or otherwise cause damage to 
the national or homeland security.
    8. The DHS/USCG-061 Maritime Analytic Support System (MASS) System 
of Records consists of electronic and paper records and will be used by 
DHS and its components. The DHS/USCG-061 Maritime Analytic Support 
System (MASS) System of Records is a repository of information held by 
DHS in connection with its several and varied missions and functions, 
including, but not limited to the enforcement of civil and criminal 
laws; investigations, inquiries, and proceedings there under; and 
national security and intelligence activities. The DHS/USCG-061 Maritime 
Analytic Support System (MASS) System of Records contains information 
that is

[[Page 51]]

collected by, on behalf of, in support of, or in cooperation with DHS 
and its components and may contain personally identifiable information 
collected by other federal, state, local, tribal, foreign, or 
international government agencies. The Secretary of Homeland Security 
has exempted this system from the following provisions of the Privacy 
Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3) and (c)(4); 
(d); (e)(1) through (3), (e)(4)(G) through (I), (e)(5) and (e)(8), (f); 
and (g)(1) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary 
of Homeland Security has exempted this system from the following 
provisions of the Privacy Act, subject to limitations set forth in 5 
U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G) through (e)(4)(I); and (f) 
pursuant to 5 U.S.C. 552a(k)(1) and (k)(2). Exemptions from these 
particular subsections are justified, on a case-by-case basis to be 
determined at the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access and Amendment to Records) because 
access to the records contained in this system of records could inform 
the subject of an investigation of an actual or potential criminal, 
civil, or regulatory violation to the existence of that investigation 
and reveal investigative interest on the part of DHS or another agency. 
Access to the records could permit the individual who is the subject of 
a record to impede the investigation, to tamper with witnesses or 
evidence, and to avoid detection or apprehension. Amendment of the 
records could interfere with ongoing investigations and law enforcement 
activities and would impose an unreasonable administrative burden by 
requiring investigations to be continually reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (f) From subsections (e)(4)(G) through (I) (Agency Requirements) and 
(f) (Agency Rules), because portions of this system are exempt from the 
individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.
    (g) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with subsection (e)(5) would 
preclude DHS agents from using their investigative training and exercise 
of good judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g)(1) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    9. The Law Enforcement Information Data Base (LEIDB)/Pathfinder is a 
historical repository of selected Coast Guard message traffic. LEIDB/
Pathfinder supports law enforcement intelligence activities. LEIDB/
Pathfinder users can query archived message traffic and link relevant 
information across multiple data records within LEIDB/Pathfinder. Users 
have system tools enabling the

[[Page 52]]

user to identify potential relationships between information contained 
in otherwise unrelated documents. These tools allow the analysts to 
build high precision and low return queries, which minimize false hits 
and maximize analyst productivity while working with unstructured, 
unformatted, free test documents.
    (a) Pursuant to 5 U.S.C. 552a(j)(2), (k)(1), and (k)(2) certain 
records or information in the above mentioned system of records are 
exempt from 5 U.S.C. 552a(c)(3) and (4); (d)(1), (2), (3), and (4); 
(e)(1), (2), (3), (4)(G) through (I), (e)(5), and (8); (f), and (g). 
These exemptions apply only to the extent that information in this 
system is subject to exemption. Where compliance would not appear to 
interfere with or adversely affect the intelligence, counterterrorism, 
homeland security, and related law enforcement purposes of this system, 
the applicable exemption may be waived by DHS.
    (b) Exemptions from the particular subsections are justified for the 
following reasons:
    (1) From subsection (c)(3) (Accounting for Disclosures) because 
making available to a record subject the accounting of disclosures from 
records concerning him/her would specifically reveal any interest in the 
individual of an intelligence, counterterrorism, homeland security, or 
related investigative nature. Revealing this information could 
reasonably be expected to compromise ongoing efforts of the Department 
to identify, understand, analyze, investigate, and counter the 
activities of:
    (i) Known or suspected terrorists and terrorist groups;
    (ii) Groups or individuals known or believed to be assisting or 
associated with known or suspected terrorists or terrorist groups;
    (iii) Individuals known, believed to be, or suspected of being 
engaged in activities constituting a threat to homeland security, 
including (1) activities which impact or concern the security, safety, 
and integrity of our international borders, including any illegal 
activities that either cross our borders or are otherwise in violation 
of the immigration or customs laws and regulations of the United States; 
(2) activities which could reasonably be expected to assist in the 
development or use of a weapon of mass effect; (3) activities meant to 
identify, create, or exploit the vulnerabilities of, or undermine, the 
``key resources'' (as defined in section 2(9) of the Homeland Security 
Act of 2002) and ``critical infrastructure'' (as defined in 42 U.S.C. 
5195c(c)) of the United States, including the cyber and national 
telecommunications infrastructure and the availability of a viable 
national security and emergency preparedness communications 
infrastructure; (4) activities detrimental to the security of 
transportation and transportation systems; (5) activities which violate 
or are suspected of violating the laws relating to counterfeiting of 
obligations and securities of the United States and other financial 
crimes, including access device fraud, financial institution fraud, 
identity theft, computer fraud; and computer-based attacks on our 
nation's financial, banking, and telecommunications infrastructure; (6) 
activities, not wholly conducted within the United States, which violate 
or are suspected of violating the laws which prohibit the production, 
transfer, or sale of narcotics or substances controlled in accordance 
with Title 21 of the United States Code, or those associated activities 
otherwise prohibited by Titles 21 and 46 of the United States Code; (7) 
activities which impact, concern, or otherwise threaten the safety and 
security of the President and Vice President, their families, heads of 
state, and other designated individuals; the White House, Vice 
President's residence, foreign missions, and other designated buildings 
within the United States; (8) activities which impact, concern, or 
otherwise threaten domestic maritime safety and security, maritime 
mobility and navigation, or the integrity of the domestic maritime 
environment; (9) activities which impact, concern, or otherwise threaten 
the national operational capability of the Department to respond to 
natural and manmade major disasters and emergencies, including acts of 
terrorism; (10) activities involving the importation, possession, 
storage, development, or transportation of nuclear or radiological 
material without authorization or for use against the United States;
    (iv) Foreign governments, organizations, or persons (foreign 
powers); and
    (v) Individuals engaging in intelligence activities on behalf of a 
foreign power or terrorist group.
    Thus, by notifying the record subject that he/she is the focus of 
such efforts or interest on the part of DHS, or other agencies with whom 
DHS is cooperating and to whom the disclosures were made, this 
information could permit the record subject to take measures to impede 
or evade such efforts, including the taking of steps to deceive DHS 
personnel and deny them the ability to adequately assess relevant 
information and activities, and could inappropriately disclose to the 
record subject the sensitive methods and/or confidential sources used to 
acquire the relevant information against him/her. Moreover, where the 
record subject is the actual target of a law enforcement investigation, 
this information could permit him/her to take measures to impede the 
investigation, for example, by destroying evidence, intimidating 
potential witnesses, or avoiding detection or apprehension.
    (2) From subsection (c)(4) (Accounting for Disclosure, notice of 
dispute) because certain records in this system are exempt from the

[[Page 53]]

access and amendment provisions of subsection (d), this requirement to 
inform any person or other agency about any correction or notation of 
dispute that the agency made with regard to those records, should not 
apply.
    (3) From subsections (d)(1), (2), (3), and (4) (Access to Records) 
because these provisions concern individual rights of access to and 
amendment of records (including the review of agency denials of either) 
contained in this system, which consists of intelligence, 
counterterrorism, homeland security, and related investigatory records 
concerning efforts of the Department, as described more fully in 
subsection (b)(1), above. Compliance with these provisions could inform 
or alert the subject of an intelligence, counterterrorism, homeland 
security, or investigatory effort undertaken on behalf of the 
Department, or by another agency with whom DHS is cooperating, of the 
fact and nature of such efforts, and/or the relevant intelligence, 
counterterrorism, homeland security, or investigatory interest of DHS 
and/or other intelligence, counterterrorism, or law enforcement 
agencies. Moreover, compliance could also compromise sensitive 
information either classified in the interest of national security, or 
which otherwise requires, as appropriate, safeguarding and protection 
from unauthorized disclosure; identify a confidential source or disclose 
information which would constitute an unwarranted invasion of another 
individual's personal privacy; reveal a sensitive intelligence or 
investigative technique or method, including interfering with 
intelligence or law enforcement investigative processes by permitting 
the destruction of evidence, improper influencing or intimidation of 
witnesses, fabrication of statements or testimony, and flight from 
detection or apprehension; or constitute a potential danger to the 
health or safety of intelligence, counterterrorism, homeland security, 
and law enforcement personnel, confidential sources and informants, and 
potential witnesses. Amendment of the records would interfere with 
ongoing intelligence, counterterrorism, homeland security, and law 
enforcement investigations and activities, including incident reporting 
and analysis activities, and impose an impossible administrative burden 
by requiring investigations, reports, and analyses to be continuously 
reinvestigated and revised.
    (4) From subsection (e)(1) (Relevant and Necessary) because it is 
not always possible for DHS to know in advance of its receipt the 
relevance and necessity of each piece of information it acquires in the 
course of an intelligence, counterterrorism, or investigatory effort 
undertaken on behalf of the Department, or by another agency with whom 
DHS is cooperating. In the context of the authorized intelligence, 
counterterrorism, and investigatory activities undertaken by DHS 
personnel, relevance and necessity are questions of analytic judgment 
and timing, such that what may appear relevant and necessary when 
acquired ultimately may be deemed unnecessary upon further analysis and 
evaluation. Similarly, in some situations, it is only after acquired 
information is collated, analyzed, and evaluated in light of other 
available evidence and information that its relevance and necessity can 
be established or made clear. Constraining the initial acquisition of 
information included within the LEIDB in accordance with the relevant 
and necessary requirement of subsection (e)(1) could discourage the 
appropriate receipt of and access to information which DHS and USCG are 
otherwise authorized to receive and possess under law, and thereby 
impede efforts to detect, deter, prevent, disrupt, or apprehend 
terrorists or terrorist groups, and/or respond to terrorist or other 
activities which threaten homeland security. Notwithstanding this 
claimed exemption, which would permit the acquisition and temporary 
maintenance of records whose relevance to the purpose of the LEIDB may 
be less than fully clear, DHS will only disclose such records after 
determining whether such disclosures are themselves consistent with the 
published LEIDB routine uses. Moreover, it should be noted that, as 
concerns the receipt by USCG, for intelligence purposes, of information 
in any record which identifies a U.S. Person, as defined in Executive 
Order 12333, as amended, such receipt, and any subsequent use or 
dissemination of that identifying information, is undertaken consistent 
with the procedures established and adhered to by USCG pursuant to that 
Executive Order. Specifically, USCG intelligence personnel may acquire 
information which identifies a particular U.S. Person, retain it within 
or disseminate it from LEIDB, as appropriate, only when it is determined 
that the personally identifying information is necessary for the conduct 
of USCG's functions, and otherwise falls into one of a limited number of 
authorized categories, each of which reflects discrete activities for 
which information on individuals would be utilized by the Department in 
the overall execution of its statutory mission.
    (5) From subsection (e)(2) (Collection of Information from 
Individuals) because application of this provision could present a 
serious impediment to counterterrorism or law enforcement efforts in 
that it would put the subject of an investigation, study or analysis on 
notice of that fact, thereby permitting the subject to engage in conduct 
designed to frustrate or impede that activity. The nature of 
counterterrorism, and law enforcement investigations is such that vital 
information

[[Page 54]]

about an individual frequently can be obtained only from other persons 
who are familiar with such individual and his/her activities. In such 
investigations it is not feasible to rely solely upon information 
furnished by the individual concerning his own activities.
    (6) From subsection (e)(3) (Notice to Subjects), to the extent that 
this subsection is interpreted to require DHS to provide notice to an 
individual if DHS or another agency receives or collects information 
about that individual during an investigation or from a third party. 
Should the subsection be so interpreted, exemption from this provision 
is necessary to avoid impeding counterterrorism or law enforcement 
efforts by putting the subject of an investigation, study or analysis on 
notice of that fact, thereby permitting the subject to engage in conduct 
intended to frustrate or impede that activity.
    (7) From subsections (e)(4) (G), (H) and (I) (Access), inasmuch as 
it is unnecessary for the publication of rules and procedures 
contemplated therein since the LEIDB, pursuant to subsections (2) and 
(3), above, will be exempt from the underlying duties to provide to 
individuals notification about, access to, and the ability to amend or 
correct the information pertaining to them in, this system of records. 
Furthermore, to the extent that subsection (e)(4)(I) is construed to 
require more detailed disclosure than the information accompanying the 
system notice for LEIDB, as published in today's Federal Register, 
exemption from it is also necessary to protect the confidentiality, 
privacy, and physical safety of sources of information, as well as the 
methods for acquiring it. Finally, greater specificity concerning the 
description of categories of sources of properly classified records 
could also compromise or otherwise cause damage to the national or 
homeland security.
    (8) From subsection (e)(5) (Collection of Information) because many 
of the records contained in this system are derived from other domestic 
and foreign sources, it is not possible for DHS to vouch for those 
records' compliance with this provision; however, the DHS has 
implemented internal quality assurance procedures to ensure that data 
used in its screening processes is as complete, accurate, and current as 
possible. In addition, in the collection of information for law 
enforcement and counterterrorism purposes, it is impossible to determine 
in advance what information is accurate, relevant, timely, and complete. 
With the passage of time, seemingly irrelevant or untimely information 
may acquire new significance as further investigation brings new details 
to light. The restrictions imposed by (e)(5) would limit the ability of 
those agencies' trained investigators and intelligence analysts to 
exercise their judgment in conducting investigations and impede the 
development of intelligence necessary for effective law enforcement and 
counterterrorism efforts.
    (9) From subsection (e)(8) (Notice on Individuals) because to 
require individual notice of disclosure of information due to compulsory 
legal process would pose an impossible administrative burden on DHS and 
other agencies and could alert the subjects of counterterrorism or law 
enforcement investigations to the fact of those investigations then not 
previously known.
    (10) From subsection (f) (Agency Rules) because portions of this 
system are exempt from the access and amendment provisions of subsection 
(d). Access to, and amendment of, system records that are not exempt or 
for which exemption is waived may be obtained under procedures described 
in the related SORN or subpart B of this part.
    (11) From subsection (g) to the extent that the system is exempt 
from other specific subsections of the Privacy Act relating to 
individuals' rights to access and amend their records contained in the 
system. Therefore DHS is not required to establish rules or procedures 
pursuant to which individuals may seek a civil remedy for the agency's: 
Refusal to amend a record; refusal to comply with a request for access 
to records; failure to maintain accurate, relevant timely and complete 
records; or failure to otherwise comply with an individual's right to 
access or amend records.
    10. DHS-ICE-001, The Immigration and Customs Enforcement (ICE) 
Student and Exchange Visitor Information System (SEVIS) collects and 
maintains pertinent information on nonimmigrant students and exchange 
visitors and the schools and exchange visitor program sponsors that host 
them while in the United States. The system permits DHS to monitor 
compliance by these individuals with the terms of their admission into 
the United States. Pursuant to exemptions (j)(2), (k)(1), (k)(2) and 
(k)(5) of the Privacy Act, portions of this system are exempt from 5 
U.S.C. 552a(c)(3); (d); (e)(1); (e)(4)(G), (H) and (I). Exemptions from 
the particular subsections are justified, on a case by case basis, to be 
determined at the time a request is made, for the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation, of an actual or potential criminal, civil, or regulatory 
violation to the existence of the investigation and reveal investigative 
interest on the part of DHS as well as the recipient agency. Disclosure 
of the accounting would therefore present a serious impediment to law 
enforcement efforts and/or efforts to preserve national security. 
Disclosure of the accounting would also permit the individual who is the 
subject of a record to impede the investigation and avoid detection or 
apprehension, which undermines the entire system.

[[Page 55]]

    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation, of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation and avoid detection or apprehension. 
Amendment of the records could interfere with ongoing investigations and 
law enforcement activities and impose an impossible administrative 
burden by requiring investigations to be continuously reinvestigated. In 
addition, permitting access and amendment to such information also could 
disclose security-sensitive information that could be detrimental to 
homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective enforcement of federal laws, it is appropriate to retain all 
information that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G), (H) and (I) (Agency Requirements), 
and (f) (Agency Rules), because portions of this system are exempt from 
the access provisions of subsection (d).
    11. The General Counsel Electronic Management System (GEMS) consists 
of records and information created or collected by attorneys for U.S. 
Immigration and Customs Enforcement, which will be used in the 
preparation and presentation of cases before a court or other 
adjudicative body. ICE attorneys work closely with ICE law enforcement 
personnel throughout the process of adjudicating immigration cases. GEMS 
allows ICE attorneys to store all the materials pertaining to 
immigration adjudications, including documents related to 
investigations, case notes and other hearing related information, and 
briefs and memoranda of law related to cases. Having this information in 
one system should not only facilitate the work of the ICE attorneys 
involved in the particular case, but also will provide a legal resource 
for other attorneys who are adjudicating similar cases. The system will 
also provide management capabilities for tracking time and effort 
expended in the preparation and presentation of cases. Pursuant to 
exemptions 5 U.S.C. 552a(j)(2) of the Privacy Act, portions of this 
system are exempt from 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), 
(e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and (e)(8); (f)(2) through (5); and 
(g). Pursuant to 5 U.S.C. 552a (k)(1) and (k)(2), this system is exempt 
from the following provisions of the Privacy Act, subject to the 
limitations set forth in those subsections: 5 U.S.C. 552a (c)(3), (d), 
(e)(1), (e)(4)(G), (e)(4)(H), and (f). Exemptions from these particular 
subsections are justified, on a case-by-case basis to be determined at 
the time a request is made, for the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation, to the existence of the investigation, which in some cases 
may be classified, and reveal investigative interest on the part of DHS 
or ICE. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
tamper with witnesses or evidence, and avoid detection or apprehension, 
which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation pertaining to an immigration matter, which in some 
cases may be classified, and prematurely reveal investigative interest 
on the part of DHS or another agency. Access to the records could permit 
the individual who is the subject of a record to impede the 
investigation, tamper with witnesses or evidence, and avoid detection or 
apprehension. Amendment of the records could interfere with ongoing 
investigations and law enforcement activities and would impose an 
impossible administrative burden by requiring investigations to be 
continuously reinvestigated. In addition, permitting access and 
amendment to such information could disclose security-sensitive 
information that could be detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal immigration law, the accuracy of information obtained or 
introduced occasionally may be unclear or the information may not be 
strictly relevant or necessary to a specific investigation. In the 
interests of effective law enforcement and for the protection of 
national security, it is appropriate to retain all information that may 
aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject of the nature or 
existence of an investigation, which could cause interference with the 
investigation, a related inquiry or

[[Page 56]]

other law enforcement activities, some of which may be classified.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise the existence of a confidential investigation or reveal the 
identity of witnesses or confidential informants.
    (f) From subsections (e)(4)(G) and (H) (Agency Requirements), (f) 
(Agency Rules), and (g) (Civil Remedies) because portions of this system 
are exempt from the individual access provisions of subsection (d).
    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with ICE's ability to obtain, serve, and 
issue subpoenas, warrants and other law enforcement mechanisms that may 
be filed under seal, and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act.
    12. DHS/CBP-005, Advanced Passenger Information System. A portion of 
the following system of records is exempt from 5 U.S.C. 552a(c)(3) and 
(4); (d)(1), (2), (3), and (4); (e)(1), (2), (3), (4)(G) through (I), 
(5), and (8); (f), and (g); however, these exemptions apply only to the 
extent that information in this system records is recompiled or is 
created from information contained in other systems of records subject 
to such exemptions pursuant to 5 U.S.C. 552a(j)(2), and (k)(2). Further, 
no exemption shall be asserted with respect to information submitted by 
and collected from the individual or the individual's representative in 
the course of any redress process associated with this system of 
records. After conferring with the appropriate component or agency, DHS 
may waive applicable exemptions in appropriate circumstances and where 
it would not appear to interfere with or adversely affect the law 
enforcement or national security purposes of the systems from which the 
information is recompiled or in which it is contained. Exemptions from 
the above particular subsections are justified, on a case-by-case basis 
to be determined at the time a request is made, when information in this 
system records is recompiled or is created from information contained in 
other systems of records subject to exemptions for the following 
reasons:
    (a) From subsection (c)(3) (Accounting for Disclosure) because 
making available to a record subject the accounting of disclosures from 
records concerning him or her would specifically reveal any 
investigative interest in the individual. Revealing this information 
could reasonably be expected to compromise ongoing efforts to 
investigate a known or suspected terrorist by notifying the record 
subject that he or she is under investigation. This information could 
also permit the record subject to take measures to impede the 
investigation, e.g., destroy evidence, intimidate potential witnesses, 
or flee the area to avoid or impede the investigation.
    (b) From subsection (c)(4) (Accounting for Disclosure, notice of 
dispute) because portions of this system are exempt from the access and 
amendment provisions of subsection (d).
    (c) From subsections (d)(1), (2), (3), and (4) (Access to Records) 
because these provisions concern individual access to and amendment of 
certain records contained in this system, including law enforcement 
counterterrorism, investigatory, and intelligence records. Compliance 
with these provisions could alert the subject of an investigation of the 
fact and nature of the investigation, and/or the investigative interest 
of intelligence or law enforcement agencies; compromise sensitive 
information related to national security; interfere with the overall law 
enforcement process by leading to the destruction of evidence, improper 
influencing of witnesses, fabrication of testimony, and/or flight of the 
subject; could identify a confidential source or disclose information 
which would constitute an unwarranted invasion of another's personal 
privacy; reveal a sensitive investigative or intelligence technique; or 
constitute a potential danger to the health or safety of law enforcement 
personnel, confidential informants, and witnesses. Amendment of these 
records would interfere with ongoing counterterrorism, law enforcement, 
or intelligence investigations and analysis activities and impose an 
impossible administrative burden by requiring investigations, analyses, 
and reports to be continuously reinvestigated and revised.
    (d) From subsection (e)(1) (Relevancy and Necessity of Information) 
because it is not always possible for DHS or other agencies to know in 
advance what information is relevant and necessary for it to complete an 
identity comparison between the individual seeking redress and a known 
or suspected terrorist. Also, because DHS and other agencies may not 
always know what information about an encounter with a known or 
suspected terrorist will be relevant to law enforcement for the purpose 
of conducting an operational response.
    (e) From subsection (e)(2) (Collection of Information from 
Individuals) because application of this provision could present a 
serious impediment to counterterrorism, law enforcement, or intelligence 
efforts in that it would put the subject of an investigation, study, or 
analysis on notice of that fact, thereby permitting the subject to 
engage in conduct designed to frustrate or impede that

[[Page 57]]

activity. The nature of counterterrorism, law enforcement, or 
intelligence investigations is such that vital information about an 
individual frequently can be obtained only from other persons who are 
familiar with such individual and his/her activities. In such 
investigations it is not feasible to rely upon information furnished by 
the individual concerning his own activities.
    (f) From subsection (e)(3) (Notice to Subjects), to the extent that 
this subsection is interpreted to require DHS to provide notice to an 
individual if DHS or another agency receives or collects information 
about that individual during an investigation or from a third party. 
Should the subsection be so interpreted, exemption from this provision 
is necessary to avoid impeding counterterrorism, law enforcement, or 
intelligence efforts by putting the subject of an investigation, study, 
or analysis on notice of that fact, thereby permitting the subject to 
engage in conduct intended to frustrate or impede that activity.
    (g) From subsections (e)(4)(G), (H) and (I) (Agency Requirements) 
because portions of this system are exempt from the access and amendment 
provisions of subsection (d).
    (h) From subsection (e)(5) (Collection of Information) because many 
of the records in this system coming from other system of records are 
derived from other domestic and foreign agency record systems and 
therefore it is not possible for DHS to vouch for their compliance with 
this provision; however, the DHS has implemented internal quality 
assurance procedures to ensure that data used in the redress process is 
as thorough, accurate, and current as possible. In addition, in the 
collection of information for law enforcement, counterterrorism, and 
intelligence purposes, it is impossible to determine in advance what 
information is accurate, relevant, timely, and complete. With the 
passage of time, seemingly irrelevant or untimely information may 
acquire new significance as further investigation brings new details to 
light. The restrictions imposed by (e)(5) would limit the ability of 
those agencies' trained investigators and intelligence analysts to 
exercise their judgment in conducting investigations and impede the 
development of intelligence necessary for effective law enforcement and 
counterterrorism efforts. The DHS has, however, implemented internal 
quality assurance procedures to ensure that the data used in the redress 
process is as thorough, accurate, and current as possible.
    (i) From subsection (e)(8) (Notice on Individuals) because to 
require individual notice of disclosure of information due to compulsory 
legal process would pose an impossible administrative burden on DHS and 
other agencies and could alert the subjects of counterterrorism, law 
enforcement, or intelligence investigations to the fact of those 
investigations when not previously known.
    (j) From subsection (f) (Agency Rules) because portions of this 
system are exempt from the access and amendment provisions of subsection 
(d).
    (k) From subsection (g) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    13. The Department of Homeland Security General Training Records 
system of records consists of electronic and paper records and will be 
used by DHS and its components. The Department of Homeland Security 
General Training Records system of records consists of electronic and 
paper records and will be used by DHS and its components and offices to 
maintain records about individual training, including enrollment and 
participation information, information pertaining to class schedules, 
programs, and instructors, training trends and needs, testing and 
examination materials, and assessments of training efficacy. The data 
will be collected by employee name or other unique identifier. The 
collection and maintenance of this information will assist DHS in 
meeting its obligation to train its personnel and contractors in order 
to ensure that the agency mission can be successfully accomplished. 
Pursuant to exemptions 5 U.S.C. 552a(k)(6) of the Privacy Act, portions 
of this system are exempt from 5 U.S.C. 552a(d) to the extent that 
records in this system relate to testing or examination materials used 
solely to determine individual qualifications for appointment in the 
Federal service. Access to or amendment of this information by the data 
subject would compromise the objectivity and fairness of the testing and 
examination process.
    14. The U.S. ICE-005 Trade Transparency Analysis and Research (TTAR) 
System consists of electronic and paper records and will be used by the 
Department of Homeland Security (DHS). TTAR is a repository of 
information held by DHS in connection with its several and varied 
missions and functions, including, but not limited to: The enforcement 
of civil and criminal laws; investigations, inquiries, and proceedings 
there under; and national security and intelligence activities. TTAR 
contains information that is collected by other federal and foreign 
government agencies and may contain personally identifiable information. 
Pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act, portions 
of this system are exempt from 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), 
(e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and (e)(8); (f), and (g). 
Pursuant to 5 U.S.C. 552a(k)(2), this system is exempt from the 
following provisions of the Privacy Act, subject to the limitations set 
forth in those subsections: 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), 
(e)(4)(H), and (f). Exemptions from these particular subsections are 
justified, on a case-by-case

[[Page 58]]

basis to be determined at the time a request is made, for the following 
reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of an investigation, thereby interfering with the related 
investigation and law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise investigations by: Revealing the existence of an otherwise 
confidential investigation and thereby provide an opportunity for the 
subject of an investigation to conceal evidence, alter patterns of 
behavior, or take other actions that could thwart investigative efforts; 
reveal the identity of witnesses in investigations, thereby providing an 
opportunity for the subjects of the investigations or others to harass, 
intimidate, or otherwise interfere with the collection of evidence or 
other information from such witnesses; or reveal the identity of 
confidential informants, which would negatively affect the informant's 
usefulness in any ongoing or future investigations and discourage 
members of the public from cooperating as confidential informants in any 
future investigations.
    (f) From subsections (e)(4)(G) and (H) (Agency Requirements), and 
(f) (Agency Rules) because portions of this system are exempt from the 
individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, potential witnesses, and confidential 
informants.
    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
DHS agents from using their investigative training and exercise of good 
judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal, and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act relating to individuals' 
rights to access and amend their records contained in the system. 
Therefore DHS is not required to establish rules or procedures pursuant 
to which individuals may seek a civil remedy for the agency's: Refusal 
to amend a record; refusal to comply with a request for access to 
records; failure to maintain accurate, relevant, timely and complete 
records; or failure to otherwise comply with an individual's right to 
access or amend records.
    15. The DHS/ALL--013 Claims Records system of records consists of 
electronic and paper records and will be used by DHS and

[[Page 59]]

its components. The DHS/ALL--013 Claims Records system is a repository 
of information held by DHS in connection with its several and varied 
missions and functions, including, but not limited to: the enforcement 
of civil and criminal laws; investigations, inquiries, and proceedings 
there under; and national security, intelligence activities; and 
protection of the President of the United States or other individuals 
pursuant to section 3056 and 3056A of Title 18. The DHS/ALL--013 Claims 
Records system contains information that is collected by, on behalf of, 
in support of, or in cooperation with DHS and its components and may 
contain personally identifiable information collected by other Federal, 
State, local, Tribal, foreign, or international government agencies. The 
Secretary of Homeland Security has exempted this system from the 
following provisions of the Privacy Act, subject to limitations set 
forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), 
(e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f), and (g) 
pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland 
Security has exempted this system from the following provisions of the 
Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3), 
(d), (e)(1), (e)(4)(G), (e)(4)(H), (I), and (f) pursuant to 5 U.S.C. 
552a(k)(1), (k)(2), and (k)(3). Exemptions from these particular 
subsections are justified, on a case-by-case basis to be determined at 
the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of an investigation, thereby interfering with the related 
investigation and law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise investigations by: revealing the existence of an otherwise 
confidential investigation and thereby provide an opportunity for the 
subject of an investigation to conceal evidence, alter patterns of 
behavior, or take other actions that could thwart investigative efforts; 
reveal the identity of witnesses in investigations, thereby providing an 
opportunity for the subjects of the investigations or others to harass, 
intimidate, or otherwise interfere with the collection of evidence or 
other information from such witnesses; or reveal the identity of 
confidential informants, which would negatively affect the informant's 
usefulness in any ongoing or future investigations and discourage 
members of the public from cooperating as confidential informants in any 
future investigations.
    (f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), 
and (f) (Agency Rules) because portions of this system are exempt from 
the individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.

[[Page 60]]

    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
DHS agents from using their investigative training and exercise of good 
judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act relating to individuals' 
rights to access and amend their records contained in the system. 
Therefore DHS is not required to establish rules or procedures pursuant 
to which individuals may seek a civil remedy for the agency's: refusal 
to amend a record; refusal to comply with a request for access to 
records; failure to maintain accurate, relevant timely and complete 
records; or failure to otherwise comply with an individual's right to 
access or amend records.
    16. [Reserved]
    17. The DHS/ALL--006 Accident Records system of records consists of 
electronic and paper records and will be used by DHS and its components. 
The DHS/ALL--006 Accident Records system is a repository of information 
held by DHS in connection with its several and varied missions and 
functions, including, but not limited to: the enforcement of civil and 
criminal laws; investigations, inquiries, and proceedings thereunder; 
national security and intelligence activities; and protection of the 
President of the United States or other individuals pursuant to section 
3056 and 3056A of Title 18. The DHS/ALL--006 Accident Records system 
contains information that is collected by, on behalf of, in support of, 
or in cooperation with DHS and its components and may contain personally 
identifiable information collected by other Federal, State, local, 
tribal, foreign, or international government agencies. The Secretary of 
Homeland Security has exempted this system from the following provisions 
of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 
552a(d) pursuant to 5 U.S.C. 552a(k)(3). Exemptions from these 
particular subsections are justified, on a case-by-case basis to be 
determined at the time a request is made, for the following reasons: 
From subsection (d) (Access to Records) because access to the records 
contained in this system of records could inform the subject of 
information related to the protection of a President of the United 
States or other individuals pursuant to section 3056 and 3056A of Title 
18. Permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    18. The DHS/ALL--020 Internal Affairs Records system of records 
consists of electronic and paper records and will be used by DHS and its 
components. The DHS/ALL--020 Internal Affairs Records system is a 
repository of information held by DHS in connection with its several and 
varied missions and functions, including, but not limited to: The 
enforcement of civil and criminal laws; investigations, inquiries, and 
proceedings thereunder; national security and intelligence activities; 
and protection of the President of the United States or other 
individuals pursuant to section 3056 and 3056A of Title 18. The DHS/
ALL--020 Internal Affairs Records system contains information that is 
collected by, on behalf of, in support of, or in cooperation with DHS 
and its components and may contain personally identifiable information 
collected by other Federal, State, local, tribal, foreign, or 
international government agencies. The Secretary of Homeland Security 
has exempted this system from the following provisions of the Privacy 
Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and 
(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), 
(e)(5) and (e)(8); (f), and (g) pursuant to 5 U.S.C. 552a(j)(2). 
Additionally, the Secretary of Homeland Security has exempted this 
system from the following provisions of the Privacy Act, subject to the 
limitations set forth in 5 U.S.C. 552a (c)(3), (d), (e)(1), (e)(4)(G), 
(e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 552a(k)(1), (k)(2), 
(k)(3), and (k)(5). Exemptions from these particular subsections are 
justified, on a case-by-case basis to be determined at the time a 
request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in

[[Page 61]]

this system of records could inform the subject of an investigation of 
an actual or potential criminal, civil, or regulatory violation, to the 
existence of the investigation, and reveal investigative interest on the 
part of DHS or another agency. Access to the records could permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension. Amendment of the records could interfere with ongoing 
investigations and law enforcement activities and would impose an 
impossible administrative burden by requiring investigations to be 
continuously reinvestigated. In addition, permitting access and 
amendment to such information could disclose security-sensitive 
information that could be detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of an investigation, thereby interfering with the related 
investigation and law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise investigations by: revealing the existence of an otherwise 
confidential investigation and thereby provide an opportunity for the 
subject of an investigation to conceal evidence, alter patterns of 
behavior, or take other actions that could thwart investigative efforts; 
reveal the identity of witnesses in investigations, thereby providing an 
opportunity for the subjects of the investigations or others to harass, 
intimidate, or otherwise interfere with the collection of evidence or 
other information from such witnesses; or reveal the identity of 
confidential informants, which would negatively affect the informant's 
usefulness in any ongoing or future investigations and discourage 
members of the public from cooperating as confidential informants in any 
future investigations.
    (f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), 
and (f) (Agency Rules) because portions of this system are exempt from 
the individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.
    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
DHS agents from using their investigative training, and exercise of good 
judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act relating to individuals' 
rights to access and amend their records contained in the system. 
Therefore DHS is not required to establish rules or procedures pursuant 
to which individuals may seek a civil remedy for the agency's: refusal 
to amend a record; refusal to comply with a request for access to 
records; failure to maintain accurate, relevant timely and complete 
records; or failure to otherwise comply with an individual's right to 
access or amend records.
    19. The DHS/ALL--024 Facility and Perimeter Access Control and 
Visitor Management system of records consists of electronic and paper 
records and will be used by DHS and its components. The DHS/ALL--024 
Facility and Perimeter Access Control and Visitor Management system is a 
repository of information held by DHS in connection with its several and 
varied missions and functions, including, but not limited to: the 
enforcement of civil and criminal laws; investigations, inquiries, and 
proceedings there under; and national security and intelligence 
activities. The DHS/ALL--024 Facility and Perimeter Access Control and 
Visitor Management system contains information that is collected by, on 
behalf of, in support of, or in cooperation with DHS and its components 
and may contain personally identifiable information collected by other 
Federal, State, local, tribal, foreign, or international government 
agencies. The Secretary of Homeland Security has exempted this system 
from the following provisions of the Privacy Act, subject to the 
limitations set forth in 5

[[Page 62]]

U.S.C. 552a (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and 
(f) pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5). Exemptions from 
these particular subsections are justified, on a case-by-case basis to 
be determined at the time a request is made, for the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements), and (f) (Agency Rules) because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    20. The Department of Homeland Security (DHS)/ALL-038 Insider Threat 
Program System of Records consists of electronic and paper records and 
will be used by DHS and its components. The DHS/ALL-038 Insider Threat 
Program System of Records is a repository of information held by DHS in 
connection with its several and varied missions and functions, including 
the enforcement of civil and criminal laws; investigations, inquiries, 
and proceedings there under; national security and intelligence 
activities; and protection of the President of the U.S. or other 
individuals pursuant to Section 3056 and 3056A of Title 18. The DHS/ALL-
038 Insider Threat Program System of Records contains information that 
is collected by, on behalf of, in support of, or in cooperation with DHS 
and its components and may contain personally identifiable information 
collected by other federal, state, local, tribal, foreign, or 
international government agencies. The Secretary of Homeland Security, 
pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the 
following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3), (c)(4); 
(d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), 
(e)(8), (e)(12); (f); and (g)(1). Additionally, the Secretary of 
Homeland Security, pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5), 
has exempted this system from the following provisions of the Privacy 
Act: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); 
and (f). Where a record received from another system has been exempted 
in that source system under 5 U.S.C. 552a(j)(2), 5 U.S.C. 552a(k)(1), 
(k)(2), and (k)(5), DHS will claim the same exemptions for those records 
that are claimed for the original primary systems of records from which 
they originated and claims any additional exemptions set forth here. 
Exemptions from these particular subsections are justified, on a case-
by-case basis to be determined at the time a request is made, for the 
following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence,

[[Page 63]]

and to avoid detection or apprehension, which would undermine the entire 
investigative process. When an investigation has been completed, 
information on disclosures made may continue to be exempted if the fact 
that an investigation occurred remains sensitive after completion.
    (b) From subsection (d) (Access and Amendment to Records) because 
access to the records contained in this system of records could inform 
the subject of an investigation of an actual or potential criminal, 
civil, or regulatory violation to the existence of that investigation 
and reveal investigative interest on the part of DHS or another agency. 
Access to the records could permit the individual who is the subject of 
a record to impede the investigation, to tamper with witnesses or 
evidence, and to avoid detection or apprehension. Amendment of the 
records could interfere with ongoing investigations and law enforcement 
activities and would impose an unreasonable administrative burden by 
requiring investigations to be continually reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    (g) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with subsection (e)(5) would 
preclude DHS agents from using their investigative training and exercise 
of good judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (e)(12) (Matching Agreements) because requiring 
DHS to provide notice of a new or revised matching agreement with a non-
Federal agency, if one existed, would impair DHS operations by 
indicating which data elements and information are valuable to DHS's 
analytical functions, thereby providing harmful disclosure of 
information to individuals who would seek to circumvent or interfere 
with DHS's missions.
    (j) From subsection (g)(1) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    21. The DHS/CBP--010 Persons Engaged in International Trade in CBP 
Licensed/Regulated Activities system of records consists of electronic 
and paper records and will be used by DHS and its components. The DHS/
CBP--010 Persons Engaged in International Trade in CBP Licensed/
Regulated Activities is a repository of information held by DHS in 
connection with its several and varied missions and functions, 
including, but not limited to: The enforcement of civil and criminal 
laws; investigations, inquiries, and proceedings thereunder; and 
national security and intelligence activities. The DHS/CBP--010 Persons 
Engaged in International Trade in CBP Licensed/Regulated Activities 
contains information that is collected by, on behalf of, in support of, 
or in cooperation with DHS and its components and may contain personally 
identifiable information collected by other Federal, State, local, 
tribal, foreign, or international government agencies. The Secretary of 
Homeland Security has exempted this system from the following provisions 
of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 
552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), 
(e)(4)(I), (e)(5) and (e)(8); (f), and (g) pursuant to 5 U.S.C. 
552a(j)(2). Additionally, the Secretary of Homeland Security has 
exempted this system from the following provisions of

[[Page 64]]

the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a 
(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant 
to 5 U.S.C. 552a(k)(2). Exemptions from these particular subsections are 
justified, on a case-by-case basis to be determined at the time a 
request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to national 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of an investigation, thereby interfering with the related 
investigation and law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise investigations by: Revealing the existence of an otherwise 
confidential investigation and thereby provide an opportunity for the 
subject of an investigation to conceal evidence, alter patterns of 
behavior, or take other actions that could thwart investigative efforts; 
reveal the identity of witnesses in investigations, thereby providing an 
opportunity for the subjects of the investigations or others to harass, 
intimidate, or otherwise interfere with the collection of evidence or 
other information from such witnesses; or reveal the identity of 
confidential informants, which would negatively affect the informant's 
usefulness in any ongoing or future investigations and discourage 
members of the public from cooperating as confidential informants in any 
future investigations.
    (f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), 
and (f) (Agency Rules) because portions of this system are exempt from 
the individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.
    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
DHS agents from using their investigative training and exercise of good 
judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act relating to individuals' 
rights to access and amend their records contained in the system. 
Therefore DHS is not required to establish rules or procedures pursuant 
to which individuals may seek a civil remedy for the agency's: Refusal 
to amend a record; refusal to comply with a request for access to 
records; failure to

[[Page 65]]

maintain accurate, relevant, timely and complete records; or failure to 
otherwise comply with an individual's right to access or amend records.
    22. The DHS/CBP--011 TECS system of records consists of electronic 
and paper records and will be used by DHS, its Components, and other 
Federal agencies. The DHS/CBP-011 TECS is a repository of information 
held by DHS in connection with its several and varied missions and 
functions, including, but not limited to: The enforcement of civil and 
criminal laws; investigations, inquiries, and proceedings thereunder; 
and national security and intelligence activities. The DHS/CBP-011 TECS 
contains information that is collected by, on behalf of, in support of, 
or in cooperation with DHS and its components and may contain personally 
identifiable information collected by other Federal, State, local, 
Tribal, foreign, or international government agencies. The Secretary of 
Homeland Security has exempted this system from the following provisions 
of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 
552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), 
(e)(4)(I), (e)(5) and (e)(8); (f), and (g) pursuant to 5 U.S.C. 
552a(j)(2). Additionally, the Secretary of Homeland Security has 
exempted this system from the following provisions of the Privacy Act, 
subject to the limitations set forth in 5 U.S.C. 552a (c)(3), (d), 
(e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 
552a(k)(2). Exemptions from these particular subsections are justified, 
on a case-by-case basis to be determined at the time a request is made, 
for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to national 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation or subject of interest would alert the 
subject to the nature or existence of an investigation, thereby 
interfering with the related investigation and law enforcement 
activities or national security matter.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise investigations by: Revealing the existence of an otherwise 
confidential investigation and thereby provide an opportunity for the 
subject of an investigation to conceal evidence, alter patterns of 
behavior, or take other actions that could thwart investigative efforts; 
reveal the identity of witnesses in investigations, thereby providing an 
opportunity for the subjects of the investigations or others to harass, 
intimidate, or otherwise interfere with the collection of evidence or 
other information from such witnesses; or reveal the identity of 
confidential informants, which would negatively affect the informant's 
usefulness in any ongoing or future investigations and discourage 
members of the public from cooperating as confidential informants in any 
future investigations.
    (f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), 
and (f) (Agency Rules) because portions of this system are exempt from 
the individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses,

[[Page 66]]

and potential witnesses, and confidential informants.
    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
DHS agents from using their investigative training and exercise of good 
judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act relating to individuals' 
rights to access and amend their records contained in the system. 
Therefore DHS is not required to establish rules or procedures pursuant 
to which individuals may seek a civil remedy for the agency's: Refusal 
to amend a record; refusal to comply with a request for access to 
records; failure to maintain accurate, relevant, timely and complete 
records; or failure to otherwise comply with an individual's right to 
access or amend records.
    23. The DHS/CBP--012 Closed Circuit Television system of records 
consists of electronic and paper records and will be used by DHS and its 
components. The DHS/CBP--012 Closed Circuit Television system is a 
repository of information held by DHS in connection with its several and 
varied missions and functions, including, but not limited to: The 
enforcement of civil and criminal laws; investigations, inquiries, and 
proceedings thereunder; and national security and intelligence 
activities. The DHS/CBP--012 Closed Circuit Television system contains 
information that is collected by, on behalf of, in support of, or in 
cooperation with DHS and its components and may contain personally 
identifiable information collected by other Federal, State, local, 
tribal, foreign, or international government agencies. The Secretary of 
Homeland Security has exempted this system from the following provisions 
of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 
552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), 
(e)(4)(I), (e)(5) and (e)(8); (f), and (g) pursuant to 5 U.S.C. 
552a(j)(2). Additionally, the Secretary of Homeland Security has 
exempted this system from the following provisions of the Privacy Act, 
subject to the limitations set forth in 5 U.S.C. 552a(c)(3), (d), 
(e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 
552a(k)(2). Exemptions from these particular subsections are justified, 
on a case-by-case basis to be determined at the time a request is made, 
for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of an investigation, thereby interfering with the related 
investigation and law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise investigations by: Revealing the existence of an otherwise 
confidential investigation and thereby provide

[[Page 67]]

an opportunity for the subject of an investigation to conceal evidence, 
alter patterns of behavior, or take other actions that could thwart 
investigative efforts; reveal the identity of witnesses in 
investigations, thereby providing an opportunity for the subjects of the 
investigations or others to harass, intimidate, or otherwise interfere 
with the collection of evidence or other information from such 
witnesses; or reveal the identity of confidential informants, which 
would negatively affect the informant's usefulness in any ongoing or 
future investigations and discourage members of the public from 
cooperating as confidential informants in any future investigations.
    (f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), 
and (f) (Agency Rules) because portions of this system are exempt from 
the individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.
    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
DHS agents from using their investigative training and exercise of good 
judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act relating to individuals' 
rights to access and amend their records contained in the system. 
Therefore DHS is not required to establish rules or procedures pursuant 
to which individuals may seek a civil remedy for the agency's: Refusal 
to amend a record; refusal to comply with a request for access to 
records; failure to maintain accurate, relevant, timely and complete 
records; or failure to otherwise comply with an individual's right to 
access or amend records.
    24. The DHS/CBP--013 Seized Assets and Case Tracking System 
(SEACATS) consists of electronic and paper records and will be used by 
DHS and its components. The DHS/CBP--013 Seized Assets and Case Tracking 
System is a repository of information held by DHS in connection with its 
several and varied missions and functions, including, but not limited 
to: The enforcement of civil and criminal laws; investigations, 
inquiries, and proceedings thereunder; and national security and 
intelligence activities. The DHS/CBP--013 Seized Assets and Case 
Tracking System contains information that is collected by, on behalf of, 
in support of, or in cooperation with DHS and its components and may 
contain personally identifiable information collected by other Federal, 
State, local, tribal, foreign, or international government agencies. The 
Secretary of Homeland Security has exempted this system from the 
following provisions of the Privacy Act, subject to the limitations set 
forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), 
(e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f), and (g) 
pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland 
Security has exempted this system from the following provisions of the 
Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a 
(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (I), and (f) pursuant to 5 
U.S.C. 552a(k)(2). Exemptions from these particular subsections are 
justified, on a case-by-case basis to be determined at the time a 
request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an

[[Page 68]]

impossible administrative burden by requiring investigations to be 
continuously reinvestigated. In addition, permitting access and 
amendment to such information could disclose security-sensitive 
information that could be detrimental to national security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of an investigation, thereby interfering with the related 
investigation and law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise investigations by: Revealing the existence of an otherwise 
confidential investigation and thereby provide an opportunity for the 
subject of an investigation to conceal evidence, alter patterns of 
behavior, or take other actions that could thwart investigative efforts; 
reveal the identity of witnesses in investigations, thereby providing an 
opportunity for the subjects of the investigations or others to harass, 
intimidate, or otherwise interfere with the collection of evidence or 
other information from such witnesses; or reveal the identity of 
confidential informants, which would negatively affect the informant's 
usefulness in any ongoing or future investigations and discourage 
members of the public from cooperating as confidential informants in any 
future investigations.
    (f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), 
and (f) (Agency Rules) because portions of this system are exempt from 
the individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.
    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
the officers and agents of DHS components' from using their 
investigative training and exercise of good judgment to both conduct and 
report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act relating to individuals' 
rights to access and amend their records contained in the system. 
Therefore DHS is not required to establish rules or procedures pursuant 
to which individuals may seek a civil remedy for the agency's: Refusal 
to amend a record; refusal to comply with a request for access to 
records; failure to maintain accurate, relevant timely and complete 
records; or failure to otherwise comply with an individual's right to 
access or amend records.
    25. The U.S. Department of Homeland Security (DHS)/U.S. Customs and 
Border Protection (CBP)-014 Regulatory Audit Archive System (RAAS) 
System of Records consists of electronic and paper records and will be 
used by DHS and its Components. The DHS/CBP-014 RAAS System of Records 
is a repository of information held by DHS in connection with its 
several and varied missions and functions, including, but not limited 
to, the enforcement of civil and criminal laws, and investigations, 
inquiries, and proceedings there under. The DHS/CBP-014 RAAS System of 
Records contains information that is collected by, on behalf of, in 
support of, or in cooperation with DHS and its Components and may 
contain personally identifiable information collected by other federal, 
state, local, tribal, foreign, or international government agencies. The 
Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2), has 
exempted this system from the following provisions of the Privacy Act: 5 
U.S.C. 552a(c)(3). Exemptions from these particular subsections are 
justified, on a case-by-case basis to be determined at the time a 
request is made, for the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts

[[Page 69]]

and/or efforts to preserve national security. Disclosure of the 
accounting would also permit the individual who is the subject of a 
record to impede the investigation, to tamper with witnesses or 
evidence, and to avoid detection or apprehension, which would undermine 
the entire investigative process.
    (b) [Reserved]
    26. DHS/CBP-001, Import Information System (IIS). A portion of the 
following system of records is exempt from 5 U.S.C. 552a(c)(3), (e)(8), 
and (g)(1) pursuant to 5 U.S.C. 552a(j)(2), and from 5 U.S.C. 552a(c)(3) 
pursuant to 5 U.S.C. 552a(k)(2). Further, no exemption shall be asserted 
with respect to information maintained in the system as it relates to 
data submitted by or on behalf of a person who travels to visit the 
United States and crosses the border, nor shall an exemption be asserted 
with respect to the resulting determination (approval or denial). After 
conferring with the appropriate component or agency, DHS may waive 
applicable exemptions in appropriate circumstances and where it would 
not appear to interfere with or adversely affect the law enforcement 
purposes of the systems from which the information is recompiled or in 
which it is contained. Exemptions from the above particular subsections 
are justified, on a case-by-case basis to be determined at the time a 
request is made, when information in this system of records is may 
impede a law enforcement, intelligence activities and national security 
investigation:
    (a) From subsection (c)(3) (Accounting for Disclosure) because 
making available to a record subject the accounting of disclosures from 
records concerning him or her would specifically reveal any 
investigative interest in the individual. Revealing this information 
could reasonably be expected to compromise ongoing efforts to 
investigate a violation of U.S. law, including investigations of a known 
or suspected terrorist, by notifying the record subject that he or she 
is under investigation. This information could also permit the record 
subject to take measures to impede the investigation, e.g., destroy 
evidence, intimidate potential witnesses, or flee the area to avoid or 
impede the investigation.
    (b) From subsection (e)(8) (Notice on Individuals) because to 
require individual notice of disclosure of information due to compulsory 
legal process would pose an impossible administrative burden on DHS and 
other agencies and could alert the subjects of counterterrorism or law 
enforcement investigations to the fact of those investigations when not 
previously known.
    (c) From subsection (g)(1) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    27. The DHS/CBP-009 Nonimmigrant Information system of records 
consists of electronic and paper records and will be used by DHS and 
it's Components. The DHS/CBP-009 Nonimmigrant Information System is a 
repository of information held by DHS in connection with its several and 
varied missions and functions, including, but not limited to: The 
enforcement of civil and criminal laws; Investigations, inquiries, and 
proceedings thereunder; and national security and intelligence 
activities. The DHS/CBP-009 Nonimmigrant Information System contains 
information that is collected by, on behalf of, in support of, or in 
cooperation with DHS and its components and may contain personally 
identifiable information collected by other Federal, State, local, 
Tribal, foreign, or international government agencies. This system may 
contain records or information pertaining to the accounting of 
disclosures made from the Nonimmigrant Information System to other law 
enforcement and counterterrorism agencies (Federal, State, Local, 
Foreign, International or Tribal) in accordance with the published 
routine uses. The Secretary of Homeland Security has exempted this 
system from the following provisions of the Privacy Act, subject to the 
limitations set forth in 5 U.S.C. 522(c)(3), (e) (8), and (g) of the 
Privacy Act of 1974, as amended, as necessary and appropriate to protect 
accounting of these disclosures only, pursuant to 5 U.S.C. 552a (j)(2), 
and (k)(2). Further, no exemption shall be asserted with respect to 
biographical or travel information submitted by, and collected from, a 
person's travel documents or submitted from a government computer system 
to support or to validate those travel documents. After conferring with 
the appropriate component or agency, DHS may waive applicable exemptions 
in appropriate circumstances and where it would not appear to interfere 
with or adversely affect the law enforcement purposes of the systems 
from which the information is recompiled or in which it is contained. 
Exemptions from the above particular subsections are justified, on a 
case-by-case basis to be determined at the time a request is made, when 
information in this system of records is recompiled or is created from 
information contained in other systems of records subject to exemptions 
for the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosure) because 
making available to a record subject the accounting of disclosures from 
records concerning him or her would specifically reveal any 
investigative interest in the individual. Revealing this information 
could reasonably be expected to compromise ongoing efforts to 
investigate a violation of U.S. law, including investigations of a known 
or suspected terrorist, by notifying the record subject that he or she 
is under investigation. This information could also permit the record 
subject to take measures to impede the investigation, e.g., destroy 
evidence, intimidate potential witnesses, or flee

[[Page 70]]

the area to avoid or impede the investigation.
    (b) From subsection (e)(8) (Notice on Individuals) because to 
require individual notice of disclosure of information due to compulsory 
legal process would pose an impossible administrative burden on DHS and 
other agencies and could alert the subjects of counterterrorism or law 
enforcement investigations to the fact of those investigations when not 
previously known.
    (c) From subsection (g) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    28. The DHS/ICE--007 Law Enforcement Support Center (LESC) Alien 
Criminal Response Information Management (ACRIMe) system of records 
consists of electronic and paper records and will be used by DHS and its 
components. The DHS/ICE--007 Law Enforcement Support Center Alien 
Criminal Response Information Management system is a repository of 
information held by DHS in connection with its several and varied 
missions and functions, including, but not limited to: The enforcement 
of civil and criminal laws; investigations, inquiries, and proceedings 
thereunder; and national security and intelligence activities. The DHS/
ICE--007 Law Enforcement Support Center Alien Criminal Response 
Information Management system contains information that is collected by, 
on behalf of, in support of, or in cooperation with DHS and its 
components and may contain personally identifiable information collected 
by other Federal, State, local, tribal, foreign, or international 
government agencies. The Secretary of Homeland Security has exempted 
this system of records from the following provisions of the Privacy Act, 
subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); 
(d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), and (e)(5) and 
(e)(8); (f), and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the 
Secretary of Homeland Security has exempted this system from the 
following provisions of the Privacy Act, subject to the limitations set 
forth in 5 U.S.C. 552a (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), and 
(f) pursuant to 5 U.S.C. 552a(k)(2). Exemptions from these particular 
subsections are justified, on a case-by-case basis to be determined at 
the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in identifying or establishing patterns of unlawful 
activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of an investigation, thereby interfering with the related 
investigation and law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise investigations by: Revealing the existence of an otherwise 
confidential investigation and thereby provide an opportunity for the 
subject of an investigation to conceal evidence, alter patterns of 
behavior, or take other actions that could thwart investigative efforts; 
reveal the identity of witnesses in investigations, thereby providing an 
opportunity for the subjects of the investigations or others to harass, 
intimidate, or otherwise interfere with the collection of evidence or 
other information from such witnesses; or reveal the identity of 
confidential informants, which would negatively affect the informant's 
usefulness in any ongoing or future investigations and discourage 
members of the public from cooperating as confidential informants in any 
future investigations.

[[Page 71]]

    (f) From subsections (e)(4)(G), (H) (Agency Requirements), and (f) 
(Agency Rules) because portions of this system are exempt from the 
individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.
    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
DHS agents from using their investigative training and exercise of good 
judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act relating to individuals' 
rights to access and amend their records contained in the system. 
Therefore DHS is not required to establish rules or procedures pursuant 
to which individuals may seek a civil remedy for the agency's: Refusal 
to amend a record; refusal to comply with a request for access to 
records; failure to maintain accurate, relevant, timely and complete 
records; or failure to otherwise comply with an individual's right to 
access or amend records.
    29. The DHS/ICE--008 Search, Arrest, and Seizure system of records 
consists of electronic and paper records and will be used by DHS and its 
components. The DHS/ICE--008 Search, Arrest, and Seizure system is a 
repository of information held by DHS in connection with its several and 
varied missions and functions, including, but not limited to: The 
enforcement of civil and criminal laws; investigations, inquiries, and 
proceedings thereunder; and national security and intelligence 
activities. The DHS/ICE--008 Search, Arrest, and Seizure system contains 
information that is collected by, on behalf of, in support of, or in 
cooperation with DHS and its components and may contain personally 
identifiable information collected by other Federal, State, local, 
tribal, foreign, or international government agencies. The Secretary of 
Homeland Security has exempted this system from the following provisions 
of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 
552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), 
(e)(5) and (e)(8); (f), and (g) pursuant to 5 U.S.C. 552a(j)(2). 
Additionally, the Secretary of Homeland Security has exempted this 
system from the following provisions of the Privacy Act, subject to the 
limitations set forth in 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), 
(e)(4)(H), and (f) pursuant to 5 U.S.C. 552a(k)(2). Exemptions from 
these particular subsections are justified, on a case-by-case basis to 
be determined at the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.

[[Page 72]]

    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of an investigation, thereby interfering with the related 
investigation and law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise investigations by: Revealing the existence of an otherwise 
confidential investigation and thereby provide an opportunity for the 
subject of an investigation to conceal evidence, alter patterns of 
behavior, or take other actions that could thwart investigative efforts; 
reveal the identity of witnesses in investigations, thereby providing an 
opportunity for the subjects of the investigations or others to harass, 
intimidate, or otherwise interfere with the collection of evidence or 
other information from such witnesses; or reveal the identity of 
confidential informants, which would negatively affect the informant's 
usefulness in any ongoing or future investigations and discourage 
members of the public from cooperating as confidential informants in any 
future investigations.
    (f) From subsections (e)(4)(G) and (H) (Agency Requirements), and 
(f) (Agency Rules) because portions of this system are exempt from the 
individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.
    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
DHS agents from using their investigative training and exercise of good 
judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act relating to individuals' 
rights to access and amend their records contained in the system. 
Therefore DHS is not required to establish rules or procedures pursuant 
to which individuals may seek a civil remedy for the agency's: Refusal 
to amend a record; refusal to comply with a request for access to 
records; failure to maintain accurate, relevant, timely and complete 
records; or failure to otherwise comply with an individual's right to 
access or amend records.
    30. The DHS/ICE--009 External Investigations system of records 
consists of electronic and paper records and will be used by DHS and its 
components. The DHS/ICE--009 External Investigations system is a 
repository of information held by DHS in connection with its several and 
varied missions and functions, including, but not limited to: The 
enforcement of civil and criminal laws; investigations, inquiries, and 
proceedings there under; and national security and intelligence 
activities. The DHS/ICE--009 External Investigations system contains 
information that is collected by, on behalf of, in support of, or in 
cooperation with DHS and its components and may contain personally 
identifiable information collected by other Federal, State, local, 
tribal, foreign, or international government agencies. The Secretary of 
Homeland Security has exempted this system from the following provisions 
of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 
552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), 
and (e)(5) and (e)(8); (f), and (g) pursuant to 5 U.S.C. 552a(j)(2). 
Additionally, the Secretary of Homeland Security has exempted this 
system from the following provisions of the Privacy Act, subject to the 
limitations set forth in 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), 
(e)(4)(H), and (f) pursuant to 5 U.S.C. 552a(k)(2). Exemptions from 
these particular subsections are justified, on a case-by-case basis to 
be determined at the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in

[[Page 73]]

this system of records could inform the subject of an investigation of 
an actual or potential criminal, civil, or regulatory violation, to the 
existence of the investigation, and reveal investigative interest on the 
part of DHS or another agency. Access to the records could permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension. Amendment of the records could interfere with ongoing 
investigations and law enforcement activities and would impose an 
impossible administrative burden by requiring investigations to be 
continuously reinvestigated. In addition, permitting access and 
amendment to such information could disclose security-sensitive 
information that could be detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of an investigation, thereby interfering with the related 
investigation and law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise investigations by: Revealing the existence of an otherwise 
confidential investigation and thereby provide an opportunity for the 
subject of an investigation to conceal evidence, alter patterns of 
behavior, or take other actions that could thwart investigative efforts; 
reveal the identity of witnesses in investigations, thereby providing an 
opportunity for the subjects of the investigations or others to harass, 
intimidate, or otherwise interfere with the collection of evidence or 
other information from such witnesses; or reveal the identity of 
confidential informants, which would negatively affect the informant's 
usefulness in any ongoing or future investigations and discourage 
members of the public from cooperating as confidential informants in any 
future investigations.
    (f) From subsections (e)(4)(G) and (H) (Agency Requirements), and 
(f) (Agency Rules) because portions of this system are exempt from the 
individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.
    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
DHS agents from using their investigative training and exercise of good 
judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act relating to individuals' 
rights to access and amend their records contained in the system. 
Therefore DHS is not required to establish rules or procedures pursuant 
to which individuals may seek a civil remedy for the agency's: Refusal 
to amend a record; refusal to comply with a request for access to 
records; failure to maintain accurate, relevant, timely and complete 
records; or failure to otherwise comply with an individual's right to 
access or amend records.
    31. The DHS/ICE--010 Confidential and Other Sources of Information 
(COSI) system of records consists of electronic and paper records and 
will be used by DHS and its components. The DHS/ICE--010 Confidential 
and Other Sources of Information system is a repository of information 
held by DHS in connection with its several and varied missions and 
functions, including, but not limited to: the enforcement of civil and 
criminal laws; and investigations, inquiries, and proceedings there 
under; and national security and intelligence activities. The DHS/ICE--
010 Confidential and Other Sources of Information system contains 
information that is collected by, on behalf of, in support of, or in 
cooperation with DHS and its components and may contain personally 
identifiable information collected by other Federal, State, local, 
tribal, foreign, or international government agencies. The Secretary of 
Homeland Security has exempted this system from the following provisions 
of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 
552a(c)(3) and (4); (d); (e)(1), (e)(2),

[[Page 74]]

(e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and (e)(8); (f), and (g) pursuant 
to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security 
has exempted this system from the following provisions of the Privacy 
Act, subject to the limitations set forth in 5 U.S.C. 552a (c)(3), (d), 
(e)(1), (e)(4)(G), (e)(4)(H), and (f) pursuant to 5 U.S.C. 552a(k)(2). 
Exemptions from these particular subsections are justified, on a case-
by-case basis to be determined at the time a request is made, for the 
following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of an investigation, thereby interfering with the related 
investigation and law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise investigations by: Revealing the existence of an otherwise 
confidential investigation and thereby provide an opportunity for the 
subject of an investigation to conceal evidence, alter patterns of 
behavior, or take other actions that could thwart investigative efforts; 
reveal the identity of witnesses in investigations, thereby providing an 
opportunity for the subjects of the investigations or others to harass, 
intimidate, or otherwise interfere with the collection of evidence or 
other information from such witnesses; or reveal the identity of 
confidential informants, which would negatively affect the informant's 
usefulness in any ongoing or future investigations and discourage 
members of the public from cooperating as confidential informants in any 
future investigations.
    (f) From subsections (e)(4)(G) and (H) (Agency Requirements), and 
(f) (Agency Rules) because portions of this system are exempt from the 
individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.
    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
DHS agents from using their investigative training and exercise of good 
judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act relating to individuals' 
rights to access and amend their records contained in the system. 
Therefore DHS is not required to establish rules or procedures pursuant 
to which individuals may

[[Page 75]]

seek a civil remedy for the agency's: Refusal to amend a record; refusal 
to comply with a request for access to records; failure to maintain 
accurate, relevant, timely and complete records; or failure to otherwise 
comply with an individual's right to access or amend records.
    32. The DHS/USCIS--006 Fraud Detection and National Security Data 
System (FDNS-DS) system of records consists of a stand alone database 
and paper files that will be used by DHS and its components. The DHS/
USCIS--006 Fraud Detection and National Security Data System is a case 
management system used to record, track, and manage immigration 
inquiries, investigative referrals, law enforcement requests, and case 
determinations involving benefit fraud, criminal activity, public safety 
and national security concerns. The Secretary of Homeland Security has 
exempted this system from the following provisions of the Privacy Act, 
subject to the limitations set forth in 5 U.S.C. 552a(c)(3); (d); 
(e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 
552a (k)(2). These exemptions apply only to the extent that records in 
the system are subject to exemption pursuant to 5 U.S.C. 552a (k)(2). 
Exemptions from these particular subsections are justified, on a case-
by-case basis to be determined at the time a request is made, for the 
following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of the investigation; and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G) and (e)(4)(H) (Agency Requirements) 
because portions of this system are exempt from the individual access 
provisions of subsection (d) which exempts providing access because it 
could alert a subject to the nature or existence of an investigation, 
and thus there could be no procedures for that particular data. 
Procedures do exist for access for those portions of the system that are 
not exempted.
    (e) From subsection (e)(4)(I) (Agency Requirements) because 
providing such source information would impede law enforcement or 
intelligence by compromising the nature or existence of a confidential 
investigation.
    (f) From subsection (f) (Agency Rules) because portions of this 
system are exempt from the access and amendment provisions of subsection 
(d).
    33. The DHS/USCG--028 Family Advocacy Case Records system of records 
consists of electronic and paper records and will be used by DHS and its 
components. The DHS/USCG--028 Family Advocacy Case Records is a 
repository of information held by DHS in connection with its several and 
varied missions and functions, including, but not limited to: the 
enforcement of civil and criminal laws; investigations, inquiries, and 
proceedings there under. The DHS/USCG--028 Family Advocacy Case Records 
contains information that is collected by, on behalf of, in support of, 
or in cooperation with DHS and its components and may contain personally 
identifiable information collected by other Federal, State, local, 
tribal, foreign, or international government agencies. The Secretary of 
Homeland Security has exempted this system from the following provisions 
of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 
552a (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) 
pursuant to 5 U.S.C. 552a(k)(2). Exemptions from these particular 
subsections are justified, on a case-by-case basis to be determined at 
the time a request is made, for the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the

[[Page 76]]

existence of the investigation, and reveal investigative interest on the 
part of DHS as well as the recipient agency. Disclosure of the 
accounting would therefore present a serious impediment to law 
enforcement efforts and/or efforts to preserve national security. 
Disclosure of the accounting would also permit the individual who is the 
subject of a record to impede the investigation, to tamper with 
witnesses or evidence, and to avoid detection or apprehension, which 
would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), 
and (f) (Agency Rules) because portions of this system are exempt from 
the individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.
    34. The DHS/USCG-029 Notice of Arrival and Departure System of 
Records consists of electronic and paper records and will be used by DHS 
and its components. The DHS/USCG-029 Notice of Arrival and Departure 
System of Records is a repository of information held by DHS in 
connection with its several and varied missions and functions, 
including, but not limited to the enforcement of civil and criminal 
laws; investigations, inquiries, and proceedings there under. The DHS/
USCG-029 Notice of Arrival and Departure System of Records contains 
information that is collected by, on behalf of, in support of, or in 
cooperation with DHS and its components and may contain personally 
identifiable information collected by other federal, state, local, 
tribal, foreign, or international government agencies.
    The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), 
exempted this system from the following provisions of the Privacy Act: 
Sections (c)(3), (e)(8), and (g) of the Privacy Act of 1974, as amended, 
as is necessary and appropriate to protect this information. Further, 
DHS has exempted section (c)(3) of the Privacy Act of 1974, as amended, 
pursuant to 5 U.S.C. 552a(k)(2), as is necessary and appropriate to 
protect this information.
    Exemptions from these particular subsections are justified, on a 
case-by-case basis to be determined at the time a request is made, for 
the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process. 
When an investigation has been completed, information on disclosures 
made may continue to be exempted if the fact that an investigation 
occurred remains sensitive after completion.
    (b) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (c) From subsection (g)(1) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    35. The DHS/Secret Service--001 Criminal Investigation Information 
system of records consists of electronic and paper records and will be 
used by DHS and its components. The DHS/Secret Service--001 Criminal 
Investigation Information system is a repository of

[[Page 77]]

information held by DHS in connection with its several and varied 
missions and functions, including, but not limited to: The enforcement 
of civil and criminal laws; investigations, inquiries, and proceedings 
there under; the protection of the President of the United States or 
other individuals and locations pursuant to section 3056 and 3056A of 
Title 18. The DHS/Secret Service--001 Criminal Investigation Information 
system contains information that is collected by, on behalf of, in 
support of, or in cooperation with DHS and its components and may 
contain personally identifiable information collected by other Federal, 
State, local, tribal, foreign, international government agencies, as 
well as private corporate, education and other entities. The Secretary 
of Homeland Security has exempted this system from the following 
provisions of the Privacy Act, subject to the limitations set forth in 5 
U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), 
(e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f), and (g) pursuant to 5 
U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has 
exempted this system from the following provisions of the Privacy Act, 
subject to the limitations set forth in 5 U.S.C. 552a(c)(3), (d), 
(e)(1), (e)(4)(G), (e)(4)(H), (I), and (f) pursuant to 5 U.S.C. 
552a(k)(1), (k)(2), and (k)(3). Exemptions from these particular 
subsections are justified, on a case-by-case basis to be determined at 
the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation, or 
protective inquiry, and reveal investigative interest on the part of DHS 
as well as the recipient agency. Disclosure of the accounting would 
therefore present a serious impediment to law enforcement efforts and/or 
the Secret Service's protective mission. Disclosure of the accounting 
would also permit the individual who is the subject of a record to 
impede the investigation, or inquiry, to tamper with witnesses or 
evidence, and to avoid detection or apprehension, which would undermine 
the entire investigative or inquiry process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, or protective inquiry to the existence of the 
investigation or inquiry, and reveal investigative interest on the part 
of DHS or another agency. Access to the records could permit the 
individual who is the subject of a record to impede the investigation or 
inquiry, to tamper with witnesses or evidence, and to avoid detection or 
apprehension. Amendment of the records could interfere with ongoing 
investigations and law enforcement or protective activities and/or could 
disclose security-sensitive information that could be detrimental to 
homeland security or the protective mission of the Secret Service.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law or protective inquiries, the accuracy of information 
obtained or introduced occasionally may be unclear or the information 
may not be strictly relevant or necessary to a specific investigation or 
protective inquiry. In the interests of effective law enforcement, and/
or the protective mission of the Secret Service, it is appropriate to 
retain all information that may aid in establishing patterns of unlawful 
activity, or a threat to an individual, location or event protected or 
secured by the Secret Service.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation or protective inquiry would alert the 
subject to the nature or existence of an investigation or inquiry, 
thereby interfering with the related investigation or inquiry and law 
enforcement or protective activities.
    (e) From subsection (e)(3) (Notice to Individuals Providing 
Information) because providing such detailed information would impede 
law enforcement or protective activities in that it could compromise 
investigations or inquires by: Revealing the existence of an otherwise 
confidential investigation or inquiry and thereby provide an opportunity 
for the subject of an investigation or inquiry to conceal evidence, 
alter patterns of behavior, or take other actions that could thwart 
investigative or protective efforts; reveal the identity of witnesses in 
investigations or inquiries, thereby providing an opportunity for the 
subjects of the investigations or inquiries or others to harass, 
intimidate, or otherwise interfere with the collection of evidence or 
other information from such witnesses; or reveal the identity of 
confidential informants, which would negatively affect the informant's 
usefulness in any ongoing or future investigations or protective 
activities and discourage members of the public from cooperating as 
confidential informants in any future investigations or protective 
activities.
    (f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), 
and (f) (Agency Rules) because portions of this system are exempt from 
the individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to the existence of records pertaining to them 
in the system of records or otherwise setting up procedures

[[Page 78]]

pursuant to which individuals may access and view records pertaining to 
themselves in the system would undermine investigative or protective 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    (g) From subsection (e)(5) (Maintenance of Information Used in 
Making any Determination) because in the collection of information for 
law enforcement and protective purposes it is impossible to determine in 
advance what information is accurate, relevant, timely, and complete. 
Compliance with (e)(5) would preclude Secret Service DHS agents from 
using their investigative and protective training and exercising good 
judgment to both conduct and report on investigations or other 
protective activities.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, or/and could result in disclosure of investigative or 
protective techniques, procedures, and evidence.
    (i) From subsection (g) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act 
relating to individuals' rights to access and amend their records 
contained in the system. Therefore DHS is not required to establish 
rules or procedures pursuant to which individuals may seek a civil 
remedy for the agency's: Refusal to amend a record; refusal to comply 
with a request for access to records; failure to maintain accurate, 
relevant, timely and complete records; or failure to otherwise comply 
with an individual's right to access or amend records.
    36. The DHS/Secret Service--003 Non-Criminal Investigation 
Information system of records consists of electronic and paper records 
and will be used by DHS and its components. The DHS/Secret Service--003 
Non-Criminal Investigation Information system is a repository of 
information held by DHS in connection with its several and varied 
missions and functions, including, but not limited to: The enforcement 
of civil and criminal laws; criminal, civil, protective and background 
investigations and inquiries, and proceedings thereunder; the protection 
of the President of the United States or other individuals and locations 
pursuant to section 3056 and 3056A of Title 18; and the hiring of 
employees through an application process which includes the use of 
polygraph examinations. The DHS/Secret Service--003 Non-Criminal 
Investigation Information system contains information that is collected 
by, on behalf of, in support of, or in cooperation with DHS and its 
components and may contain personally identifiable information collected 
by other Federal, State, local, tribal, foreign, or international 
government agencies, as well as private corporate, educational and other 
entities. The Secretary of Homeland Security has exempted this system 
from the following provisions of the Privacy Act, subject to the 
limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), 
(e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f), 
and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of 
Homeland Security has exempted this system from the following provisions 
of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 
552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) 
pursuant to 5 U.S.C. 552a(k)(1), (k)(2), (k)(3), (k)(5), and (k)(6). 
Exemptions from these particular subsections are justified, on a case-
by-case basis to be determined at the time a request is made, for the 
following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation, or 
protective inquiry, and reveal investigative interest on the part of DHS 
as well as the recipient agency. Disclosure of the accounting would 
therefore present a serious impediment to law enforcement efforts and/or 
the Secret Service's protective mission. Disclosure of the accounting 
would also permit the individual who is the subject of a record to 
impede the investigation or inquiry, to tamper with witnesses or 
evidence, and to avoid detection or apprehension, which would undermine 
the entire investigative or inquiry process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, or protective inquiry to the existence of the 
investigation or inquiry, and reveal investigative interest on the part 
of DHS or another agency. Access to the records could permit the 
individual who is the subject of a record to impede the investigation or 
inquiry, to tamper with witnesses or evidence, and to avoid detection or 
apprehension. Amendment of the records could interfere with ongoing 
investigations and law enforcement or protective activities and/or could 
disclose security-sensitive information that could be detrimental to 
homeland security or the protective mission of the Secret Service.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law or protective inquiries, the accuracy of information 
obtained or introduced occasionally may be unclear or the information 
may not be strictly relevant or necessary to a specific investigation or 
protective inquiry. In the interests of effective

[[Page 79]]

law enforcement and/or the protective mission of the Secret Service, it 
is appropriate to retain all information that may aid in establishing 
patterns of unlawful activity, or a threat to an individual, location or 
event protected or secured by the Secret Service.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation or protective inquiry would alert the 
subject to the nature or existence of an investigation or inquiry, 
thereby interfering with the related investigation or inquiry and law 
enforcement or protective activities.
    (e) From subsection (e)(3) (Notice to Individuals Providing 
Information) because providing such detailed information would impede 
law enforcement or protective activities in that it could compromise 
investigations or inquiries by: Revealing the existence of an otherwise 
confidential investigation or inquiry and thereby provide an opportunity 
for the subject of an investigation or inquiry to conceal evidence, 
alter patterns of behavior, or take other actions that could thwart 
investigative or protective efforts; reveal the identity of witnesses in 
investigations or inquiries, thereby providing an opportunity for the 
subjects of the investigations or inquiries or others to harass, 
intimidate, or otherwise interfere with the collection of evidence or 
other information from such witnesses; or reveal the identity of 
confidential informants, which would negatively affect the informant's 
usefulness in any ongoing or future investigations or protective 
activities and discourage members of the public from cooperating as 
confidential informants in any future investigations or protective 
activities.
    (f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), 
and (f) (Agency Rules) because portions of this system are exempt from 
the individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to the existence of records pertaining to them 
in the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative or protective efforts and 
reveal the identities of witnesses, and potential witnesses, and 
confidential informants.
    (g) From subsection (e)(5) (Maintenance of Information Used in 
Making any Determination) because in the collection of information for 
law enforcement and protective purposes it is impossible to determine in 
advance what information is accurate, relevant, timely, and complete. 
Compliance with (e)(5) would preclude Secret Service agents from using 
their investigative and protective training, and exercising good 
judgment to both conduct and report on investigations or other 
protective activities.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, or could result in disclosure of investigative or 
protective techniques, procedures, and evidence.
    (i) From subsection (g) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act 
relating to individuals' rights to access and amend their records 
contained in the system. Therefore DHS is not required to establish 
rules or procedures pursuant to which individuals may seek a civil 
remedy for the agency's: Refusal to amend a record; refusal to comply 
with a request for access to records; failure to maintain accurate, 
relevant, timely and complete records; or failure to otherwise comply 
with an individual's right to access or amend records.
    37. The DHS/Secret Service--004 Protection Information system of 
records consists of electronic and paper records and will be used by DHS 
and its components. The DHS/Secret Service--004 Protection Information 
system is a repository of information held by DHS in connection with its 
several and varied missions and functions, including, but not limited 
to: the enforcement of civil and criminal laws; investigations, 
inquiries, and proceedings thereunder; and the protection of the 
President of the United States or other individuals and locations 
pursuant to Sections 3056 and 3056A of Title 18. The DHS/Secret 
Service--004 Protection Information system contains information that is 
collected by, on behalf of, in support of, or in cooperation with DHS 
and its components and may contain personally identifiable information 
collected by other Federal, State, local, Tribal, foreign, or 
international government agencies, as well as private corporate or other 
entities. The Secretary of Homeland Security has exempted this system 
from the following provisions of the Privacy Act, subject to the 
limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), 
(e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f), 
and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of 
Homeland Security has exempted this system from the following provisions 
of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 
552a (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) 
pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(3). Exemptions from 
these particular subsections are justified, on a case-by-case basis to 
be determined at the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the

[[Page 80]]

accounting of disclosures could alert the subject of an investigation of 
an actual or potential criminal, civil, or regulatory violation or a 
protective inquiry to the existence of the investigation or inquiry, and 
reveal investigative interest on the part of DHS as well as the 
recipient agency. Disclosure of the accounting would therefore present a 
serious impediment to law enforcement efforts and/or the Secret 
Service's protective mission. Disclosure of the accounting would also 
permit the individual who is the subject of a record to impede the 
investigation or inquiry, to tamper with witnesses or evidence, and to 
avoid detection or apprehension, which would undermine the entire 
investigative or inquiry process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, or protective inquiry to the existence of the 
investigation or inquiry, and reveal investigative interest on the part 
of DHS or another agency. Access to the records could permit the 
individual who is the subject of a record to impede the investigation, 
or inquiry to tamper with witnesses or evidence, and to avoid detection 
or apprehension. Amendment of the records could interfere with ongoing 
investigations, law enforcement or protective activities and/or could 
disclose security-sensitive information that could be detrimental to 
homeland security or the protective mission of the Secret Service.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law or protective inquiries, the accuracy of information 
obtained or introduced occasionally may be unclear or the information 
may not be strictly relevant or necessary to a specific investigation or 
protective inquiry. In the interests of effective law enforcement and/or 
the protective mission of the Secret Service, it is appropriate to 
retain all information that may aid in establishing patterns of unlawful 
activity, or a possible threat to an individual, location or event 
protected or secured by the Secret Service.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation or protective inquiry would alert the 
subject to the nature or existence of an investigation or inquiry, 
thereby interfering with the related investigation or inquiry and law 
enforcement or protective activities.
    (e) From subsection (e)(3) (Notice to Individuals Providing 
Information) because providing such detailed information would impede 
law enforcement or protective activities in that it could compromise 
investigations or inquiries by: Revealing the existence of an otherwise 
confidential investigation or inquiry and thereby provide an opportunity 
for the subject of an investigation or inquiry to conceal evidence, 
alter patterns of behavior, or take other actions that could thwart 
investigative or protective efforts; reveal the identity of witnesses, 
thereby providing an opportunity for the subjects of the investigations 
or inquiries or others to harass, intimidate, or otherwise interfere 
with the collection of evidence or other information from such 
witnesses; or reveal the identity of confidential informants, which 
would negatively affect the informant's usefulness in any ongoing or 
future investigations or protective activities and discourage members of 
the public from cooperating as confidential informants in any future 
investigations or protective activities.
    (f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), 
and (f) (Agency Rules) because portions of this system are exempt from 
the individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to the existence of records pertaining to them 
in the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative and protective efforts and 
reveal the identities of witnesses, and potential witnesses, and 
confidential informants.
    (g) From subsection (e)(5) (Maintenance of Information Used in 
Making any Determination) because in the collection of information for 
law enforcement and protective purposes it is impossible to determine in 
advance what information is accurate, relevant, timely, and complete. 
Compliance with (e)(5) would preclude Secret Service agents from using 
their investigative and protective training and exercising good judgment 
to both conduct and report on investigations or other protective 
activities.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, and could result in disclosure of investigative or 
protective techniques, procedures, and evidence.
    (i) From subsection (g) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act 
relating to individuals' rights to access and amend their records 
contained in the system. Therefore DHS is not required to establish 
rules or procedures pursuant to which individuals may seek a civil 
remedy for the agency's: refusal to amend a record; refusal to comply 
with a request for access to

[[Page 81]]

records; failure to maintain accurate, relevant, timely and complete 
records; or failure to otherwise comply with an individual's right to 
access or amend records.
    38. The DHS/ALL--025 Law Enforcement Authority in Support of the 
Protection of Property Owned or Occupied by the Department of Homeland 
Security system of records consists of electronic and paper records and 
will be used by DHS and its components. The DHS/ALL--025 Law Enforcement 
Authority in Support of the Protection of Property Owned or Occupied by 
the Department of Homeland Security system is a repository of 
information held by DHS in connection with its several and varied 
missions and functions, including, but not limited to: The enforcement 
of civil and criminal laws; investigations, inquiries, and proceedings 
there under; and national security and intelligence activities. The DHS/
ALL--025 Law Enforcement Authority in Support of the Protection of 
Property Owned or Occupied by the Department of Homeland Security system 
contains information that is collected by, on behalf of, in support of, 
or in cooperation with DHS and its components and may contain personally 
identifiable information collected by other Federal, State, local, 
tribal, foreign, or international government agencies. The Secretary of 
Homeland Security has exempted this system from the following provisions 
of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 
552a (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) 
pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5). Exemptions from 
these particular subsections are justified, on a case-by-case basis to 
be determined at the time a request is made, for the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements), and (f) (Agency Rules) because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    39. The DHS/ALL--017 General Legal Records system of records 
consists of electronic and paper records and will be used by DHS and its 
components. The DHS/ALL--017 General Legal Records system of records is 
a repository of information held by DHS in connection with its several 
and varied missions and functions, including, but not limited to: The 
enforcement of civil and criminal laws; investigations, inquiries, and 
proceedings thereunder; national security and intelligence activities; 
and protection of the President of the United States or other 
individuals pursuant to section 3056 and 3056A of Title 18. The DHS/
ALL--017 General Legal Records system of records contains information 
that is collected by, on behalf of, in support of, or in cooperation 
with DHS and its components and may contain personally identifiable 
information collected by other Federal, State, local, tribal, foreign, 
or international government agencies. The Secretary of Homeland Security 
has exempted this system from the following provisions of the Privacy 
Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and 
(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H),

[[Page 82]]

(e)(4)(I), (e)(5) and (e)(8); (f), and (g), pursuant to exemption 5 
U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has 
exempted this system from the following provisions of the Privacy Act, 
subject to the limitations set forth in 5 U.S.C. 552a (c)(3), (d), 
(e)(1), (e)(4)(G), (e)(4)(H), (I), and (f), pursuant to 5 U.S.C. 
552a(k)(1), (k)(2), (k)(3) and (k)(5). Exemptions from these particular 
subsections are justified, on a case-by-case basis to be determined at 
the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of an investigation, thereby interfering with the related 
investigation and law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise investigations by: Revealing the existence of an otherwise 
confidential investigation and thereby provide an opportunity for the 
subject of an investigation to conceal evidence, alter patterns of 
behavior, or take other actions that could thwart investigative efforts; 
reveal the identity of witnesses in investigations, thereby providing an 
opportunity for the subjects of the investigations or others to harass, 
intimidate, or otherwise interfere with the collection of evidence or 
other information from such witnesses; or reveal the identity of 
confidential informants, which would negatively affect the informant's 
usefulness in any ongoing or future investigations and discourage 
members of the public from cooperating as confidential informants in any 
future investigations.
    (f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), 
and (f) (Agency Rules) because portions of this system are exempt from 
the individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.
    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
DHS agents from using their investigative training and exercise of good 
judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act relating to individuals' 
rights to access and amend their records contained in the system. 
Therefore DHS is not required to establish rules or procedures pursuant 
to which individuals may

[[Page 83]]

seek a civil remedy for the agency's: Refusal to amend a record; refusal 
to comply with a request for access to records; failure to maintain 
accurate, relevant, timely and complete records; or failure to otherwise 
comply with an individual's right to access or amend records.
    40. The DHS/ALL--023 Personnel Security Management system of records 
consists of electronic and paper records and will be used by DHS and its 
components. The DHS/ALL--023 Personnel Security Management system is a 
repository of information held by DHS in connection with its several and 
varied missions and functions, including, but not limited to: The 
enforcement of civil and criminal laws; investigations, inquiries, and 
proceedings thereunder; national security and intelligence activities; 
and protection of the President of the United States or other 
individuals pursuant to section 3056 and 3056A of Title 18. The DHS/
ALL--023 Personnel Security Management system contains information that 
is collected by, on behalf of, in support of, or in cooperation with DHS 
and its components and may contain personally identifiable information 
collected by other Federal, State, local, tribal, foreign, or 
international government agencies. The Secretary of Homeland Security 
has exempted this system from the following provisions of the Privacy 
Act, subject to the limitations set forth in 5 U.S.C. 552a (c)(3), (d), 
(e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 
552a(k)(1), (k)(2), (k)(3), and (k)(5). Exemptions from these particular 
subsections are justified, on a case-by-case basis to be determined at 
the time a request is made, for the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), 
and (f) (Agency Rules) because portions of this system are exempt from 
the individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.
    41. The DHS/NPPD/US-VISIT--001 Arrival and Departure Information 
system of records notice is a system for the storage and use of 
biographic, biometric indicator, and encounter data consolidated from 
various systems regarding aliens who have applied for entry, entered, or 
departed the United States. Information in the DHS/NPPD/US-VISIT--001 
Arrival and Departure Information system of records notice is used 
primarily to facilitate the investigation of subjects of interest who 
may have violated their immigration status by remaining in the United 
States beyond their authorized stay; thereby supporting the several and 
varied missions and functions of DHS, including but not limited to: the 
enforcement of civil and criminal laws (including the immigration law); 
investigations, inquiries; national security and intelligence activities 
in support of the DHS mission to identify and prevent acts of terrorism 
against the United States. The information is collected by, on behalf 
of, in support of, or in cooperation with DHS and its components and may 
contain personally identifiable information collected by other Federal, 
State, local, tribal, foreign, or international government agencies. The 
Secretary of Homeland Security has exempted this system from

[[Page 84]]

the following provisions of the Privacy Act, subject to the limitations 
set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), 
(e)(4)(G), (e)(4)(H), (e)(5) and (e)(8); (f); and (g) pursuant to 5 
U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has 
exempted this system from the following provisions of the Privacy Act, 
subject to the limitations set forth in 5 U.S.C. 552a(c)(3); (d); 
(e)(1), (e)(4)(G), (e)(4)(H); and (f) pursuant to 5 U.S.C. 552a(k)(1), 
(k)(2), (k)(3) and (k)(5). Exemptions from these particular subsections 
are justified, on a case-by-case basis to be determined at the time a 
request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation; and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of an investigation, thereby interfering with the related 
investigation and law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise investigations by: revealing the existence of an otherwise 
confidential investigation and thereby provide an opportunity for the 
subject of an investigation to conceal evidence, alter patterns of 
behavior, or take other actions that could thwart investigative efforts; 
reveal the identities of witnesses in investigations, thereby providing 
an opportunity for the subjects of the investigations or others to 
harass, intimidate, or otherwise interfere with the collection of 
evidence or other information from such witnesses; or reveal the 
identity of confidential informants, which would negatively affect the 
informant's usefulness in any ongoing or future investigations and 
discourage members of the public from cooperating as confidential 
informants in any future investigations.
    (f) From subsections (e)(4)(G) and (H) (Agency Requirements), and 
(f) (Agency Requirements) because portions of this system are exempt 
from the individual access provisions of subsection (d) for the reasons 
noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
DHS agents from using their investigative training and exercise of good 
judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act 
relating to individuals' rights to access and

[[Page 85]]

amend their records contained in the system. Therefore DHS is not 
required to establish rules or procedures pursuant to which individuals 
may seek a civil remedy for the agency's: refusal to amend a record; 
refusal to comply with a request for access to records; failure to 
maintain accurate, relevant, timely and complete records; or failure to 
otherwise comply with an individual's right to access or amend records.
    42. The DHS/NPPD/US-VISIT--003 Technical Reconciliation Analysis 
Classification system of records (TRACS) consists of stand alone 
database and paper files that will be used by DHS and its components. 
This system of records will be used to perform a range of information 
management and analytic functions involving collecting, verifying, and 
resolving tracking of data primarily on individuals who are not United 
States citizens or legal permanent residents (LPRs). However, it will 
contain data on: (1.) U.S. citizens or LPRs who have a connection to the 
DHS mission (e.g., individuals who have submitted a visa application to 
the UK, or have made requests for a license or credential as part of a 
background check or security screening in connection with their hiring 
or retention, performance of a job function or the issuance of a license 
or credential for employment at DHS); (2.) U.S. citizens and LPRs who 
have an incidental connection to the DHS mission (e.g., individuals 
living at the same address as individuals who have remained in this 
country beyond their authorized stays); and (3.) individuals who have, 
over time, changed their status and became U.S. citizens or LPRs. The 
DHS/NPPD/US-VISIT--003 Technical Reconciliation Analysis Classification 
system of records is managed and maintained by the US-VISIT Program. The 
data contained in the DHS/NPPD/US-VISIT--003 Technical Reconciliation 
Analysis Classification system of records is primarily derived from DHS/
NPPD/U.S-VISIT--001 Arrival and Departure Information System (ADIS); 
DHS/CBP--011 TECS; DHS/ICE--001 Student and Exchange Visitor Information 
System (SEVIS); DHS/ICE/CBP/USCIS--001--03 Enforcement Operational 
Immigration Records (ENFORCE/IDENT); DHS/ICE--011 Removable Alien 
Records System (RARS); DHS/USCIS--001 Alien File (A-File) and Central 
Index System (CIS); DHS/USCIS--007 Benefits Information System covering 
Computer Linked Application Information Management System 3 (Claims 3) 
and Computer Linked Application Information Management System 4 (Claims 
4); DHS/USCIS Refugees, Asylum & Parole System (RAPS); and from the 
Department of State's Consolidated Consular Database (CCD). The DHS/
NPPD/US-VISIT--003 Technical Reconciliation Analysis Classification 
system of records also contains data from web searches for addresses and 
phone numbers. This data is collected by, on behalf of, in support of, 
or in cooperation with DHS and its components. The Secretary of Homeland 
Security has exempted this system from the following provisions of the 
Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) 
and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), 
(e)(5) and (e)(8); (f); and (g) pursuant to 5 U.S.C. 552a(j)(2). 
Additionally, the Secretary of Homeland Security has exempted this 
system from the following provisions of the Privacy Act, subject to the 
limitations set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), 
(e)(4)(H), (e)(4)(I); and (f) pursuant to 5 U.S.C. 552a(k)(1), (k)(2), 
and (k)(5). Exemptions from these particular subsections are justified, 
on a case-by-case basis to be determined at the time a request is made, 
for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain

[[Page 86]]

all information that may aid in establishing patterns of unlawful 
activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of an investigation, thereby interfering with the related 
investigation and law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise investigations by: revealing the existence of an otherwise 
confidential investigation and thereby provide an opportunity for the 
subject of an investigation to conceal evidence, alter patterns of 
behavior, or take other actions that could thwart investigative efforts; 
reveal the identity of witnesses in investigations, thereby providing an 
opportunity for the subjects of the investigations or others to harass, 
intimidate, or otherwise interfere with the collection of evidence or 
other information from such witnesses; or reveal the identity of 
confidential informants, which would negatively affect the informant's 
usefulness in any ongoing or future investigations and discourage 
members of the public from cooperating as confidential informants in any 
future investigations.
    (f) From subsections (e)(4)(G), and (e)(4)(H) (Agency Requirements) 
because portions of this system are exempt from the individual access 
provisions of subsection (d) which exempts providing access because it 
could alert a subject to the nature or existence of an investigation, 
and thus there could be no procedures for that particular data. 
Procedures do exist for access for those portions of the system that are 
not exempted.
    (g) From subsection (e)(4)(I) (Agency Requirements) because 
providing such source information would impede enforcement or 
intelligence by compromising the nature or existence of a confidential 
investigation.
    (h) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
DHS agents from using their investigative training and exercise of good 
judgment to both conduct and report on investigations.
    (i) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, and could result in disclosure of investigative 
techniques, procedures and evidence.
    (j) From subsection (f) (Agency Rules) because portions of this 
system are exempt from the access and amendment provisions of subsection 
(d).
    (k) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act.
    43. The DHS/USCG--013 Marine Information for Safety and Law 
Enforcement system of records consists of electronic and paper records 
and will be used by DHS and its components. The DHS/USCG--013 Marine 
Information for Safety and Law Enforcement system of records is a 
repository of information held by DHS in connection with its several and 
varied missions and functions, including, but not limited to: the 
enforcement of civil and criminal laws; investigations, inquiries, and 
proceedings there under; national security and intelligence activities. 
The DHS/USCG--013 Marine Information for Safety and Law Enforcement 
system of records contains information that is collected by, on behalf 
of, in support of, or in cooperation with DHS and its components and may 
contain personally identifiable information collected by other Federal, 
State, local, tribal, foreign, or international government agencies. The 
Secretary of Homeland Security has exempted this system from the 
following provisions of the Privacy Act, subject to the limitations set 
forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), 
(e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f); and (g) 
pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland 
Security has exempted this system from the following provisions of the 
Privacy Act, subject to the limitations set forth in 5 U.S.C. 
552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H); (I); and (f) pursuant to 
5 U.S.C. 552a(k)(2). Exemptions from these particular subsections are 
justified, on a case-by-case basis to be determined at the time a 
request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part

[[Page 87]]

of DHS or another agency. Access to the records could permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension. Amendment of the records could interfere with ongoing 
investigations and law enforcement activities and would impose an 
impossible administrative burden by requiring investigations to be 
continuously reinvestigated. In addition, permitting access and 
amendment to such information could disclose security-sensitive 
information that could be detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of an investigation, thereby interfering with the related 
investigation and law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise investigations by: revealing the existence of an otherwise 
confidential investigation and thereby provide an opportunity for the 
subject of an investigation to conceal evidence, alter patterns of 
behavior, or take other actions that could thwart investigative efforts; 
reveal the identity of witnesses in investigations, thereby providing an 
opportunity for the subjects of the investigations or others to harass, 
intimidate, or otherwise interfere with the collection of evidence or 
other information from such witnesses; or reveal the identity of 
confidential informants, which would negatively affect the informant's 
usefulness in any ongoing or future investigations and discourage 
members of the public from cooperating as confidential informants in any 
future investigations.
    (f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), 
and (f) (Agency Rules) because portions of this system are exempt from 
the individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.
    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
DHS agents from using their investigative training and exercise of good 
judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act relating to individuals' 
rights to access and amend their records contained in the system. 
Therefore DHS is not required to establish rules or procedures pursuant 
to which individuals may seek a civil remedy for the agency's: refusal 
to amend a record; refusal to comply with a request for access to 
records; failure to maintain accurate, relevant timely and complete 
records; or failure to otherwise comply with an individual's right to 
access or amend records.
    44. The DHS/USCG--030 Merchant Seaman's Records system of records 
consists of electronic and paper records and will be used by DHS and its 
components. The DHS/USCG--030 Merchant Seaman's Records system of 
records is a repository of information held by DHS in connection with 
its several and varied missions and functions, including, but not 
limited to: the enforcement of civil and criminal laws; investigations, 
inquiries, and proceedings there under. The DHS/USCG--030 Merchant 
Seaman's Records system of records contains information that is 
collected by, on behalf of, in support of, or in cooperation with DHS 
and its components and may contain personally identifiable information 
collected by other Federal, State, local, tribal, foreign, or 
international government agencies. The Secretary of Homeland Security 
has exempted this system from the following provisions of the Privacy 
Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3); (d); 
(e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) pursuant to 5 U.S.C. 
552a(k)(2). Exemptions from these particular subsections are justified, 
on a case-by-case basis to be determined at the time a request is made, 
for the following reasons:

[[Page 88]]

    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements), and (f) (Agency Rules) because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    45. The DHS/CBP--006 Automated Targeting system of records performs 
screening of both inbound and outbound cargo, travelers, and 
conveyances. As part of this screening function and to facilitate DHS's 
border enforcement mission, the DHS/CBP--006 Automated Targeting system 
of records compares information received with CBP's law enforcement 
databases, the Federal Bureau of Investigation Terrorist Screening 
Center's Terrorist Screening Database (TSDB), information on outstanding 
wants or warrants, information from other government agencies regarding 
high-risk parties, and risk-based rules developed by analysts using law 
enforcement data, intelligence, and past case experience. The modules 
also facilitate analysis of the screening results of these comparisons. 
This supports the several and varied missions and functions of DHS, 
including but not limited to: The enforcement of civil and criminal laws 
(including the immigration law); investigations, inquiries; national 
security and intelligence activities in support of the DHS mission to 
identify and prevent acts of terrorism against the United States. The 
information is collected by, on behalf of, in support of, or in 
cooperation with DHS and its components and may contain personally 
identifiable information collected by other Federal, State, local, 
tribal, foreign, or international government agencies. Certain records 
or information in DHS/CBP--006 Automated Targeting system of records are 
exempt from the Privacy Act. With respect to the ATS-P module, exempt 
records are the targeting rule sets, risk assessment analyses, and 
business confidential information contained in the PNR that relates to 
the air and vessel carriers. No exemption shall be asserted regarding 
PNR data about the requester, provided by either the requester or a 
booking agent, brokers, or another person on the requester's behalf. 
This information, upon request, may be provided to the requester in the 
form in which it was collected from the respective carrier, but may not 
include certain business confidential information of the air carrier 
that is also contained in the record, such as use and application of 
frequent flier miles, internal annotations to the air fare, etc. For 
other DHS/CBP--006 Automated Targeting system of records modules the 
only information maintained in the system is the targeting rule sets, 
risk assessment analyses, and a pointer to the data from the source 
system of records. The Secretary of Homeland Security has exempted this 
system from the following provisions of the Privacy Act, subject to the 
limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d)(1), (2), (3), 
and (4); (e)(1), (2), (3), (4)(G) through (I), (e)(5), and (8); (f); and 
(g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary

[[Page 89]]

of Homeland Security has exempted this system from the following 
provisions of the Privacy Act, subject to the limitations set forth in 5 
U.S.C. 552a(c)(3) and (4); (d)(1), (2), (3), and (4); (e)(1), (2), (3), 
(4)(G) through (I), (e)(5), and (8); (f); and (g) pursuant to 5 U.S.C. 
552a(k)(2). These exemptions also apply to the extent that information 
in this system of records is recompiled or is created from information 
contained in other systems of records. After conferring with the 
appropriate component or agency, DHS may waive applicable exemptions in 
appropriate circumstances and where it would not appear to interfere 
with or adversely affect the law enforcement purposes of the systems 
from which the information is recompiled or in which it is contained. 
Exemptions from these particular subsections are justified, on a case-
by-case basis to be determined at the time a request is made, for the 
following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosure) 
because making available to a record subject the accounting of 
disclosures from records concerning him or her would specifically reveal 
any investigative interest in the individual. Revealing this information 
could reasonably be expected to compromise ongoing efforts to 
investigate a known or suspected criminal or terrorist, or other person 
of interest, by notifying the record subject that he or she is under 
investigation. This information could also permit the record subject to 
take measures to impede the investigation, e.g., destroy evidence, 
intimidate potential witnesses, or flee the area to avoid or impede the 
investigation. Exemptions from these particular subsections are 
justified, on a case-by-case basis to be determined at the time a 
request is made, for the following reasons: (a) From subsection (c)(3) 
(Accounting for Disclosure) because making available to a record subject 
the accounting of disclosures from records concerning him or her would 
specifically reveal any investigative interest in the individual. 
Revealing this information could reasonably be expected to compromise 
ongoing efforts to investigate a known or suspected terrorist by 
notifying the record subject that he or she is under investigation. This 
information could also permit the record subject to take measures to 
impede the investigation, e.g., destroy evidence, intimidate potential 
witnesses, or flee the area to avoid or impede the investigation.
    (b) From subsection (c)(4) (Accounting for Disclosure, notice of 
dispute) because certain records in this system are exempt from the 
access and amendment provisions of subsection (d), this requirement to 
inform any person or other agency about any correction or notation of 
dispute that the agency made with regard to those records, should not 
apply.
    (c) From subsections (d)(1), (2), (3), and (4) (Access to Records) 
because these provisions concern individual access to and amendment of 
certain records contained in this system, including law enforcement, 
counterterrorism, and investigatory records. Compliance with these 
provisions could alert the subject of an investigation to the fact and 
nature of the investigation, and/or the investigative interest of 
intelligence or law enforcement agencies; compromise sensitive 
information related to law enforcement, including matters bearing on 
national security; interfere with the overall law enforcement process by 
leading to the destruction of evidence, improper influencing of 
witnesses, fabrication of testimony, and/or flight of the subject; could 
identify a confidential source; reveal a sensitive investigative or 
intelligence technique; or constitute a potential danger to the health 
or safety of law enforcement personnel, confidential informants, and 
witnesses. Amendment of these records would interfere with ongoing 
counterterrorism or law enforcement investigations and analysis 
activities and impose an impossible administrative burden by requiring 
investigations, analyses, and reports to be continuously reinvestigated 
and revised.
    (d) From subsection (e)(1) (Relevancy and Necessity of Information) 
because it is not always possible for DHS or other agencies to know in 
advance what information is relevant and necessary for it to complete 
screening of cargo, conveyances, and passengers. Information relating to 
known or suspected criminals or terrorists or other persons of interest, 
is not always collected in a manner that permits immediate verification 
or determination of relevancy to a DHS purpose. For example, during the 
early stages of an investigation, it may not be possible to determine 
the immediate relevancy of information that is collected--only upon 
later evaluation or association with further information, obtained 
subsequently, may it be possible to establish particular relevance to a 
law enforcement program. Lastly, this exemption is required because DHS 
and other agencies may not always know what information about an 
encounter with a known or suspected criminal or terrorist or other 
person of interest will be relevant to law enforcement for the purpose 
of conducting an operational response.
    (e) From subsection (e)(2) (Collection of Information from 
Individuals) because application of this provision could present a 
serious impediment to counterterrorism or other law enforcement efforts 
in that it would put the subject of an investigation, study or analysis 
on notice of that fact, thereby permitting the subject to engage in 
conduct designed to frustrate or impede that activity. The nature of 
counterterrorism, and law enforcement investigations is such that vital 
information about an individual frequently

[[Page 90]]

can be obtained only from other persons who are familiar with such 
individual and his/her activities. In such investigations it is not 
feasible to rely solely upon information furnished by the individual 
concerning his own activities.
    (f) From subsection (e)(3) (Notice to Subjects), to the extent that 
this subsection is interpreted to require DHS to provide notice to an 
individual if DHS or another agency receives or collects information 
about that individual during an investigation or from a third party. 
Should the subsection be so interpreted, exemption from this provision 
is necessary to avoid impeding counterterrorism or other law enforcement 
efforts by putting the subject of an investigation, study or analysis on 
notice of that fact, thereby permitting the subject to engage in conduct 
intended to frustrate or impede that activity.
    (g) From subsections (e)(4)(G), (H) and (I) (Agency Requirements) 
because portions of this system are exempt from the access and amendment 
provisions of subsection (d).
    (h) From subsection (e)(5) (Collection of Information) because many 
of the records in this system coming from other systems of records are 
derived from other domestic and foreign agency record systems and 
therefore it is not possible for DHS to vouch for their compliance with 
this provision; however, the DHS has implemented internal quality 
assurance procedures to ensure that data used in its screening processes 
is as complete, accurate, and current as possible. In addition, in the 
collection of information for law enforcement and counterterrorism 
purposes, it is impossible to determine in advance what information is 
accurate, relevant, timely, and complete. With the passage of time, 
seemingly irrelevant or untimely information may acquire new 
significance as further investigation brings new details to light. The 
restrictions imposed by (e)(5) would limit the ability of those 
agencies' trained investigators and intelligence analysts to exercise 
their judgment in conducting investigations and impede the development 
of intelligence necessary for effective law enforcement and 
counterterrorism efforts.
    (i) From subsection (e)(8) (Notice on Individuals) because to 
require individual notice of disclosure of information due to compulsory 
legal process would pose an impossible administrative burden on DHS and 
other agencies and could alert the subjects of counterterrorism or law 
enforcement investigations to the fact of those investigations when not 
previously known.
    (j) From subsection (f) (Agency Rules) because portions of this 
system are exempt from the access and amendment provisions of subsection 
(d). Access to, and amendment of, system records that are not exempt or 
for which exemption is waived may be obtained under procedures described 
in the related SORN or subpart B of this part.
    (k) From subsection (g) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    46. The DHS/CBP-007 Border Crossing Information System of Records 
consists of electronic and paper records and will be used by DHS and its 
Components. The DHS/CBP-007 Border Crossing Information System of 
Records is a repository of information held by DHS in connection with 
its several and varied missions and functions including, but not limited 
to the enforcement of civil and criminal laws; investigations, 
inquiries, and proceedings thereunder; and law enforcement, border 
security, and intelligence activities. The DHS/CBP-007 Border Crossing 
Information System of Records contains information that is collected by, 
on behalf of, in support of, or in cooperation with DHS and its 
Components and may contain personally identifiable information collected 
by other Federal, State, local, tribal, foreign, or international 
government agencies. At the time of border crossing and during the 
process of determining admissibility, CBP collects two types of data for 
which it claims different exemptions.
    (a) CBP will not assert any exemption to limit an individual from 
accessing or amending his or her record with respect to information 
maintained in the system that is collected from a person at the time of 
crossing and submitted by that person's air, sea, bus, or rail carriers. 
The Privacy Act requires DHS to maintain an accounting of the 
disclosures made pursuant to all routine uses. Pursuant to 5 U.S.C. 
552a(j)(2), CBP will not disclose the fact that a law enforcement or 
intelligence agency has sought particular records because it may affect 
ongoing law enforcement activities. The Secretary of Homeland Security 
has exempted this system from subsections (c)(3), (e)(8), and (g) of the 
Privacy Act of 1974, as amended, as is necessary and appropriate to 
protect this information. Further, DHS will claim exemption from 
subsection (c)(3) of the Privacy Act of 1974, as amended, pursuant to 5 
U.S.C. 552a(k)(2) as is necessary and appropriate to protect this 
information. Exemptions from these particular subsections are justified, 
on a case-by-case basis to be determined at the time a request is made, 
for the following reasons:
    (i) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security.

[[Page 91]]

Disclosure of the accounting would also permit the individual who is the 
subject of a record to impede the investigation, to tamper with 
witnesses or evidence, and to avoid detection or apprehension, which 
would undermine the entire investigative process.
    (ii) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (iii) From subsection (g) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    (b) Additionally, this system contains records or information 
recompiled from or created from information contained in other systems 
of records that are exempt from certain provisions of the Privacy Act. 
For these records or information only, the Secretary of Homeland 
Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from 
the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3), 
(c)(4); (d)(1)-(4); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), 
(e)(4)(I), (e)(5) and (e)(8); (f); and (g). Additionally, the Secretary 
of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2), has exempted this 
system from the following provisions of the Privacy Act, 5 U.S.C. 
552a(c)(3); (d)(1)-(4); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and 
(f). Exemptions from these particular subsections are justified, on a 
case-by-case basis to be determined at the time a request is made, for 
the following reasons:
    (i) From subsection (c)(3) and (c)(4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (ii) From subsection (d) (Access to Records) because access to the 
6records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, and to avoid detection or apprehension. 
Amendment of the records could interfere with ongoing investigations and 
law enforcement activities and would impose an unreasonable 
administrative burden by requiring investigations to be continually 
reinvestigated. In addition, permitting access and amendment to such 
information could disclose security-sensitive information that could be 
detrimental to homeland security.
    (iii) From subsection (e)(1) (Relevancy and Necessity of 
Information) because in the course of investigations into potential 
violations of federal law, the accuracy of information obtained or 
introduced occasionally may be unclear, or the information may not be 
strictly relevant or necessary to a specific investigation. In the 
interests of effective law enforcement, it is appropriate to retain all 
information that may aid in establishing patterns of unlawful activity.
    (iv) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (v) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (vi) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, potential witnesses, and 
confidential informants.
    (vii) From subsection (e)(5) (Collection of Information) because 
with the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with subsection (e)(5) would 
preclude DHS agents from using their investigative training and exercise 
of good judgment to both conduct and report on investigations.
    (viii) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of

[[Page 92]]

investigative techniques, procedures, and evidence.
    (ix) From subsection (g) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    47. The Visa Security Program Records (VSPR) system of records 
consists of electronic and paper records and will be used by the 
Department of Homeland Security (DHS) U.S. Immigration and Customs 
Enforcement (ICE). VSPR consists of information created in support of 
the Visa Security Program, the purpose of which is to identify persons 
who may be ineligible for a U.S. visa because of criminal history, 
terrorism association, or other factors and convey that information to 
the State Department, which decides whether to issue the visa. VSPR 
contains records on visa applicants for whom a visa security review is 
conducted. VSPR contains information that is collected by, on behalf of, 
in support of, or in cooperation with DHS and its components and may 
contain personally identifiable information collected by other Federal, 
State, local, Tribal, foreign, or international government agencies. 
Pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act, portions 
of this system are exempt from 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), 
(e)(2), (e)(3), (e)(4)(G), and (e)(4)(H), (e)(5) and (e)(8); (f); and 
(g). Pursuant to 5 U.S.C. 552a(k)(1) and (k)(2), this system is exempt 
from the following provisions of the Privacy Act, subject to the 
limitations set forth in those subsections: 5 U.S.C. 552a(c)(3), (d), 
(e)(1), (e)(4)(G), (e)(4)(H), and (f). Exemptions from these particular 
subsections are justified, on a case-by-case basis to be determined at 
the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the 
individual to the existence of an investigation in the form of a visa 
security review predicated on classified, national security, law 
enforcement, foreign government, or other sensitive information. 
Disclosure of the accounting would therefore present a serious 
impediment to ICE's Visa Security Program, immigration enforcement 
efforts and/or efforts to preserve national security. Disclosure of the 
accounting would also permit the individual who is the subject of a 
record to impede the investigation, thereby undermining the entire 
investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could alert the individual 
to the existence of an investigation in the form of a visa security 
review predicated on classified, national security, law enforcement, 
foreign government, or other sensitive information. Revealing the 
existence of an otherwise confidential investigation could also provide 
the visa applicant an opportunity to conceal adverse information or take 
other actions that could thwart investigative efforts; and reveal the 
identity of other individuals with information pertinent to the visa 
security review, thereby providing an opportunity for the applicant to 
interfere with the collection of adverse or other relevant information 
from such individuals. Access to the records would therefore present a 
serious impediment to the enforcement of Federal immigration laws, law 
enforcement efforts and/or efforts to preserve national security. 
Amendment of the records could interfere with ICE's ongoing 
investigations and law enforcement activities and would impose an 
impossible administrative burden by requiring investigations to be 
continuously reinvestigated. In addition, permitting access and 
amendment to such information could disclose classified and other 
security-sensitive information that could be detrimental to national or 
homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations of visa applications, the 
accuracy of information obtained or introduced occasionally may be 
unclear or the information may not be strictly relevant or necessary to 
a specific investigation. In the interest of effective enforcement of 
Federal immigration laws, it is appropriate to retain all information 
that may be relevant to the determination whether an individual is 
eligible for a U.S. visa.
    (d) From subsection (e)(2) (Collection of Information From 
Individuals) because requiring that information be collected from the 
visa applicant would alert the subject to the fact of an investigation 
in the form of a visa security review, and to the existence of adverse 
information about the individual, thereby interfering with the related 
investigation and law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede immigration enforcement 
activities in that it could compromise investigations by: Revealing the 
existence of an otherwise confidential investigation and thereby provide 
an opportunity for the visa applicant to conceal adverse information, or 
take other actions that could thwart investigative efforts; Reveal the 
identity of other individuals with information pertinent to the visa 
security review, thereby providing an opportunity for the applicant to 
interfere with the collection of adverse or other relevant information 
from such individuals; or reveal the identity of confidential 
informants, which would negatively affect the informant's usefulness in 
any ongoing or future investigations and discourage members of the 
public from cooperating as confidential informants in any future 
investigations.
    (f) From subsections (e)(4)(G) and (H) (Agency Requirements), and 
(f) (Agency Rules) because portions of this system are

[[Page 93]]

exempt from the individual access provisions of subsection (d) for the 
reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative and 
immigration enforcement efforts as described above.
    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
DHS agents from using their investigative training and exercise of good 
judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) because to require individual notice of 
disclosure of information due to compulsory legal process would pose an 
impossible administrative burden on DHS and other agencies and could 
alert the subjects of counterterrorism, law enforcement, or intelligence 
investigations to the fact of those investigations when not previously 
known.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act relating to individuals' 
rights to access and amend their records contained in the system. 
Therefore DHS is not required to establish rules or procedures pursuant 
to which individuals may seek a civil remedy for the agency's: Refusal 
to amend a record; refusal to comply with a request for access to 
records; failure to maintain accurate, relevant, timely and complete 
records; or failure to otherwise comply with an individual's right to 
access or amend records.
    48. The DHS/ICE-011 Immigration and Enforcement Operational Records 
system of records consists of electronic and paper records and will be 
used by DHS and its components. The DHS/ICE-011 Immigration and 
Enforcement Operational Records system of records is a repository of 
information held by DHS in connection with its several and varied 
missions and functions, including, but not limited to: The enforcement 
of civil and criminal laws; investigations, inquiries, and proceedings 
there under; and national security and intelligence activities. The DHS/
ICE-011 Immigration and Enforcement Operational Records system of 
records contains information that is collected by, on behalf of, in 
support of, or in cooperation with DHS and its components and may 
contain personally identifiable information collected by other federal, 
state, local, tribal, foreign, or international government agencies. The 
Secretary of Homeland Security has exempted this system from the 
following provisions of the Privacy Act, subject to the limitations set 
forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), 
(e)(4)(G), (e)(4)(H), (e)(5), and (e)(8); (f); and (g) pursuant to 5 
U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has 
exempted this system from the following provisions of the Privacy Act, 
subject to the limitations set forth in 5 U.S.C. 552a(c)(3); (d); 
(e)(1), (e)(4)(G), (e)(4)(H); and (f) pursuant to 5 U.S.C. 552a(k)(2). 
Exemptions from these particular subsections are justified, on a case-
by-case basis to be determined at the time a request is made, for the 
following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.

[[Page 94]]

    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of an investigation, thereby interfering with the related 
investigation and law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise investigations by: Revealing the existence of an otherwise 
confidential investigation and thereby provide an opportunity for the 
subject of an investigation to conceal evidence, alter patterns of 
behavior, or take other actions that could thwart investigative efforts; 
reveal the identity of witnesses in investigations, thereby providing an 
opportunity for the subjects of the investigations or others to harass, 
intimidate, or otherwise interfere with the collection of evidence or 
other information from such witnesses; or reveal the identity of 
confidential informants, which would negatively affect the informant's 
usefulness in any ongoing or future investigations and discourage 
members of the public from cooperating as confidential informants in any 
future investigations.
    (f) From subsections (e)(4)(G) and (H) (Agency Requirements), and 
(f) (Agency Rules) because portions of this system are exempt from the 
individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.
    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
DHS agents from using their investigative training and exercise of good 
judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act relating to individuals' 
rights to access and amend their records contained in the system. 
Therefore DHS is not required to establish rules or procedures pursuant 
to which individuals may seek a civil remedy for the agency's: Refusal 
to amend a record; refusal to comply with a request for access to 
records; failure to maintain accurate, relevant timely and complete 
records; or failure to otherwise comply with an individual's right to 
access or amend records.
    49. The DHS/USCIS--009 Compliance Tracking and Management System of 
Records consists of electronic and paper files that will be used by DHS 
and its components. This system of records will be used to perform a 
range of information management and analytic functions involving 
minimizing misuse, abuse, discrimination, breach of privacy, and 
fraudulent use of SAVE and E-Verify. The Secretary of Homeland Security 
has exempted this system from the following provisions of the Privacy 
Act, subject to the limitation set forth in 5 U.S.C. 552a(c)(3), (d), 
(e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 
552a(k)(2). Exemptions from these particular subsections are justified, 
on a case-by-case basis to be determined at the time a request is made, 
for the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could

[[Page 95]]

disclose security-sensitive information that could be detrimental to 
homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interest of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), 
and (f) (Agency Rules) because portions of this system are exempt from 
the individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.
    50. The Immigration and Customs Enforcement (ICE)--006 Intelligence 
Records System (IIRS) consists of electronic and paper records and will 
be used by the Department of Homeland Security (DHS). IIRS is a 
repository of information held by DHS in connection with its several and 
varied missions and functions, including, but not limited to: the 
enforcement of civil and criminal laws; investigations, inquiries, and 
proceedings thereunder; and national security and intelligence 
activities. IIRS contains information that is collected by other federal 
and foreign government agencies and may contain personally identifiable 
information. Pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy 
Act, portions of this system are exempt from 5 U.S.C. 552a(c)(3) and 
(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and 
(e)(8); (f), and (g). Pursuant to 5 U.S.C. 552a(k)(2), this system is 
exempt from the following provisions of the Privacy Act, subject to the 
limitations set forth in those subsections: 5 U.S.C. 552a(c)(3), (d), 
(e)(1), (e)(4)(G), (e)(4)(H), and (f). Exemptions from these particular 
subsections are justified, on a case-by-case basis to be determined at 
the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of an investigation, thereby interfering with the related 
investigation and law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise investigations by: revealing the existence of an otherwise 
confidential investigation and thereby provide an opportunity for the 
subject of an investigation to conceal evidence, alter patterns of 
behavior, or take other actions that could thwart investigative efforts; 
reveal the identity of witnesses in investigations, thereby providing an 
opportunity for the subjects of the investigations or others to harass, 
intimidate, or otherwise interfere with the collection of evidence or 
other information from such witnesses; or reveal the identity of

[[Page 96]]

confidential informants, which would negatively affect the informant's 
usefulness in any ongoing or future investigations and discourage 
members of the public from cooperating as confidential informants in any 
future investigations.
    (f) From subsections (e)(4)(G) and (H) (Agency Requirements), and 
(f) (Agency Rules) because portions of this system are exempt from the 
individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.
    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
DHS agents from using their investigative training and exercise of good 
judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act relating to individuals' 
rights to access and amend their records contained in the system. 
Therefore DHS is not required to establish rules or procedures pursuant 
to which individuals may seek a civil remedy for the agency's: refusal 
to amend a record; refusal to comply with a request for access to 
records; failure to maintain accurate, relevant timely and complete 
records; or failure to otherwise comply with an individual's right to 
access or amend records.
    51. The DHS/ALL--027 The History of the Department of Homeland 
Security System of Records consists of electronic and paper records and 
will be used by DHS and its components. The DHS/ALL--027 The History of 
the Department of Homeland Security System of Records is a repository of 
information held by DHS in connection with its several and varied 
missions and functions, including, but not limited to the enforcement of 
civil and criminal laws; investigations, inquiries, and proceedings 
thereunder; national security and intelligence activities; and 
protection of the President of the United States or other individuals 
pursuant to section 3056 and 3056A of Title 18. The DHS/ALL--027 The 
History of the Department of Homeland Security System of Records contain 
information that is collected by, on behalf of, in support of, or in 
cooperation with DHS and its components and may contain personally 
identifiable information collected by other federal, state, local, 
tribal, foreign, or international government agencies. The Secretary of 
Homeland Security has exempted this system from the following provisions 
of the Privacy Act, subject to limitations set forth in 5 U.S.C. 
552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), 
(e)(4)(I), (e)(5), (e)(8), (e)(12); (f); (g)(1); and (h) pursuant to 5 
U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has 
exempted this system from the following provisions of the Privacy Act, 
subject to limitations set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), 
(e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) pursuant to 5 U.S.C. 
552a(k)(1), (k)(2), (k)(3), and (k)(5). Exemptions from these particular 
subsections are justified, on a case-by-case basis to be determined at 
the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an unreasonable administrative burden by requiring 
investigations to be continually reinvestigated. In addition, permitting 
access and amendment to such information could

[[Page 97]]

disclose security-sensitive information that could be detrimental to 
homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    (g) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with subsection (e)(5) would 
preclude DHS agents from using their investigative training and exercise 
of good judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (e)(12) (Computer Matching) if the agency is a 
recipient agency or a source agency in a matching program with a non-
Federal agency, with respect to any establishment or revision of a 
matching program, at least 30 days prior to conducting such program, 
publish in the Federal Register notice of such establishment or 
revision.
    (j) From subsection (g)(1) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    (k) From subsection (h) (Legal Guardians) the parent of any minor, 
or the legal guardian of any individual who has been declared to be 
incompetent due to physical or mental incapacity or age by a court of 
competent jurisdiction, may act on behalf of the individual.
    52. The DHS/ALL--031 ISE SAR Initiative System of Records consists 
of electronic records and will be used by DHS and its components. The 
DHS/ALL--031 ISE SAR Initiative System of Records is a repository of 
information held by DHS in connection with its several and varied 
missions and functions, including, but not limited to the enforcement of 
civil and criminal laws; investigations, inquiries, and proceedings 
there under; national security and intelligence activities; and 
protection of the President of the U.S. or other individuals pursuant to 
Section 3056 and 3056A of Title 18. The DHS/ALL--031 ISE SAR Initiative 
System of Records contains information that is collected by, on behalf 
of, in support of, or in cooperation with DHS, its components, as well 
as other federal, state, local, tribal, or foreign agencies or private 
sector organization and may contain personally identifiable information 
collected by other federal, state, local, tribal, foreign, or 
international government agencies. The Secretary of Homeland Security 
has exempted this system from the following provisions of the Privacy 
Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and 
(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), 
(e)(5), (e)(8), and (e)(12); (f); (g)(1); and (h) of the Privacy Act 
pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland 
Security has exempted this system from the following provisions of the 
Privacy Act, subject to the limitation set forth in 5 U.S.C. 552a(c)(3); 
(d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) of the Privacy Act 
pursuant to 5 U.S.C. 552a(k)(2) and (k)(3). Exemptions from these 
particular subsections are justified, on a case-by-case basis to be 
determined at the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (c)(4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore

[[Page 98]]

present a serious impediment to law enforcement efforts and/or efforts 
to preserve national security. Disclosure of the accounting would also 
permit the individual who is the subject of a record to impede the 
investigation, to tamper with witnesses or evidence, and to avoid 
detection or apprehension, which would undermine the entire 
investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an unreasonable administrative burden by requiring 
investigations to be continually reinvestigated. In addition, permitting 
access and amendment to such information could disclose security-
sensitive information that could be detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    (g) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with subsection (e)(5) would 
preclude DHS agents from using their investigative training and exercise 
of good judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (e)(12) (Computer Matching) if the agency is a 
recipient agency or a source agency in a matching program with a non-
Federal agency, with respect to any establishment or revision of a 
matching program, at least 30 days prior to conducting such program, 
publish in the Federal Register notice of such establishment or 
revision.
    (j) From subsection (g)(1) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    (k) From subsection (h) (Legal Guardians) the parent of any minor, 
or the legal guardian of any individual who has been declared to be 
incompetent due to physical or mental incapacity or age by a court of 
competent jurisdiction, may act on behalf of the individual.
    53. The DHS/USCIS-012 CIDR System of Records consists of electronic 
and paper records and will be used by DHS and its components. The DHS/
USCIS-012 CIDR System of Records is a repository of information held by 
DHS in connection with its several and varied missions and functions, 
including, but not limited to the enforcement of civil and criminal 
laws; investigations, inquiries, and proceedings thereunder; national 
security and intelligence activities; and protection of the President of 
the U.S. or other individuals pursuant to Section 3056 and 3056A of 
Title 18. The DHS/USCIS-012 CIDR System of Records contains information 
that is collected by, on behalf of, in support of, or in cooperation 
with DHS and its components and may contain PII collected by other 
federal, state, local, tribal, foreign, or international government 
agencies. The Secretary of Homeland Security has exempted this system 
from the following provisions of the Privacy Act, subject to limitations 
set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), 
(e)(4)(I); and (f) pursuant

[[Page 99]]

to 5 U.S.C. 552a (k)(1) and (k)(2). Exemptions from these particular 
subsections are justified, on a case-by-case basis to be determined at 
the time a request is made, for the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting could also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an impossible administrative burden by requiring 
investigations to be continuously reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements), and (f) (Agency Rules) because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    54. The DHS/USCG--008 Courts Martial Case Files System of Records 
consists of electronic and paper records and will be used by DHS/USCG. 
The DHS/USCG--008 Courts Martial Case Files System of Records is a 
repository of information held by DHS/USCG in connection with its 
several and varied missions and functions, including, but not limited 
to: the enforcement of civil and criminal laws; investigations, 
inquiries, and proceedings thereunder; and national security and 
intelligence activities. The DHS/USCG--008 Courts Martial Case Files 
System of Records contains information that is collected by, on behalf 
of, in support of, or in cooperation with DHS/USCG and may contain 
personally identifiable information collected by other federal, state, 
local, tribal, foreign, or international government agencies. The 
Secretary of Homeland Security has exempted this system from the 
following provisions of the Privacy Act, subject to the limitations set 
forth in 5 U.S.C. 552a(c)(3) and (c)(4); (d); (e)(1), (e)(2), (e)(3), 
(e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f); and (g) 
pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland 
Security has exempted this system from the following provisions of the 
Privacy Act, subject to the limitations set forth in 5 U.S.C. 
552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) 
pursuant to 5 U.S.C. 552a(k)(1) and (k)(2). Exemptions from these 
particular subsections are justified, on a case-by-case basis to be 
determined at the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (c)(4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of the investigation, and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation, to the existence of the investigation, and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is

[[Page 100]]

the subject of a record to impede the investigation, to tamper with 
witnesses or evidence, and to avoid detection or apprehension. Amendment 
of the records could interfere with ongoing investigations and law 
enforcement activities and would impose an impossible administrative 
burden by requiring investigations to be continuously reinvestigated. In 
addition, permitting access and amendment to such information could 
disclose security-sensitive information that could be detrimental to 
homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of an investigation, thereby interfering with the related 
investigation and law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information would impede law enforcement in that it could 
compromise investigations by revealing the existence of an otherwise 
confidential investigation and thereby provide an opportunity for the 
subject of an investigation to conceal evidence, alter patterns of 
behavior, or take other actions that could thwart investigative efforts; 
reveal the identity of witnesses in investigations, thereby providing an 
opportunity for the subjects of the investigations or others to harass, 
intimidate, or otherwise interfere with the collection of evidence or 
other information from such witnesses; or reveal the identity of 
confidential informants, which would negatively affect the informant's 
usefulness in any ongoing or future investigations and discourage 
members of the public from cooperating as confidential informants in any 
future investigations.
    (f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements), and (f) (Agency Rules) because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    (g) From subsection (e)(5) (Collection of Information) because in 
the collection of information for law enforcement purposes it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with (e)(5) would preclude 
DHS agents from using their investigative training and exercise of good 
judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS' ability to obtain, serve, and issue 
subpoenas, warrants, and other law enforcement mechanisms that may be 
filed under seal, and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act relating to individuals' 
rights to access and amend their records contained in the system. 
Therefore DHS is not required to establish rules or procedures pursuant 
to which individuals may seek a civil remedy for the agency's: refusal 
to amend a record; refusal to comply with a request for access to 
records; failure to maintain accurate, relevant, timely and complete 
records; or failure to otherwise comply with an individual's right to 
access or amend records.
    55. The DHS/FEMA-011 Training and Exercise Program Records System of 
Records consists of electronic and paper records and will be used by 
FEMA. The DHS/FEMA-011 Training and Exercise Program Records System of 
Records consists of electronic and paper records and will be used by DHS 
and its components and offices to maintain records about individual 
training, including enrollment and participation information, 
information pertaining to class schedules, programs, and instructors, 
training trends and needs, testing and examination materials, and 
assessments of training efficacy. The data will be collected by employee 
name or other unique identifier. The collection and maintenance of this 
information will assist DHS in meeting its obligation to train its 
personnel and contractors in order to ensure that the agency mission can 
be successfully accomplished. The DHS/FEMA-011 General Training and 
Exercise Program Records System of Records contains information that is 
collected by, on behalf of, in support of, or in cooperation with DHS 
and its components and may contain personally identifiable information 
collected by other Federal, State, local, tribal, foreign, or 
international government agencies. The Secretary of Homeland Security 
has exempted this system from the following provisions of the Privacy 
Act, subject to limitations set forth in 5 U.S.C.

[[Page 101]]

552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) 
pursuant to 5 U.S.C. 552a (k)(6) where it states: ``For testing or 
examination material used solely to determine individual qualifications 
for appointment or promotion in the Federal service the disclosure of 
which would compromise the objectivity or fairness of the testing or 
examination process.''
    Exemptions from these particular subsections are justified, on a 
case-by-case basis to be determined at the time a request is made, for 
the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an unreasonable administrative burden by requiring 
investigations to be continually reinvestigated. In addition, permitting 
access and amendment to such information could disclose security-
sensitive information that could be detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    56. The DHS/TSA-023 Workplace Violence Prevention Program System of 
Records consists of electronic and paper records and is used by the TSA 
in the administration of its Workplace Violence Prevention Program, an 
internal TSA program designed to prevent and respond to workplace 
violence. The DHS/TSA-023 Workplace Violence Prevention Program System 
of Records is a repository of information held by TSA in connection with 
its several and varied missions and functions, including, but not 
limited to: The enforcement of civil and criminal laws; investigations, 
inquiries, and proceedings there under. The DHS/TSA-023 Workplace 
Violence Prevention Program System of Records contains information 
collected by TSA, and may contain personally identifiable information 
collected by other federal, state, local, tribal, foreign, or 
international government agencies. The Secretary of Homeland Security 
has exempted portions of this system from the following provisions of 
the Privacy Act, subject to the limitations set forth in (c)(3); (d); 
(e)(1), (e)(4)(G); (e)(4)(H); (e)(4)(I); and (f) of the Privacy Act 
pursuant to 5 U.S.C. 552a(k)(2). Exemptions from these particular 
subsections are justified, on a case-by-case basis to be determined at 
the time a request is made, for the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part

[[Page 102]]

of DHS or another agency. Access to the records could permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension. Amendment of the records could interfere with ongoing 
investigations and law enforcement activities and would impose an 
unreasonable administrative burden by requiring investigations to be 
continually reinvestigated. In addition, permitting access and amendment 
to such information could disclose security-sensitive information that 
could be detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    57. The DHS/OPS-002 National Operations Center Tracker and Senior 
Watch Officer Logs Records System of Records consists of electronic and 
paper records and will be used by DHS and its components. The DHS/OPS-
002 National Operations Center Tracker and Senior Watch Officer Logs 
Records System of Records is a repository of information held by DHS in 
connection with its several and varied missions and functions, 
including, but not limited to the enforcement of civil and criminal 
laws; investigations, inquiries, and proceedings there under; national 
security and intelligence activities; and protection of the President of 
the U.S. or other individuals pursuant to Section 3056 and 3056A of 
Title 18. The DHS/OPS-002 National Operations Center Tracker and Senior 
Watch Officer Logs Records System of Records contains information that 
is collected by, on behalf of, in support of, or in cooperation with DHS 
and its components and may contain personally identifiable information 
collected by other federal, state, local, tribal, foreign, or 
international government agencies. The Secretary of Homeland Security is 
exempting this system from the following provisions of the Privacy Act, 
subject to limitations set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), 
(e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) pursuant to 5 U.S.C. 
552a(k)(1), (k)(2), and (k)(3). Exemptions from these particular 
subsections are justified, on a case-by-case basis to be determined at 
the time a request is made, for the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an unreasonable administrative burden by requiring 
investigations to be continually reinvestigated. In addition, permitting 
access and amendment to such information could disclose security-
sensitive information that could be detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or

[[Page 103]]

procedures with respect to such access. Providing notice to individuals 
with respect to existence of records pertaining to them in the system of 
records or otherwise setting up procedures pursuant to which individuals 
may access and view records pertaining to themselves in the system would 
undermine investigative efforts and reveal the identities of witnesses, 
and potential witnesses, and confidential informants.
    59. The DHS/NPPD-001 NICC Records System of Records consists of 
electronic and paper records and will be used by DHS and its components. 
The DHS/NPPD-001 NICC Records System of Records is a repository of 
information held by DHS in connection with its several and varied 
missions and functions, including, but not limited to the enforcement of 
civil and criminal laws; investigations, inquiries, and proceedings 
there under; national security and intelligence activities The DHS/NPPD-
001 NICC Records System of Records contains information that is 
collected by, on behalf of, in support of, or in cooperation with DHS 
and its components and may contain personally identifiable information 
collected by other Federal, state, local, Tribal, foreign, or 
international government agencies. The Secretary of Homeland Security 
has exempted this system from the following provisions of the Privacy 
Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3); (d); 
(e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 
552a(k)(1) and (k)(2). Exemptions from these particular subsections are 
justified, on a case-by-case basis to be determined at the time a 
request is made, for the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an unreasonable administrative burden by requiring 
investigations to be continually reinvestigated. In addition, permitting 
access and amendment to such information could disclose security-
sensitive information that could be detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    64. The DHS/USCIS-015 Electronic Immigration System-2 Account and 
Case Management System of Records consists of electronic and paper 
records and will be used by DHS and its components. The DHS/USCIS-015 
Electronic Immigration System-2 Account and Case Management is a 
repository of information held by USCIS to serve its mission of 
processing immigration benefits. This system also supports certain other 
DHS programs whose functions include, but are not limited to, the 
enforcement of civil and criminal laws; investigations, inquiries, and 
proceedings there under; and national security and intelligence 
activities. The DHS/USCIS-015 Electronic Immigration System-2 Account 
and Case Management System of Records contains information that is 
collected by, on behalf of, in support of, or in cooperation with DHS 
and its components and may contain personally identifiable information 
collected by other federal, state, local, Tribal, foreign, or 
international government agencies. This system is exempted from the 
following provisions of the Privacy Act pursuant to 5 U.S.C. 552a(k)(2): 
5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and 
(f). Additionally, many of the functions in this system require 
retrieving

[[Page 104]]

records from law enforcement systems. Where a record received from 
another system has been exempted in that source system under 5 U.S.C. 
552a(j)(2), DHS will claim the same exemptions for those records that 
are claimed for the original primary systems of records from which they 
originated and claims any additional exemptions in accordance with this 
rule. Exemptions from these particular subsections are justified, on a 
case-by-case basis determined at the time a request is made, for the 
following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and/or 
reveal investigative interest on the part of DHS or another agency. 
Access to the records could permit the individual who is the subject of 
a record to impede the investigation, to tamper with witnesses or 
evidence, and to avoid detection or apprehension. Amendment of the 
records could interfere with ongoing investigations and law enforcement 
activities and would impose an unreasonable administrative burden by 
requiring investigations to be continually reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules) because portions of this system are 
exempt from the individual access provisions of subsection (d) for the 
reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records, or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system, would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    65. The DHS/USCIS-016 Electronic Immigration System-3 Automated 
Background Functions System of Records consists of electronic and paper 
records and will be used by DHS and its components. The DHS/USCIS-016 
Electronic Immigration System-3 Automated Background Functions System of 
Records is a repository of information held by USCIS to serve its 
mission of processing immigration benefits. This system also supports 
certain other DHS programs whose functions include, but are not limited 
to, the enforcement of civil and criminal laws; investigations, 
inquiries, and proceedings there under; and national security and 
intelligence activities. The DHS/USCIS-016 Electronic Immigration 
System-3 Automated Background Functions System of Records contains 
information that is collected by, on behalf of, in support of, or in 
cooperation with DHS and its components and may contain personally 
identifiable information collected by other federal, state, local, 
Tribal, foreign, or international government agencies. This system is 
exempted from the following provisions of the Privacy Act pursuant to 5 
U.S.C. 552a(k)(2): 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), 
(e)(4)(H), (e)(4)(I); and (f). Additionally, many of the functions in 
this system require retrieving records from law enforcement systems. 
Where a record received from another system has been exempted in that 
source system under 5 U.S.C. 552a(j)(2), DHS will claim the same 
exemptions for those records that are claimed for the original primary 
systems of records from which they originated and claims any additional 
exemptions in accordance with this rule. Exemptions from these 
particular subsections are justified, on a case-by-case basis determined 
at the time a request is made, for the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a

[[Page 105]]

record to impede the investigation, to tamper with witnesses or 
evidence, and to avoid detection or apprehension, which would undermine 
the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and/or 
reveal investigative interest on the part of DHS or another agency. 
Access to the records could permit the individual who is the subject of 
a record to impede the investigation, to tamper with witnesses or 
evidence, and to avoid detection or apprehension. Amendment of the 
records could interfere with ongoing investigations and law enforcement 
activities and would impose an unreasonable administrative burden by 
requiring investigations to be continually reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records, or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system, would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    66. The DHS/ALL-030 Use of the Terrorist Screening Database System 
of Records consists of electronic and paper records and will be used by 
DHS and its Components. The DHS/ALL-030 Use of the Terrorist Screening 
Database System of Records is a repository of information held by DHS in 
connection with its several and varied missions and functions, 
including, the enforcement of civil and criminal laws; investigations, 
inquiries, and proceedings thereunder; and national security and 
intelligence activities. The Terrorist Screening Database belongs to the 
Department of Justice (DOJ)/Federal Bureau of Investigation (FBI). DHS 
does not change or alter these records. All records within the DHS/ALL-
030 Use of the Terrorist Screening Database System of Records are 
collected and disseminated by the DOJ/FBI and are covered by the DOJ/
FBI-019, ``Terrorist Screening Records Center System,'' 72 FR 77846 
(Dec. 14, 2011). Because DHS does not make any changes to the records 
obtained from DOJ/FBI, the same exemptions outlined in the DOJ/FBI SORN, 
and reasons provided in its implementing regulations for use of such 
exemptions at 28 CFR 16.96, transfer and apply. The Secretary of 
Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this 
system from the following provisions of the Privacy Act: 5 U.S.C. 
552a(c)(3), (c)(4), (d), (e)(1), (e)(2), (e)(3), (e)(5), (e)(8), and 
(g). When a record has been received from DOJ/FBI-019 Terrorist 
Screening Records System of Records and has been exempted in that source 
system, DHS will claim the same exemptions for those records that are 
claimed for that original primary system of records from which they 
originated and claims any additional exemptions set forth here. 
Exemptions from these particular subsections are justified, on a case-
by-case basis to be determined at the time a request is made, for the 
following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an unreasonable administrative burden by requiring 
investigations to be continually reinvestigated. In addition, permitting 
access and amendment to such information could

[[Page 106]]

disclose security-sensitive information that could be detrimental to 
homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (f) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with subsection (e)(5) would 
preclude DHS agents from using their investigative training and exercise 
of good judgment to both conduct and report on investigations.
    (g) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (h) From subsection (g) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    67. The DHS/FEMA-012 Suspicious Activity Reporting System of Records 
consists of electronic and paper records and will be used by DHS/FEMA 
and its components. The DHS/FEMA--012 Suspicious Activity Reporting 
System of Records is a repository of information held by DHS/FEMA to 
serve its mission to support our citizens and first responders to ensure 
that as a nation we work together to build, sustain, and improve our 
capability to prepare for, protect against, respond to, recover from, 
and mitigate all hazards. This system also supports certain other DHS/
FEMA programs whose functions include, but are not limited to, the 
enforcement of civil and criminal laws; investigations, inquiries, and 
proceedings there under; and national security and intelligence 
activities. The DHS/FEMA-012 Suspicious Activity Reporting System of 
Records contains information that is collected by, on behalf of, in 
support of, or in cooperation with DHS/FEMA and its components and may 
contain personally identifiable information collected by other federal, 
state, local, tribal, foreign, or international government agencies. The 
Secretary of Homeland Security has exempted this system from the 
following provisions of the Privacy Act pursuant to 5 U.S.C. 552a(k)(2); 
(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). 
Exemptions from these particular subsections are justified, on a case-
by-case basis determined at the time a request is made, for the 
following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of that investigation and reveal 
investigative interest on the part of DHS/FEMA as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS/FEMA or another agency. Access 
to the records could permit the individual who is the subject of a 
record to impede the investigation, to tamper with witnesses or 
evidence, and to avoid detection or apprehension. Amendment of the 
records could interfere with ongoing investigations and law enforcement 
activities and would impose an unreasonable administrative burden by 
requiring investigations to be continually reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f)

[[Page 107]]

(Agency Rules), because portions of this system are exempt from the 
individual access provisions of subsection (d) for the reasons noted 
above, and therefore DHS/FEMA is not required to establish requirements, 
rules, or procedures with respect to such access. Providing notice to 
individuals with respect to existence of records pertaining to them in 
the system of records or otherwise setting up procedures pursuant to 
which individuals may access and view records pertaining to themselves 
in the system would undermine investigative efforts and reveal the 
identities of witnesses, and potential witnesses, and confidential 
informants.
    68. The DHS OPS-003 Operations Collection, Planning, Coordination, 
Reporting, Analysis, and Fusion System of Records consists of electronic 
and paper records and will be used by DHS and its components. The DHS 
OPS-003 Operations Collection, Planning, Coordination, Reporting, 
Analysis, and Fusion System of Records is a repository of information 
held by DHS to serve its several and varied missions and functions. This 
system also supports certain other DHS programs whose functions include, 
but are not limited to, the enforcement of civil and criminal laws; 
investigations, inquiries, and proceedings there under; national 
security and intelligence activities; and protection of the President of 
the U.S. or other individuals pursuant to Section 3056 and 3056A of 
Title 18. The DHS OPS-003 Operations Collection, Planning, Coordination, 
Reporting, Analysis, and Fusion System of Records contains information 
that is collected by, on behalf of, in support of, or in cooperation 
with DHS and its components and may contain personally identifiable 
information collected by other federal, state, local, tribal, foreign, 
or international government agencies. This system is exempted from the 
following provisions of the Privacy Act pursuant to 5 U.S.C. 552a(k)(1), 
(k)(2), (k)(3): 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), 
(e)(4)(I); and (f). Exemptions from these particular subsections are 
justified, on a case-by-case basis to be determined at the time a 
request is made, for the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access and Amendment) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an unreasonable administrative burden by requiring 
investigations to be continually reinvestigated. In addition, permitting 
access and amendment to such information could disclose security-
sensitive information that could be detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    69. The DHS/CBP--017 Analytical Framework for Intelligence (AFI) 
System of Records consists of electronic and paper records and will be 
used by DHS and its components. The DHS/CBP--017 Analytical Framework 
for Intelligence (AFI) System of Records is a repository of information 
held by DHS to enhance DHS's ability to: Identify, apprehend, and/or 
prosecute individuals who pose a potential law enforcement or security 
risk; aid in the enforcement of the customs and immigration laws, and 
other laws enforced by DHS at the border; and enhance United States 
security. This system also supports certain other DHS programs whose 
functions include, but are not limited to, the enforcement of civil and 
criminal

[[Page 108]]

laws; investigations, inquiries, and proceedings there under; and 
national security and intelligence activities. The DHS/CBP--017 
Analytical Framework for Intelligence (AFI) System of Records contains 
information that is collected by, on behalf of, in support of, or in 
cooperation with DHS and its components and may contain personally 
identifiable information collected by other federal, state, local, 
tribal, foreign, or international government agencies.
    (a) The Secretary of Homeland Security has exempted this system from 
certain provisions of the Privacy Act as follows:
    (1) Pursuant to 5 U.S.C. 552a(j)(2), the system is exempt from 5 
U.S.C. 552a(c)(3) and (c)(4), (e)(1), (e)(2), (e)(3), (e)(4)(G), 
(e)(4)(H), (e)(4)(I), (e)(5), (e)(8), (f), and (g).
    (2) Pursuant to 5 U.S.C. 552a(j)(2), the system (except for any 
records that were ingested by AFI where the source system of records 
already provides access and/or amendment under the Privacy Act) is 
exempt from 5 U.S.C. 552a(d)(1), (d)(2), (d)(3), and (d)(4).
    (3) Pursuant to 5 U.S.C. 552a(k)(1), the system is exempt from 5 
U.S.C. 552a(c)(3); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).
    (4) Pursuant to 5 U.S.C. 552a(k)(1), the system is exempt from 
(d)(1), (d)(2), (d)(3), and (d)(4).
    (5) Pursuant to 5 U.S.C. 552a(k)(2), the system is exempt from 5 
U.S.C. 552a(c)(3); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).
    (6) Pursuant to 5 U.S.C. 552a(k)(2),the system (except for any 
records that were ingested by AFI where the source system of records 
already provides access and/or amendment under the Privacy Act) is 
exempt from (d)(1), (d)(2), (d)(3), and (d)(4).
    (b) Exemptions from these particular subsections are justified, on a 
case-by-case basis to be determined at the time a request is made, for 
the following reasons:
    (1) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (2) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an unreasonable administrative burden by requiring 
investigations to be continually reinvestigated. In addition, permitting 
access and amendment to such information could disclose security-
sensitive information that could be detrimental to homeland security.
    (3) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement and national security, it is appropriate to 
retain all information that may aid in establishing patterns of unlawful 
activity.
    (4) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement and national security 
activities.
    (5) From subsection (e)(3) (Notice to Individuals) because providing 
such detailed information could impede law enforcement and national 
security by compromising the existence of a confidential investigation 
or reveal the identity of witnesses or confidential informants.
    (6) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    (7) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with subsection (e)(5) would 
preclude DHS agents from using their

[[Page 109]]

investigative training and exercise of good judgment to both conduct and 
report on investigations.
    (8) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (9) From subsection (g)(1) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    70. DHS/USCIS-ICE-CBP-001 Alien File, Index, and National File 
Tracking System of Records consists of electronic and paper records and 
will be used by USCIS, ICE, and CBP. DHS/USCIS-ICE-CBP-001 Alien File, 
Index, and National File Tracking System of Records is a repository of 
information held by DHS in connection with its several and varied 
missions and functions, including, but not limited to: The enforcement 
of civil and criminal laws; investigations, inquiries, and proceedings 
thereunder; and national security and intelligence activities. DHS/
USCIS-ICE-CBP-001 Alien File, Index, and National File Tracking System 
of Records contains information that is collected by, on behalf of, in 
support of, or in cooperation with DHS and its components and may 
contain personally identifiable information collected by other federal, 
state, local, tribal, territorial, foreign, or international government 
agencies. The Secretary of Homeland Security has exempted this system 
from the following provisions of the Privacy Act pursuant to 5 U.S.C. 
552a(j)(2): 5 U.S.C. 552a(c)(3) and (c)(4), (d), (e)(1), (e)(2), (e)(3), 
(e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8), (e)(12), (f), (g)(1), 
and (h). Additionally, the Secretary of Homeland Security has exempted 
this system from the following provisions of the Privacy Act pursuant to 
5 U.S.C. 552a(k)(1) and (k)(2): 5 U.S.C. 552a(c)(3), (d), (e)(1), 
(e)(4)(G), (e)(4)(H), (e)(4)(I), and (f). Exemptions from these 
particular subsections may be justified, on a case-by-case basis to be 
determined at the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an unreasonable administrative burden by requiring 
investigations to be continually reinvestigated. In addition, permitting 
access and amendment to such information could disclose security-
sensitive information that could be detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (e) From subsection (e)(3) (Notice to Individuals) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses, DHS employees, or confidential informants.
    (f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, potential witnesses, and 
confidential informants.

[[Page 110]]

    (g) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with subsection (e)(5) would 
impede DHS officials' ability to effectively use their investigative 
training and exercise good judgment to both conduct and report on 
investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (e)(12) (Computer Matching) if the agency is a 
recipient agency or a source agency in a matching program with a non-
Federal agency, with respect to any establishment or revision of a 
matching program, at least 30 days prior to conducting such program, 
publish in the Federal Register notice of such establishment or 
revision.
    (j) From subsection (g)(1) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act. (k) 
From subsection (h) (Legal Guardians) if the parent of any minor, or the 
legal guardian of any individual who has been declared to be incompetent 
due to physical or mental incapacity or age by a court of competent 
jurisdiction, is acting on behalf of the individual.
    71. The Department of Homeland Security (DHS)/Transportation 
Security Administration (TSA)-021 TSA Pre[check] \TM\ Application 
Program System of Records consists of electronic and paper records and 
will be used by DHS/TSA. The DHS/TSA-021 Pre[check] \TM\ Application 
Program System of Records is a repository of information held by DHS/TSA 
on individuals who voluntarily provide personally identifiable 
information (PII) to TSA in return for enrollment in a program that will 
make them eligible for expedited security screening at designated 
airports. This System of Records contains PII in biographic application 
data, biometric information, pointer information to law enforcement 
databases, payment tracking, and U.S. application membership decisions 
that support the TSA Pre[check] \TM\ Application Program membership 
decisions. The DHS/TSA-021 TSA Pre[check] \TM\ Application Program 
System of Records contains information that is collected by, on behalf 
of, in support of, or in cooperation with DHS and its components and may 
contain PII collected by other federal, state, local, tribal, 
territorial, or foreign government agencies. The Secretary of Homeland 
Security, pursuant to 5 U.S.C. 552a(k)(1) and (k)(2), has exempted this 
system from the following provisions of the Privacy Act: 5 U.S.C. 
552a(c)(3); (d); (e)(1); (e)(4)(G), (H), and (I); and (f). Where a 
record received from another system has been exempted in that source 
system under 5 U.S.C. 552a(k)(1) and (k)(2), DHS will claim the same 
exemptions for those records that are claimed for the original primary 
systems of records from which they originated and claims any additional 
exemptions set forth here. Exemptions from these particular subsections 
are justified, on a case-by-case basis to be determined at the time a 
request is made, for the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting also would permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an unreasonable administrative burden by requiring 
investigations to be continually reinvestigated. In addition, permitting 
access and amendment to such information could disclose security-
sensitive information that could be detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G), (H), and (I) (Agency Requirements) 
and (f) (Agency Rules), because portions of this system are exempt from 
the individual access provisions of subsection (d) for the reasons noted 
above,

[[Page 111]]

and therefore DHS is not required to establish requirements, rules, or 
procedures with respect to such access. Providing notice to individuals 
with respect to the existence of records pertaining to them in the 
system of records or otherwise setting up procedures pursuant to which 
individuals may access and view records pertaining to themselves in the 
system would undermine investigative efforts and reveal the identities 
of witnesses, potential witnesses, and confidential informants.
    72. The DHS/ICE-014 Homeland Security Investigations Forensic 
Laboratory System of Records consists of electronic and paper records 
that will be used by DHS and its components. The DHS/ICE-014 Homeland 
Security Investigations Forensic Laboratory System of Records contains 
records of evidence and cases submitted to the HSI-FL. This information 
will include information on the individual submitting the request, 
identify the evidence submitted, track the evidence as it moves 
throughout the HSI-FL, capture case notes and results of examinations, 
store electronic images of evidence, and produce reports of findings. 
Other case-related records are maintained, including descriptions of 
expert witness testimony provided by HSI-FL employees. Records in the 
DHS/ICE-014 Homeland Security Investigations Forensic Laboratory System 
of Records also include the library of genuine, altered, and counterfeit 
travel and identity documents provided to the HSI-FL by international 
organizations, government agencies, and law enforcement organizations 
from across the United States and around the world to research methods 
of document production and authenticate documents through comparative 
forensic examinations. The DHS/ICE-014 Homeland Security Investigations 
Forensic Laboratory System of Records contains information that is 
collected by, on behalf of, in support of, or in cooperation with DHS 
and its components, and may contain personally identifiable information 
(PII) collected by other federal, state, local, tribal, foreign, or 
international government agencies. The Secretary of the Department of 
Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this 
system from the following provisions of the Privacy Act, subject to 
limitations set forth in 5 U.S.C. 552a(c)(3), (c)(4); (d); (e)(1), 
(e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (f); 
and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 
U.S.C. 552a(k)(2), has exempted this system from the following 
provisions of the Privacy Act, subject to limitations set forth in 5 
U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and 
(f). Where a record received from another system has been exempted in 
that source system under 5 U.S.C. 552a(j)(2), DHS will claim the same 
exemptions for those records that are claimed for the original primary 
systems of records from which they originated and claims any additional 
exemptions set forth here. Exemptions from these particular subsections 
are justified, on a case-by-case basis to be determined at the time a 
request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an unreasonable administrative burden by requiring 
investigations to be continually reinvestigated. In addition, permitting 
access and amendment to such information could disclose security-
sensitive information that could be detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.

[[Page 112]]

    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    (g) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with subsection (e)(5) would 
preclude DHS agents from using their investigative training and exercise 
of good judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g)(1) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    73. The DHS/NPPD--002 Chemical Facility Anti-Terrorism Standards 
Personnel Surety Program System of Records consists of electronic and 
paper records and will be used by DHS and its components. The DHS/NPPD--
002 Chemical Facility Anti-Terrorism Standards Personnel Surety Program 
System of Records is a repository of information held by DHS in 
connection with its several and varied missions and functions, 
including, but not limited to the enforcement of civil and criminal 
laws; investigations, inquiries, and proceedings thereunder; and 
national security and intelligence activities. The DHS/NPPD--002 
Chemical Facility Anti-Terrorism Standards Personnel Surety Program 
System of Records contains information that is collected by, on behalf 
of, in support of, or in cooperation with DHS and its components and may 
contain personally identifiable information collected by other federal, 
state, local, tribal, foreign, or international government agencies. The 
Secretary of Homeland Security has exempted this system from the 
following provisions of the Privacy Act, subject to limitations set 
forth therein: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), 
(e)(4)(I); and (f). These exemptions are made pursuant to 5 U.S.C. 
552a(k)(1) and (k)(2).
    In addition to records under the control of DHS, the DHS/NPPD--002 
Chemical Facility Anti-Terrorism Standards Personnel Surety Program 
System of Records may include records originating from systems of 
records of other law enforcement and intelligence agencies, which may be 
exempt from certain provisions of the Privacy Act. DHS does not, 
however, assert exemption from any provisions of the Privacy Act with 
respect to information submitted by high-risk chemical facilities.
    To the extent the DHS/NPPD--002 Chemical Facility Anti-Terrorism 
Standards Personnel Surety Program System of Records contains records 
originating from other systems of records, DHS will rely on the 
exemptions claimed for those records in the originating systems of 
records. Exemptions from these particular subsections are justified, on 
a case-by-case basis to be determined at the time a request is made, for 
the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of that investigation and reveal 
investigative interest, on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an unreasonable administrative burden by requiring 
investigations to be continually reinvestigated. In addition, permitting 
access and amendment to such information could disclose security-
sensitive information that could be detrimental to homeland security.

[[Page 113]]

    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, potential witnesses, and 
confidential informants.
    74. The DHS/CBP-022 Electronic Visa Update System (EVUS) System of 
Records consists of electronic and paper records and will be used by DHS 
and its components. The DHS/CBP-022 EVUS System of Records is a 
repository of information held by DHS in connection with its several and 
varied missions and functions, including the enforcement of civil and 
criminal laws; investigations, inquiries, and proceedings thereunder; 
national security and intelligence activities. This system of records 
covers information collected by, on behalf of, in support of, or in 
cooperation with DHS and its components and may contain personally 
identifiable information collected by other federal, state, local, 
tribal, foreign, or international government agencies. As part of the 
process of determining EVUS eligibility or admissibility to the United 
States, CBP collects two types of data for which it claims different 
exemptions.
    (a) CBP will not assert any exemption to limit an individual from 
accessing or amending his or her record under subsection 552a(d) with 
respect to information maintained in the system as it relates to data 
submitted by or on behalf of a person who travels to visit the United 
States and crosses the border, nor shall an exemption be asserted with 
respect to the resulting determination (approval or denial). However, 
pursuant to 5 U.S.C. 552a(j)(2), CBP will not disclose the fact that a 
law enforcement or intelligence agency has sought particular records 
because it may affect ongoing law enforcement activities, and thus, the 
Secretary of Homeland Security has exempted such records covered by this 
system from sections (c)(3), (e)(8), and (g) of the Privacy Act of 1974, 
as amended, as is necessary and appropriate to protect this information. 
Further, DHS will claim exemption from section (c)(3) of the Privacy Act 
of 1974, as amended, pursuant to 5 U.S.C. 552a(k)(2) as is necessary and 
appropriate to protect this information.
    (b) Additionally, this system contains law enforcement and other 
derogatory records or information recompiled from or created from 
information contained in other systems of records that are exempt from 
certain provisions of the Privacy Act, and possibly relied upon as the 
basis for denial of an EVUS application. For these records or 
information only, the Secretary of Homeland Security, pursuant to 5 
U.S.C. 552a(j)(2), has exempted this system from the following 
provisions of the Privacy Act: 5 U.S.C. 552a(c)(3), (c)(4); (d)(1)-(4); 
(e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), and 
(e)(8); (f); and (g). Additionally, the Secretary of Homeland Security, 
pursuant to 5 U.S.C. 552a(k)(2), has exempted this system from the 
following provisions of the Privacy Act, 5 U.S.C. 552a(c)(3); (d)(1)-
(4); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).
    Exemptions from these particular subsections cited above under (a) 
and (b) are justified, on a case-by-case basis to be determined at the 
time a request is made, for the following reasons:
    (i) From subsection (c)(3) and (c)(4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (ii) From subsection (d) (Access and Amendment to Records) because 
access to the records contained in this system of records could inform 
the subject of an investigation of an actual or potential criminal, 
civil, or regulatory violation to the existence of that investigation 
and reveal investigative interest on the part of DHS or another agency. 
Access to the records could permit the individual who is the subject of 
a record to impede the investigation, to tamper with witnesses or 
evidence, and to avoid detection or apprehension. Amendment of the 
records could interfere with ongoing investigations and law enforcement 
activities and would impose an unreasonable administrative burden by 
requiring investigations to

[[Page 114]]

be continually reinvestigated. In addition, permitting access and 
amendment to such information could disclose security-sensitive 
information that could be detrimental to homeland security.
    (iii) From subsection (e)(1) (Relevancy and Necessity of 
Information) because in the course of investigations into potential 
violations of federal law, the accuracy of information obtained or 
introduced occasionally may be unclear, or the information may not be 
strictly relevant or necessary to a specific investigation. In the 
interests of effective law enforcement, it is appropriate to retain all 
information that may aid in establishing patterns of unlawful activity.
    (iv) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (v) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (vi) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, potential witnesses, and 
confidential informants.
    (vii) From subsection (e)(5) (Collection of Information) because 
with the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with subsection (e)(5) would 
preclude DHS agents from using their investigative training and exercise 
of good judgment to both conduct and report on investigations.
    (viii) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (ix) From subsection (g) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    75. The DHS/ICE-015 LeadTrac System of Records consists of 
electronic and paper records and will be used by ICE investigative and 
homeland security personnel. The DHS/ICE-015 LeadTrac System of Records 
is a repository of information held by ICE for analytical and 
investigative purposes. The system is used to conduct research 
supporting the production of law enforcement activities; provide lead 
information for investigative inquiry and follow-up; assist in the 
conduct of ICE criminal and administrative investigations; assist in the 
disruption of terrorist or other criminal activity; and discover 
previously unknown connections among existing ICE investigations. The 
DHS/ICE-015 LeadTrac System of Records contains aggregated data from ICE 
and DHS law enforcement and homeland security IT systems, as well as 
data uploaded by ICE personnel for analysis from various public, 
private, and commercial sources during the course of an investigation or 
analytical project. The Secretary of Homeland Security, pursuant to 5 
U.S.C. 552a(j)(2), has exempted this system from the following 
provisions of the Privacy Act: 5 U.S.C. 552a(c)(3), (c)(4); (d); (e)(1), 
(e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (f); 
and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 
U.S.C. 552a(k)(2), has exempted this system from the following 
provisions of the Privacy Act: 5 U.S.C. 552a(c)(3), (c)(4); (d); (e)(1), 
(e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). When a record received from 
another system has been exempted in that source system under 5 U.S.C. 
552a(j)(2) or (k)(2), DHS will claim the same exemptions for those 
records that are claimed for the original primary systems of records 
from which they originated and claims any additional exemptions set 
forth here.
    Exemptions from these particular subsections are justified, on a 
case-by-case basis to be determined at the time a request is made, for 
the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension,

[[Page 115]]

which would undermine the entire investigative process. Disclosure of 
corrections or notations of dispute may impede investigations by 
requiring DHS to inform each witness or individual contacted during the 
investigation of each correction or notation pertaining to information 
provided them during the investigation.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an unreasonable administrative burden by requiring 
investigations to be continually reinvestigated. In addition, permitting 
access and amendment to such information could disclose classified and 
other security-sensitive information that could be detrimental to 
homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise establishing 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, potential witnesses, and 
confidential informants.
    (g) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with subsection (e)(5) would 
preclude DHS agents from using their investigative training and exercise 
of good judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g)(1) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    76. The DHS/CBP-023 Border Patrol Enforcement Records (BPER) System 
of Records consists of electronic and paper records and will be used by 
DHS and its components. The DHS/CBP-023 BPER System of Records is a 
repository of information held by DHS/CBP in connection with its several 
and varied missions and functions, including, but not limited to the 
enforcement of civil and criminal laws; investigations, inquiries, and 
proceedings there under; and national security and intelligence 
activities. The DHS/CBP-023 BPER System of Records contains information 
that is collected by, on behalf of, in support of, or in cooperation 
with DHS and its components and may contain personally identifiable 
information collected by other federal, state, local, tribal, foreign, 
or international government agencies. The Secretary of Homeland 
Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from 
the following provisions of the Privacy Act: 5 U.S.C. 552a (c)(3), 
(c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5), 
(e)(8); and (g). Additionally, the Secretary of Homeland Security, 
pursuant to 5 U.S.C. 552a(k)(2), has exempted this system from the 
following provisions of the Privacy Act: 5 U.S.C. 552a (c)(3); (d); 
(e)(1), (e)(4)(G), and (e)(4)(H). Exemptions from these particular 
subsections are justified, on a case-by-case basis to be determined at 
the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part

[[Page 116]]

of DHS as well as the recipient agency. Disclosure of the accounting 
would therefore present a serious impediment to law enforcement efforts 
and/or efforts to preserve national security. Disclosure of the 
accounting would also permit the individual who is the subject of a 
record to impede the investigation, to tamper with witnesses or 
evidence, and to avoid detection or apprehension, which would undermine 
the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an unreasonable administrative burden by requiring 
investigations to be continually reinvestigated. In addition, permitting 
access and amendment to such information could disclose security-
sensitive information that could be detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (f) From subsections (e)(4)(G) and (e)(4)(H) (Agency Requirements) 
because portions of this system are exempt from the individual access 
provisions of subsection (d) for the reasons noted above, and therefore 
DHS is not required to establish requirements, rules, or procedures with 
respect to such access. Providing notice to individuals with respect to 
existence of records pertaining to them in the system of records or 
otherwise setting up procedures pursuant to which individuals may access 
and view records pertaining to themselves in the system would undermine 
investigative efforts and reveal the identities of witnesses, and 
potential witnesses, and confidential informants.
    (g) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with subsection (e)(5) would 
preclude DHS agents from using their investigative training and exercise 
of good judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g)(1) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    77. The DHS/USCG-031 USCG Law Enforcement (ULE) System of Records 
consists of electronic and paper records and will be used by DHS and its 
components. The DHS/USCG-031 USCG Law Enforcement (ULE) System of 
Records is a repository of information held by DHS in connection with 
its several and varied missions and functions, including, but not 
limited to the enforcement of civil and criminal laws; investigations, 
inquiries, and proceedings there under; and national security and 
intelligence activities. The DHS/USCG-031 USCG Law Enforcement (ULE) 
System of Records contains information that is collected by, on behalf 
of, in support of, or in cooperation with DHS and its components and may 
contain personally identifiable information collected by other federal, 
state, local, tribal, foreign, or international government agencies. The 
Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has 
exempted this system from the following provisions of the Privacy Act: 5 
U.S.C. 552a (c)(3-4); (d); (e)(1-3), (e)(5), (e)(8); and (g). 
Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 
552a(k)(2) has exempted this system from the following provisions of the 
Privacy Act: 5 U.S.C. 552a (c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), 
(e)(4)(I); and (f). When a record received from another system has been 
exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will claim 
the same exemptions for those records that are claimed for the original 
primary systems of records from which they originated and claims any 
additional exemptions set forth here.
    Exemptions from these particular subsections are justified, on a 
case-by-case basis

[[Page 117]]

to be determined at the time a request is made, for the following 
reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities and 
would impose an unreasonable administrative burden by requiring 
investigations to be continually reinvestigated. In addition, permitting 
access and amendment to such information could disclose security-
sensitive information that could be detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (f) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with subsection (e)(5) would 
preclude DHS agents from using their investigative training and exercise 
of good judgment to both conduct and report on investigations.
    (g) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (h) From subsection (g) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    78. The DHS/ALL-039 Foreign Access Management System of Records 
consists of electronic and paper records and will be used by DHS and its 
components. The DHS/ALL-039 Foreign Access Management System of Records 
is a repository of information held by DHS in connection with its 
several and varied missions and functions, including, but not limited to 
the enforcement of civil and criminal laws; investigations, inquiries, 
and proceedings there under; and national security and intelligence 
activities. The DHS/ALL-039 Foreign Access Management System of Records 
contains information that is collected by, on behalf of, in support of, 
or in cooperation with DHS and its components and may contain personally 
identifiable information collected by other federal, state, local, 
tribal, foreign, or international government agencies. The Secretary of 
Homeland Security, pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5), 
has exempted this system from the following provisions of the Privacy 
Act: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); 
and (f). When a record received from another system has been exempted in 
that source system under 5 U.S.C. 552a(j)(2), DHS will claim the same 
exemptions for those records that are claimed for the original primary 
systems of records from which they originated and claims any additional 
exemptions set forth here. Exemptions from these particular subsections 
are justified, on a case-by-case basis to be determined at the time a 
request is made, for the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts

[[Page 118]]

and efforts to preserve national security. Disclosure of the accounting 
would also permit the individual who is the subject of a record to 
impede the investigation, to tamper with witnesses or evidence, and to 
avoid detection or apprehension, which would undermine the entire 
investigative process. When an investigation has been completed, 
information on disclosures made may continue to be exempted if the fact 
that an investigation occurred remains sensitive after completion.
    (b) From subsection (d) (Access and Amendment to Records) because 
access to the records contained in this system of records could inform 
the subject of an investigation of an actual or potential criminal, 
civil, or regulatory violation to the existence of that investigation 
and reveal investigative interest on the part of DHS or another agency. 
Access to the records could permit the individual who is the subject of 
a record to impede the investigation, to tamper with witnesses or 
evidence, and to avoid detection or apprehension. Amendment of the 
records could interfere with ongoing investigations and law enforcement 
activities and would impose an unreasonable administrative burden by 
requiring investigations to be continually reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    79. The DHS/CBP-024 CBP Intelligence Records System (CIRS) System of 
Records consists of electronic and paper records and will be used by DHS 
and its components. The CIRS is a repository of information held by DHS 
in connection with its several and varied missions and functions, 
including, but not limited to the enforcement of civil and criminal 
laws; investigations, inquiries, and proceedings there under; and 
national security and intelligence activities. The CIRS contains 
information that is collected by, on behalf of, in support of, or in 
cooperation with DHS and its components and may contain personally 
identifiable information collected by other Federal, state, local, 
tribal, foreign, or international government agencies. The Secretary of 
Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this 
system from the following provisions of the Privacy Act: 5 U.S.C. 
552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), 
(e)(4)(I); (e)(5), and (e)(8); (f); and (g). Additionally, the Secretary 
of Homeland Security, pursuant to 5 U.S.C. 552a(k)(1) and (k)(2), has 
exempted this system from the following provisions of the Privacy Act, 5 
U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and 
(f). When this system receives a record from another system exempted in 
that source system under 5 U.S.C. 552a(k)(1), (k)(2), or (j)(2), DHS 
will claim the same exemptions for those records that are claimed for 
the original primary systems of records from which they originated and 
claims any additional exemptions set forth here. Exemptions from these 
particular subsections are justified, on a case by case basis to be 
determined at the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process. 
Information on a completed investigation may be withheld and exempt from 
disclosure if the fact that an investigation occurred remains sensitive 
after completion.
    (b) From subsection (d) (Access and Amendment to Records) because 
access to the records contained in this system of records could inform 
the subject of an investigation of an actual or potential criminal, 
civil, or regulatory violation to the existence of that investigation 
and reveal investigative interest on the part of DHS or another agency. 
Access to the records could permit the individual who is the subject of 
a

[[Page 119]]

record to impede the investigation, to tamper with witnesses or 
evidence, and to avoid detection or apprehension. Amendment of the 
records could interfere with ongoing investigations and law enforcement 
activities and would impose an unreasonable administrative burden by 
requiring investigations to be continually reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
Federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules) because portions of this system are 
exempt from the individual access and amendment provisions of subsection 
(d) for the reasons noted above, and therefore DHS is not required to 
establish requirements, rules, or procedures with respect to such 
access. Providing notice to individuals with respect to existence of 
records pertaining to them in the system of records or otherwise setting 
up procedures pursuant to which individuals may access, amend, and view 
records pertaining to themselves in the system would undermine 
investigative efforts and reveal the identities of witnesses, and 
potential witnesses, and confidential informants.
    (g) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with subsection (e)(5) would 
preclude DHS agents from using their investigative training and exercise 
of good judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g) to the extent that the system is exempt from 
other specific subsections of the Privacy Act relating to individuals' 
rights to access and amend their records contained in the system. 
Therefore, DHS is not required to establish rules or procedures pursuant 
to which individuals may seek a civil remedy for the agency's refusal to 
amend a record, refusal to comply with a request for access to records, 
failure to maintain accurate, relevant timely and complete records, or 
its failure to otherwise comply with an individual's right to access or 
amend records.
    80. The DHS/ICE-007 Criminal History and Immigration Verification 
(CHIVe) System of Records consists of electronic and paper records and 
will be used by DHS and its components. The CHIVe System of Records is a 
repository of information held by DHS in connection with its several and 
varied missions and functions, including the enforcement of civil and 
criminal laws; investigations, inquiries, and proceedings thereunder; 
and national security and intelligence activities. The CHIVe System of 
Records contains information that is collected by, on behalf of, in 
support of, or in cooperation with DHS and its components and may 
contain personally identifiable information collected by other federal, 
state, local, tribal, foreign, or international government agencies. The 
Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has 
exempted this system from the following provisions of the Privacy Act: 5 
U.S.C. 552a(c)(3) and (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), 
(e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (f); and (g). Additionally, the 
Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2), has 
exempted this system from the following provisions of the Privacy Act: 5 
U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H); and (f). 
Exemptions from these particular subsections are justified, on a case-
by-case basis to be determined at the time a request is made, for the 
following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence,

[[Page 120]]

and to avoid detection or apprehension, which would undermine the entire 
investigative process. Information on a completed investigation may be 
withheld and exempt from disclosure if the fact that an investigation 
occurred remains sensitive after completion.
    (b) From subsection (d) (Access and Amendment to Records) because 
access to the records contained in this system of records could inform 
the subject of an investigation of an actual or potential criminal, 
civil, or regulatory violation to the existence of that investigation 
and reveal investigative interest on the part of DHS or another agency. 
Access to the records could permit the individual who is the subject of 
a record to impede the investigation, to tamper with witnesses or 
evidence, and to avoid detection or apprehension. Amendment of the 
records could interfere with ongoing investigations and law enforcement 
activities and would impose an unreasonable administrative burden by 
requiring investigations to be continually reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    (g) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with subsection (e)(5) would 
preclude DHS agents from using their investigative training and exercise 
of good judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (j) From subsection (g) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    81. The DHS/ICE-016 FALCON Search and Analysis (FALCON-SA) System of 
Records consists of electronic and paper records and will be used by DHS 
and its components. The FALCON-SA System of Records is a repository of 
information held by DHS in connection with its several and varied 
missions and functions, including the enforcement of civil and criminal 
laws; investigations, inquiries, and proceedings thereunder; and 
national security and intelligence activities. The FALCON-SA System of 
Records contains information that is collected by, on behalf of, in 
support of, or in cooperation with DHS and its components and may 
contain personally identifiable information collected by other federal, 
state, local, tribal, foreign, or international government agencies. The 
Secretary of Homeland Security has exempted this system from the 
following provisions of the Privacy Act, subject to limitations set 
forth in 5 U.S.C. 552a(c)(3) and (c)(4): (d); (e)(1), (e)(2), (e)(3), 
(e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (f); and (g) pursuant 
to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security 
has exempted this system from the following provisions of the Privacy 
Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3); (d); 
(e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) pursuant to 5 U.S.C. 
552a(k)(2). Exemptions from these particular subsections are justified, 
on a case-by-case basis to be determined at the time a request is made, 
for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part

[[Page 121]]

of DHS as well as the recipient agency. Disclosure of the accounting 
would therefore present a serious impediment to law enforcement efforts 
and/or efforts to preserve national security. Disclosure of the 
accounting would also permit the individual who is the subject of a 
record to impede the investigation, to tamper with witnesses or 
evidence, and to avoid detection or apprehension, which would undermine 
the entire investigative process. Information on a completed 
investigation may be withheld and exempt from disclosure if the fact 
that an investigation occurred remains sensitive after completion.
    (b) From subsection (d) (Access and Amendment to Records) because 
access to the records contained in this system of records could inform 
the subject of an investigation of an actual or potential criminal, 
civil, or regulatory violation to the existence of that investigation 
and reveal investigative interest on the part of DHS or another agency. 
Access to the records could permit the individual who is the subject of 
a record to impede the investigation, to tamper with witnesses or 
evidence, and to avoid detection or apprehension. Amendment of the 
records could interfere with ongoing investigations and law enforcement 
activities and would impose an unreasonable administrative burden by 
requiring investigations to be continually reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    (g) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete. Compliance with subsection (e)(5) would 
preclude DHS agents from using their investigative training and exercise 
of good judgment to both conduct and report on investigations.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (j) From subsection (g) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    82. The DHS/ALL-045 Statistical Immigration Data Production and 
Reporting System of Records consists of electronic and paper records and 
will be used by DHS and its Components. The DHS/ALL-045 Statistical 
Immigration Data Production and Reporting System of Records is a 
repository of information held by DHS in connection with its several and 
varied missions and functions, including, but not limited to the 
enforcement of civil and criminal laws; investigations, inquiries, and 
proceedings there under; national security and intelligence activities. 
The DHS/ALL-045 Statistical Immigration Data Production and Reporting 
System of Records System of Records contains information that is 
collected by, on behalf of, in support of, or in cooperation with DHS 
and its components and may contain personally identifiable information 
collected by other federal, state, local, tribal, foreign, or 
international government agencies.
    For records created and aggregated by DHS OIS, the Secretary of 
Homeland Security, pursuant to 5 U.S.C. 552a(k)(4), has exempted this 
system from the following provisions of the Privacy Act: 5 U.S.C. 
552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). In 
addition to the reasons stated below, the reason for exempting the 
system of records is that disclosure of statistical records (including 
release of accounting for disclosures) would in most instances be of no 
benefit to a particular individual since the records do

[[Page 122]]

not have a direct effect on a given individual.
    Where a record received from another system has been exempted in 
that source system under 5 U.S.C. 552a(j)(2) or (k)(2), DHS will claim 
the same exemptions for those records that are claimed for the original 
primary systems of records from which they originated and claims any 
additional exemptions set forth here.
    Exemptions from these particular subsections are justified, on a 
case-by-case basis to be determined at the time a request is made, for 
the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures for records derived from DHS 
operational systems could alert the subject of an investigation of an 
actual or potential criminal, civil, or regulatory violation to the 
existence of that investigation and reveal investigative interest on the 
part of DHS as well as the recipient agency. Disclosure of the 
accounting would therefore present a serious impediment to law 
enforcement efforts and efforts to preserve national security. 
Disclosure of the accounting would also permit the individual who is the 
subject of a record to impede the investigation, to tamper with 
witnesses or evidence, and to avoid detection or apprehension, which 
would undermine the entire investigative process. When an investigation 
has been completed, information on disclosures made may continue to be 
exempted if the fact that an investigation occurred remains sensitive 
after completion.
    (b) From subsection (d) (Access and Amendment to Records) because 
access to the records contained in this system of records that are 
derived from records from DHS operational systems could inform the 
subject of an investigation of an actual or potential criminal, civil, 
or regulatory violation to the existence of that investigation and 
reveal investigative interest on the part of DHS or another agency. 
Access to the records could permit the individual who is the subject of 
a record to impede the investigation, to tamper with witnesses or 
evidence, and to avoid detection or apprehension. Amendment of the 
records could interfere with ongoing investigations and law enforcement 
activities and would impose an unreasonable administrative burden by 
requiring investigations to be continually reinvestigated. In addition, 
permitting access and amendment to such information could disclose 
security-sensitive information that could be detrimental to homeland 
security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity, including 
statistics records covered by this system that derived from records 
originating from DHS operational systems.
    (f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    83. The Department of Homeland Security (DHS)/ALL-046 
Counterintelligence Program System of Records consists of electronic and 
paper records and will be used by DHS and its components. The DHS/ALL-
046 Counterintelligence Program System of Records is a repository of 
information held by DHS in connection with its several and varied 
missions and functions, including the enforcement of civil and criminal 
laws; investigations, inquiries, and proceedings there under; national 
security and intelligence activities; and protection of the President of 
the U.S. or other individuals pursuant to Section 3056 and 3056A of 
Title 18. The system of records covers information that is collected by, 
on behalf of, in support of, or in cooperation with DHS and its 
components and may contain personally identifiable information collected 
by other federal, state, local, tribal, foreign, or international 
government agencies.
    The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), 
has exempted this system from the following provisions of the Privacy 
Act, 5 U.S.C. secs. 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), 
(e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8), (e)(12); (f); and 
(g)(1). Additionally, the Secretary of Homeland Security, pursuant to 5 
U.S.C. 552a(k)(1), (k)(2), and (k)(5), has exempted this system from the 
following provisions of the Privacy Act: 5 U.S.C. secs. 552a(c)(3); (d); 
(e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). Exemptions from these 
particular subsections are justified, on a case-by-case basis to be 
determined at the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the

[[Page 123]]

accounting of disclosures could alert the subject of an investigation of 
an actual or potential criminal, civil, or regulatory violation to the 
existence of that investigation and reveal investigative interest on the 
part of DHS as well as the recipient agency. Disclosure of the 
accounting would therefore present a serious impediment to law 
enforcement efforts and/or efforts to preserve national security. 
Disclosure of the accounting would also permit the individual who is the 
subject of a record to impede the investigation, to tamper with 
witnesses or evidence, and to avoid detection or apprehension, which 
would undermine the entire investigative process.
    (b) From subsection (d) (Access and Amendment to Records) because 
access to the records contained in this system of records could inform 
the subject of an investigation of an actual or potential criminal, 
civil, or regulatory violation to the existence of that investigation 
and reveal investigative interest on the part of DHS or another agency. 
Access to the records could permit the individual who is the subject of 
a record to impede the investigation, to tamper with witnesses or 
evidence, and to avoid detection or apprehension. Amendment of the 
records could interfere with ongoing investigations and law enforcement 
activities. Further, permitting amendment to counterintelligence records 
after an investigation has been completed would impose an unmanageable 
administrative burden. In addition, permitting access and amendment to 
such information could disclose security-sensitive information that 
could be detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    (g) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (e)(12) (Matching Agreements) because requiring 
DHS to provide notice of a new or revised matching agreement with a non-
Federal agency, if one existed, would impair DHS operations by 
indicating which data elements and information are valuable to DHS's 
analytical functions, thereby providing harmful disclosure of 
information to individuals who would seek to circumvent or interfere 
with DHS's missions.
    (j) From subsection (g)(1) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    84. The U.S. Department of Homeland Security (DHS)/U.S. Customs and 
Border Protection (CBP)-002 Trusted and Registered Traveler Program 
(TRTP) System of Records consists of electronic and paper records and 
will be used by DHS and its components. The DHS/CBP-002 TRTP System of 
Records collects and maintains records on individuals who voluntarily 
provide personally identifiable information to U.S. Customs and Border 
Protection in return for enrollment in a program that will make them 
eligible for dedicated CBP processing at designated U.S. border ports of 
entry and foreign preclearance facilities. The DHS/CBP-002 TRTP system 
of records contains personally identifiable information in biographic 
application data, biometric information, conveyance information, pointer 
information to other law enforcement databases that support the DHS/CBP 
membership decision, Law Enforcement risk assessment worksheets, payment 
tracking numbers, and U.S. or foreign trusted traveler membership 
decisions in the form of a ``pass/fail.''

[[Page 124]]

    The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), 
has exempted this system from the following provisions of the Privacy 
Act: 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), 
(e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (f); and (g)(1). Additionally, the 
Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2), has 
exempted records created during the background check and vetting process 
from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3); 
(d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).
    Also, the Privacy Act requires DHS maintain an accounting of such 
disclosures made pursuant to all routine uses. However, disclosing the 
fact that CBP has disclosed records to an external law enforcement and/
or intelligence agency may affect ongoing law enforcement, intelligence, 
or national security activity. As such, the Secretary of Homeland 
Security, pursuant to 5 U.S.C. 552a(j)(2) and (k)(2) has exempted these 
records from (c)(3), (e)(8), and (g)(1) of the Privacy Act, as is 
necessary and appropriate to protect this information.
    In addition, when a record received from another system has been 
exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will claim 
the same exemptions for those records that are claimed for the original 
primary systems of records from which they originated and claims any 
additional exemptions set forth here.
    Finally, in its discretion, CBP will not assert any exemptions with 
regard to accessing or amending an individual's application data in a 
trusted or registered traveler program or accessing their final 
membership determination in the trusted or registered traveler programs.
    Exemptions from these particular subsections are justified, on a 
case-by-case basis to be determined at the time a request is made, for 
the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process. 
When an investigation has been completed, information on disclosures 
made may continue to be exempted if the fact that an investigation 
occurred remains sensitive after completion.
    (b) From subsection (d) (Access and Amendment to Records) because 
access to certain records contained in this system of records could 
inform the subject of an investigation of an actual or potential 
criminal, civil, or regulatory violation to the existence of that 
investigation and reveal investigative interest on the part of DHS or 
another agency. Access to certain records could also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension. Amendment of certain records could interfere with ongoing 
investigations and law enforcement activities. Further, permitting 
amendment to counterintelligence records after an investigation has been 
completed would impose an unmanageable administrative burden. In 
addition, permitting access and amendment to such information could 
disclose security-sensitive information that could be detrimental to 
homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.

[[Page 125]]

    (g) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g)(1) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    85. The U.S. Department of Homeland Security (DHS)/U.S. Customs and 
Border Protection (CBP)-018 Customs Trade Partnership Against Terrorism 
(CTPAT) System of Records consists of electronic and paper records and 
will be used by DHS and its components. The DHS/CBP-018 CTPAT System of 
Records is a repository of information held by DHS in connection with 
its several and varied missions and functions, including, but not 
limited to, the enforcement of civil and criminal laws; investigations, 
inquiries, and proceedings thereunder; and national security activities. 
The system of records contains information that is collected by, on 
behalf of, in support of, or in cooperation with DHS and its components 
and may contain personally identifiable information collected by other 
federal, state, local, tribal, foreign, or international government 
agencies.
    The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), 
has exempted this system from the following provisions of the Privacy 
Act, 5 U.S.C. 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), 
(e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (f); and (g). 
Additionally, the Secretary of Homeland Security pursuant to 5 U.S.C. 
552a(k)(2) has exempted this system from the following provisions of the 
Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3); 
(d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). Exemptions from 
these particular subsections are justified, on a case-by-case basis to 
be determined at the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access to Records) because access to the 
records contained in this system of records could inform the subject of 
an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS or another agency. Access to 
the records could permit the individual who is the subject of a record 
to impede the investigation, to tamper with witnesses or evidence, and 
to avoid detection or apprehension. Amendment of the records could 
interfere with ongoing investigations and law enforcement activities 
when weighing and evaluating all available information. Further, 
permitting amendment to records after an investigation has been 
completed could impose administrative burdens on investigators. In 
addition, permitting access and amendment to such information could 
disclose security-sensitive information that could be detrimental to 
homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine

[[Page 126]]

investigative efforts and reveal the identities of witnesses, and 
potential witnesses, and confidential informants.
    (g) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g)(1) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    86. The DHS/ICE-018 Analytical Records System of Records consists of 
electronic and paper records and will be used by DHS and its components. 
The DHS/ICE-018 Analytical Records System of Records is a repository of 
information held by DHS in connection with its several and varied 
missions and functions, including, but not limited to the enforcement of 
civil and criminal laws; investigations, inquiries, and proceedings 
there under; national security and intelligence activities. The DHS/ICE-
018 Analytical Records System of Records contains information that is 
collected by, on behalf of, in support of, or in cooperation with DHS 
and its components and may contain personally identifiable information 
collected by other Federal, State, local, tribal, foreign, or 
international government agencies. The Secretary of Homeland Security 
has exempted this system from the following provisions of the Privacy 
Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3) and (4), 
(d), (e)(1), (e)(2) and (3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), 
(e)(8); (f); and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the 
Secretary of Homeland Security has exempted this system from the 
following provisions of the Privacy Act, subject to limitations set 
forth in 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), and (f) 
pursuant to 5 U.S.C. 552a(k)(2). Where a record received from another 
system has been exempted in that source system under 5 U.S.C. 
552a(j)(2), DHS will claim the same exemptions for those records that 
are claimed for the original primary systems of records from which they 
originated and claims any additional exemptions set forth here. 
Exemptions from these particular subsections are justified, on a case-
by-case basis to be determined at the time a request is made, for the 
following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access and Amendment to Records) because 
access to the records contained in this system of records could inform 
the subject of an investigation of an actual or potential criminal, 
civil, or regulatory violation to the existence of that investigation 
and reveal investigative interest on the part of DHS or another agency. 
Access to the records could permit the individual who is the subject of 
a record to impede the investigation, to tamper with witnesses or 
evidence, and to avoid detection or apprehension. Amendment of the 
records could interfere with ongoing investigations and law enforcement 
activities. Further, permitting amendment to counterintelligence records 
after an investigation has been completed would impose an unmanageable 
administrative burden. In addition, permitting access and amendment to 
such information could disclose security-sensitive information that 
could be detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons

[[Page 127]]

noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    (g) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under seal and could result in disclosure of investigative 
techniques, procedures, and evidence.
    (i) From subsection (g)(1) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    87. The DHS/OIDO-001 Office of the Immigration Detention Ombudsman 
System of Records consists of electronic and paper records and will be 
used by DHS and its components. The DHS/OIDO-001 Office of the 
Immigration Detention Ombudsman System of Records is a repository of 
information held by DHS in connection with its several and varied 
missions and functions, including, but not limited to the enforcement of 
civil and criminal laws, and investigations, inquiries, and proceedings 
there under. The DHS/OIDO-001 Office of the Immigration Detention 
Ombudsman System of Records contains information that is collected by, 
on behalf of, in support of, or in cooperation with DHS and its 
components and may contain personally identifiable information collected 
by other Federal, State, local, tribal, foreign, or international 
government agencies.
    The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2) 
and (k)(5), has exempted this system from the following provisions of 
the Privacy Act: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), 
(e)(4)(I); and (f). Where a record received from another system has been 
exempted in that source system under 5 U.S.C. 552a(j)(2), (k)(2), or 
(k)(5), DHS will claim the same exemptions for those records that are 
claimed for the original primary systems of records from which they 
originated and claims any additional exemptions set forth here.
    Exemptions from these particular subsections are justified, on a 
case-by-case basis to be determined at the time a request is made, for 
the following reasons:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
release of the accounting of disclosures could alert the subject of an 
investigation of an actual or potential criminal, civil, or regulatory 
violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and efforts to preserve national 
security. Disclosure of the accounting would also permit the individual 
who is the subject of a record to impede the investigation, to tamper 
with witnesses or evidence, and to avoid detection or apprehension, 
which would undermine the entire investigative process. When an 
investigation has been completed, information on disclosures made may 
continue to be exempted if the fact that an investigation occurred 
remains sensitive after completion.
    (b) From subsection (d) (Access and Amendment to Records) because 
access to the records contained in this system of records could inform 
the subject of an investigation of an actual or potential criminal, 
civil, or regulatory violation to the existence of that investigation 
and reveal investigative interest on the part of DHS or another agency. 
Access to the records could permit the individual who is the subject of 
a record to impede the investigation, to tamper with witnesses or 
evidence, and to avoid detection or apprehension. Amendment of the 
records could interfere with ongoing investigations and law enforcement 
activities. Further, permitting amendment to law enforcement records 
after an investigation has been completed would impose an unmanageable 
administrative burden. In addition, permitting access and amendment to 
such information could disclose security-sensitive information that 
could be detrimental to homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up

[[Page 128]]

procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    88. The DHS/CBP-027 Customs Broker Management System of Records 
consists of electronic and paper records and will be used by DHS and its 
components. DHS/CBP-027 Customs Broker Management System of Records is a 
repository of information held by DHS in connection with its several and 
varied missions and functions, including, but not limited to the 
enforcement of civil and criminal laws; investigations, inquiries, and 
proceedings there under; and national security and intelligence 
activities. DHS/CBP-027 Customs Broker Management System of Records 
maintains information about individuals, associations, corporations, or 
partnerships to administer the Customs Broker License Exam, determine 
suitability for providing an individual a Customs Broker license, and 
determine whether a licensed Customs Broker continues to meet the 
eligibility requirements to maintain a Customs Broker license.
    The Secretary of Homeland Security has exempted this system pursuant 
to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act, portions of this 
system are exempt from 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), 
(e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), and (e)(8); (f); and 
(g). Additionally, the Secretary has exempted this system pursuant to 5 
U.S.C. 552a(k)(2) of the Privacy Act from subsections (c)(3), (d), 
(e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f). Exemptions from these 
particular subsections are justified, on a case-by-case basis to be 
determined at the time a request is made, for the following reasons:
    (a) From subsection (c)(3) and (4) (Accounting for Disclosures) 
because release of the accounting of disclosures could alert the subject 
of an investigation of an actual or potential criminal, civil, or 
regulatory violation to the existence of that investigation and reveal 
investigative interest on the part of DHS as well as the recipient 
agency. Disclosure of the accounting would therefore present a serious 
impediment to law enforcement efforts and/or efforts to preserve 
national security. Disclosure of the accounting would also permit the 
individual who is the subject of a record to impede the investigation, 
to tamper with witnesses or evidence, and to avoid detection or 
apprehension, which would undermine the entire investigative process.
    (b) From subsection (d) (Access and Amendment to Records) because 
access to the records contained in this system of records could inform 
the subject of an investigation of an actual or potential criminal, 
civil, or regulatory violation to the existence of that investigation 
and reveal investigative interest on the part of DHS or another agency. 
Access to the records could permit the individual who is the subject of 
a record to impede the investigation, to tamper with witnesses or 
evidence, and to avoid detection or apprehension. Amendment of the 
records could interfere with ongoing investigations and law enforcement 
activities when weighing and evaluating all available information. In 
addition, permitting access and amendment to such information could 
disclose security-sensitive information that could be detrimental to 
homeland security.
    (c) From subsection (e)(1) (Relevancy and Necessity of Information) 
because in the course of investigations into potential violations of 
federal law, the accuracy of information obtained or introduced 
occasionally may be unclear, or the information may not be strictly 
relevant or necessary to a specific investigation. In the interests of 
effective law enforcement, it is appropriate to retain all information 
that may aid in establishing patterns of unlawful activity.
    (d) From subsection (e)(2) (Collection of Information from 
Individuals) because requiring that information be collected from the 
subject of an investigation would alert the subject to the nature or 
existence of the investigation, thereby interfering with that 
investigation and related law enforcement activities.
    (e) From subsection (e)(3) (Notice to Subjects) because providing 
such detailed information could impede law enforcement by compromising 
the existence of a confidential investigation or reveal the identity of 
witnesses or confidential informants.
    (f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency 
Requirements) and (f) (Agency Rules), because portions of this system 
are exempt from the individual access provisions of subsection (d) for 
the reasons noted above, and therefore DHS is not required to establish 
requirements, rules, or procedures with respect to such access. 
Providing notice to individuals with respect to existence of records 
pertaining to them in the system of records or otherwise setting up 
procedures pursuant to which individuals may access and view records 
pertaining to themselves in the system would undermine investigative 
efforts and reveal the identities of witnesses, and potential witnesses, 
and confidential informants.
    (g) From subsection (e)(5) (Collection of Information) because with 
the collection of information for law enforcement purposes, it is 
impossible to determine in advance what information is accurate, 
relevant, timely, and complete.
    (h) From subsection (e)(8) (Notice on Individuals) because 
compliance would interfere with DHS's ability to obtain, serve, and 
issue subpoenas, warrants, and other law enforcement mechanisms that may 
be filed under

[[Page 129]]

seal and could result in disclosure of investigative techniques, 
procedures, and evidence.
    (i) From subsection (g)(1) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.
    89. The DHS/U.S. Customs and Border Protection (CBP)-020 Export 
Information System (EIS) System of Records consists of electronic and 
paper records and will be used by DHS and its components. CBP uses EIS 
to collect and process information to comply with export laws and 
facilitate legitimate international trade. CBP is charged with enforcing 
all U.S. export laws at the border and the exporting community is 
required to report export data to CBP that contains personally 
identifiable information (PII).
    The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), 
has exempted this system from the following provisions of the Privacy 
Act: 552a(c)(3); (e)(8); and (g)(1). Additionally, the Secretary of 
Homeland Security pursuant to 5 U.S.C. 552a(k)(2) has exempted records 
created during the background check and vetting process from the 
following provision of the Privacy Act, 5 U.S.C. 552a(c)(3).
    Further, no exemption shall be asserted with respect to information 
maintained in the system as it relates to data submitted by or on behalf 
of a person who travels from the United States and crosses the border, 
nor shall an exemption be asserted with respect to the resulting 
determination (approval or denial). After conferring with the 
appropriate component or agency, DHS may waive applicable exemptions in 
appropriate circumstances and where it would not appear to interfere 
with or adversely affect the law enforcement purposes of the systems 
from which the information is recompiled or in which it is contained. 
Exemptions from these particular subsections are justified, on a case-
by-case basis to be determined at the time a request is made, when 
information in this system of records may impede a law enforcement, 
intelligence-related, or national security investigation:
    (a) From subsection (c)(3) (Accounting for Disclosures) because 
making available to a record subject the accounting of disclosures from 
records concerning him or her would specifically reveal any 
investigative interest in the individual. Revealing this information 
could reasonably be expected to compromise ongoing efforts to 
investigate a violation of U.S. law, including investigations of a known 
or suspected terrorist, by notifying the record subject that he or she 
is under investigation. This information could also permit the record 
subject to take measures to impede the investigation (e.g., destroy 
evidence), intimidate potential witnesses, or flee the area to avoid or 
impede the investigation.
    (b) From subsection (e)(8) (Notice on Individuals) because to 
require individual notice of disclosure of information due to compulsory 
legal process would pose an impossible administrative burden on DHS and 
other agencies and could alert the subjects of counterterrorism or law 
enforcement investigations to the fact of those investigations when not 
previously known.
    (c) From subsection (g)(1) (Civil Remedies) to the extent that the 
system is exempt from other specific subsections of the Privacy Act.

[71 FR 20523, Apr. 21, 2006]

    Editorial Note: For Federal Register citations affecting appendix C 
to part 5, see the List of CFR Sections Affected, which appears in the 
Finding Aids section of the printed volume and at www.govinfo.gov.



PART 7_CLASSIFIED NATIONAL SECURITY INFORMATION--Table of Contents



Sec.
7.1 Purpose.
7.2 Scope.
7.3 Definitions.

                        Subpart A_Administration

7.10 Authority of the DHS Chief Security Officer.
7.11 Components' responsibilities.
7.12 Violations of classified information requirements.
7.13 Judicial proceedings.

                    Subpart B_Classified Information

7.20 Classification and declassification authority.
7.21 Classification of information, limitations.
7.22 Classification pending review.
7.23 Emergency release of classified information.
7.24 Duration of classification.
7.25 Identification and markings.
7.26 Derivative classification.
7.27 Declassification and downgrading.
7.28 Automatic declassification.
7.29 National Declassification Center.
7.30 Documents of permanent historical value.
7.31 Classification challenges.
7.32 Mandatory declassification review.

    Authority: 5 U.S.C. 301; Pub. L. 107-296; E.O. 13526; 3 CFR, 1995 
Comp., p. 333; E.O. 13142, 64 FR 66089, 3 CFR, 1999 Comp., p. 236; 32 
CFR part 2001.

    Source: 79 FR 44095, July 30, 2014, unless otherwise noted.

[[Page 130]]



Sec.  7.1  Purpose.

    The purpose of this part is to ensure that information within the 
Department of Homeland Security (DHS) relating to the national security 
is classified, safeguarded, and declassified pursuant to the provisions 
of Executive Order 13526, and implementing directives from the 
Information Security Oversight Office (ISOO) of the National Archives 
and Records Administration (NARA).



Sec.  7.2  Scope.

    (a) This part applies to all employees, detailees, and non-
contractor personnel inside and outside the Executive Branch who are 
granted access to classified information by the DHS, in accordance with 
the standards in Executive Order 13526, and its implementing directives, 
and Executive Order 13549, ``Classified National Security Information 
Program for State, Local, Tribal, and Private Sector Entities,'' and its 
implementing directives.
    (b) This part does not apply to contractors, grantees and other 
categories of personnel falling under the purview of Executive Order 
12829, National Industrial Security Program, as amended, and its 
implementing directives.
    (c) This part is independent of and does not affect any 
classification procedures or requirements of the Atomic Energy Act of 
1954, as amended (42 U.S.C. 2011 et seq.).
    (d) This part does not, and is not intended to, create any right to 
judicial review, or any other right or benefit or trust responsibility, 
substantive or procedural, enforceable by a party against the United 
States, its agencies or instrumentalities, its officers or employees, or 
any other person. This part creates limited rights to administrative 
review of decisions. This part does not, and is not intended to, create 
any right to judicial review of administrative action.



Sec.  7.3  Definitions.

    The terms defined or used in Executive Order 13526, and the 
implementing directives in 32 CFR part 2001 and 2004 are applicable to 
this part.



                        Subpart A_Administration



Sec.  7.10  Authority of the DHS Chief Security Officer.

    (a) The DHS Chief Security Officer (hereafter ``Chief Security 
Officer'') is designated as the Senior Agency Official as required by 
section 5.4(d) of Executive Order 13526, and, except as specifically 
provided elsewhere in this part, is authorized to administer the DHS 
Classified National Security Information program pursuant to Executive 
Order 13526.
    (b) To the extent that 32 CFR part 2001 refers to the agency head or 
``designee,'' the Chief Security Officer is such designee unless 
determined otherwise by the Secretary. The Chief Security Officer may 
further delegate the associated authorities.
    (c) The Chief Security Officer shall, among other actions:
    (1) Oversee and administer the DHS's program established under 
Executive Order 13526;
    (2) Promulgate implementing regulations;
    (3) Establish and maintain DHS-wide security education and training 
programs, to include implementation and management of mandatory training 
for DHS officials who have been delegated original classification 
authority and those who perform derivative classification actions and 
suspension of such authority for failure to attend such training;
    (4) Establish and maintain an ongoing self-inspection program that 
shall include regularly reviewing representative samples of DHS's 
original and derivative classification actions, correcting instances of 
misclassification, and reporting annually to the Director of ISOO on the 
DHS self-inspection program;
    (5) Establish procedures to prevent unnecessary access to classified 
information, including procedures that:
    (i) Require that a need for access to classified information is 
established before initiating administrative procedures to grant access; 
and
    (ii) Ensure that the number of persons granted access to classified 
information is limited to the minimum necessary for operational and 
security requirements and needs;

[[Page 131]]

    (6) Develop special contingency plans for the safeguarding of 
classified information used in or near hostile or potentially hostile 
areas;
    (7) Coordinate with the DHS Chief Human Capital Officer, as 
appropriate, to ensure that the performance contract or other system 
used to rate personnel performance includes the management of classified 
information as a critical element or item to be evaluated in the rating 
of:
    (i) Original classification authorities;
    (ii) Security managers or security specialists; and
    (iii) All other personnel whose duties significantly involve the 
creation or handling of classified information, including persons who 
apply derivative classification markings;
    (8) Account for the costs associated with implementing this part and 
report the cost to the Director of ISOO;
    (9) Assign in a prompt manner personnel to respond to any request, 
appeal, challenge, complaint, or suggestion concerning Executive Order 
13526, that pertains to classified information that originated in a DHS 
component that no longer exists and for which there is no clear 
successor in function;
    (10) Establish a secure capability to receive information, 
allegations, or complaints regarding over-classification or incorrect 
classification and to provide a ready source for guidance on proper 
classification;
    (11) Report violations, take corrective measures and assess 
appropriate sanctions as warranted, in accordance with Executive Order 
13526;
    (12) Oversee DHS creation and participation in special access 
programs authorized under Executive Order 13526;
    (13) Direct and administer DHS's personnel security program in 
accordance with Executive Order 12968 and other applicable law;
    (14) Direct and administer DHS implementation and compliance with 
the National Industrial Security Program in accordance with Executive 
Order 12829 and other applicable guidance; and
    (15) Perform any other duties as the Secretary may designate.
    (d) The Chief Security Officer shall maintain a current list of all 
officials authorized pursuant to this part to originally classify or 
declassify documents.
    (e) The Chief Security Officer shall establish and maintain a means 
for appointing, tracking, and training DHS officials who do or will 
perform original and derivative classification actions.
    (f) The Chief Security Officer shall administer a program for the 
implementation, management, and oversight of access to and safeguarding 
of classified information provided to state, local, tribal, and private 
sector personnel pursuant to Executive Order 13549, ``Classified 
National Security Information Program for State, Local, Tribal, and 
Private Sector Entities,'' and its implementing directives.
    (g) Nothing in this part will be interpreted to abrogate or affect 
the responsibilities of the Director of National Intelligence under the 
National Security Act of 1947, Public Law 235 (1947), as amended, and 
E.O. 12333, United States Intelligence Activities (1981), as amended, or 
any responsibilities of the Under Secretary for Intelligence and 
Analysis conferred by presidential or intelligence community directive 
implicating those authorities, insofar as those authorities concern 
classified sources, methods, and activities, classified national 
intelligence, or sensitive compartmented information and are executed 
consistent with delegations or designations of authority issued pursuant 
to the statutory authority of the Secretary.



Sec.  7.11  Components' responsibilities.

    Each DHS component shall appoint a security officer or security 
liaison to implement this part. The security officer/security liaison 
shall:
    (a) Implement, observe, and enforce security regulations or 
procedures within their component with respect to the classification, 
declassification, safeguarding, handling, and storage of classified 
national security information;
    (b) Report violations of the provisions of this part to the Chief 
Security Officer committed by employees of their component, as required 
by implementing directives;

[[Page 132]]

    (c) Ensure that employees of their component attend mandatory 
security education and training, as required by the DHS classified 
information security procedures, to include those component officials 
delegated the authority to classify information originally and those who 
perform derivative classification actions;
    (d) Continuously review the requirements for personnel access to 
classified information as a part of the continuous need-to-know 
evaluation, and initiate action to administratively withdraw or reduce 
the level of access authorized, as appropriate; and
    (e) Cooperate fully with any request from the Chief Security Officer 
for assistance in the implementation of this part.



Sec.  7.12  Violations of classified information requirements.

    (a) Any person who suspects or has knowledge of a violation of this 
part, including the known or suspected loss or compromise of classified 
information, shall promptly report such violations or possible 
violations, pursuant to requirements set forth in DHS directives.
    (b) DHS employees and detailees may be reprimanded, suspended 
without pay, terminated from classification authority, suspended from or 
denied access to classified information, or subject to other sanctions 
in accordance with applicable law and DHS regulations or directives if 
they:
    (1) Knowingly, willfully, or negligently disclose to unauthorized 
persons information properly classified under Executive Order 13526, or 
its predecessor orders;
    (2) Knowingly, willfully, or negligently classify or continue the 
classification of information in violation of Executive Order 13526, or 
its implementing directives; or
    (3) Knowingly, willfully, or negligently create or continue a 
special access program contrary to the requirements of Executive Order 
13526; or,
    (4) Knowingly, willfully, or negligently violate any other provision 
of Executive Order 13526, or DHS implementing directives, or;
    (5) Knowingly, willfully, or negligently grant eligibility for, or 
allow access to, classified information in violation of Executive Order 
13526, or its implementing directives, this part, or DHS implementing 
directives promulgated by the Chief Security Officer.



Sec.  7.13  Judicial proceedings.

    (a) Any DHS official or organization, except for the Office of 
Inspector General in matters involving the Office of Inspector General 
only, receiving an order or subpoena from a federal or state court, or 
an administrative subpoena from a federal agency, to produce classified 
information (see 6 CFR 5.41 through 5.49), required to submit classified 
information for official DHS litigation purposes, or receiving 
classified information from another organization for production of such 
in litigation, shall notify the Office of the General Counsel, unless 
the demand for production is made by the Office of the General Counsel, 
and immediately determine from the agency originating the classified 
information whether the information can be declassified. If 
declassification is not possible, DHS representatives will take 
appropriate action to protect such information, pursuant to the 
provisions of this section.
    (b) If a determination is made under paragraph (a) of this section 
to produce classified information in a judicial proceeding in any 
manner, the DHS General Counsel attorney, or the Office of Inspector 
General attorney, if the matter involves the Office of Inspector General 
only, in conjunction with the Department of Justice, shall take 
appropriate steps to protect classified information in judicial 
proceedings and retrieve the information when the information is no 
longer required in such judicial proceedings, in accordance with the 
Department of Justice procedures, and in Federal criminal cases, 
pursuant to the requirements of Classified Information Procedures Act 
(CIPA), Public Law 96-456, 94 Stat. 2025, (18 U.S.C. App.), and the 
``Security Procedures Established Pursuant to Public Law 96-456, 94 
Stat. 2025, by the Chief Justice of the United States for the Protection 
of Classified Information,'' and other applicable authorities.

[[Page 133]]



                    Subpart B_Classified Information



Sec.  7.20  Classification and declassification authority.

    (a) Top Secret original classification authority may only be 
exercised by the Secretary and by officials with a demonstrable and 
continuing need to exercise such authority and to whom such authority is 
delegated in writing by the Secretary. The Chief Security Officer, as 
the Senior Agency Official, is delegated authority to originally 
classify information up to and including Top Secret. No official who is 
delegated Top Secret original classification authority by the Secretary 
may further delegate such authority.
    (b) The Chief Security Officer may delegate Secret and Confidential 
original classification authority to other officials with a demonstrable 
and continuing need to exercise such authority. No official who is 
delegated original classification authority by the Secretary or the 
Chief Security Officer may further delegate such authority.
    (c) Persons who are delegated original classification authority 
shall attend mandatory classification training within 60 days of the 
delegation, and annually thereafter. Persons who fail to attend 
mandatory training shall have such authority suspended until such time 
as the training occurs.
    (1) Except for suspensions of the Inspector General's classification 
authority, the Chief Security Officer may waive a suspension of 
authority for no longer than 60 days following the due date of the 
training when unavoidable circumstances exist that prevent the person 
from attending the training.
    (2) For cases involving suspension of the Inspector General's 
classification authority under paragraph (c) of this section, only the 
Secretary or Deputy Secretary may waive such a suspension.
    (d) Officials authorized to classify information at a specified 
level are also authorized to classify information at a lower level. In 
the absence of an official authorized to exercise classification 
authority, the person designated to act in lieu of such official may 
exercise the official's classification authority.
    (e) Declassification authority may be exercised by the official who 
authorized the original classification, if that official is still 
serving in the same position and has original classification authority; 
the originator's current successor in function, if that individual has 
original classification authority; a supervisory official of either the 
originator or his or her successor in function, if the supervisory 
official has original classification authority; or officials delegated 
declassification authority by the Secretary or the Chief Security 
Officer.



Sec.  7.21  Classification of information, limitations.

    (a) Information may be originally classified only if all of the 
following standards are met:
    (1) An original classification authority is classifying the 
information;
    (2) The information is owned by, produced by or for, or is under the 
control of the United States Government;
    (3) The information falls within one or more of the categories of 
information specified in section 1.4 of Executive Order 13526; and
    (4) The original classification authority determines that the 
unauthorized disclosure of the information reasonably could be expected 
to cause identifiable and describable damage to the national security.
    (b) Information shall be classified as Top Secret, Secret, or 
Confidential in accordance with and in compliance with the standards and 
criteria in Executive Order 13526. No other terms shall be used to 
identify United States classified information except as otherwise 
provided by statute.
    (c) If there is significant doubt about the need to classify 
information it shall not be classified. If classification is warranted 
but there is significant doubt about the appropriate level of 
classification it shall be classified at the lower level.
    (d) Original classification decisions made by a DHS original 
classification authority shall be incorporated into a security 
classification guide in a timely manner but no later than one year from 
the date of the original decision. Such decisions shall be reported to 
the

[[Page 134]]

Office of the Chief Security Officer, Administrative Security Division, 
within thirty days following the original classification decision.
    (e) All DHS security classification guides shall be coordinated 
through and receive the concurrence of the Office of the Chief Security 
Officer, Administrative Security Division, prior to approval and 
publication by an original classification authority.
    (f) Information shall not be classified in order to:
    (1) Conceal inefficiency, violations of law, or administrative 
error;
    (2) Prevent embarrassment to a person, organization, or agency;
    (3) Restrain competition;
    (4) Prevent or delay release of information that does not require 
protection in the interest of national security.
    (g) Information may not be reclassified after it has been 
declassified and released to the public under proper authority unless:
    (1) The reclassification is approved in writing by the Secretary 
based on a document-by-document determination that the reclassification 
of the information is required to prevent significant and demonstrable 
damage to the national security;
    (2) The reclassification of the information meets the standards and 
criteria for classification pursuant to Executive Order 13526;
    (3) The information may be reasonably recovered without bringing 
undue attention to the information; and
    (4) The reclassification action is reported promptly to the 
Assistant to the President for National Security Affairs (National 
Security Advisor) and the Director of ISOO.
    (5) For documents in the physical and legal custody of the National 
Archives and Records Administration that have previously been made 
available for public use and determined to warrant reclassification per 
paragraphs (g)(1) through (4) of this section, the Secretary shall 
notify the Archivist of the United States, who shall suspend public 
access pending approval by the Director of ISOO. Any such decision made 
by the Director of ISOO may be appealed by the Secretary to the 
President through the National Security Advisor.
    (h) Information that has not previously been disclosed to the public 
under proper authority may be classified or reclassified after DHS has 
received a request for it under the Freedom of Information Act (5 U.S.C. 
552), the Presidential Records Act, 44 U.S.C. 2204(c)(1), the Privacy 
Act of 1974 (5 U.S.C. 552a), or the mandatory review provisions of 
Executive Order 13526, section 3.5. When it is necessary to classify or 
reclassify such information, it shall be done so on a document-by-
document basis with the personal participation of and under the 
direction of the Secretary or Deputy Secretary.



Sec.  7.22  Classification pending review.

    (a) Whenever persons who do not have original classification 
authority originate or develop information that they believe requires 
immediate classification and safeguarding, and no authorized original 
classifier is available, that person shall:
    (1) Safeguard the information in a manner appropriate for the 
classification level they believe it to be;
    (2) Apply the appropriate overall classification markings; and
    (3) Within five working days, securely transmit the information to 
the organization that has appropriate subject matter interest and 
original classification authority.
    (b) When it is not clear which component would be the appropriate 
original classifier, the information shall be sent to the Office of the 
Chief Security Officer, Administrative Security Division, to determine 
the appropriate organization.
    (c) The applicable original classification authority shall decide 
within 30 days of receipt whether the information warrants 
classification pursuant to Executive Order 13526 and shall render such 
decision in writing.



Sec.  7.23  Emergency release of classified information.

    (a) The DHS Undersecretary for Management has delegated to certain 
DHS employees the authority to disclose classified information to an 
individual or individuals not otherwise eligible for access in emergency 
situations

[[Page 135]]

when there is an imminent threat to life or in defense of the homeland.
    (b) In exercising this authority, the delegees shall adhere to the 
following conditions:
    (1) Limit the amount of classified information disclosed to a 
minimum to achieve the intended purpose;
    (2) Limit the number of individuals who receive it to only those 
persons with a specific need-to-know;
    (3) Transmit the classified information through approved 
communication channels by the most secure and expeditious method 
possible, or by other means deemed necessary in exigent circumstances;
    (4) Provide instructions about what specific information is 
classified and how it should be safeguarded. Physical custody of 
classified information must remain with an authorized Federal Government 
entity, in all but the most extraordinary circumstances as determined by 
the delegated official;
    (5) Provide appropriate briefings to the recipients on their 
responsibilities not to disclose the information and obtain from the 
recipients a signed DHS Emergency Release of Classified Information Non-
disclosure Form. In emergency situations requiring immediate verbal 
release of information, the signed nondisclosure agreement memorializing 
the briefing may be received after the emergency abates;
    (6) Within 72 hours of the disclosure of classified information, or 
the earliest opportunity that the emergency permits, but no later than 7 
days after the release, the disclosing authority must notify the DHS 
Office of the Chief Security Officer, Administrative Security Division, 
and the originating agency of the information disclosed. A copy of the 
signed nondisclosure agreements should be forwarded with the 
notification, or as soon thereafter as practical.
    (7) Release of information pursuant to this authority does not 
constitute declassification of the information.
    (8) Authority to disclose classified information under the above 
conditions may not be further delegated.



Sec.  7.24  Duration of classification.

    (a) At the time of original classification, original classification 
authorities shall apply a date or event in which the information will be 
automatically declassified.
    (b) The original classification authority shall attempt to establish 
a specific date or event that is not more than 10 years from the date of 
origination in which the information will be automatically declassified. 
If the original classification authority cannot determine an earlier 
specific date or event it shall be marked for automatic declassification 
10 years from the date of origination.
    (c) If the original classification authority determines that the 
sensitivity of the information requires classification beyond 10 years, 
it may be marked for automatic declassification for up to 25 years from 
the date of the original classification decision.
    (d) Original classification authorities do not have the authority to 
classify or retain the classification of information beyond 25 years 
from the date of origination. The only exceptions to this rule are 
information that would clearly and demonstrably be expected to reveal 
the identity of a confidential human source or human intelligence 
source, or, key design concepts of weapons of mass destruction. In these 
instances, the information shall be marked for declassification based on 
implementing directives issued pursuant to Executive Order 13526. In all 
other instances, classification beyond 25 years shall only be authorized 
in accordance with Sec.  7.28 and Executive Order 13526.



Sec.  7.25  Identification and markings.

    (a) Classified information, in all forms, must be marked in a manner 
that is immediately apparent pursuant to the standards set forth in 
section 1.6 of Executive Order 13526; 32 CFR part 2001, subpart B; and 
internal DHS guidance approved and distributed by the Office of the 
Chief Security Officer.
    (b) Foreign government information shall retain its original 
classification markings or be assigned a U.S. classification that 
provides a degree of protection at least equivalent to that required by 
the entity that furnished the information.
    (c) Information assigned a level of classification under predecessor 
Executive Orders shall remain classified at that level of 
classification, except as

[[Page 136]]

otherwise provided herein, i.e., the information is reclassified or 
declassified.



Sec.  7.26  Derivative classification.

    (a) Derivative classification is defined as the incorporating, 
paraphrasing, restating, or generating in a new form information that is 
already classified, and marking the newly developed material consistent 
with the classification markings that apply to the source information. 
Information is also derivatively classified when classification is based 
on instructions provided in a security classification guide.
    (b) Persons need not possess original classification authority to 
derivatively classify information based on source documents or 
classification guides.
    (c) Persons who perform derivative classification actions shall be 
designated as authorized derivative classifiers as specified in 
directives published by the Office of the Chief Security Officer.
    (d) Persons who are designated as authorized derivative classifiers 
shall attend mandatory classification training before performing 
derivative classification actions, and once every two years thereafter. 
Persons who fail to attend mandatory training shall have such authority 
suspended until such time as the training occurs.
    (1) Except for suspensions of the Office of Inspector General's 
classification authority, the Chief Security Officer may waive the 
suspension of authority for no longer than 60 days following the due 
date of the training when unavoidable circumstances exist that prevent 
the person from attending the training.
    (2) For cases involving suspension of the Office of Inspector 
General's classification authority under paragraph (d) of this section, 
only the Secretary or Deputy Secretary may waive such a suspension.
    (e) Persons who apply derivative classification markings shall 
observe original classification decisions and carry forward to any newly 
created documents the pertinent classification markings.
    (f) Information classified derivatively from other classified 
information shall be classified and marked in accordance with the 
standards set forth in sections 2.1 and 2.2 of Executive Order 13526, 32 
CFR part 2001, and internal DHS guidance provided by the Office of the 
Chief Security Officer.



Sec.  7.27  Declassification and downgrading.

    (a) Classified information shall be declassified as soon as it no 
longer meets the standards for classification. Declassification and 
downgrading is governed by part 3 of Executive Order 13526, implementing 
ISOO directives at 32 CFR part 2001, subpart C, and applicable internal 
DHS direction provided by the Office of the Chief Security Officer.
    (b) Information shall be declassified or downgraded by the official 
who authorized the original classification if that official is still 
serving in the same position and has original classification authority, 
the originator's successor if that position has original classification 
authority, or a supervisory official of either if that position has 
original classification authority, or, by officials delegated such 
authority in writing by the Secretary or the Chief Security Officer, or, 
pursuant to section 3.1.(e) of Executive Order 13526, the Director of 
the Information Security Oversight Office.
    (c) It is presumed that information that continues to meet the 
classification requirements under Executive Order 13526 requires 
continued protection. In some exceptional cases during declassification 
reviews, the need to protect classified information may be outweighed by 
the public interest in disclosure of the information, and in these cases 
the information should be declassified. If it appears that the public 
interest in disclosure of the information may outweigh the need to 
protect the information, the declassification reviewing official shall 
refer the information with a recommendation for decision to the Chief 
Security Officer. The Chief Security Officer shall review the 
information and after consulting with the applicable original 
classification authority and other components and agencies with 
equities, make a recommendation to the Secretary on whether the public 
interest in disclosure outweighs the damage to

[[Page 137]]

national security that might reasonably be expected from disclosure. The 
Secretary shall decide whether to declassify the information. The 
decision of the Secretary shall be final. This provision does not 
amplify or modify the substantive criteria or procedures for 
classification or create any substantive or procedural rights subject to 
judicial review.
    (d) Each component shall develop schedules for declassification of 
records in the National Archives.



Sec.  7.28  Automatic declassification.

    (a) Subject to paragraph (b) of this section and paragraphs 3.3(b)-
(d) and (g)-(j) of Executive Order 13526, all classified information 
contained in records that are more than 25 years old that have been 
determined to have permanent historical value shall be declassified 
automatically on December 31st of the year that is 25 years from the 
date of origin.
    (b) At least one year before information is declassified 
automatically under this section, the Chief Security Officer shall 
notify the ISOO of any specific information that DHS proposes to exempt 
from automatic declassification. The notification shall include:
    (1) A description of the information;
    (2) An explanation of why the information is exempt from automatic 
declassification and must remain classified for a longer period of time; 
and
    (3) A specific date or event for declassification of the information 
whenever the information exempted does not identify a confidential human 
source or human intelligence source, or, key design concepts of weapons 
of mass destruction.
    (c) Proposed exemptions under this section shall be forwarded to the 
Chief Security Officer. When the Chief Security Officer determines the 
exemption request is consistent with this section, he or she will submit 
the exemption request to the Executive Secretary of the Interagency 
Security Classification Appeals Panel (ISCAP) for approval.
    (d) Declassification guides that narrowly and precisely define 
exempted information may be used to exempt information from automatic 
declassification. Declassification guides must include the exemption 
notification information detailed in paragraph (b) of this section, and 
be approved pursuant to paragraph (c) of this section. The creation of 
declassification guides to cite proposed or ISCAP-approved DHS 
exemptions shall be coordinated through and processed by the Office of 
the Chief Security Officer, Administrative Security Division.



Sec.  7.29  National Declassification Center.

    (a) The Chief Security Officer and applicable components will 
support the NARA, National Declassification Center (NDC), which was 
established to streamline declassification processes, facilitate 
quality-assurance measures, and implement standardized training 
regarding the declassification of records determined to have permanent 
historical value. The Chief Security Officer will assign DHS personnel 
on an as-needed basis to address declassification matters and priorities 
containing DHS equities.
    (b) The Office of the Chief Security Officer shall provide the NDC 
with all DHS classification and declassification guides that include 
ISCAP-approved exemptions from automatic declassification.
    (c) The Chief Security Officer, or his designee, shall oversee DHS-
wide support to the NDC, including representing DHS in consultations 
with the NDC Director.



Sec.  7.30  Documents of permanent historical value.

    The original classification authority, to the greatest extent 
possible, shall declassify classified information contained in records 
determined to have permanent historical value under 44 U.S.C. 2107 
before they are accessioned into the National Archives.



Sec.  7.31  Classification challenges.

    (a) Authorized holders of information classified by DHS or any other 
agency who, in good faith, believe that specific information is 
improperly or unnecessarily classified are encouraged and expected to 
challenge the classification status of that information pursuant to 
section 1.8 of Executive Order 13526. Authorized holders may submit 
classification challenges in writing to the original classification 
authority with

[[Page 138]]

jurisdiction over the information in question. If an original 
classification authority cannot be determined, the challenge shall be 
submitted to the Office of the Chief Security Officer, Administrative 
Security Division. The challenge need not be more specific than a 
question as to why the information is or is not classified, or is 
classified at a certain level.
    (b) If anonymity of the challenger is requested, the challenger may 
submit the challenge to the Office of the Chief Security Officer, 
Administrative Security Division. The Administrative Security Division 
will act as an agent for the challenger and the identity of the 
challenger will be redacted.
    (c) The original classification authority shall no later than 60 
days from receipt of the challenge, provide a written response to the 
submitter. The original classification authority may classify or 
declassify the information subject to the challenge and, if applicable, 
state specific reasons why the original classification determination was 
proper. If the original classification authority is not able to respond 
within 60 days, he or she shall inform the individual who filed the 
challenge in writing of that fact, and the anticipated determination 
date.
    (d) The individual challenging the classification will be notified 
of the determination made by the original classification authority and 
that the individual may appeal this determination to the Chief Security 
Officer, or in cases involving appeals by Office of Inspector General 
employees, the Secretary or Deputy Secretary. Upon receipt of such 
appeals, the Chief Security Officer, or in cases involving appeals by 
Office of Inspector General employees, the Secretary or Deputy 
Secretary, shall convene a DHS Classification Appeals Panel (DHS/CAP). 
The DHS/CAP shall, at a minimum, consist of representatives from the 
Office of the Chief Security Officer, the Office of General Counsel, and 
a representative from the component having jurisdiction over the 
information. Additional members may be added as determined by the Chief 
Security Officer. The DHS/CAP shall be chaired by the Chief Security 
Officer.
    (e) If the requester files an appeal through the DHS/CAP, and the 
appeal is denied, the requester shall be notified of the right to appeal 
the denial to the Interagency Security Classification Appeals Panel 
(ISCAP) pursuant to section 5.3 of Executive Order 13526, and the rules 
issued by the ISCAP pursuant to section 5.3 of Executive Order 13526.
    (f) Any individual who challenges a classification and believes that 
any action has been taken against him or her in retaliation or 
retribution because of that challenge may report the facts to the Office 
of Inspector General via its Hotline or Web site, or other appropriate 
office.
    (g) Nothing in this section shall prohibit a person from informally 
challenging the classified status of information directly to the 
original classification authority.
    (h) Classification challenge provisions are not applicable to 
documents required to be submitted for prepublication review or other 
administrative process pursuant to an approved non-disclosure agreement.
    (i) Requests for review of classified material for declassification 
by persons other than authorized holders are governed by Sec.  7.32.



Sec.  7.32  Mandatory declassification review.

    (a) Any individual, as ``individual'' is defined by 5 U.S.C. 
552a(a)(2) (with the exception of a foreign government entity or any 
representative thereof), may request that classified information be 
reviewed for declassification pursuant to the mandatory declassification 
review provisions of section 3.5 of Executive Order 13526. Such requests 
must be sent to the Departmental Disclosure Officer, Privacy Office, 245 
Murray Lane SW., Building 410, Washington, DC 20528.
    (b) The request must describe the document or material with enough 
specificity to allow it to be located by the component with a reasonable 
amount of effort. Components will generally consider deficient any 
requests for declassification review of, for instance, broad categories 
of information, entire file series of records, or similar non-specific 
requests.

[[Page 139]]

    (1) When the description of the information in the request is 
deficient, the component shall solicit as much additional identifying 
information as possible from the requester.
    (2) If the information or material requested cannot be obtained with 
a reasonable amount of effort, the component shall provide the 
requester, through the DHS Disclosure Officer, with written notification 
of the reasons why no action will be taken and of the requester's right 
to appeal.
    (c) Requests for review of information that has been subjected to a 
declassification review request within the preceding two years shall not 
be processed. The DHS Disclosure Officer will notify the requester of 
such denial.
    (d) Mandatory Declassification Review provisions are not applicable 
to documents required to be submitted for prepublication review or other 
administrative process pursuant to an approved non-disclosure agreement.
    (e) Requests for information exempted from search or review under 
sections 701, 702, or 703 of the National Security Act of 1947, as added 
and amended (50 U.S.C. 431-433), or other provisions of law, shall not 
be processed. The DHS Disclosure Officer will notify the requester of 
such denial.
    (f) If documents or material being reviewed for declassification 
under this section contain information that has been originally 
classified by another government agency, the reviewing authority shall 
notify the DHS Disclosure Officer. Unless the association of that 
organization with the requested information is itself classified, the 
DHS Disclosure Officer will then notify the requester of the referral.
    (g) A DHS component may refuse to confirm or deny the existence, or 
non-existence, of requested information when its existence or non-
existence, is properly classified.
    (h) DHS components shall make a final determination on the request 
as soon as practicable but within one year from receipt. When 
information cannot be declassified in its entirety, components shall 
make reasonable efforts to redact those portions that still meet the 
standards for classification and release those declassified portions of 
the requested information that constitute a coherent segment.
    (i) DHS components shall notify the DHS Disclosure Officer of the 
determination made in the processing of a mandatory review request. Such 
notification shall include the number of pages declassified in full; the 
number of pages declassified in part; and the number of pages where 
declassification was denied.
    (j) The DHS Disclosure Officer shall maintain a record of all 
mandatory review actions for reporting in accordance with applicable 
Federal requirements.
    (k) The mandatory declassification review system shall provide for 
administrative appeal in cases where the review results in the 
information remaining classified. The requester shall be notified of the 
results of the review and of the right to appeal the denial of 
declassification. To address such appeals, the DHS Disclosure Office 
shall convene a DHS Classification Appeals Panel (DHS/CAP). The DHS/CAP 
shall, at a minimum, consist of representatives from the Disclosure 
Office, the Office of the Chief Security Officer, the Office of General 
Counsel, and a representative from the component having jurisdiction 
over the information. Additional members may be added as determined by 
the DHS Disclosure Officer. The DHS/CAP shall be chaired by the DHS 
Disclosure Officer.
    (l) If the requester files an appeal through the DHS/CAP, and the 
appeal is denied, the requester shall be notified of the right to appeal 
the denial to the ISCAP pursuant to section 5.3 of Executive Order 
13526, and the rules issued by the ISCAP pursuant to section 5.3 of 
Executive Order 13526.



PART 9_RESTRICTIONS UPON LOBBYING--Table of Contents



                            Subpart A_General

Sec.
9.1 Conditions on use of funds.
9.2 Definitions.
9.3 Certification and disclosure.

                  Subpart B_Activities by Own Employees

9.11 Agency and legislative liaison.
9.15 Professional and technical services.
9.20 Reporting.

[[Page 140]]

            Subpart C_Activities by Other than Own Employees

9.23 Professional and technical services.

                   Subpart D_Penalties and Enforcement

9.31 Penalties.
9.32 Penalty procedures.
9.33 Enforcement.

                          Subpart E_Exemptions

9.41 Secretary of Defense.

                        Subpart F_Agency Reports

9.51 Semi-annual compilation.
9.52 Inspector General report.

Appendix A to Part 9--Certification Regarding Lobbying
Appendix B to Part 9--Disclosure Form To Report Lobbying

    Authority: Sec. 319, Pub. L. 101-121, 103 Stat. 750 (31 U.S.C. 
1352); Pub. L. 107-296, 116 Stat. 2135 (6 U.S.C. 1 et seq.); 5 U.S.C. 
301.

    Source: 68 FR 10912, Mar. 6, 2003, unless otherwise noted.



                            Subpart A_General



Sec.  9.1  Conditions on use of funds.

    (a) No appropriated funds may be expended by the recipient of a 
Federal contract, grant, loan, or cooperative agreement to pay any 
person for influencing or attempting to influence an officer or employee 
of any agency, a Member of Congress, an officer or employee of Congress, 
or an employee of a Member of Congress in connection with any of the 
following covered Federal actions: the awarding of any Federal contract, 
the making of any Federal grant, the making of any Federal loan, the 
entering into of any cooperative agreement, and the extension, 
continuation, renewal, amendment, or modification of any Federal 
contract, grant, loan, or cooperative agreement.
    (b) Each person who requests or receives from an agency a Federal 
contract, grant, loan, or cooperative agreement shall file with that 
agency a certification, set forth in appendix A to this part, that the 
person has not made, and will not make, any payment prohibited by 
paragraph (a) of this section.
    (c) Each person who requests or receives from an agency a Federal 
contract, grant, loan, or a cooperative agreement shall file with that 
agency a disclosure form, set forth in appendix B to this part, if such 
person has made or has agreed to make any payment using non appropriated 
funds (to include profits from any covered Federal action), which would 
be prohibited under paragraph (a) of this section if paid for with 
appropriated funds.
    (d) Each person who requests or receives from an agency a commitment 
providing for the United States to insure or guarantee a loan shall file 
with that agency a statement, set forth in appendix A to this part, 
whether that person has made or has agreed to make any payment to 
influence or attempt to influence an officer or employee of any agency, 
a Member of Congress, an officer or employee of Congress, or an employee 
of a Member of Congress in connection with that loan insurance or 
guarantee.
    (e) Each person who requests or receives from an agency a commitment 
providing for the United States to insure or guarantee a loan shall file 
with that agency a disclosure form, set forth in appendix B to this 
part, if that person has made or has agreed to make any payment to 
influence or attempt to influence an officer or employee of any agency, 
a Member of Congress, an officer or employee of Congress, or an employee 
of a Member of Congress in connection with that loan insurance or 
guarantee.



Sec.  9.2  Definitions.

    For purposes of this part:
    (a) Agency has the same meaning as provided in 5 U.S.C. 552(f), and 
includes Federal executive departments and agencies as well as 
independent regulatory commissions and Government corporations, as 
defined in 31 U.S.C. 9101(1).
    (b) The term covered Federal action:
    (1) Means any of the following Federal actions:
    (i) The awarding of any Federal contract;
    (ii) The making of any Federal grant;
    (iii) The making of any Federal loan;
    (iv) The entering into of any cooperative agreement; and
    (v) The extension, continuation, renewal, amendment, or modification 
of

[[Page 141]]

any Federal contract, grant, loan, or cooperative agreement.
    (2) Does not include receiving from an agency a commitment providing 
for the United States to insure or guarantee a loan. Loan guarantees and 
loan insurance are addressed independently within this part.
    (c) Federal contract means an acquisition contract awarded by an 
agency, including those subject to the Federal Acquisition Regulation 
(FAR) (48 CFR Chapter 1) and any other acquisition contract for real or 
personal property or services not subject to the FAR.
    (d) Federal cooperative agreement means a cooperative agreement 
entered into by an agency.
    (e) Federal grant means an award of financial assistance in the form 
of money, or property in lieu of money, by the Federal Government or a 
direct appropriation made by law to any person. The term does not 
include technical assistance that provides services instead of money, or 
other assistance in the form of revenue sharing, loans, loan guarantees, 
loan insurance, interest subsidies, insurance, or direct United States 
cash assistance to an individual.
    (f) Federal loan means a loan made by an agency. The term does not 
include loan guarantee or loan insurance.
    (g) Indian tribe and tribal organization have the meaning provided 
in section 4 of the Indian Self-Determination and Education Assistance 
Act (25 U.S.C. 450B). Alaskan Natives are included under the definition 
of Indian tribe in that Act.
    (h) Influencing or attempting to influence means making, with the 
intent to influence, any communication to or appearance before an 
officer or employee or any agency, a Member of Congress, an officer or 
employee of Congress, or an employee of a Member of Congress in 
connection with any covered Federal action.
    (i) Loan guarantee or loan insurance means an agency's guarantee or 
insurance of a loan made by a person.
    (j) Local government means a unit of government in a State and, if 
chartered, established, or otherwise recognized by a State for the 
performance of a governmental duty, including a local public authority, 
a special district, an intrastate district, a council of governments, a 
sponsor group representative organization, and any other instrumentality 
of a local government.
    (k) Officer or employee of an agency includes the following 
individuals who are employed by an agency:
    (1) An individual appointed to a position in the Government pursuant 
to title 5 of the United States Code, including any position by 
temporary appointment or any appointment as an acting official as 
outlined in section 1511(c) of the Homeland Security Act;
    (2) A member of the uniformed services as defined in 37 U.S.C. 
101(3);
    (3) A special Government employee as defined in section 18 U.S.C. 
202; and
    (4) An individual who is a member of a Federal advisory committee, 
as defined by the Federal Advisory Committee Act at 5 U.S.C. App. 2.
    (l) Person means an individual, corporation, company, association, 
authority, firm, partnership, society, State, and local government, 
regardless of whether such entity is operated for profit or not for 
profit. This term excludes an Indian tribe, tribal organization, or any 
other Indian organization with respect to expenditures specifically 
permitted by other Federal law.
    (m) Reasonable compensation means, with respect to a regularly 
employed officer or employee of any person, compensation that is 
consistent with the normal compensation for such officer or employee for 
work that is not furnished to, not funded by, or not furnished in 
cooperation with the Federal Government.
    (n) Reasonable payment means, with respect to professional and other 
technical services, a payment in an amount that is consistent with the 
amount normally paid for such services in the private sector.
    (o) Recipient includes all contractors, subcontractors at any tier, 
and sub grantees at any tier of the recipient of funds received in 
connection with a Federal contract, grant, loan, or cooperative 
agreement. The term excludes an Indian tribe, tribal organization, or 
any other Indian organization with respect to expenditures specifically 
permitted by other Federal law.

[[Page 142]]

    (p) Regularly employed means, with respect to an officer or employee 
of a person requesting or receiving a Federal contract, grant, loan, or 
cooperative agreement or a commitment providing for the United States to 
insure or guarantee a loan, an officer or employee who is employed by 
such person for at least 130 working days within one year immediately 
preceding the date of the submission that initiates agency consideration 
of such person for receipt of such contract, grant, loan, cooperative 
agreement, loan insurance commitment, or loan guarantee commitment. An 
officer or employee who is employed by such person for less than 130 
working days within one year immediately preceding the date of the 
submission that initiates agency consideration of such person shall be 
considered to be regularly employed as soon as he or she is employed by 
such person for 130 working days.
    (q) State means a State of the United States, the District of 
Columbia, the Commonwealth of Puerto Rico, a territory or possession of 
the United States, an agency or instrumentality of a State, and a multi-
State, regional, or interstate entity having governmental duties and 
powers.



Sec.  9.3  Certification and disclosure.

    (a) Each person shall file a certification, and a disclosure form, 
if required, with each submission that initiates agency consideration of 
such person for:
    (1) Award of a Federal contract, grant, or cooperative agreement 
exceeding $100,000; or
    (2) An award of a Federal loan or a commitment providing for the 
United States to insure or guarantee a loan exceeding $150,000.
    (b)(1) Each person shall file a certification, and a disclosure 
form, if required, upon receipt by such person of:
    (i) A Federal contract, grant, or cooperative agreement exceeding 
$100,000; or
    (ii) A Federal loan or a commitment providing for the United States 
to insure or guarantee a loan exceeding $150,000.
    (2) A filing described in paragraph (b)(1) of this section shall not 
be required if such person previously filed a certification, and a 
disclosure form required under paragraph (a) of this section.
    (c) Each person shall file a disclosure form at the end of each 
calendar quarter in which there occurs any event that requires 
disclosure or that materially affects the accuracy of the information 
contained in any disclosure form previously filed by such person under 
paragraph (a) or (b) of this section. An event that materially affects 
the accuracy of the information reported includes:
    (1) A cumulative increase of $25,000 or more in the amount paid or 
expected to be paid for influencing or attempting to influence a covered 
Federal action;
    (2) A change in the person(s) or individual(s) influencing or 
attempting to influence a covered Federal action; or
    (3) A change in the officer(s), employee(s), or Member(s) contacted 
to influence or attempt to influence a covered Federal action.
    (d)(1) The requirements of paragraph (d)(2) of this section apply to 
any person who requests or receives from a person referred to in 
paragraph (a) or (b) of this section:
    (i) A subcontract exceeding $100,000 at any tier under a Federal 
contract;
    (ii) A subgrant, contract, or subcontract exceeding $100,000 at any 
tier under a Federal grant;
    (iii) A contract or subcontract exceeding $100,000 at any tier under 
a Federal loan exceeding $150,000; or
    (iv) A contract or subcontract exceeding $100,000 at any tier under 
a Federal cooperative agreement.
    (2) A person described in paragraph (d)(1) of this section shall 
file a certification, and a disclosure form, if required, to the next 
tier.
    (e) All disclosure forms, but not certifications, shall be forwarded 
from tier to tier until received by the person referred to in paragraph 
(a) or (b) of this section. That person shall forward all disclosure 
forms to the agency.
    (f) Any certification or disclosure form filed under paragraph (e) 
of this section shall be treated as a material representation of fact 
upon which all receiving tiers shall rely. All liability arising from an 
erroneous representation shall be borne solely by the tier filing that 
representation and shall not

[[Page 143]]

be shared by any tier to which the erroneous representation is 
forwarded. Submitting an erroneous certification or disclosure 
constitutes a failure to file the required certification or disclosure, 
respectively. If a person fails to file a required certification or 
disclosure, the United States may pursue all available remedies, 
including those authorized by section 31 U.S.C. 1352.
    (g) No reporting is required for an activity paid for with 
appropriated funds if that activity is allowable under either subpart B 
or C of this part.



                  Subpart B_Activities by Own Employees



Sec.  9.11  Agency and legislative liaison.

    (a) The prohibition on the use of appropriated funds, in Sec.  
9.1(a), does not apply in the case of a payment of reasonable 
compensation made to an officer or employee of a person requesting or 
receiving a Federal contract, grant, loan, or cooperative agreement if 
the payment is for agency and legislative liaison activities not 
directly related to a covered Federal action.
    (b) For purposes of paragraph (a) of this section, providing any 
information specifically requested by an agency or Congress is allowable 
at any time.
    (c) For purposes of paragraph (a) of this section, the following 
agency and legislative liaison activities are allowable at any time only 
where they are not related to a specific solicitation for any covered 
Federal action:
    (1) Discussing with an agency (including individual demonstrations) 
the qualities and characteristics of the person's products or services, 
conditions or terms of sale, and service capabilities; and
    (2) Technical discussions and other activities regarding the 
application or adaptation of the person's products or services for an 
agency's use.
    (d) For purposes of paragraph (a) of this section, the following 
agencies and legislative liaison activities are allowable only where 
they are prior to formal solicitation of any covered Federal action:
    (1) Providing any information not specifically requested but 
necessary for an agency to make an informed decision about initiation of 
a covered Federal action;
    (2) Technical discussions regarding the preparation of an 
unsolicited proposal prior to its official submission; and
    (3) Capability presentations by persons seeking awards from an 
agency pursuant to the provisions of the Small Business Act, as amended.
    (e) Only those activities expressly authorized by this section are 
allowable under this section.



Sec.  9.15  Professional and technical services.

    (a) The prohibition on the use of appropriated funds, in Sec.  
9.1(a), does not apply in the case of a payment of reasonable 
compensation made to an officer or employee of a person requesting or 
receiving a Federal contract, grant, loan, or cooperative agreement or 
an extension, continuation, renewal, amendment, or modification of a 
Federal contract, grant, loan, or cooperative agreement if payment is 
for professional or technical services rendered directly in the 
preparation, submission, or negotiation of any bid, proposal, or 
application for that Federal contract, grant, loan, or cooperative 
agreement or for meeting requirements imposed by or pursuant to law as a 
condition for receiving that Federal contract, grant, loan, or 
cooperative agreement.
    (b) For purposes of paragraph (a) of this section, professional and 
technical services shall be limited to advice and analysis directly 
applying any professional or technical discipline. For example, drafting 
of a legal document accompanying a bid or proposal by a lawyer is 
allowable. Similarly, technical advice provided by an engineer on the 
performance or operational capability of a piece of equipment rendered 
directly in the negotiation of a contract is allowable. However, 
communications with the intent to influence made by a professional (such 
as a licensed lawyer) or a technical person (such as a licensed 
accountant) are not allowable under this section unless they provide 
advice and analysis directly applying their professional or technical 
expertise and unless the advice or analysis is rendered directly and 
solely in the

[[Page 144]]

preparation, submission or negotiation of a covered Federal action. 
Thus, for example, communications with the intent to influence made by a 
lawyer that do not provide legal advice or analysis directly and solely 
related to the legal aspects of his or her client's proposal, but 
generally advocate one proposal over another are not allowable under 
this section because the lawyer is not providing professional legal 
services. Similarly, communications with the intent to influence made by 
an engineer providing an engineering analysis prior to the preparation 
or submission of a bid or proposal are not allowable under this section 
since the engineer is providing technical services but not directly in 
the preparation, submission or negotiation of a covered Federal action.
    (c) Requirements imposed by or pursuant to law as a condition for 
receiving a covered Federal award include those required by law or 
regulation, or reasonably expected to be required by law or regulation, 
and any other requirements in the actual award documents.
    (d) Only those services expressly authorized by this section are 
allowable under this section.



Sec.  9.20  Reporting.

    No reporting is required with respect to payments of reasonable 
compensation made to regularly employed officers or employees of a 
person.



            Subpart C_Activities by Other than Own Employees



Sec.  9.23  Professional and technical services.

    (a) The prohibition on the use of appropriated funds, in Sec.  
9.1(a), does not apply in the case of any reasonable payment to a 
person, other than an officer or employee of a person requesting or 
receiving a covered Federal action, if the payment is for professional 
or technical services rendered directly in the preparation, submission, 
or negotiation of any bid, proposal, or application for that Federal 
contract, grant, loan, or cooperative agreement or for meeting 
requirements imposed by or pursuant to law as a condition for receiving 
that Federal contract, grant, loan, or cooperative agreement.
    (b) The reporting requirements in Sec.  9.3(a) and (b) regarding 
filing a disclosure form by each person, if required, shall not apply 
with respect to professional or technical services rendered directly in 
the preparation, submission, or negotiation of any commitment providing 
for the United States to insure or guarantee a loan.
    (c) For purposes of paragraph (a) of this section, professional and 
technical services shall be limited to advice and analysis directly 
applying any professional or technical discipline. For example, drafting 
of a legal document accompanying a bid or proposal by a lawyer is 
allowable. Similarly, technical advice provided by an engineer on the 
performance or operational capability of a piece of equipment rendered 
directly in the negotiation of a contract is allowable. However, 
communications with the intent to influence made by a professional (such 
as a licensed lawyer) or a technical person (such as a licensed 
accountant) are not allowable under this section unless they provide 
advice and analysis directly applying their professional or technical 
expertise and unless the advice or analysis is rendered directly and 
solely in the preparation, submission or negotiation of a covered 
Federal action. Thus, for example, communications with the intent to 
influence made by a lawyer that do not provide legal advice or analysis 
directly and solely related to the legal aspects of his or her client's 
proposal, but generally advocate one proposal over another are not 
allowable under this section because the lawyer is not providing 
professional legal services. Similarly, communications with the intent 
to influence made by an engineer providing an engineering analysis prior 
to the preparation or submission of a bid or proposal are not allowable 
under this section since the engineer is providing technical services 
but not directly in the preparation, submission or negotiation of a 
covered Federal action.
    (d) Requirements imposed by or pursuant to law as a condition for 
receiving a covered Federal action include those required by law or 
regulation, or reasonably expected to be required by

[[Page 145]]

law or regulation, and any other requirements in the actual award 
documents.
    (e) Persons other than officers or employees of a person requesting 
or receiving a covered Federal action include consultants and trade 
associations.
    (f) Only those services expressly authorized by this section are 
allowable under this section.



                   Subpart D_Penalties and Enforcement



Sec.  9.31  Penalties.

    (a) Any person who makes an expenditure prohibited herein shall be 
subject to a civil penalty of not less than $10,000 and not more than 
$100,000 for each such expenditure.
    (b) Any person who fails to file or amend the disclosure form (see 
appendix B to this part) to be filed or amended if required herein, 
shall be subject to a civil penalty of not less than $10,000 and not 
more than $100,000 for each such failure.
    (c) A filing or amended filing on or after the date on which an 
administrative action for the imposition of a civil penalty is commenced 
does not prevent the imposition of such civil penalty for a failure 
occurring before that date. An administrative action is commenced with 
respect to a failure when an investigating official determines in 
writing to commence an investigation of an allegation of such failure.
    (d) In determining whether to impose a civil penalty, and the amount 
of any such penalty, by reason of a violation by any person, the agency 
shall consider the nature, circumstances, extent, and gravity of the 
violation, the effect on the ability of such person to continue in 
business, any prior violations by such person, the degree of culpability 
of such person, the ability of the person to pay the penalty, and such 
other matters as may be appropriate.
    (e) First offenders under paragraphs (a) or (b) of this section 
shall be subject to a civil penalty of $10,000, absent aggravating 
circumstances. Second and subsequent offenses by persons shall be 
subject to an appropriate civil penalty between $10,000 and $100,000, as 
determined by the agency head or his or her designee.
    (f) An imposition of a civil penalty under this section does not 
prevent the United States from seeking any other remedy that may apply 
to the same conduct that is the basis for the imposition of such civil 
penalty.



Sec.  9.32  Penalty procedures.

    Agencies shall impose and collect civil penalties pursuant to the 
provisions of the Program Fraud and Civil Remedies Act, 31 U.S.C. 3803 
(except subsection (c)), 3804, 3805, 3806, 3807, 3808, and 3812, insofar 
as these provisions are not inconsistent with the requirements in this 
part.



Sec.  9.33  Enforcement.

    The head of each agency shall take such actions as are necessary to 
ensure that the provisions herein are vigorously implemented and 
enforced in that agency.



                          Subpart E_Exemptions



Sec.  9.41  Secretary of Defense.

    (a) The Secretary of Defense may exempt, on a case-by-case basis, a 
covered Federal action from the prohibition whenever the Secretary 
determines, in writing, that such an exemption is in the national 
interest. The Secretary shall transmit a copy of each such written 
exemption to Congress immediately after making such a determination.
    (b) The Department of Defense may issue supplemental regulations to 
implement paragraph (a) of this section.



                        Subpart F_Agency Reports



Sec.  9.51  Semi-annual compilation.

    (a) The head of each agency shall collect and compile the disclosure 
reports (see appendix B to this part) and, on May 31 and November 30 of 
each year, submit to the Secretary of the Senate and the Clerk of the 
House of Representatives a report containing a compilation of the 
information contained in the disclosure reports received during the six-
month period ending on March 31 or September 30, respectively, of that 
year.

[[Page 146]]

    (b) The report, including the compilation, shall be available for 
public inspection 30 days after receipt of the report by the Secretary 
and the Clerk.
    (c) Information that involves intelligence matters shall be reported 
only to the Select Committee on Intelligence of the Senate, the 
Permanent Select Committee on Intelligence of the House of 
Representatives, and the Committees on Appropriations of the Senate and 
the House of Representatives in accordance with procedures agreed to by 
such committees. Such information shall not be available for public 
inspection.
    (d) Information that is classified under Executive Order 12356 or 
any successor order shall be reported only to the Committee on Foreign 
Relations of the Senate and the Committee on Foreign Affairs of the 
House of Representatives or the Committees on Armed Services of the 
Senate and the House of Representatives (whichever such committees have 
jurisdiction of matters involving such information) and to the 
Committees on Appropriations of the Senate and the House of 
Representatives in accordance with procedures agreed to by such 
committees. Such information shall not be available for public 
inspection.
    (e) Agencies shall keep the originals of all disclosure reports in 
the official files of the agency.



Sec.  9.52  Inspector General report.

    (a) The Inspector General, or other official as specified in 
paragraph (b) of this section, of each agency shall prepare and submit 
to Congress each year an evaluation of the compliance of that agency 
with, and the effectiveness of, the requirements in this part. The 
evaluation may include any recommended changes that may be necessary to 
strengthen or improve the requirements.
    (b) In the case of an agency that does not have an Inspector 
General, the agency official comparable to an Inspector General shall 
prepare and submit the annual report, or, if there is no such comparable 
official, the head of the agency shall prepare and submit the annual 
report.
    (c) The annual report shall be submitted at the same time the agency 
submits its annual budget justifications to Congress.
    (d) The annual report shall include the following: All alleged 
violations relating to the agency's covered Federal actions during the 
year covered by the report, the actions taken by the head of the agency 
in the year covered by the report with respect to those alleged 
violations and alleged violations in previous years, and the amounts of 
civil penalties imposed by the agency in the year covered by the report.





       Sec. Appendix A to Part 9--Certification Regarding Lobbying

 Certification for Contracts, Grants, Loans, and Cooperative Agreements

 I. The undersigned certifies, to the best of his or her knowledge and 
                              belief, that:

    (1) No Federal appropriated funds have been paid or will be paid, by 
or on behalf of the undersigned, to any person for influencing or 
attempting to influence an officer or employee of an agency, a Member of 
Congress, an officer or employee of Congress, or an employee of a Member 
of Congress in connection with the awarding of any Federal contract, the 
making of any Federal grant, the making of any Federal loan, the 
entering into of any cooperative agreement, and the extension, 
continuation, renewal, amendment, or modification of any Federal 
contract, grant, loan, or cooperative agreement.
    (2) If any funds other than Federal appropriated funds have been 
paid or will be paid to any person for influencing or attempting to 
influence an officer or employee of any agency, a Member of Congress, an 
officer or employee of Congress, or an employee of a Member of Congress 
in connection with this Federal contract, grant, loan, or cooperative 
agreement, the undersigned shall complete and submit Standard Form--LLL, 
``Disclosure Form to Report Lobbying,'' in accordance with its 
instructions.
    (3) The undersigned shall require that the language of this 
certification be included in the award documents for all sub awards at 
all tiers (including subcontracts, subgrants, and contracts under 
grants, loans, and cooperative agreements) and that all subrecipients 
shall certify and disclose accordingly.
This certification is a material representation of fact upon which 
reliance was placed when this transaction was made or entered into.
Submission of this certification is a prerequisite for making or 
entering into this transaction imposed by section 31 U.S.C.

[[Page 147]]

1352. Any person who fails to file the required certification shall be 
subject to a civil penalty of not less than $10,000 and not more than 
$100,000 for each such failure.

          II. Statement for Loan Guarantees and Loan Insurance:

The undersigned states, to the best of his or her knowledge and belief, 
that:
    If any funds have been paid or will be paid to any person for 
influencing or attempting to influence an officer or employee of any 
agency, a Member of Congress, an officer or employee of Congress, or an 
employee of a Member of Congress in connection with this commitment 
providing for the United States to insure or guarantee a loan, the 
undersigned shall complete and submit Standard Form-LLL, ``Disclosure 
Form to Report Lobbying,'' in accordance with its instructions.
Submission of this statement is a prerequisite for making or entering 
into this transaction imposed by 31 U.S.C. 1352. Any person who fails to 
file the required statement shall be subject to a civil penalty of not 
less than $10,000 and not more than $100,000 for each such failure.

[[Page 148]]



      Sec. Appendix B to Part 9--Disclosure Form To Report Lobbying
[GRAPHIC] [TIFF OMITTED] TR06MR03.021


[[Page 149]]


[GRAPHIC] [TIFF OMITTED] TR06MR03.022


[[Page 150]]


[GRAPHIC] [TIFF OMITTED] TR06MR03.023



PART 11_CLAIMS--Table of Contents



                        Subpart A_Debt Collection

Sec.
11.1 General application.
11.2 Definitions.
11.3 Demand for payment.
11.4 Collection by administrative offset.
11.5 Administrative wage garnishment.
11.6 Reporting debts.
11.7 Private collection agencies.
11.8 Suspension or revocation of eligibility for loans and loan 
          guarantees, licenses, permits, or privileges.
11.9 Collection in installments.
11.10 Interest, penalty charges, and administrative costs.
11.11 Compromise.
11.12 Suspending or terminating collection activity.
11.13 Referrals to the Department of Justice.
11.14 Receipt of offset requests by other Federal agencies.
11.15 Applying the debt against DHS payments.

Subpart B [Reserved]

    Authority: 5 U.S.C. 301, 5514; 26 U.S.C. 6402, 31 U.S.C. 3701, 3711, 
3716, 3717, 3718, 3720A,

[[Page 151]]

3720B, 3720D; Pub. L. 107-296, 116 Stat. 2135 (6 U.S.C. 1 et seq.).

    Source: 72 FR 4190, Jan. 30, 2007, unless otherwise noted.



                        Subpart A_Debt Collection



Sec.  11.1  General application.

    (a) Application of Debt Collection Standards. The provisions of 31 
CFR parts 285, 900-904, as amended by the Secretary of the Treasury and 
the Attorney General, are applicable to debts and debt procedures within 
the jurisdiction of the Department of Homeland Security.
    (b) Authority. The Chief Financial Officer of the Department of 
Homeland Security is delegated authority to administer this subpart and 
to redelegate authority under this subpart.
    (c) Application to DHS. This subpart provides procedures for the 
collection of DHS debts, and for collection of other debts owed to the 
United States when a request for offset of a DHS payment is received by 
the DHS from another federal agency. This subpart applies to all of DHS, 
including all of its components. It applies to the DHS when collecting a 
DHS debt, to persons who owe DHS debts, and to Federal agencies 
requesting offset of a payment issued by the DHS as a payment agency 
(including salary payments to DHS employees).
    (d) Exclusions. This subpart does not apply to debt arising from 
taxation under the Internal Revenue Act of 1986, as amended, or to any 
debt excepted from the FCCS, 31 CFR parts 900 through 904.
    (e) Non-exclusive procedure or remedy. Nothing in this subpart 
precludes collection or disposition of any debt under statutes and 
regulations other than those described in this subpart. To the extent 
that the provisions of laws or other regulations apply, including the 
remission or mitigation of fines, penalties, forfeitures and debts 
arising under the tariff laws of the United States, DHS components are 
authorized to collect debts under those laws and regulations. DHS 
components and other Federal agencies may simultaneously use multiple 
collection remedies to collect a debt, except as prohibited by law.
    (f) Additional policies and procedures. DHS components may, but are 
not required to, promulgate additional policies and procedures 
consistent with this subpart and other applicable Federal law, policies, 
and procedures.
    (g) Duplication not required. Nothing in this subpart requires DHS 
to duplicate notices or administrative proceedings required by contract, 
this subpart, or other laws or regulations.
    (h) No private rights created. This subpart does not create any 
right or benefit, substantive or procedural, enforceable at law or in 
equity by a party against the United States, its agencies, its officers, 
or any other person, nor shall the failure of any DHS component to 
comply with any of the provisions of this subpart or 31 CFR parts 285, 
900-904 be a defense to the collection of any debt or enforcement of any 
other law.



Sec.  11.2  Definitions.

    In addition to the definitions provided in 31 CFR parts 285, 900-
904, as used in this subpart:
    (a) Department of Homeland Security or DHS means the United States 
Department of Homeland Security and includes the Secretary and any DHS 
entity which reports directly or indirectly to the Secretary.
    (b) DHS debt means a debt owed to DHS by a person.
    (c) Secretary means the Secretary of Homeland Security.



Sec.  11.3  Demand for payment.

    (a) Notice requirements. Generally, before DHS starts the collection 
actions described in this subpart, DHS sends a written notice to the 
debtor under 31 CFR 901.2. The notice provided under this section 
includes notice of any and all actions DHS may take to offset the debt, 
including any notices required under 31 CFR parts 285, 900-904.
    (b) Exceptions to notice requirements. DHS may omit from any notice 
to a debtor any provision that is not legally required given the 
collection remedies to be applied to a particular debt.



Sec.  11.4  Collection by administrative offset.

    (a) General Provisions for Offset. DHS will collect debts by 
administrative offset pursuant to 31 CFR parts 900-904.

[[Page 152]]

    (b) Centralized Offset through the Treasury Offset Program. DHS 
adopts the provisions of 31 CFR 901.3.
    (c) Non-centralized Offset for DHS Debts. When centralized offset is 
not available or appropriate, DHS may collect delinquent DHS debts 
through non-centralized offset. In these cases, DHS may offset a payment 
internally or make a request directly to a Federal payment agency to 
offset a payment owed to the debtor. Before requesting a payment 
authorizing agency to conduct a non-centralized administrative offset, 
DHS will provide the debtor with the due process set forth in 31 CFR 
901.3(b)(4) and the notice requirements of 31 CFR 901.2 (unless the due 
process and notice requirements are not required under that part). DHS 
will provide the payment authorizing agency written certification that 
the debtor owes the past due, legally enforceable delinquent debt in the 
amount stated, and that DHS has fully complied with its regulations 
concerning administrative offset.
    (d) Hearing Procedures for Federal Employees--(1) Request for a 
hearing. A Federal employee who has received a notice that his or her 
DHS debt will be collected by means of salary offset may request a 
hearing concerning the existence or amount of the debt. The Federal 
employee also may request a hearing concerning the amount proposed to be 
deducted from the employee's pay each pay period. The employee must send 
any request for hearing, in writing, to the office designated in the 
notice described in section 11.4(c). The request must be received by the 
designated office on or before the 15th calendar day following the 
employee's receipt of the notice. The employee must sign the request and 
specify whether an oral or paper hearing is requested. If an oral 
hearing is requested, the employee must explain why the matter cannot be 
resolved by review of the documentary evidence alone. All travel 
expenses incurred by the Federal employee in connection with an in-
person hearing will be borne by the employee.
    (2) Failure to submit timely request for hearing. If the employee 
fails to submit a request for hearing within the time period described 
in paragraph (d)(1) of this section, the employee will have waived the 
right to a hearing, and salary offset may be initiated. However, DHS 
should accept a late request for hearing if the employee can show that 
the late request was the result of circumstances beyond the employee's 
control or because of a failure to receive actual notice of the filing 
deadline.
    (3) Hearing official. DHS must obtain the services of a hearing 
official who is not under the supervision or control of the Secretary. 
The DHS Chief Financial Officer will coordinate DHS efforts to obtain 
the services of a hearing official.
    (4) Notice of hearing. After the employee requests a hearing, the 
designated hearing official informs the employee of the form of the 
hearing to be provided. For oral hearings, the notice sets forth the 
date, time and location of the hearing. For paper hearings, the notice 
provides the employee the date by which he or she should submit written 
arguments to the designated hearing official. The hearing official gives 
the employee reasonable time to submit documentation in support of the 
employee's position. The hearing official schedules a new hearing date 
if requested by both parties. The hearing official gives both parties 
reasonable notice of the time and place of a rescheduled hearing.
    (5) Oral hearing. The hearing official conducts an oral hearing if 
he or she determines the matter cannot be resolved by review of 
documentary evidence alone (for example, when an issue of credibility or 
veracity is involved). The hearing need not take the form of an 
evidentiary hearing, but may be conducted in a manner determined by the 
hearing official, including but not limited to:
    (i) Informal conferences with the hearing official, in which the 
employee and agency representative will be given full opportunity to 
present evidence, witnesses and argument;
    (ii) Informal meetings with an interview of the employee by the 
hearing official; or
    (iii) Formal written submissions, with an opportunity for oral 
presentation.
    (6) Paper hearing. If the hearing official determines an oral 
hearing is not

[[Page 153]]

necessary, he or she makes the determination based upon a review of the 
available written record, including any documentation submitted by the 
employee in support of his or her position.
    (7) Failure to appear or submit documentary evidence. In the absence 
of good cause shown (for example, excused illness), if the employee 
fails to appear at an oral hearing or fails to submit documentary 
evidence as required for a paper hearing, the employee waives the right 
to a hearing, and salary offset may be initiated. Further, the employee 
is deemed to admit the existence and amount of the debt as described in 
the notice of intent to offset. If a DHS representative does not appear 
at an oral hearing, the hearing official shall proceed with the hearing 
as scheduled, and make his or her determination based upon the oral 
testimony presented and the documentary evidence submitted by both 
parties.
    (8) Burden of proof. DHS has the initial burden to prove the 
existence and amount of the debt. Thereafter, if the employee disputes 
the existence or amount of the debt, the employee must prove by a 
preponderance of the evidence that no debt exists or that the amount of 
the debt is incorrect. In addition, the employee may present evidence 
that the proposed terms of the repayment schedule are unlawful, would 
cause a financial hardship to the employee, or that collection of the 
debt may not be pursued due to operation of law.
    (9) Record. The hearing official maintains a summary record of any 
hearing provided by this subpart. Witnesses testify under oath or 
affirmation in oral hearings.
    (10) Date of decision. The hearing official issues a written opinion 
stating his or her decision, based upon documentary evidence and 
information developed at the hearing, as soon as practicable after the 
hearing but not later than 60 days after the date on which the request 
for hearing was received by DHS. If the employee requests a delay in the 
proceedings, the deadline for the decision may be postponed by the 
number of days by which the hearing was postponed. When a decision is 
not timely rendered, DHS waives penalties applied to the debt for the 
period beginning with the date the decision is due and ending on the 
date the decision is issued.
    (11) Content of decision. The written decision includes:
    (i) A statement of the facts presented to support the origin, 
nature, and amount of the debt;
    (ii) The hearing official's findings, analysis, and conclusions; and
    (iii) The terms of any repayment schedules, if applicable.
    (12) Final agency action. The hearing official's decision is final.
    (f) Waiver not precluded. Nothing in this subpart precludes an 
employee from requesting waiver of an overpayment under 5 U.S.C. 5584 or 
8346(b), 10 U.S.C. 2774, 32 U.S.C. 716, or other statutory authority.
    (g) Salary offset process--(1) Determination of disposable pay. The 
Chief Financial Officer consults with the appropriate DHS payroll office 
to determine the amount of a DHS employee's disposable pay and will 
implement salary offset when requested to do so by a DHS component or 
another federal agency. If the debtor is not employed by DHS, the agency 
employing the debtor will determine the amount of the employee's 
disposable pay and implement salary offset upon request.
    (2) Amount of salary offset. The amount to be offset from each 
salary payment will be up to 15 percent of a debtor's disposable pay, as 
follows:
    (i) If the amount of the debt is equal to or less than 15 percent of 
the disposable pay, such debt generally is collected in one lump sum 
payment; or
    (ii) Installment deductions are made over a period of no greater 
than the anticipated period of employment. An installment deduction will 
not exceed 15 percent of the disposable pay from which the deduction is 
made unless the employee has agreed in writing to the deduction of a 
greater amount or the creditor agency has determined that smaller 
deductions are appropriate based on the employee's ability to pay.
    (3) Final salary payment. After the employee has separated either 
voluntarily or involuntarily from the payment agency, the payment agency 
may make a lump sum deduction exceeding 15 percent of disposable pay 
from any

[[Page 154]]

final salary or other payments pursuant to 31 U.S.C. 3716 in order to 
satisfy a debt.
    (h) Payment agency's responsibilities. (1) As required by 5 CFR 
550.1109, if the employee separates from the payment agency from which 
DHS requested salary offset, the payment agency must certify the total 
amount of its collection and notify DHS and the employee of the amounts 
collected. If the payment agency is aware that the employee is entitled 
to payments from the Civil Service Retirement Fund and Disability Fund, 
the Federal Employee Retirement System, or other similar payments, it 
must provide written notification to the agency responsible for making 
such retirement payments that the debtor owes a debt, the amount of the 
debt, and that DHS has complied with the provisions of this section. DHS 
must submit a properly certified claim to the new payment agency before 
the collection can be made.
    (2) If the employee is already separated from employment and all 
payments due from his or her former payment agency have been made, DHS 
may request that money due and payable to the employee from the Civil 
Service Retirement Fund and Disability Fund, the Federal Employee 
Retirement System, or other similar funds, is administratively offset to 
collect the debt. Generally, DHS will collect such monies through the 
Treasury Offset Program as described in this section.
    (3) When an employee transfers to another agency, DHS should resume 
collection with the employee's new payment agency in order to continue 
salary offset.



Sec.  11.5  Administrative wage garnishment.

    DHS may collect debts from a debtor's wages by means of 
administrative wage garnishment in accordance with the requirements of 
31 U.S.C. 3720D under the procedures established in 31 CFR 285.11.



Sec.  11.6  Reporting debts.

    DHS will report delinquent debts to credit bureaus and other 
automated databases in accordance with 31 U.S.C. 3711(e), 31 CFR 901.4, 
and the Office of Management and Budget Circular A-129, ``Policies for 
Federal Credit Programs and Non-tax Receivables,'' which may be found at 
http://www.fms.treas.gov/debt. At least sixty (60) days prior to 
reporting a delinquent debt to a consumer reporting agency, DHS sends a 
notice to the debtor in accordance with 6 CFR 11.3. DHS may authorize 
the Treasury Department's Financial Management Service to report to 
credit bureaus those delinquent debts that have been transferred to the 
Financial Management Service for administrative offset.



Sec.  11.7  Private collection agencies.

    DHS will transfer delinquent DHS debts to the Treasury Department's 
Financial Management Service to obtain debt collection services provided 
by private collection agencies.



Sec.  11.8  Suspension or revocation of eligibility for loans and loan
guarantees, licenses, permits, or privileges.

    The authority to extend financial assistance in the form of a loan, 
loan guarantee, or loan insurance to any person delinquent on a nontax 
debt owed to DHS is delegated to the Chief Financial Officer.



Sec.  11.9  Collection in installments.

    DHS may accept payment of a DHS debt in regular installments, in 
accordance with the provisions of 31 CFR 901.8 and policies and 
procedures adopted by the Chief Financial Officer (CFO). The CFO will 
consult the Office of General Counsel regarding a legally enforceable 
written agreement from the debtor.



Sec.  11.10  Interest, penalty charges, and administrative costs.

    (a) Assessment and notice. DHS shall assess interest, penalties and 
administrative costs on DHS debts in accordance with 31 U.S.C. 3717 and 
31 CFR 901.9. Administrative costs of processing and handling a 
delinquent debt shall be determined by DHS.
    (b) Waiver of interest, penalties, and administrative costs. DHS may 
waive interest, penalties, and administrative costs, or any portion 
thereof, under the criteria in the FCCS, or when it determines the 
collection of these charges

[[Page 155]]

would be against equity and good conscience or not in the best interests 
of the United States. The authority to waive interest, penalties and 
administrative costs is delegated to the Chief Financial Officer. The 
DHS Chief Financial Officer shall issue written guidance on maintaining 
records of waivers.
    (c) Accrual during suspension of debt collection. Interest and 
related charges will not accrue during the period a hearing official 
does not render a timely decision.



Sec.  11.11  Compromise.

    DHS may compromise a debt in accordance with the provisions of 31 
CFR part 902. The Chief Financial Officer is authorized to compromise 
debts owed to DHS. No debt over $10,000 may be compromised without the 
concurrence of the Office of the General Counsel.



Sec.  11.12  Suspending or terminating collection activity.

    DHS will suspend or terminate collection activity, or discharge 
indebtedness, in accordance with 31 CFR part 903. The Chief Financial 
Officer is delegated authority to suspend or terminate collection 
activity, or to discharge indebtedness regarding debts owed to DHS, but 
for any such action involving a debt over $10,000, the Chief Financial 
Officer must obtain the concurrence of the Office of the General 
Counsel. The Chief Financial Officer is authorized to act on behalf of 
the Secretary in selling a debt, and in determining whether or not it is 
in the best interests of the United States to do so.



Sec.  11.13  Referrals to the Department of Justice.

    Referrals of debts to the Department of Justice for collection will 
be by the General Counsel.



Sec.  11.14  Receipt of offset requests by other Federal agencies.

    Other Federal agencies send non-centralized offset requests to DHS 
at: U.S. Department of Homeland Security, Attn: Chief Financial Officer, 
Mail Stop 0200, Washington, DC 20528-0200. Those agencies must comply 
with 31 CFR 901.3 when forwarding the requests to DHS. DHS does not 
review the merits of the creditor agency's determination with regard to 
the existence or the amount of the debt. When two or more agencies are 
seeking offsets from payments made to the same person, or when two or 
more debts are owed to a single creditor agency, DHS may determine the 
order in which the debts will be collected or whether one or more debts 
should be collected by offset simultaneously. For the purposes of this 
section, debts owed to DHS generally take precedence over debts owed to 
other agencies, but DHS may pay a debt to another agency prior to 
collecting for DHS. DHS determines the order of debt collection based 
upon the best interests of the United States.



Sec.  11.15  Applying the debt against DHS payments.

    (a) Notice to the Debtor. DHS sends a written notice to the debtor 
indicating a certified debt claim was received from the creditor agency, 
the amount of the debt claimed to be owed by the creditor agency, the 
estimated date the offset will begin (if more than one payment), and the 
amount of the deduction(s). For employees, DHS generally begins 
deductions from pay at the next officially established pay interval. 
Deductions continue until DHS knows the debt is paid in full or until 
otherwise instructed by the creditor agency. Alternatively, the amount 
offset may be an amount agreed upon, in writing, by the debtor and the 
creditor agency. If a DHS employee retires or resigns, or if his or her 
employment ends before collection of the debt is complete, DHS continues 
to offset, under 31 U.S.C. 3716, up to 100% of an employee's subsequent 
payments until the debt is paid or otherwise resolved. Such payments 
include a debtor's final salary payment, lump-sum leave payment, and 
other payments payable to the debtor by DHS. See 31 U.S.C. 3716 and 5 
CFR 550.1104(l) and 550.1104(m). If the employee is separated from DHS 
before the debt is paid in full, DHS will certify to the creditor agency 
the total amount of its collection. If DHS is aware the employee is 
entitled to payments from the Civil Service Retirement and Disability 
Fund, Federal Employee Retirement System, or other

[[Page 156]]

similar payments, DHS provides written notice to the agency making such 
retirement payments that the debtor owes a debt (including the amount) 
and that the provisions of 5 CFR 550.1109 have been fully complied with. 
The creditor agency is responsible for submitting a certified claim to 
the agency responsible for making such payments before collection may 
begin. Generally, creditor agencies will collect such monies through the 
Treasury Offset Program as described in section 11.4.
    (b) Notice to the debtor. DHS provides to the debtor a copy of any 
notices sent to the creditor agency under this subpart.
    (c) Transfer of employee debtor to another Federal agency. If an 
employee debtor transfers to another Federal agency before the debt is 
paid in full, DHS notifies the creditor agency and provides it a 
certification of the total amount of its collection on the debt. The 
creditor agency is responsible for submitting a certified claim to the 
debtor's new employing agency before collection may begin.

Subpart B [Reserved]



PART 13_PROGRAM FRAUD CIVIL REMEDIES--Table of Contents



Sec.
13.1 Basis, purpose, scope and effect.
13.2 Definitions.
13.3 Basis for civil penalties and assessments.
13.4 Investigation.
13.5 Review by the Reviewing Official.
13.6 Prerequisites for issuing a Complaint.
13.7 Complaint.
13.8 Service of Complaint.
13.9 Answer.
13.10 Default upon failure to answer.
13.11 Referral of Complaint and answer to the ALJ.
13.12 Notice of hearing.
13.13 Parties to the hearing.
13.14 Separation of functions.
13.15 Ex parte contacts.
13.16 Disqualification of Reviewing Official or ALJ.
13.17 Rights of parties.
13.18 Authority of the ALJ.
13.19 Prehearing conferences.
13.20 Disclosure of Documents.
13.21 Discovery.
13.22 Exchange of witness lists, Statements, and exhibits.
13.23 Subpoenas for attendance at hearing.
13.24 Protective order.
13.25 Fees.
13.26 Filing, form and service of papers.
13.27 Computation of time.
13.28 Motions.
13.29 Sanctions.
13.30 The hearing and burden of proof.
13.31 Determining the amount of penalties and assessments.
13.32 Location of hearing.
13.33 Witnesses.
13.34 Evidence.
13.35 The record.
13.36 Post-hearing briefs.
13.37 Initial Decision.
13.38 Reconsideration of Initial Decision.
13.39 Appeal to Authority Head.
13.40 Stays ordered by the Department of Justice.
13.41 Stay pending appeal.
13.42 Judicial review.
13.43 Collection of civil penalties and assessments.
13.44 Right to administrative offset.
13.45 Deposit in Treasury of United States.
13.46 Compromise or settlement.
13.47 Limitations.

    Authority: Pub. L. 107-296, 116 Stat. 2135 (6 U.S.C., Ch. 1, 
sections 101 et seq.); 5 U.S.C. 301; 31 U.S.C. 3801-3812.

    Source: 70 FR 59211, Oct. 12, 2005, unless otherwise noted.



Sec.  13.1  Basis, purpose, scope and effect.

    (a) Basis. This part implements the Program Fraud Civil Remedies Act 
of 1986, 31 U.S.C. 3801-3812. section 3809 of title 31, United States 
Code, requires each authority to promulgate regulations necessary to 
implement the provisions of the statute.
    (b) Purpose. This part:
    (1) Establishes administrative procedures for imposing civil 
penalties and assessments against Persons who Make, submit, or present, 
or cause to be Made, submitted, or presented, false, fictitious, or 
fraudulent Claims or written Statements to the Authority or to certain 
others; and
    (2) Specifies the hearing and appeal rights of Persons subject to 
allegations of liability for such penalties and assessments.
    (c) Scope. This part applies to all components of the Department of 
Homeland Security.
    (d) Effect. (1) This part applies to program fraud cases initiated 
by any component of the Department of Homeland Security on or after 
October 12, 2005.

[[Page 157]]

    (2) Program fraud cases initiated by any component of the Department 
of Homeland Security before October 12, 2005, but not completed before 
October 12, 2005, will continue to completion under the rules and 
procedures in effect before this part.



Sec.  13.2  Definitions.

    The following definitions have general applicability throughout this 
part:
    (a) ALJ means an Administrative Law Judge in the Authority appointed 
pursuant to 5 U.S.C. 3105 or detailed to the Authority pursuant to 5 
U.S.C. 3344. An ALJ will preside at any hearing convened under the 
regulations in this part.
    (b) Authority means the Department of Homeland Security.
    (c) Authority Head means the Deputy Secretary, Department of 
Homeland Security, or another officer designated by the Deputy 
Secretary.
    (d) Benefit means, in the context of a Statement, anything of value, 
including but not limited to any advantage, preference, privilege, 
license, permit, favorable decision, ruling, status, or loan guarantee.
    (e) Claim means any request, demand, or submission:
    (1) Made to the Authority for property, services, or money 
(including money representing grants, loans, insurance, or Benefits);
    (2) Made to a recipient of property, services, or money from the 
Authority or to a party to a contract with the Authority:
    (i) For property or services if the United States:
    (A) Provided such property or services;
    (B) Provided any portion of the funds for the purchase of such 
property or services; or
    (C) Will reimburse such recipient or party for the purchase of such 
property or services; or
    (ii) For the payment of money (including money representing grants, 
loans, insurance, or Benefits) if the United States:
    (A) Provided any portion of the money requested or demanded; or
    (B) Will reimburse such recipient or party for any portion of the 
money paid on such request or demand; or
    (3) Made to the Authority which has the effect of decreasing an 
obligation to pay or account for property, services, or money.
    (f) Complaint means the administrative Complaint served by the 
Reviewing Official on the Defendant under Sec.  13.7.
    (g) Defendant means any Person alleged in a Complaint under Sec.  
13.7 to be liable for a civil penalty or assessment under Sec.  13.3.
    (h) Government means the Government of the United States.
    (i) Individual means a natural Person.
    (j) Initial Decision means the written decision of the ALJ required 
by Sec.  13.10 or Sec.  13.37, and includes a revised Initial Decision 
issued following a remand or a motion for reconsideration.
    (k) Investigating Official means the Inspector General of the 
Department of Homeland Security or an officer or employee of the Office 
of the Inspector General designated by the Inspector General and 
eligible under 31 U.S.C. 3801(a)(4)(B).
    (l) Knows or Has Reason to Know, means that a Person, with respect 
to a Claim or Statement:
    (1) Has actual knowledge that the Claim or Statement is false, 
fictitious, or fraudulent;
    (2) Acts in deliberate ignorance of the truth or falsity of the 
Claim or Statement; or
    (3) Acts in reckless disregard of the truth or falsity of the Claim 
or Statement.
    (m) Makes includes presents, submits, and causes to be made, 
presented, or submitted. As the context requires, Making or Made will 
likewise include the corresponding forms of such terms.
    (n) Person means any Individual, partnership, corporation, 
association, or private organization, and includes the plural of that 
term.
    (o) Representative means an attorney who is a member in good 
standing of the bar of any State, Territory, or possession of the United 
States, the District of Columbia, or the Commonwealth of Puerto Rico. 
This definition is not intended to foreclose pro se appearances. That 
is, an Individual may appear for himself or herself, and a corporation 
or other entity may appear by

[[Page 158]]

an owner, officer, or employee of the corporation or entity.
    (p) Reviewing Official means the General Counsel of the Department 
of Homeland Security, or other officer or employee of the Department who 
is designated by the General Counsel and eligible under 31 U.S.C. 
3801(a)(8).
    (q) Statement means any representation, certification, affirmation, 
Document, record, or accounting or bookkeeping entry Made:
    (1) With respect to a Claim or to obtain the approval or payment of 
a Claim (including relating to eligibility to Make a Claim); or
    (2) With respect to (including relating to eligibility for):
    (i) A contract with, or bid or proposal for a contract with the 
Authority, or any State, political subdivision of a State, or other 
party, if the United States Government provides any portion of the money 
or property under such contract or for such grant, loan, or Benefit, or 
if the Government will reimburse such State, political subdivision, or 
party for any portion of the money or property under such contract or 
for such grant, loan, or Benefit; or
    (ii) A grant, loan, or Benefit from, the Authority, or any State, 
political subdivision of a State, or other party, if the United States 
Government provides any portion of the money or property under such 
contract or for such grant, loan, or Benefit, or if the Government will 
reimburse such State, political subdivision, or party for any portion of 
the money or property under such contract or for such grant, loan, or 
Benefit.



Sec.  13.3  Basis for civil penalties and assessments.

    (a) Claims. (1) Except as provided in paragraph (c) of this section, 
a Person will be subject, in addition to any other remedy that may be 
prescribed by law, to a civil penalty of not more than $5,500 for each 
Claim (as adjusted in accordance with the Federal Civil Penalties 
Inflation Adjustment Act of 1990 (Public Law 101-140), as amended by the 
Debt Collection Improvement Act of 1996 (Public Law 104-134)) if such 
Person Makes a Claim that such Person Knows or Has Reason to Know:
    (i) Is false, fictitious, or fraudulent;
    (ii) Includes or is supported by any written Statement that asserts 
a material fact that is false, fictitious, or fraudulent;
    (iii) Includes or is supported by any written Statement that:
    (A) Omits a material fact;
    (B) Is false, fictitious, or fraudulent as a result of such 
omission; and
    (C) Is a Statement in which the Person Making such Statement has a 
duty to include such material fact; or
    (iv) Is for payment for the provision of property or services that 
the Person has not provided as claimed.
    (2) Each voucher, invoice, Claim form, or other Individual request 
or demand for property, services, or money constitutes a separate Claim.
    (3) A Claim will be considered Made to the Authority, recipient, or 
party when such Claim is actually Made to an agent, fiscal intermediary, 
or other entity, including any State or political subdivision thereof, 
acting for or on behalf of the Authority, recipient, or party.
    (4) Each Claim for property, services, or money is subject to a 
civil penalty regardless of whether such property, services, or money is 
actually delivered or paid.
    (5) If the Government has Made any payment (including transferred 
property or provided services) on a Claim, a Person subject to a civil 
penalty under paragraph (a)(1) of this section will also be subject to 
an assessment of not more than twice the amount of such Claim or that 
portion thereof that is determined to be in violation of paragraph 
(a)(1) of this section. Such assessment will be in lieu of damages 
sustained by the Government because of such Claim.
    (b) Statements. (1) Except as provided in paragraph (c) of this 
section, a Person will be subject, in addition to any other remedy that 
may be prescribed by law, to a civil penalty of not more than $5,500 (as 
adjusted in accordance with the Federal Civil Penalties Inflation 
Adjustment Act of 1990 (Public Law 101-140), as amended by the Debt 
Collection Improvement Act of 1996 (Public Law 104-134)) if such Person 
Makes a written Statement that:
    (i) The Person Knows or Has Reason to Know:

[[Page 159]]

    (A) Asserts a material fact that is false, fictitious, or 
fraudulent; or
    (B) Is false, fictitious, or fraudulent because it omits a material 
fact that the Person Making the Statement has a duty to include in such 
Statement; and
    (ii) Contains, or is accompanied by, an express certification or 
affirmation of the truthfulness and accuracy of the contents of the 
Statement.
    (2) Each written representation, certification, or affirmation 
constitutes a separate Statement.
    (3) A Statement will be considered Made to the Authority when such 
Statement is actually Made to an agent, fiscal intermediary, or other 
entity, including any State or political subdivision thereof, acting for 
or on behalf of the Authority.
    (c) Specific intent not required. No proof of specific intent to 
defraud is required to establish liability under this section.
    (d) More than one Person liable. (1) In any case in which it is 
determined that more than one Person is liable for Making a Claim or 
Statement under this section, each such Person may be held liable for a 
civil penalty under this section.
    (2) In any case in which it is determined that more than one Person 
is liable for Making a Claim under this section on which the Government 
has Made payment (including transferred property or provided services), 
an assessment may be imposed against any such Person or jointly and 
severally against any combination of such Persons.



Sec.  13.4  Investigation.

    (a) If an Investigating Official concludes that a subpoena pursuant 
to the Authority conferred by 31 U.S.C. 3804(a) is warranted:
    (1) The subpoena so issued will notify the Person to whom it is 
addressed of the Authority under which the subpoena is issued and will 
identify the records or Documents sought;
    (2) The Investigating Official may designate a Person to act on his 
or her behalf to receive the Documents sought; and
    (3) The Person receiving such subpoena will be required to tender to 
the Investigating Official or the Person designated to receive the 
Documents a certification that the Documents sought have been produced, 
or that such Documents are not available and the reasons therefore, or 
that such Documents, suitably identified, have been withheld based upon 
the assertion of an identified privilege.
    (b) If the Investigating Official concludes that an action under the 
Act may be warranted, the Investigating Official will submit a report 
containing the findings and conclusions of such investigation to the 
Reviewing Official.
    (c) Nothing in this section will preclude or limit an Investigating 
Official's discretion to refer allegations directly to the Department of 
Justice for suit under the False Claims Act or other civil relief, or to 
defer or postpone a report or referral to the Reviewing Official to 
avoid interference with a criminal investigation or prosecution.
    (d) Nothing in this section modifies any responsibility of an 
Investigating Official to report violations of criminal law to the 
Attorney General.



Sec.  13.5  Review by the Reviewing Official.

    (a) If, based on the report of the Investigating Official under 
Sec.  13.4(b), the Reviewing Official determines that there is adequate 
evidence to believe that a Person is liable under Sec.  13.3, the 
Reviewing Official will transmit to the Attorney General a written 
notice of the Reviewing Official's intention to issue a Complaint under 
Sec.  13.7.
    (b) Such notice will include:
    (1) A Statement of the Reviewing Official's reasons for issuing a 
Complaint;
    (2) A Statement specifying the evidence that supports the 
allegations of liability;
    (3) A description of the Claims or Statements upon which the 
allegations of liability are based;
    (4) An estimate of the amount of money or the value of property, 
services, or other Benefits requested or demanded in violation of Sec.  
13.3;
    (5) A Statement of any exculpatory or mitigating circumstances that 
may relate to the Claims or Statements known by the Reviewing Official 
or the Investigating Official; and

[[Page 160]]

    (6) A Statement that there is a reasonable prospect of collecting an 
appropriate amount of penalties and assessments.



Sec.  13.6  Prerequisites for issuing a Complaint.

    (a) The Reviewing Official may issue a Complaint under Sec.  13.7 
only if:
    (1) The Department of Justice approves the issuance of a Complaint 
in a written Statement described in 31 U.S.C. 3803(b)(1); and
    (2) In the case of allegations of liability under Sec.  13.3(a) with 
respect to a Claim, the Reviewing Official determines that, with respect 
to such Claim or a group of related Claims submitted at the same time 
such Claim is submitted (as defined in paragraph (b) of this section), 
the amount of money or the value of property or services demanded or 
requested in violation of Sec.  13.3(a) does not exceed $150,000.
    (b) For the purposes of this section, a related group of Claims 
submitted at the same time will include only those Claims arising from 
the same transaction (e.g., grant, loan, application, or contract) that 
are submitted simultaneously as part of a single request, demand, or 
submission.
    (c) Nothing in this section will be construed to limit the Reviewing 
Official's authority to join in a single Complaint against a Person's 
Claims that are unrelated or were not submitted simultaneously, 
regardless of the amount of money, or the value of property or services, 
demanded or requested.



Sec.  13.7  Complaint.

    (a) On or after the date the Department of Justice approves the 
issuance of a Complaint in accordance with 31 U.S.C. 3803(b)(1), the 
Reviewing Official may serve a Complaint on the Defendant, as provided 
in Sec.  13.8.
    (b) The Complaint will state:
    (1) The allegations of liability against the Defendant, including 
the statutory basis for liability, an identification of the Claims or 
Statements that are the basis for the alleged liability, and the reasons 
why liability allegedly arises from such Claims or Statements;
    (2) The maximum amount of penalties and assessments for which the 
Defendant may be held liable;
    (3) Instructions for filing an answer to request a hearing, 
including a specific Statement of the Defendant's right to request a 
hearing by filing an answer and to be represented by a Representative; 
and
    (4) That failure to file an answer within 30 days of service of the 
Complaint will result in the imposition of the maximum amount of 
penalties and assessments without right to appeal, as provided in Sec.  
13.10.
    (5) That the Defendant may obtain copies of relevant material and 
exculpatory information pursuant to the process outlined in Sec.  13.20.
    (c) At the same time the Reviewing Official serves the Complaint, he 
or she will serve the Defendant with a copy of the regulations in this 
part.



Sec.  13.8  Service of Complaint.

    (a) Service of a Complaint must be Made by certified or registered 
mail or by delivery in any manner authorized by Rule 4(d) of the Federal 
Rules of Civil Procedure. Service of a Complaint is complete upon 
receipt.
    (b) Proof of service, stating the name and address of the Person on 
whom the Complaint was served, and the manner and date of service, may 
be Made by:
    (1) Affidavit of the Individual serving the Complaint by delivery;
    (2) A United States Postal Service return receipt card acknowledging 
receipt; or
    (3) Written acknowledgment of receipt by the Defendant or his or her 
Representative; or
    (4) In case of service abroad, authentication in accordance with the 
Convention on Service Abroad of Judicial and Extrajudicial Documents in 
Commercial and Civil Matters.



Sec.  13.9  Answer.

    (a) The Defendant may request a hearing by serving an answer on the 
Reviewing Official within 30 days of service of the Complaint. Service 
of an answer will be Made by delivering a copy to the Reviewing Official 
or by placing a copy in the United States mail, postage prepaid and 
addressed to the Reviewing Official. Service of an

[[Page 161]]

answer is complete upon such delivery or mailing. An answer will be 
deemed to be a request for hearing.
    (b) In the answer, the Defendant:
    (1) Will admit or deny each of the allegations of liability Made in 
the Complaint;
    (2) Will state any defense on which the Defendant intends to rely;
    (3) May state any reasons why the Defendant contends that the 
penalties and assessments should be less than the statutory maximum; and
    (4) Will state the name, address, and telephone number of the Person 
authorized by the Defendant to act as Defendant's Representative, if 
any.
    (c) If the Defendant is unable to file an answer meeting the 
requirements of paragraph (b) of this section within the time provided, 
the Defendant may, before the expiration of 30 days from service of the 
Complaint, serve on the Reviewing Official a general answer denying 
liability and requesting a hearing, and a request for an extension of 
time within which to serve an answer meeting the requirements of 
paragraph (b) of this section. The Reviewing Official will file promptly 
the Complaint, the general answer denying liability, and the request for 
an extension of time as provided in Sec.  13.11. For good cause shown, 
the ALJ may grant the Defendant up to 30 additional days from the 
original due date within which to serve an answer meeting the 
requirements of paragraph (b) of this section.



Sec.  13.10  Default upon failure to answer.

    (a) If the Defendant does not answer within the time prescribed in 
Sec.  13.9(a), the Reviewing Official may refer the Complaint to an ALJ 
by filing the Complaint and a Statement that Defendant has failed to 
answer on time.
    (b) Upon the referral of the Complaint, the ALJ will promptly serve 
on Defendant in the manner prescribed in Sec.  13.8, a notice that an 
Initial Decision will be issued under this section.
    (c) In addition, the ALJ will assume the facts alleged in the 
Complaint to be true, and, if such facts establish liability under Sec.  
13.3, the ALJ will issue an Initial Decision imposing the maximum amount 
of penalties and assessments allowed under the statute.
    (d) Except as otherwise provided in this section, by failing to 
answer on time, the Defendant waives any right to further review of the 
penalties and assessments imposed under paragraph (c) of this section, 
and the Initial Decision will become final and binding upon the parties 
30 days after it is issued.
    (e) If, before such an Initial Decision becomes final, the Defendant 
files a motion seeking to reopen on the grounds that extraordinary 
circumstances prevented the Defendant from answering, the Initial 
Decision will be stayed pending the ALJ's decision on the motion.
    (f) If, on such motion, the Defendant can demonstrate extraordinary 
circumstances excusing the failure to answer on time, the ALJ will 
withdraw the Initial Decision in paragraph (c) of this section, if such 
a decision has been issued, and will grant the Defendant an opportunity 
to answer the Complaint.
    (g) A decision of the ALJ denying a Defendant's motion under 
paragraph (e) of this section is not subject to reconsideration under 
Sec.  13.38.
    (h) The Defendant may appeal to the Authority Head the decision 
denying a motion to reopen by filing a notice of appeal in accordance 
with Sec.  13.26 within 15 days after the ALJ denies the motion. The 
timely filing of a notice of appeal will stay the Initial Decision until 
the Authority Head decides the issue.
    (i) If the Defendant files a timely notice of appeal with the 
Authority Head, the ALJ will forward the record of the proceeding to the 
Authority Head.
    (j) The Authority Head will decide expeditiously whether 
extraordinary circumstances excuse the Defendant's failure to answer on 
time based solely on the record before the ALJ.
    (k) If the Authority Head decides that extraordinary circumstances 
excused the Defendant's failure to answer on time, the Authority Head 
will remand the case to the ALJ with instructions to grant the Defendant 
an opportunity to answer.
    (l) If the Authority Head decides that the Defendant's failure to 
answer on time is not excused, the Authority Head will reinstate the 
Initial Decision of the ALJ, which will become final

[[Page 162]]

and binding upon the parties 30 days after the Authority Head issues 
such decision.



Sec.  13.11  Referral of Complaint and answer to the ALJ.

    Upon receipt of an answer, the Reviewing Official will refer the 
matter to an ALJ by filing the Complaint and answer in accordance with 
Sec.  13.26.



Sec.  13.12  Notice of hearing.

    (a) When the ALJ receives the Complaint and answer, the ALJ will 
promptly serve a notice of hearing upon the Defendant in the manner 
prescribed by Sec.  13.8.
    (b) Such notice will include:
    (1) The tentative time and place, and the nature of the hearing;
    (2) The legal authority and jurisdiction under which the hearing is 
to be held;
    (3) The matters of fact and law to be asserted;
    (4) A description of the procedures for the conduct of the hearing;
    (5) The name, address, and telephone number of the Representative of 
the Government and of the Defendant, if any; and
    (6) Such other matters as the ALJ deems appropriate.



Sec.  13.13  Parties to the hearing.

    (a) The parties to the hearing will be the Defendant and the 
Authority.
    (b) Pursuant to 31 U.S.C. 3730(c)(5), a private plaintiff under the 
False Claims Act may participate in these proceedings to the extent 
authorized by the provisions of that Act.



Sec.  13.14  Separation of functions.

    (a) The Investigating Official, the Reviewing Official, and any 
employee or agent of the Authority who takes part in investigating, 
preparing, or presenting a particular case may not, in such case or a 
factually related case:
    (1) Participate in the hearing as the ALJ;
    (2) Participate or advise in the Initial Decision or the review of 
the Initial Decision by the Authority Head, except as a witness or a 
Representative in public proceedings; or
    (3) Make the collection of penalties and assessments under 31 U.S.C. 
3806.
    (b) The ALJ will not be responsible to, or subject to the 
supervision or direction of, the Investigating Official or the Reviewing 
Official.
    (c) Except as provided in paragraph (a) of this section, the 
Representative for the Government may be employed anywhere in the 
Authority, including in the offices of either the Investigating Official 
or the Reviewing Official.



Sec.  13.15  Ex parte contacts.

    No party or Person (except employees of the ALJ's office) will 
communicate in any way with the ALJ on any matter at issue in a case, 
unless on notice and opportunity for all parties to participate. This 
provision does not prohibit a Person or party from inquiring about the 
status of a case or asking routine questions concerning administrative 
functions or procedures.



Sec.  13.16  Disqualification of Reviewing Official or ALJ.

    (a) A Reviewing Official or ALJ in a particular case may disqualify 
himself or herself at any time.
    (b) A party may file a motion for disqualification of a Reviewing 
Official or an ALJ. Such motion will be accompanied by an affidavit 
alleging personal bias or other reason for disqualification.
    (c) Such motion and affidavit will be filed promptly upon the 
party's discovery of reasons requiring disqualification, or such 
objections will be deemed waived.
    (d) Such affidavit will state specific facts that support the 
party's belief that personal bias or other reason for disqualification 
exists and the time and circumstances of the party's discovery of such 
facts. It will be accompanied by a certificate of the Representative of 
record that it is Made in good faith.
    (e)(1) If the ALJ determines that a Reviewing Official is 
disqualified, the ALJ will dismiss the Complaint without prejudice.
    (2) If the ALJ disqualifies himself or herself, the case will be 
reassigned promptly to another ALJ.
    (3) If the ALJ denies a motion to disqualify, the Authority Head may 
determine the matter only as part of his or

[[Page 163]]

her review of the Initial Decision upon appeal, if any.



Sec.  13.17  Rights of parties.

    Except as otherwise limited by this part, all parties may:
    (a) Be accompanied, represented, and advised by a Representative;
    (b) Participate in any conference held by the ALJ;
    (c) Conduct discovery;
    (d) Agree to stipulations of fact or law, which will be Made part of 
the record;
    (e) Present evidence relevant to the issues at the hearing;
    (f) Present and cross-examine witnesses;
    (g) Present oral arguments at the hearing as permitted by the ALJ; 
and
    (h) Submit written briefs and proposed findings of fact and 
conclusions of law after the hearing.



Sec.  13.18  Authority of the ALJ.

    (a) The ALJ will conduct a fair and impartial hearing, avoid delay, 
maintain order, and assure that a record of the proceeding is Made.
    (b) The ALJ has the authority to:
    (1) Set and change the date, time, and place of the hearing upon 
reasonable notice to the parties;
    (2) Continue or recess the hearing in whole or in part for a 
reasonable period of time;
    (3) Hold conferences to identify or simplify the issues, or to 
consider other matters that may aid in the expeditious disposition of 
the proceeding;
    (4) Administer oaths and affirmations;
    (5) Issue subpoenas requiring the attendance of witnesses and the 
production of Documents at depositions or at hearings;
    (6) Rule on motions and other procedural matters;
    (7) Regulate the scope and timing of discovery;
    (8) Regulate the course of the hearing and the conduct of 
Representatives and parties;
    (9) Examine witnesses;
    (10) Receive, rule on, exclude, or limit evidence;
    (11) Upon motion of a party, take official notice of facts;
    (12) Upon motion of a party, decide cases, in whole or in part, by 
summary judgment where there is no disputed issue of material fact;
    (13) Conduct any conference, argument, or hearing on motions in 
Person or by telephone; and
    (14) Exercise such other authority as is necessary to carry out the 
responsibilities of the ALJ under this part.
    (c) The ALJ does not have the authority to Make any determinations 
regarding the validity of treaties or other international agreements, 
Federal statutes or regulations, or Departmental Orders or Directives.



Sec.  13.19  Prehearing conferences.

    (a) The ALJ may schedule prehearing conferences as appropriate.
    (b) Upon the motion of any party, the ALJ will schedule at least one 
prehearing conference at a reasonable time in advance of the hearing.
    (c) The ALJ may use prehearing conferences to discuss the following:
    (1) Simplification of the issues;
    (2) The necessity or desirability of amendments to the pleadings, 
including the need for a more definite Statement;
    (3) Stipulations and admissions of fact or as to the contents and 
authenticity of Documents;
    (4) Whether the parties can agree to submission of the case on a 
stipulated record;
    (5) Whether a party chooses to waive appearance at an oral hearing 
and to submit only documentary evidence (subject to the objection of 
other parties) and written argument;
    (6) Limitation of the number of witnesses;
    (7) Scheduling dates for the exchange of witness lists and of 
proposed exhibits;
    (8) Discovery;
    (9) The time and place for the hearing; and
    (10) Such other matters as may tend to expedite the fair and just 
disposition of the proceedings.
    (d) The ALJ may issue an order containing all matters agreed upon by 
the parties or ordered by the ALJ at a prehearing conference.

[[Page 164]]



Sec.  13.20  Disclosure of Documents.

    (a) Upon written request to the Reviewing Official, the Defendant 
may review, at a time and place convenient to the Authority, any 
relevant and material Documents, transcripts, records, and other 
materials that relate to the allegations set out in the Complaint and 
upon which the findings and conclusions of the Investigating Official 
under Sec.  13.4(b) are based, unless such Documents are subject to a 
privilege under Federal law. Special arrangements as to confidentiality 
may be required by the Reviewing Official, who may also assert privilege 
or other related doctrines. Upon payment of fees for duplication, the 
Defendant may obtain copies of such Documents.
    (b) Upon written request to the Reviewing Official, the Defendant 
also may obtain a copy of all exculpatory information in the possession 
of the Reviewing Official or Investigating Official relating to the 
allegations in the Complaint, even if it is contained in a Document that 
would otherwise be privileged. If the Document would otherwise be 
privileged, only that portion containing exculpatory information must be 
disclosed.
    (c) The notice sent to the Attorney General from the Reviewing 
Official as described in Sec.  13.5 is not discoverable under any 
circumstances.
    (d) The Defendant may file a motion to compel disclosure of the 
Documents subject to the provisions of this section. Such a motion may 
only be filed following the serving of an answer pursuant to Sec.  13.9.



Sec.  13.21  Discovery.

    (a) In general. (1) The following types of discovery are authorized:
    (i) Requests for production of Documents for inspection and copying;
    (ii) Requests for admissions of the authenticity of any relevant 
Document or of the truth of any relevant fact;
    (iii) Written interrogatories; and
    (iv) Depositions.
    (2) Unless mutually agreed to by the parties, discovery is available 
only as ordered by the ALJ. The ALJ will regulate the timing of 
discovery.
    (b) Documents defined. (1) For the purpose of this section and 
Sec. Sec.  13.22 and 13.23, the term Documents includes information, 
documents, reports, answers, records, accounts, papers, and other data 
and documentary evidence.
    (2) Nothing in this part will be interpreted to require the creation 
of a Document.
    (c) Motions for discovery. (1) A party seeking discovery may file a 
motion. Such a motion will be accompanied by a copy of the request for 
production of Documents, request for admissions, or interrogatories or, 
in the case of depositions, a summary of the scope of the proposed 
deposition.
    (2) Within ten days of service, a party may file an opposition to 
the motion or a motion for protective order as provided in Sec.  13.24.
    (3) The ALJ may grant a motion for discovery only if he or she finds 
that the discovery sought:
    (i) Is necessary for the expeditious, fair, and reasonable 
consideration of the issues;
    (ii) Is not unduly costly or burdensome;
    (iii) Will not unduly delay the proceeding; and
    (iv) Does not seek privileged information.
    (4) The burden of showing that discovery should be allowed is on the 
party seeking discovery.
    (5) The ALJ may grant discovery subject to a protective order under 
Sec.  13.24.
    (d) Depositions. (1) If a motion for deposition is granted, the ALJ 
will issue a subpoena for the deponent, which may require the deponent 
to produce Documents. The subpoena will specify the time and place at 
which the deposition will be held. Deposition requests for senior level 
DHS officials (including career and non-career senior executive level 
employees) shall not be approved absent showing of compelling need that 
cannot be met by any other means.
    (2) The party seeking to depose will serve the subpoena in the 
manner prescribed in Sec.  13.8.
    (3) The deponent may file a motion to quash the subpoena or a motion 
for a protective order within ten days of service. If the ALJ has not 
acted on such a motion by the return date, such date will be suspended 
pending the ALJ's final action on the motion.
    (4) The party seeking to depose will provide for the taking of a 
verbatim

[[Page 165]]

transcript of the deposition, which it will Make available to all other 
parties for inspection and copying.
    (e) Each party will bear its own costs of discovery.



Sec.  13.22  Exchange of witness lists, Statements, and exhibits.

    (a) At least 15 days before the hearing or at such other time as may 
be ordered by the ALJ, the parties will exchange witness lists, copies 
of prior Statements of proposed witnesses, and copies of proposed 
hearing exhibits, including copies of any written Statements that the 
party intends to offer in lieu of live testimony in accordance with 
Sec.  13.33(b). At the time the above Documents are exchanged, any party 
that intends to rely on the transcript of deposition testimony in lieu 
of live testimony at the hearing, if permitted by the ALJ, will provide 
each party with a copy of the specific pages of the transcript it 
intends to introduce into evidence.
    (b) If a party objects, the ALJ will not admit into evidence the 
testimony of any witness whose name does not appear on the witness list 
of any exhibit not provided to the opposing party as provided above 
unless the ALJ finds good cause for the failure or that there is no 
prejudice to the objecting party.
    (c) Unless another party objects within the time set by the ALJ, 
Documents exchanged in accordance with paragraph (a) of this section 
will be deemed to be authentic for the purpose of admissibility at the 
hearing.



Sec.  13.23  Subpoenas for attendance at hearing.

    (a) A party wishing to procure the appearance and testimony of any 
Individual at the hearing may request that the ALJ issue a subpoena. 
Requests for witness testimony of senior level DHS officials (including 
career and non-career senior executive level employees) shall not be 
approved absent a showing of compelling need that cannot be met by any 
other means.
    (b) A subpoena requiring the attendance and testimony of an 
Individual may also require the Individual to produce Documents at the 
hearing.
    (c) A party seeking a subpoena will file a written request therefore 
not less than 15 days before the date fixed for the hearing unless 
otherwise allowed by the ALJ for good cause shown. Such request will be 
accompanied by a proposed subpoena, which will specify and Documents to 
be produced and will designate the witnesses and describe the address 
and location thereof with sufficient particularity to permit such 
witnesses to be found.
    (d) The subpoena will specify the time and place at which the 
witness is to appear and any Documents the witness is to produce.
    (e) The party seeking the subpoena will serve it in the manner 
prescribed in Sec.  13.8. A subpoena on a party or upon an Individual 
under the control of party may be served by first class mail.
    (f) A party or the Individual to whom the subpoena is directed may 
file a motion to quash the subpoena within ten days after service or on 
or before the time specified in the subpoena for compliance if it is 
less than ten days after service. If the ALJ has not acted on such a 
motion by the return date, such date will be suspended pending the ALJ's 
final action on the motion.



Sec.  13.24  Protective order.

    (a) A party or a prospective witness or deponent may file a motion 
for a protective order with respect to discovery sought by an opposing 
party or with respect to the hearing, seeking to limit the availability 
or disclosure of evidence.
    (b) In issuing a protective order, the ALJ may Make any order that 
justice requires to protect a party or Person from annoyance, 
embarrassment, oppression, or undue burden or expense, including one or 
more of the following:
    (1) That the discovery not be had;
    (2) That the discovery may be had only on specified terms and 
conditions, including a designation of the time or place;
    (3) That the discovery may be had only through a method of discovery 
other than that requested;
    (4) That certain matters not be inquired into, or that the scope of 
discovery be limited to certain matters;
    (5) That discovery be conducted with no one present except Persons 
designated by the ALJ;

[[Page 166]]

    (6) That the contents of discovery or evidence be sealed;
    (7) That a deposition after being sealed be opened only by order of 
the ALJ;
    (8) That a trade secret or other confidential research, development, 
commercial information, or facts pertaining to any criminal 
investigation, proceeding, or other administrative investigation not be 
disclosed or be disclosed only in a designated way; and
    (9) That the parties simultaneously submit to the ALJ specified 
Documents or information enclosed in sealed envelopes to be opened as 
directed by the ALJ.



Sec.  13.25  Fees.

    The party requesting a subpoena will pay the cost of the fees and 
mileage of any witness subpoenaed in the amounts that would be payable 
to a witness in a proceeding in United States District Court. A check 
for witness fees and mileage will accompany the subpoena when served, 
except that when a subpoena is issued on behalf of the Authority, a 
check for witness fees and mileage need not accompany the subpoena.



Sec.  13.26  Filing, form and service of papers.

    (a) Filing and form. (1) Documents filed with the ALJ will include 
an original and two copies.
    (2) Every pleading and paper filed in the proceeding will contain a 
caption setting forth the title of the action, the case number assigned 
by the ALJ, and a designation of the paper (e.g., Motion to Quash 
Subpoena).
    (3) Every pleading and paper will be signed by, and will contain the 
address and telephone number of, the party or the Person on whose behalf 
the paper was filed, or his or her Representative.
    (4) Papers are considered filed when they are mailed. Date of 
mailing may be established by a certificate from the party or its 
Representative or by proof that the Document was sent by certified or 
registered mail.
    (b) Service. A party filing a Document will, at the time of filing, 
serve a copy of such Document on every other party. Service upon any 
party of any Document other than those required to be served as 
prescribed in Sec.  13.8 will be Made by delivering a copy, or by 
placing a copy of the Document in the United States mail, postage 
prepaid and addressed, to the party's last known address. When a party 
is represented by a Representative, service will be Made upon such 
Representative in lieu of the actual party.
    (c) Proof of service. A certificate of the Individual serving the 
Document by Personal delivery or by mail, setting forth the manner of 
service, will be proof of service.



Sec.  13.27  Computation of time.

    (a) In computing any period of time under this part or in an order 
issued thereunder, the time begins with the day following the act, 
event, or default, and includes the last day of the period, unless it is 
a Saturday, Sunday, or legal holiday observed by the Federal Government, 
in which event it includes the next business day.
    (b) When the period of time allowed is less than seven days, 
intermediate Saturdays, Sundays, and legal holidays observed by the 
Federal Government will be excluded from the computation.
    (c) Where a Document has been served or issued by placing it in the 
United States mail, an additional five days will be added to the time 
permitted for any responses.



Sec.  13.28  Motions.

    (a) Any application to the ALJ for an order or ruling will be by 
motion. Motions will state the relief sought, the authority relied upon, 
and the facts alleged, and will be filed and served on all other 
parties.
    (b) Except for motions Made during a prehearing conference or at the 
hearing, all motions will be in writing. The ALJ may require that oral 
motions be reduced to writing.
    (c) Within 15 days after a written motion is served, or such other 
time as may be fixed by the ALJ, any party may file a response to such 
motion.
    (d) The ALJ may not grant a written motion before the time for 
filing response thereto has expired, except upon consent of the parties 
or following a hearing on the motion, but may overrule or deny such 
motion without awaiting a response.

[[Page 167]]

    (e) The ALJ will Make a reasonable effort to dispose of all 
outstanding motions before the hearing begins.
    (f) Except as provided by Sec. Sec.  13.21(e)(3) and 13.23(f), which 
concern subpoenas, the filing or pendency of a motion will not 
automatically alter or extend a deadline or return date.



Sec.  13.29  Sanctions.

    (a) The ALJ may sanction a Person, including any party or 
Representative, for:
    (1) Failing to comply with an order, rule, or procedure governing 
the proceeding;
    (2) Failing to prosecute or defend an action; or
    (3) Engaging in other misconduct that interferes with the speedy, 
orderly, or fair conduct of the hearing.
    (b) Sanctions include but are not limited to those specifically set 
forth in paragraphs (c), (d), and (e) of this section. Any such sanction 
will reasonably relate to the severity and nature of the failure or 
misconduct.
    (c) When a party fails to comply with an order, including an order 
for taking a deposition, the production of evidence within the party's 
control, or a request for admission, the ALJ may:
    (1) Draw an inference in favor of the requesting party with regard 
to the information sought;
    (2) In the case of requests for admission, deem each matter of which 
an admission is requested to be admitted;
    (3) Prohibit the party failing to comply with such order from 
introducing evidence concerning, or otherwise relying upon, testimony 
relating to the information sought; and
    (4) Strike any part of the pleadings or other submissions of the 
party failing to comply with such request.
    (d) If a party fails to prosecute or defend an action under this 
part begun by service of a notice of hearing, the ALJ may dismiss the 
action or may issue an Initial Decision imposition penalties and 
assessments.
    (e) The ALJ may refuse to consider any motion, request, response, 
brief or other Document that is not filed in a timely fashion.



Sec.  13.30  The hearing and burden of proof.

    (a) The ALJ will conduct a hearing on the record in order to 
determine whether the Defendant is liable for a civil penalty or 
assessment under Sec.  13.3 and, if so, the appropriate amount of any 
such civil penalty or assessment considering any aggravating or 
mitigating factors.
    (b) The Authority will prove Defendant's liability and any 
aggravating factors by a preponderance of the evidence.
    (c) The Defendant will prove any affirmative defenses and any 
mitigating factors by a preponderance of the evidence.
    (d) The hearing will be open to the public unless otherwise ordered 
by the ALJ for good cause shown.



Sec.  13.31  Determining the amount of penalties and assessments.

    (a) In determining an appropriate amount of civil penalties and 
assessments, the ALJ and the Authority Head, upon appeal, should 
evaluate any circumstances that mitigate or aggravate the violation and 
should articulate in their opinions the reasons that support the 
penalties and assessments they impose. Because of the intangible costs 
of fraud, the expense of investigating such conduct, and the need to 
deter others who might be similarly tempted, ordinarily double damages 
and a significant civil penalty should be imposed.
    (b) Although not exhaustive, the following factors are among those 
that may influence the ALJ and the Authority Head in determining the 
amount of penalties and assessments to impose with respect to the 
misconduct (i.e., the false fictitious, of fraudulent Claims or 
Statements) charged in the Complaint:
    (1) The number of false, fictitious, or fraudulent Claims or 
Statements;
    (2) The time period over which such Claims or Statements were Made;
    (3) The degree of the Defendant's culpability with respect to the 
misconduct;
    (4) The amount of money or the value of the property, services, or 
Benefit falsely claimed;

[[Page 168]]

    (5) The value of the Government's actual loss as a result of the 
misconduct, including foreseeable consequential damages and the costs of 
investigation;
    (6) The relationship of the amount imposed as civil penalties to the 
amount of the Government's loss;
    (7) The potential or actual impact of the misconduct upon national 
defense, public health or safety, or public confidence in the management 
of Government programs and operations, including particularly the impact 
on the intended beneficiaries of such programs;
    (8) Whether the Defendant has engaged in a pattern of the same or 
similar misconduct;
    (9) Whether the Defendant attempted to conceal the misconduct;
    (10) The degree to which the Defendant has involved others in the 
misconduct or in concealing it;
    (11) Where the misconduct of employees or agents is imputed to the 
Defendant, the extent to which the Defendant's practices fostered or 
attempted to preclude such misconduct;
    (12) Whether the Defendant cooperated in or obstructed an 
investigation of the misconduct;
    (13) Whether the Defendant assisted in identifying and prosecuting 
other wrongdoers;
    (14) The complexity of the program or transaction, and the degree of 
the Defendant's sophistication with respect to it, including the extent 
of the Defendant's prior participation in the program or in similar 
transactions;
    (15) Whether the Defendant has been found, in any criminal, civil, 
or administrative proceeding to have engaged in similar misconduct or to 
have dealt dishonestly with the Government of the United States or of a 
State, directly or indirectly; and
    (16) The need to deter the Defendant and others from engaging in the 
same or similar misconduct.
    (c) Nothing in this section will be construed to limit the ALJ or 
the Authority Head from considering any other factors that in any given 
case may mitigate or aggravate the offense for which penalties and 
assessments are imposed.



Sec.  13.32  Location of hearing.

    (a) The hearing may be held:
    (1) In any judicial district of the United States in which the 
Defendant resides or transacts business;
    (2) In any judicial district of the United States in which the Claim 
or Statement in issue was Made; or
    (3) In such other place as may be agreed upon by the Defendant and 
the ALJ.
    (b) Each party will have the opportunity to present written and oral 
argument with respect to the location of the hearing.
    (c) The hearing will be held at the place and at the time ordered by 
the ALJ.



Sec.  13.33  Witnesses.

    (a) Except as provided in paragraph (b) of this section, testimony 
at the hearing will be given orally by witnesses under oath or 
affirmation.
    (b) At the discretion of the ALJ, testimony may be admitted in the 
form of a written Statement or deposition. Any such written Statement 
must be provided to all other parties along with the last known address 
of such witness, in a manner that allows sufficient time for other 
parties to subpoena such witness for cross-examination at the hearing. 
Prior written Statements of witnesses proposed to testify at the hearing 
and deposition transcripts will be exchanged as provided in Sec.  
13.22(a).
    (c) The ALJ will exercise reasonable control over the mode and order 
of interrogating witnesses and presenting evidence so as to:
    (1) Make the interrogation and presentation effective for the 
ascertainment of the truth;
    (2) Avoid needless consumption of time; and
    (3) Protect witnesses from harassment or undue embarrassment.
    (d) The ALJ will permit the parties to conduct such cross-
examination as may be required for a full and true disclosure of the 
facts.
    (e) At the discretion of the ALJ, a witness may be cross-examined on 
matters relevant to the proceeding without regard to the scope of his or 
her direct examination. To the extent permitted

[[Page 169]]

by the ALJ, cross-examination on matters outside the scope of direct 
examination will be conducted in the manner of direct examination and 
may proceed by leading questions only if the witness is a hostile 
witness, an adverse party, or a witness identified with an adverse 
party.
    (f) Upon motion of any party, the ALJ will order witnesses excluded 
so that they cannot hear the testimony of other witnesses. This rule 
does not authorize exclusion of:
    (1) A party who is an Individual;
    (2) In the case of a party that is not an Individual, an officer or 
employee of the party;
    (i) Appearing for the entity pro se; or
    (ii) Designated by the party's Representative; or
    (3) An Individual whose presence is shown by a party to be essential 
to the presentation of its case, including an Individual employed by the 
Government engaged in assisting the Representative for the Government.



Sec.  13.34  Evidence.

    (a) The ALJ will determine the admissibility of evidence.
    (b) Except as provided in this part, the ALJ will not be bound by 
the Federal Rules of Evidence. However, the ALJ may apply the Federal 
Rules of Evidence where appropriate, e.g., to exclude unreliable 
evidence.
    (c) The ALJ will exclude irrelevant and immaterial evidence.
    (d) Although relevant, evidence may be excluded if its probative 
value is substantially outweighed by the danger of unfair prejudice, 
confusion of the issues, or by considerations of undue delay or needless 
presentation of cumulative evidence.
    (e) Although relevant, evidence may be excluded if it is privileged 
under Federal law.
    (f) Evidence concerning offers of compromise or settlement will be 
inadmissible to the extent provided in Rule 408 of the Federal Rules of 
Evidence.
    (g) The ALJ will permit the parties to introduce rebuttal witnesses 
and evidence.
    (h) All Documents and other evidence offered or taken for the record 
will be open to examination by all parties, unless otherwise ordered by 
the ALJ pursuant to Sec.  13.24.



Sec.  13.35  The record.

    (a) The hearing will be recorded and transcribed. Transcripts may be 
obtained following the hearing from the ALJ at a cost not to exceed the 
actual cost of duplication.
    (b) The transcript of testimony, exhibits and other evidence 
admitted at the hearing, and all papers and requests filed in the 
proceeding constitute the record for the decision by the ALJ and the 
Authority Head.
    (c) The record may be inspected and copied (upon payment of a 
reasonable fee) by anyone, unless otherwise ordered by the ALJ pursuant 
to Sec.  13.24.



Sec.  13.36  Post-hearing briefs.

    The ALJ may require the parties to file post-hearing briefs. In any 
event, any party may file a post-hearing brief. The ALJ will fix the 
time for filing such briefs. Such briefs may be accompanied by proposed 
findings of fact and conclusions of law. The ALJ may permit the parties 
to file reply briefs.



Sec.  13.37  Initial Decision.

    (a) The ALJ will issue an Initial Decision based only on the record, 
which will contain findings of fact, conclusions of law, and the amount 
of any penalties and assessments imposed.
    (b) The findings of fact will include a finding on each of the 
following issues:
    (1) Whether the Claims or Statements identified in the Complaint, or 
any portions thereof, violate Sec.  13.3;
    (2) If the Person is liable for penalties or assessments, the 
appropriate amount of any such penalties or assessments considering any 
mitigating or aggravating factors that he or she finds in the case, such 
as those described in Sec.  13.31.
    (c) The ALJ will promptly serve the Initial Decision on all parties 
within 90 days after the time for submission of post-hearing briefs and 
reply briefs (if permitted) has expired. The ALJ will at the same time 
serve all parties with a Statement describing the right of any Defendant 
determined to be liable for a civil penalty or assessment to file a 
motion for reconsideration with the

[[Page 170]]

ALJ or a notice of appeal with the Authority Head. If the ALJ fails to 
meet the deadline contained in this paragraph, he or she will notify the 
parties of the reason for the delay and will set a new deadline.
    (d) Unless the Initial Decision of the ALJ is timely appealed to the 
Authority Head, or a motion for reconsideration of the Initial Decision 
is timely filed, the Initial Decision will constitute the final decision 
of the Authority Head and will be final and binding on the parties 30 
days after it is issued by the ALJ.



Sec.  13.38  Reconsideration of Initial Decision.

    (a) Except as provided in paragraph (d) of this section, any party 
may file a motion for reconsideration of the Initial Decision within 20 
days of receipt of the Initial Decision. If service was Made by mail, 
receipt will be presumed to be five days from the date of mailing in the 
absence of contrary proof.
    (b) Every such motion must set forth the matters claimed to have 
been erroneously decided and the nature of the alleged errors. Such 
motion will be accompanied by a supporting brief.
    (c) Responses to such motions will be allowed only upon request of 
the ALJ.
    (d) No party may file a motion for reconsideration of an Initial 
Decision that has been revised in response to a previous motion for 
reconsideration.
    (e) The ALJ may dispose of a motion for reconsideration by denying 
it or by issuing a revised Initial Decision.
    (f) If the ALJ denies a motion for reconsideration, the Initial 
Decision will constitute the final decision of the Authority Head and 
will be final and binding on the parties 30 days after the ALJ denies 
the motion, unless the Initial Decision is timely appealed to the 
Authority Head in accordance with Sec.  13.39.
    (g) If the ALJ issues a revised Initial Decision, that decision will 
constitute the final decision of the Authority Head and will be final 
and binding on the parties 30 days after it is issued, unless it is 
timely appealed to the Authority Head in accordance with Sec.  13.39.



Sec.  13.39  Appeal to Authority Head.

    (a) Any Defendant who has served a timely answer and who is 
determined in an Initial Decision to be liable for a civil penalty or 
assessment may appeal such decision to the Authority Head by filing a 
notice of appeal in accordance with this section and Sec.  13.26.
    (b)(1) A notice of appeal may be filed at any time within 30 days 
after the ALJ issues an Initial Decision. However, if another party 
files a motion for reconsideration under Sec.  13.38, consideration of 
the appeal will be stayed automatically pending resolution of the motion 
for reconsideration.
    (2) If a Defendant files a timely motion for reconsideration, a 
notice of appeal may be filed within 30 days after the ALJ denies the 
motion or issues a revised Initial Decision, whichever applies.
    (3) The Authority Head may extend the initial 30-day period for an 
additional 30 days if the Defendant files with the Authority Head a 
request for an extension within the initial 30-day period and shows good 
cause.
    (c) If the Defendant files a timely notice of appeal and the time 
for filing motions for reconsideration under Sec.  13.38 has expired, 
the ALJ will forward two copies of the notice of appeal to the Authority 
Head, and will forward or Make available the record of the proceeding to 
the Authority Head.
    (d) A notice of appeal will be accompanied by a written brief 
specifying exceptions to the Initial Decision and reasons supporting the 
exceptions.
    (e) The Representative for the Government may file a brief in 
opposition to exceptions within 30 days of receiving the notice of 
appeal and accompanying brief.
    (f) There is no right to appear personally before the Authority 
Head.
    (g) There is no right to appeal any interlocutory ruling by the ALJ.
    (h) In reviewing the Initial Decision, the Authority Head will not 
consider any objection that was not raised before the ALJ unless a 
demonstration is Made of extraordinary circumstances causing the failure 
to raise the objection.
    (i) If any party demonstrates to the satisfaction of the Authority 
Head that additional evidence not presented at such hearing is material 
and that there were reasonable grounds for the failure

[[Page 171]]

to present such evidence at such hearing, the Authority Head will remand 
the matter to the ALJ for consideration of such additional evidence.
    (j) The Authority Head may affirm, reduce, reverse, compromise, 
remand, or settle any penalty or assessment determined by the ALJ in any 
Initial Decision.
    (k) The Authority Head will promptly serve each party to the appeal 
with a copy of the decision of the Authority Head and with a Statement 
describing the right of any Person determined to be liable for a penalty 
or assessment to seek judicial review.
    (l) Unless a petition for review is filed as provided in 31 U.S.C. 
3805 after a Defendant has exhausted all administrative remedies under 
this part and within 60 days after the date on which the Authority Head 
serves the Defendant with a copy of the Authority Head's decision, a 
determination that a Defendant is liable under Sec.  13.3 is final and 
is not subject to judicial review.



Sec.  13.40  Stays ordered by the Department of Justice.

    If at any time the Attorney General or an Assistant Attorney General 
designated by the Attorney General transmits to the Authority Head a 
written finding that continuation of the administrative process 
described in this part with respect to a Claim or Statement may 
adversely affect any pending or potential criminal or civil action 
related to such Claim or Statement, the Authority Head will stay the 
process immediately. The Authority Head may order the process resumed 
only upon receipt of the written authorization of the Attorney General.



Sec.  13.41  Stay pending appeal.

    (a) An Initial Decision is stayed automatically pending disposition 
of a motion for reconsideration or of an appeal to the Authority Head.
    (b) No administrative stay is available following a final decision 
of the Authority Head.



Sec.  13.42  Judicial review.

    Section 3805 of title 31, United States Code, authorizes judicial 
review by an appropriate United States District Court of a final 
decision of the Authority Head imposing penalties or assessments under 
this part and specifies the procedures for such review.



Sec.  13.43  Collection of civil penalties and assessments.

    Sections 3806 and 3808(b) of title 31, United States Code, authorize 
actions for collection of civil penalties and assessments imposed under 
this part and specify the procedures for such actions.



Sec.  13.44  Right to administrative offset.

    The amount of any penalty or assessment that has become final, or 
for which a judgment has been entered under Sec.  13.42 or Sec.  13.43, 
or any amount agreed upon in a compromise or settlement under Sec.  
13.46, may be collected by administrative offset under 31 U.S.C. 3716, 
except that an administrative offset may not be Made under that 
subsection against a refund of an overpayment of Federal taxes, then or 
later owing by the United States to the Defendant.



Sec.  13.45  Deposit in Treasury of United States.

    All amounts collected pursuant to this part will be deposited as 
miscellaneous receipts in the Treasury of the United States, except as 
provided in 31 U.S.C. 3806(g).



Sec.  13.46  Compromise or settlement.

    (a) Parties may Make offers of compromise or settlement at any time.
    (b) The Reviewing Official has the exclusive authority to compromise 
or settle a case under this part at any time after the date on which the 
Reviewing Official is permitted to issue a Complaint and before the date 
on which the ALJ issues an Initial Decision.
    (c) The Authority Head has exclusive authority to compromise or 
settle a case under this part at any time after the date on which the 
ALJ issues an Initial Decision, except during the pendency of any review 
under Sec.  13.42 or during the pendency of any action to collect 
penalties and assessments under Sec.  13.43.
    (d) The Attorney General has exclusive authority to compromise or 
settle a case under this part during the pendency of any review under 
Sec.  13.42 or of

[[Page 172]]

any action to recover penalties and assessments under 31 U.S.C. 3806.
    (e) The Investigating Official may recommend settlement terms to the 
Reviewing Official, the Authority Head, or the Attorney General, as 
appropriate. The Reviewing Official may recommend settlement terms to 
the Authority Head, or the Attorney General, as appropriate.
    (f) Any compromise or settlement must be in writing and signed by 
all parties and their Representatives.



Sec.  13.47  Limitations.

    (a) The notice of hearing with respect to a Claim or Statement must 
be served in the manner specified in Sec.  13.8 within 6 years after the 
date on which such Claim or Statement is Made.
    (b) If the Defendant fails to serve a timely answer, service of a 
notice under Sec.  13.10(b) will be deemed a notice of hearing for 
purposes of this section.
    (c) The statute of limitations may be extended by agreement of the 
parties.



PART 15_ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF DISABILITY IN
PROGRAMS OR ACTIVITIES CONDUCTED BY THE DEPARTMENT OF HOMELAND SECURITY-
-Table of Contents



Sec.
15.1 Purpose.
15.2 Application.
15.3 Definitions.
15.10 Self-evaluation.
15.11 Notice.
15.30 General prohibitions against discrimination.
15.40 Employment.
15.49 Program accessibility; discrimination prohibited.
15.50 Program accessibility; existing facilities.
15.51 Program accessibility; new construction and alterations.
15.60 Communications.
15.70 Compliance procedures.

    Authority: Pub. L. 107-296, 116 Stat. 2135 (6 U.S.C. 1 et seq.); 5 
U.S.C. 301; 29 U.S.C. 794.

    Source: 68 FR 10886, Mar. 6, 2003, unless otherwise noted.



Sec.  15.1  Purpose.

    The purpose of this part is to effectuate section 504 of the 
Rehabilitation Act of 1973 (``Section 504''), as amended by section 119 
of the Rehabilitation, Comprehensive Services, and Developmental 
Disabilities Amendments of 1978, which prohibits discrimination on the 
basis of disability in programs or activities conducted by Executive 
agencies. The provisions established by this part shall be effective for 
all components of the Department, including all Department components 
that are transferred to the Department, except to the extent that a 
Department component already has existing section 504 regulations.



Sec.  15.2  Application.

    This part applies to all programs or activities conducted by the 
Department of Homeland Security (Department), except for programs or 
activities conducted outside the United States that do not involve 
individuals with a disability in the United States.



Sec.  15.3  Definitions.

    For purposes of this part:
    (a) Auxiliary aids means services or devices that enable persons 
with impaired sensory, manual, or speaking skills to have an equal 
opportunity to participate in, and enjoy the benefits of, programs or 
activities conducted by the Department. For example, auxiliary aids 
useful for persons with impaired vision include readers, materials in 
Braille, audio recordings and other similar services and devices. 
Auxiliary aids useful for persons with impaired hearing include 
telephone handset amplifiers, telephones compatible with hearing aids, 
telecommunications devices for deaf persons (TTYs), interpreters, 
notetakers, written materials and other similar services and devices.
    (b) Complete complaint means a written statement that contains the 
complainant's name and address, and describes the Department's alleged 
discriminatory action in sufficient detail to inform the Department of 
the nature and date of the alleged violation of section 504. It shall be 
signed by the complainant or by someone authorized to do so on his or 
her behalf. Complaints filed on behalf of classes of individuals with 
disabilities shall also identify (where possible) the alleged victims of 
discrimination.

[[Page 173]]

    (c) Facility means all or any portion of a building, structure, 
equipment, road, walk, parking lot, rolling stock, or other conveyance, 
or other real or personal property.
    (d) Individual with a disability means any person who has a physical 
or mental impairment that substantially limits one or more of the 
individual's major life activities, has a record of such an impairment, 
or is regarded as having such an impairment. For purposes of this 
definition:
    (1) Physical or mental impairment includes:
    (i) Any physiological disorder or condition, cosmetic disfigurement, 
or anatomical loss affecting one or more of the following body systems: 
Neurological; musculoskeletal; special sense organs; respiratory, 
including speech organs, cardiovascular; reproductive, digestive; 
genitourinary; hemic and lymphatic; skin; and endocrine; or
    (ii) Any mental or psychological disorder such as mental 
retardation, organic brain syndrome, emotional or mental illness, and 
specific learning disabilities. The term physical or mental impairment 
includes, but is not limited to, such diseases and conditions as 
orthopedic, visual, speech and hearing impairments, cerebral palsy, 
epilepsy, muscular dystrophy, multiple sclerosis, cancer, heart disease, 
diabetes, mental retardation, emotional illness, drug addiction and 
alcoholism.
    (2) Major life activities includes functions such as caring for 
one's self, performing manual tasks, walking, seeing, hearing, speaking, 
breathing, learning, and working.
    (3) Has a record of such an impairment means has a history of, or 
has been misclassified as having, a mental or physical impairment that 
substantially limits one or more of the individual's major life 
activities.
    (4) Is regarded as having an impairment means:
    (i) Has a physical or mental impairment that does not substantially 
limit major life activities but is treated by the Department as 
constituting such a limitation;
    (ii) Has a physical or mental impairment that substantially limits 
major life activities only as a result of the attitudes of others toward 
such impairment; or
    (iii) Has none of the impairments defined in paragraph (e)(1) of 
this section but is treated by the Department as having such an 
impairment.
    (e) Qualified individual with a disability means:
    (1) With respect to a Department program or activity under which a 
person is required to perform services or to achieve a level of 
accomplishment, an individual with a disability who meets the essential 
eligibility requirements and who can achieve the purpose of the program 
or activity without modifications in the program or activity that the 
Department can demonstrate would result in a fundamental alteration in 
the nature of the program; and
    (2) With respect to any other program or activity, an individual 
with a disability who meets the essential eligibility requirements for 
participation in, or receipt of benefits from, that program or activity.
    (3) With respect to employment, an individual with a disability who 
satisfies the requisite skill, experience, education and other job-
related requirements of the employment position such individual holds or 
desires, and who, with or without reasonable accommodation, can perform 
the essential functions of such position.
    (f) Section 504 means section 504 of the Rehabilitation Act of 1973 
(29 U.S.C. 794), as amended. As used in this part, section 504 applies 
only to programs or activities conducted by Executive agencies and not 
to federally assisted programs.



Sec.  15.10  Self-evaluation.

    (a) Except as provided in paragraph (d) of this section, the 
Department shall, not later than March 7, 2005, evaluate its current 
policies and practices, and the effects thereof, to determine if they 
meet the requirements of this part. To the extent modification of any 
such policy and practice is required, the Department shall proceed to 
make the necessary modifications.
    (b) The Department shall provide an opportunity to interested 
persons, including individuals with a disability or organizations 
representing individuals

[[Page 174]]

with disabilities, to participate in the self-evaluation process.
    (c) The Department shall, until three years following the completion 
of the self-evaluation, maintain on file and make available for public 
inspection:
    (1) A description of areas examined and any problems identified;
    (2) A description of any modifications made; and
    (3) A list of participants in the self-evaluation process.
    (d) If a component within the Department has already complied with 
the self-evaluation requirement of a regulation implementing section 
504, then the requirements of this section shall apply to only those 
programs and activities conducted by that component that were not 
included in the previous self-evaluation.



Sec.  15.11  Notice.

    The Department shall make available to all Department employees and 
interested persons information regarding the provisions of this part and 
its applicability to the programs or activities conducted by the 
Department, and make such information available to them in such a manner 
as is necessary to apprise them of the protections against 
discrimination assured them by section 504 and this part.



Sec.  15.30  General prohibitions against discrimination.

    (a) No qualified individual with a disability in the United States, 
shall, by reason of his or her disability, be excluded from the 
participation in, be denied benefits of, or otherwise be subjected to 
discrimination under any program or activity conducted by the 
Department.
    (b)(1) The Department, in providing any aid, benefit, or service, 
may not directly or through contractual, licensing, or other 
arrangements, on the basis of disability:
    (i) Deny a qualified individual with a disability the opportunity to 
participate in or benefit from the aid, benefit, or service;
    (ii) Afford a qualified individual with a disability an opportunity 
to participate in or benefit from the aid, benefit, or service that is 
not equal to that afforded others;
    (iii) Provide a qualified individual with a disability with an aid, 
benefit, or service that is not as effective in affording equal 
opportunity to obtain the same result, to gain the same benefit, or to 
reach the same level of achievement as that provided to others;
    (iv) Provide different or separate aid, benefits or services to 
individuals with a disability or to any class of individuals with a 
disability than is provided to others unless such action is necessary to 
provide qualified individuals with a disability with aid, benefits or 
services that are as effective as those provided to others;
    (v) Deny a qualified individual with a disability the opportunity to 
participate as a member of planning or advisory boards; or
    (vi) Otherwise limit a qualified individual with a disability in the 
enjoyment of any right, privilege, advantage, or opportunity enjoyed by 
others receiving the aid, benefit, or service.
    (2) For purposes of this part, aids, benefits, and services, to be 
equally effective, are not required to produce the identical result or 
level of achievement for individuals with a disability and for 
nondisabled persons, but must afford individuals with a disability equal 
opportunity to obtain the same result, to gain the same benefit, or to 
reach the same level of achievement in the most integrated setting 
appropriate to the individual's needs.
    (3) Even if the Department is permitted, under paragraph (b)(1)(iv) 
of this section, to operate a separate or different program for 
individuals with a disability or for any class of individuals with a 
disability, the Department must permit any qualified individual with a 
disability who wishes to participate in the program that is not separate 
or different to do so.
    (4) The Department may not, directly or through contractual or other 
arrangements, utilize criteria or methods of administration the purpose 
or effect of which would:
    (i) Subject qualified individuals with a disability to 
discrimination on the basis of disability; or
    (ii) Defeat or substantially impair accomplishment of the objectives 
of a program or activity with respect to individuals with a disability.

[[Page 175]]

    (5) The Department may not, in determining the site or location of a 
facility, make selections the purpose or effect of which would:
    (i) Exclude individuals with a disability from, deny them the 
benefits of, or otherwise subject them to discrimination under any 
program or activity conducted by the Department; or
    (ii) Defeat or substantially impair the accomplishment of the 
objectives of a program or activity with respect to individuals with a 
disability.
    (6) The Department, in the selection of procurement contractors, may 
not use criteria that subject qualified individuals with a disability to 
discrimination on the basis of disability.
    (7) The Department may not administer a licensing or certification 
program in a manner that subjects qualified individuals with a 
disability to discrimination on the basis of disability, nor may the 
Department establish requirements for the programs or activities of 
licensees or certified entities that subject qualified individuals with 
a disability to discrimination on the basis of disability. However, the 
programs or activities of entities that are licensed or certified by the 
Department are not, themselves, covered by this part.
    (c) The exclusion of nondisabled persons from the benefits of a 
program limited by Federal statute or Executive order to individuals 
with a disability or the exclusion of a specific class of individuals 
with a disability from a program limited by Federal statute or Executive 
order to a different class of individuals with a disability is not 
prohibited by this part.
    (d) The Department shall administer programs and activities in the 
most integrated setting appropriate to the needs of qualified 
individuals with a disability.



Sec.  15.40  Employment.

    No qualified individual with a disability shall, on the basis of 
that disability, be subjected to discrimination in employment under any 
program or activity conducted by the Department. The definitions, 
requirements and procedures of section 501 of the Rehabilitation Act of 
1973 (29 U.S.C. 791), as established by the Equal Employment Opportunity 
Commission in 29 CFR part 1614, shall apply to employment of Federally 
conducted programs or activities.



Sec.  15.49  Program accessibility; discrimination prohibited.

    Except as otherwise provided in Sec.  15.50, no qualified individual 
with a disability shall, because the Department's facilities are 
inaccessible to or unusable by individuals with a disability, be denied 
the benefits of, be excluded from participation in, or otherwise be 
subjected to discrimination under any program or activity conducted by 
the Department.



Sec.  15.50  Program accessibility; existing facilities.

    (a) General. The Department shall operate each program or activity 
so that the program or activity, when viewed in its entirety, is readily 
accessible to and usable by individuals with a disability. This 
paragraph (a) does not require the Department:
    (1) To make structural alterations in each of its existing 
facilities in order to make them accessible to and usable by individuals 
with a disability where other methods are effective in achieving 
compliance with this section; or
    (2) To take any action that it can demonstrate would result in a 
fundamental alteration in the nature of a program or activity or in 
undue financial and administrative burdens. In those circumstances where 
Department personnel believe that the proposed action would 
fundamentally alter the program or activity or would result in undue 
financial and administrative burdens, the Department has the burden of 
proving that compliance with this paragraph (a) of this section would 
result in such alteration or burdens. The decision that compliance would 
result in such alteration or burdens must be made by the Secretary of 
Homeland Security (or his or her designee) after considering all agency 
resources available for use in the funding and operation of the 
conducted program or activity and must be accompanied by a written 
statement of the reasons for reaching that conclusion. If an action 
would result in such an alteration or such burdens, the Department shall

[[Page 176]]

take any other action that would not result in such an alteration or 
such burdens but would nevertheless ensure that individuals with a 
disability receive the benefits and services of the program or activity.
    (b) Methods. The Department may comply with the requirements of this 
section through such means as redesign of equipment, reassignment of 
services to accessible buildings, assignment of aides to beneficiaries, 
home visits, delivery of services at alternate accessible sites, 
alteration of existing facilities and construction of new facilities, 
use of accessible rolling stock, or any other methods that result in 
making its programs or activities readily accessible to and usable by 
individuals with a disability. The Department, in making alterations to 
existing buildings, shall meet accessibility requirements to the extent 
required by the Architectural Barriers Act of 1968, as amended (42 
U.S.C. 4151-4157), and any regulations implementing it. In choosing 
among available methods for meeting the requirements of this section, 
the Department shall give priority to those methods that offer programs 
and activities to qualified individuals with a disability in the most 
integrated setting appropriate.
    (c) Time period for compliance. The Department shall comply with the 
obligations established under this section not later than May 5, 2003, 
except that where structural changes in facilities are undertaken, such 
changes shall be made not later than March 6, 2006, but in any event as 
expeditiously as possible. If a component within the Department has 
already complied with the accessibility requirements of a regulation 
implementing section 504, then the provisions of this paragraph shall 
apply only to facilities for that agency's programs and activities that 
were not previously made readily accessible to and usable by individuals 
with disabilities in compliance with that regulation.
    (d) Transition plan. In the event that structural changes to 
facilities will be undertaken to achieve program accessibility, the 
Department shall develop not later than September 8, 2003, a transition 
plan setting forth the steps necessary to complete such changes. The 
Department shall provide an opportunity to interested persons, including 
individuals with disabilities or organizations representing individuals 
with disabilities, to participate in the development of the transition 
plan by submitting comments (both telephonic and written). A copy of the 
transition plan shall be made available for public inspection. If a 
component of the Department has already complied with the transition 
plan requirement of a regulation implementing section 504, then the 
requirements of this paragraph shall apply only to the agency's 
facilities for programs and activities that were not included in the 
previous transition plan. The plan shall at a minimum:
    (1) Identify physical obstacles in the Department's facilities that 
limit the physical accessibility of its programs or activities to 
individuals with disabilities;
    (2) Describe in detail the methods that will be used to make the 
facilities accessible;
    (3) Specify the schedule for taking the steps necessary to achieve 
compliance with this section and, if the time period of the transition 
plan is longer than one year, identify steps that will be taken during 
each year of the transition period; and
    (4) Indicate the official responsible for implementation of the 
plan.



Sec.  15.51  Program accessibility; new construction and alterations.

    Each building or part of a building that is constructed or altered 
by, on behalf of, or for the use of the Department shall be designed, 
constructed, or altered so as to be readily accessible to and usable by 
individuals with a disability. The definitions, requirements, and 
standards of the Architectural Barriers Act (42 U.S.C. 4151-4157), as 
established in 41 CFR 101-19.600 through 101-19.607 apply to buildings 
covered by this section.



Sec.  15.60  Communications.

    (a) The Department shall take appropriate steps to effectively 
communicate with applicants, participants, personnel of other Federal 
entities, and members of the public.

[[Page 177]]

    (1) The Department shall furnish appropriate auxiliary aids where 
necessary to afford an individual with a disability an equal opportunity 
to participate in, and enjoy the benefits of, a program or activity 
conducted by the Department.
    (i) In determining what type of auxiliary aid is necessary, the 
Department shall give primary consideration to the requests of the 
individual with a disability.
    (ii) The Department need not provide individually prescribed 
devices, readers for personal use or study, or other devices of a 
personal nature to applicants or participants in programs.
    (2) Where the Department communicates with applicants and 
beneficiaries by telephone, the Department shall use telecommunication 
devices for deaf persons (TTYs) or equally effective telecommunication 
systems to communicate with persons with impaired hearing.
    (b) The Department shall make available to interested persons, 
including persons with impaired vision or hearing, information as to the 
existence and location of accessible services, activities, and 
facilities.
    (c) The Department shall post notices at a primary entrance to each 
of its inaccessible facilities, directing users to an accessible 
facility, or to a location at which they can obtain information about 
accessible facilities. The international symbol for accessibility shall 
be used at each primary entrance of an accessible facility.
    (d) This section does not require the Department to take any action 
that it can demonstrate would result in a fundamental alteration in the 
nature of a program or activity or in undue financial and administrative 
burdens.
    (e) In those circumstances where Department personnel believe that 
the proposed action would fundamentally alter the program or activity or 
would result in undue financial and administrative burdens, the 
Department has the burden of proving that compliance with this section 
would result in such alteration or burdens. The decision that compliance 
would result in such alteration or burdens must be made by the Secretary 
of Homeland Security (or his or her designee) after considering all 
resources available for use in the funding and operation of the 
conducted program or activity and must be accompanied by a written 
statement of the reasons for reaching that conclusion. If an action 
required to comply with this section would result in such an alteration 
or such burdens, the Department shall take any other action that would 
not result in such an alteration or such burdens but would nevertheless 
ensure that, to the maximum extent possible, individuals with a 
disability receive the benefits and services of the program or activity.



Sec.  15.70  Compliance procedures.

    (a) Except as provided in paragraph (b) of this section, this 
section applies to all allegations of discrimination on the basis of 
disability in programs and activities conducted by the Department.
    (b) The Department shall process complaints alleging violations of 
section 504 with respect to employment according to the procedures 
established by the Equal Employment Opportunity Commission in 29 CFR 
part 1614.
    (c) All other complaints alleging violations of section 504 may be 
sent to the Officer for Civil Rights and Civil Liberties, Department of 
Homeland Security, Washington, DC 20528. The Officer for Civil Rights 
and Civil Liberties shall be responsible for coordinating implementation 
of this section.
    (d)(1) Any person who believes that he or she has been subjected to 
discrimination prohibited by this part may by him or herself, or by his 
or her authorized representative, file a complaint. Any person who 
believes that any specific class of persons has been subjected to 
discrimination prohibited by this part and who is a member of that class 
or the authorized representative of a member of that class may file a 
complaint.
    (2) The Department shall accept and investigate all complete 
complaints over which it has jurisdiction.
    (3) All complete complaints must be filed within 180 days of the 
alleged act of discrimination. The Department may extend this time 
period for good cause.

[[Page 178]]

    (e) If the Department receives a complaint over which it does not 
have jurisdiction, it shall promptly notify the complainant and shall 
make reasonable efforts to refer the complaint to the appropriate entity 
of the Federal government.
    (f) The Department shall notify the Architectural and Transportation 
Barriers Compliance Board upon receipt of any complaint alleging that a 
building or facility that is subject to the Architectural Barriers Act 
of 1968, as amended (42 U.S.C. 4151-4157), is not readily accessible to 
and usable by individuals with disabilities.
    (g)(1) Not later than 180 days from the receipt of a complete 
complaint over which it has jurisdiction, the Department shall notify 
the complainant of the results of the investigation in a letter 
containing:
    (i) Findings of fact and conclusions of law;
    (ii) A description of a remedy for each violation found; and
    (iii) A notice of the right to appeal.
    (2) Department employees are required to cooperate in the 
investigation and attempted resolution of complaints. Employees who are 
required to participate in any investigation under this section shall do 
so as part of their official duties and during the course of regular 
duty hours.
    (3) If a complaint is resolved informally, the terms of the 
agreement shall be reduced to writing and made part of the complaint 
file, with a copy of the agreement provided to the complainant. The 
written agreement shall describe the subject matter of the complaint and 
any corrective action to which the parties have agreed.
    (h) Appeals of the findings of fact and conclusions of law or 
remedies must be filed by the complainant not later than 60 days after 
receipt from the Department of the letter required by paragraph (g)(1) 
of this section. The Department may extend this time for good cause.
    (i) Timely appeals shall be accepted and processed by the Officer 
for Civil Rights and Civil Liberties, or designee thereof, who will 
issue the final agency decision which may include appropriate corrective 
action to be taken by the Department.
    (j) The Department shall notify the complainant of the results of 
the appeal within 30 days of the receipt of the appeal. If the 
Department determines that it needs additional information from the 
complainant, it shall have 30 days from the date it received the 
additional information to make its determination on the appeal.
    (k) The time limits cited in paragraphs (g) and (j) of this section 
may be extended for an individual case when the Officer for Civil Rights 
and Civil Liberties determines that there is good cause, based on the 
particular circumstances of that case, for the extension.
    (l) The Department may delegate its authority for conducting 
complaint investigations to other Federal agencies and may contract with 
nongovernment investigators to perform the investigation, but the 
authority for making the final determination may not be delegated to 
another agency.



PART 17_NONDISCRIMINATION ON THE BASIS OF SEX IN EDUCATION PROGRAMS OR
ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE--Table of Contents



                         Subpart A_Introduction

Sec.
17.100 Purpose and effective date.
17.105 Definitions.
17.110 Remedial and affirmative action and self-evaluation.
17.115 Assurance required.
17.120 Transfers of property.
17.125 Effect of other requirements.
17.130 Effect of employment opportunities.
17.135 Designation of responsible employee and adoption of grievance 
          procedures.
17.140 Dissemination of policy.

                           Subpart B_Coverage

17.200 Application.
17.205 Educational institutions and other entities controlled by 
          religious organizations.
17.210 Military and merchant marine educational institutions.
17.215 Membership practices of certain organizations.
17.220 Admissions.
17.225 Educational institutions eligible to submit transition plans.
17.230 Transition plans.

[[Page 179]]

17.235 Statutory amendments.

     Subpart C_Discrimination on the Basis of Sex in Admission and 
                         Recruitment Prohibited

17.300 Admission.
17.305 Preference in admission.
17.310 Recruitment.

 Subpart D_Discrimination on the Basis of Sex in Education Programs or 
                          Activities Prohibited

17.400 Education programs or activities.
17.405 Housing.
17.410 Comparable facilities.
17.415 Access to course offerings.
17.420 Access to schools operated by LEAs.
17.425 Counseling and use of appraisal and counseling materials.
17.430 Financial assistance.
17.435 Employment assistance to students.
17.440 Health and insurance benefits and services.
17.445 Marital or parental status.
17.450 Athletics.
17.455 Textbooks and curricular material.

Subpart E_Discrimination on the Basis of Sex in Employment in Education 
                    Programs or Activities Prohibited

17.500 Employment.
17.505 Employment criteria.
17.510 Recruitment.
17.515 Compensation.
17.520 Job classification and structure.
17.525 Fringe benefits.
17.530 Marital or parental status.
17.535 Effect of state or local law or other requirements.
17.540 Advertising.
17.545 Pre-employment inquiries.
17.550 Sex as a bona fide occupational qualification.

                          Subpart F_Procedures

17.600 Notice of covered programs.
17.605 Enforcement procedures.
17.635 Forms and instructions; coordination.

    Authority: Pub. L. 107-296, 116 Stat. 2135 (6 U.S.C. 1 et seq.); 5 
U.S.C. 301; 20 U.S.C. 1681, 1682, 1683, 1685, 1686, 1687, 1688.

    Source: 68 FR 10892, Mar. 6, 2003, unless otherwise noted.



                         Subpart A_Introduction



Sec.  17.100  Purpose and effective date.

    (a) The purpose of these Title IX regulations is to effectuate Title 
IX of the Education Amendments of 1972, as amended (except sections 904 
and 906 of those Amendments) (20 U.S.C. 1681, 1682, 1683, 1685, 1686, 
1687, 1688), which is designed to eliminate (with certain exceptions) 
discrimination on the basis of sex in any education program or activity 
receiving Federal financial assistance, whether or not such program or 
activity is offered or sponsored by an educational institution as 
defined in these Title IX regulations. The effective date of these Title 
IX regulations shall be March 6, 2003.
    (b) The provisions established by this part shall be effective for 
all components of the Department, including all Department components 
that are transferred to the Department, except to the extent that a 
Department component already has existing Title IX regulations.



Sec.  17.105  Definitions.

    As used in these Title IX regulations, the term:
    (a) Administratively separate unit means a school, department, or 
college of an educational institution (other than a local educational 
agency) admission to which is independent of admission to any other 
component of such institution.
    (b) Admission means selection for part-time, full-time, special, 
associate, transfer, exchange, or any other enrollment, membership, or 
matriculation in or at an education program or activity operated by a 
recipient.
    (c) Applicant means one who submits an application, request, or plan 
required to be approved by an official of the Federal agency that awards 
Federal financial assistance, or by a recipient, as a condition to 
becoming a recipient.
    (d) Department means Department of Homeland Security.
    (e) Designated agency official means the Officer for Civil Rights 
and Civil Liberties, or the designee thereof.
    (f) Educational institution means a local educational agency (LEA) 
as defined by 20 U.S.C. 8801(18), a preschool, a private elementary or 
secondary school, or an applicant or recipient

[[Page 180]]

that is an institution of graduate higher education, an institution of 
undergraduate higher education, an institution of professional 
education, or an institution of vocational education, as defined in this 
section.
    (g) Federal financial assistance means any of the following, when 
authorized or extended under a law administered by the Federal agency 
that awards such assistance:
    (1) A grant or loan of Federal financial assistance, including funds 
made available for:
    (i) The acquisition, construction, renovation, restoration, or 
repair of a building or facility or any portion thereof; and
    (ii) Scholarships, loans, grants, wages, or other funds extended to 
any entity for payment to or on behalf of students admitted to that 
entity, or extended directly to such students for payment to that 
entity.
    (2) A grant of Federal real or personal property or any interest 
therein, including surplus property, and the proceeds of the sale or 
transfer of such property, if the Federal share of the fair market value 
of the property is not, upon such sale or transfer, properly accounted 
for to the Federal Government.
    (3) Provision of the services of Federal personnel.
    (4) Sale or lease of Federal property or any interest therein at 
nominal consideration, or at consideration reduced for the purpose of 
assisting the recipient or in recognition of public interest to be 
served thereby, or permission to use Federal property or any interest 
therein without consideration.
    (5) Any other contract, agreement, or arrangement that has as one of 
its purposes the provision of assistance to any education program or 
activity, except a contract of insurance or guaranty.
    (h) Institution of graduate higher education means an institution 
that:
    (1) Offers academic study beyond the bachelor of arts or bachelor of 
science degree, whether or not leading to a certificate of any higher 
degree in the liberal arts and sciences;
    (2) Awards any degree in a professional field beyond the first 
professional degree (regardless of whether the first professional degree 
in such field is awarded by an institution of undergraduate higher 
education or professional education); or
    (3) Awards no degree and offers no further academic study, but 
operates ordinarily for the purpose of facilitating research by persons 
who have received the highest graduate degree in any field of study.
    (i) Institution of professional education means an institution 
(except any institution of undergraduate higher education) that offers a 
program of academic study that leads to a first professional degree in a 
field for which there is a national specialized accrediting agency 
recognized by the Secretary of Education.
    (j) Institution of undergraduate higher education means:
    (1) An institution offering at least two but less than four years of 
college-level study beyond the high school level, leading to a diploma 
or an associate degree, or wholly or principally creditable toward a 
baccalaureate degree;
    (2) An institution offering academic study leading to a 
baccalaureate degree; or
    (3) An agency or body that certifies credentials or offers degrees, 
but that may or may not offer academic study.
    (k) Institution of vocational education means a school or 
institution (except an institution of professional or graduate or 
undergraduate higher education) that has as its primary purpose 
preparation of students to pursue a technical, skilled, or semi-skilled 
occupation or trade, or to pursue study in a technical field, whether or 
not the school or institution offers certificates, diplomas, or degrees 
and whether or not it offers full-time study.
    (l) Recipient means any State or political subdivision thereof or 
any instrumentality of a State or political subdivision thereof, any 
public or private agency, institution, or organization, or other entity, 
or any person, to whom Federal financial assistance is extended directly 
or through another recipient and that operates an education program or 
activity that receives such assistance, including any subunit, 
successor, assignee, or transferee thereof.

[[Page 181]]

    (m) Reviewing authority means that component of the Department 
delegated authority to review the decisions of hearing officers in cases 
arising under these Title IX regulations.
    (n) Secretary means Secretary of the Department of Homeland 
Security.
    (o) Student means a person who has gained admission.
    (p) Title IX means Title IX of the Education Amendments of 1972, 
Public Law 92-318, 86 Stat. 235, 373 (codified as amended at 20 U.S.C. 
1681-1688) (except sections 904 and 906 thereof), as amended by section 
3 of Public Law 93-568, 88 Stat. 1855, by section 412 of the Education 
Amendments of 1976, Public Law 94-482, 90 Stat. 2234, and by section 3 
of Public Law 100-259, 102 Stat. 28, 28-29 (20 U.S.C. 1681, 1682, 1683, 
1685, 1686, 1687, 1688).
    (q) Title IX regulations means the provisions of this part.
    (r) Transition plan means a plan subject to the approval of the 
Secretary of Education pursuant to section 901(a)(2) of the Education 
Amendments of 1972 (20 U.S.C. 1681(a)(2)), under which an educational 
institution operates in making the transition from being an educational 
institution that admits only students of one sex to being one that 
admits students of both sexes without discrimination.



Sec.  17.110  Remedial and affirmative action and self-evaluation.

    (a) Remedial action. If the designated agency official finds that a 
recipient has discriminated against persons on the basis of sex in an 
education program or activity, such recipient shall take such remedial 
action as the designated agency official deems necessary to overcome the 
effects of such discrimination.
    (b) Affirmative action. In the absence of a finding of 
discrimination on the basis of sex in an education program or activity, 
a recipient may take affirmative action consistent with law to overcome 
the effects of conditions that resulted in limited participation therein 
by persons of a particular sex. Nothing in these Title IX regulations 
shall be interpreted to alter any affirmative action obligations that a 
recipient may have under Executive Order 11246, 3 CFR, 1964-1965 Comp., 
p. 339; as amended by Executive Order 11375, 3 CFR, 1966-1970 Comp., p. 
684; as amended by Executive Order 11478, 3 CFR, 1966-1970 Comp., p. 
803; as amended by Executive Order 12086, 3 CFR, 1978 Comp., p. 230; as 
amended by Executive Order 12107, 3 CFR, 1978 Comp., p. 264.
    (c) Self-evaluation. Each recipient education institution shall, 
within one year of March 6, 2003:
    (1) Evaluate, in terms of the requirements of these Title IX 
regulations, its current policies and practices and the effects thereof 
concerning admission of students, treatment of students, and employment 
of both academic and non-academic personnel working in connection with 
the recipient's education program or activity;
    (2) Modify any of these policies and practices that do not or may 
not meet the requirements of these Title IX regulations; and
    (3) Take appropriate remedial steps to eliminate the effects of any 
discrimination that resulted or may have resulted from adherence to 
these policies and practices.
    (d) Availability of self-evaluation and related materials. 
Recipients shall maintain on file for at least three years following 
completion of the evaluation required under paragraph (c) of this 
section, and shall provide to the designated agency official upon 
request, a description of any modifications made pursuant to paragraph 
(c)(2) of this section and of any remedial steps taken pursuant to 
paragraph (c)(3) of this section.



Sec.  17.115  Assurance required.

    (a) General. Either at the application stage or the award stage, 
Federal agencies must ensure that applications for Federal financial 
assistance or awards of Federal financial assistance contain, be 
accompanied by, or be covered by a specifically identified assurance 
from the applicant or recipient, satisfactory to the designated agency 
official, that each education program or activity operated by the 
applicant or recipient and to which these Title IX regulations apply 
will be operated in compliance with these Title IX regulations. An 
assurance of compliance with these Title IX regulations shall not be 
satisfactory to the designated agency official if the

[[Page 182]]

applicant or recipient to whom such assurance applies fails to commit 
itself to take whatever remedial action is necessary in accordance with 
Sec.  17.110(a) to eliminate existing discrimination on the basis of sex 
or to eliminate the effects of past discrimination whether occurring 
prior to or subsequent to the submission to the designated agency 
official of such assurance.
    (b) Duration of obligation. (1) In the case of Federal financial 
assistance extended to provide real property or structures thereon, such 
assurance shall obligate the recipient or, in the case of a subsequent 
transfer, the transferee, for the period during which the real property 
or structures are used to provide an education program or activity.
    (2) In the case of Federal financial assistance extended to provide 
personal property, such assurance shall obligate the recipient for the 
period during which it retains ownership or possession of the property.
    (3) In all other cases such assurance shall obligate the recipient 
for the period during which Federal financial assistance is extended.
    (c) Form. (1) The assurances required by paragraph (a) of this 
section, which may be included as part of a document that addresses 
other assurances or obligations, shall include that the applicant or 
recipient will comply with all applicable Federal statutes relating to 
nondiscrimination. These include but are not limited to: Title IX of the 
Education Amendments of 1972, as amended (20 U.S.C. 1681-1683, 1685-
1688).
    (2) The designated agency official will specify the extent to which 
such assurances will be required of the applicant's or recipient's 
subgrantees, contractors, subcontractors, transferees, or successors in 
interest.



Sec.  17.120  Transfers of property.

    If a recipient sells or otherwise transfers property financed in 
whole or in part with Federal financial assistance to a transferee that 
operates any education program or activity, and the Federal share of the 
fair market value of the property is not upon such sale or transfer 
properly accounted for to the Federal Government, both the transferor 
and the transferee shall be deemed to be recipients, subject to the 
provisions of Sec. Sec.  17.205 through 17.235(a).



Sec.  17.125  Effect of other requirements.

    (a) Effect of other Federal provisions. The obligations imposed by 
these Title IX regulations are independent of, and do not alter, 
obligations not to discriminate on the basis of sex imposed by Executive 
Order 11246, 3 CFR, 1964-1965 Comp., p. 339; as amended by Executive 
Order 11375, 3 CFR, 1966-1970 Comp., p. 684; as amended by Executive 
Order 11478, 3 CFR, 1966-1970 Comp., p. 803; as amended by Executive 
Order 12087, 3 CFR, 1978 Comp., p. 230; as amended by Executive Order 
12107, 3 CFR, 1978 Comp., p. 264; sections 704 and 855 of the Public 
Health Service Act (42 U.S.C. 295m, 298b-2); Title VII of the Civil 
Rights Act of 1964 (42 U.S.C. 2000e et seq.); the Equal Pay Act of 1963 
(29 U.S.C. 206); and any other Act of Congress or Federal regulation.
    (b) Effect of State or local law or other requirements. The 
obligation to comply with these Title IX regulations is not obviated or 
alleviated by any State or local law or other requirement that would 
render any applicant or student ineligible, or limit the eligibility of 
any applicant or student, on the basis of sex, to practice any 
occupation or profession.
    (c) Effect of rules or regulations of private organizations. The 
obligation to comply with these Title IX regulations is not obviated or 
alleviated by any rule or regulation of any organization, club, athletic 
or other league, or association that would render any applicant or 
student ineligible to participate or limit the eligibility or 
participation of any applicant or student, on the basis of sex, in any 
education program or activity operated by a recipient and that receives 
Federal financial assistance.



Sec.  17.130  Effect of employment opportunities.

    The obligation to comply with these Title IX regulations is not 
obviated or alleviated because employment opportunities in any 
occupation or profession are or may be more limited for members of one 
sex than for members of the other sex.

[[Page 183]]



Sec.  17.135  Designation of responsible employee and adoption of
grievance procedures.

    (a) Designation of responsible employee. Each recipient shall 
designate at least one employee to coordinate its efforts to comply with 
and carry out its responsibilities under these Title IX regulations, 
including any investigation of any complaint communicated to such 
recipient alleging its noncompliance with these Title IX regulations or 
alleging any actions that would be prohibited by these Title IX 
regulations. The recipient shall notify all its students and employees 
of the name, office address, and telephone number of the employee or 
employees appointed pursuant to this paragraph.
    (b) Complaint procedure of recipient. A recipient shall adopt and 
publish grievance procedures providing for prompt and equitable 
resolution of student and employee complaints alleging any action that 
would be prohibited by these Title IX regulations.



Sec.  17.140  Dissemination of policy.

    (a) Notification of policy. (1) Each recipient shall implement 
specific and continuing steps to notify applicants for admission and 
employment, students and parents of elementary and secondary school 
students, employees, sources of referral of applicants for admission and 
employment, and all unions or professional organizations holding 
collective bargaining or professional agreements with the recipient, 
that it does not discriminate on the basis of sex in the educational 
programs or activities that it operates, and that it is required by 
Title IX and these Title IX regulations not to discriminate in such a 
manner. Such notification shall contain such information, and be made in 
such manner, as the designated agency official finds necessary to 
apprise such persons of the protections against discrimination assured 
them by Title IX and these Title IX regulations, but shall state at 
least that the requirement not to discriminate in education programs or 
activities extends to employment therein, and to admission thereto 
unless Sec. Sec.  17.300 through 17.310 do not apply to the recipient, 
and that inquiries concerning the application of Title IX and these 
Title IX regulations to such recipient may be referred to the employee 
designated pursuant to Sec.  17.135, or to the designated agency 
official.
    (2) Each recipient shall make the initial notification required by 
paragraph (a)(1) of this section within 90 days of March 6, 2003 or of 
the date these Title IX regulations first apply to such recipient, 
whichever comes later, which notification shall include publication in:
    (i) Newspapers and magazines operated by such recipient or by 
student, alumnae, or alumni groups for or in connection with such 
recipient; and
    (ii) Memoranda or other written communications distributed to every 
student and employee of such recipient.
    (b) Publications. (1) Each recipient shall prominently include a 
statement of the policy described in paragraph (a) of this section in 
each announcement, bulletin, catalog, or application form that it makes 
available to any person of a type, described in paragraph (a) of this 
section, or which is otherwise used in connection with the recruitment 
of students or employees.
    (2) A recipient shall not use or distribute a publication of the 
type described in paragraph (b)(1) of this section that suggests, by 
text or illustration, that such recipient treats applicants, students, 
or employees differently on the basis of sex except as such treatment is 
permitted by these Title IX regulations.
    (c) Distribution. Each recipient shall distribute without 
discrimination on the basis of sex each publication described in 
paragraph (b)(1) of this section, and shall apprise each of its 
admission and employment recruitment representatives of the policy of 
nondiscrimination described in paragraph (a) of this section, and shall 
require such representatives to adhere to such policy.



                           Subpart B_Coverage



Sec.  17.200  Application.

    Except as provided in Sec. Sec.  17.205 through 17.235(a), these 
Title IX regulations apply to every recipient and to each education 
program or activity operated by such recipient that receives Federal 
financial assistance.

[[Page 184]]



Sec.  17.205  Educational institutions and other entities controlled by
religious organizations.

    (a) Exemption. These Title IX regulations do not apply to any 
operation of an educational institution or other entity that is 
controlled by a religious organization to the extent that application of 
these Title IX regulations would not be consistent with the religious 
tenets of such organization.
    (b) Exemption claims. An educational institution or other entity 
that wishes to claim the exemption set forth in paragraph (a) of this 
section shall do so by submitting in writing to the designated agency 
official a statement by the highest-ranking official of the institution, 
identifying the provisions of these Title IX regulations that conflict 
with a specific tenet of the religious organization.



Sec.  17.210  Military and merchant marine educational institutions.

    These Title IX regulations do not apply to an educational 
institution whose primary purpose is the training of individuals for a 
military service of the United States or for the merchant marine.



Sec.  17.215  Membership practices of certain organizations.

    (a) Social fraternities and sororities. These Title IX regulations 
do not apply to the membership practices of social fraternities and 
sororities that are exempt from taxation under section 501(a) of the 
Internal Revenue Code of 1954, 26 U.S.C. 501(a), the active membership 
of which consists primarily of students in attendance at institutions of 
higher education.
    (b) YMCA, YWCA, Girl Scouts, Boy Scouts, and Camp Fire Girls. These 
Title IX regulations do not apply to the membership practices of the 
Young Men's Christian Association (YMCA), the Young Women's Christian 
Association (YWCA), the Girl Scouts, the Boy Scouts, and Camp Fire 
Girls.
    (c) Voluntary youth service organizations. These Title IX 
regulations do not apply to the membership practices of a voluntary 
youth service organization that is exempt from taxation under section 
501(a) of the Internal Revenue Code of 1986 (26 U.S.C. 501(a)), and the 
membership of which has been traditionally limited to members of one sex 
and principally to persons of less than nineteen years of age.



Sec.  17.220  Admissions.

    (a) General. Admissions to educational institutions prior to June 
24, 1973, are not covered by these Title IX regulations.
    (b) Administratively separate units. For the purposes only of this 
section, Sec. Sec.  17.225, 17.230, and 17.300 through 17.310, each 
administratively separate unit shall be deemed to be an educational 
institution.
    (c) Application of Sec. Sec.  17.300 through 17.310. Except as 
provided in paragraphs (d) and (e) of this section, Sec. Sec.  17.300 
through 17.310 apply to each recipient. A recipient to which Sec. Sec.  
17.300 through 17.310 apply shall not discriminate on the basis of sex 
in admission or recruitment in violation of Sec. Sec.  17.300 through 
17.310.
    (d) Educational institutions. Except as provided in paragraph (e) of 
this section as to recipients that are educational institutions, 
Sec. Sec.  17.300 through 17.310 apply only to institutions of 
vocational education, professional education, graduate higher education, 
and public institutions of undergraduate higher education.
    (e) Public institutions of undergraduate higher education. Sections 
17.300 through 17.310 do not apply to any public institution of 
undergraduate higher education that traditionally and continually from 
its establishment has had a policy of admitting students of only one 
sex.



Sec.  17.225  Educational institutions eligible to submit transition 
plans.

    (a) Application. This section applies to each educational 
institution to which Sec. Sec.  17.300 through 17.310 apply that:
    (1) Admitted students of only one sex as regular students as of June 
23, 1972; or
    (2) Admitted students of only one sex as regular students as of June 
23, 1965, but thereafter admitted, as regular students, students of the 
sex not admitted prior to June 23, 1965.
    (b) Provision for transition plans. An educational institution to 
which this

[[Page 185]]

section applies shall not discriminate on the basis of sex in admission 
or recruitment in violation of Sec. Sec.  17.300 through 17.310.



Sec.  17.230  Transition plans.

    (a) Submission of plans. An institution to which Sec.  17.225 
applies and that is composed of more than one administratively separate 
unit may submit either a single transition plan applicable to all such 
units, or a separate transition plan applicable to each such unit.
    (b) Content of plans. In order to be approved by the Secretary of 
Education, a transition plan shall:
    (1) State the name, address, and Federal Interagency Committee on 
Education Code of the educational institution submitting such plan, the 
administratively separate units to which the plan is applicable, and the 
name, address, and telephone number of the person to whom questions 
concerning the plan may be addressed. The person who submits the plan 
shall be the chief administrator or president of the institution, or 
another individual legally authorized to bind the institution to all 
actions set forth in the plan.
    (2) State whether the educational institution or administratively 
separate unit admits students of both sexes as regular students and, if 
so, when it began to do so.
    (3) Identify and describe with respect to the educational 
institution or administratively separate unit any obstacles to admitting 
students without discrimination on the basis of sex.
    (4) Describe in detail the steps necessary to eliminate as soon as 
practicable each obstacle so identified and indicate the schedule for 
taking these steps and the individual directly responsible for their 
implementation.
    (5) Include estimates of the number of students, by sex, expected to 
apply for, be admitted to, and enter each class during the period 
covered by the plan.
    (c) Nondiscrimination. No policy or practice of a recipient to which 
Sec.  17.225 applies shall result in treatment of applicants to or 
students of such recipient in violation of Sec. Sec.  17.300 through 
17.310 unless such treatment is necessitated by an obstacle identified 
in paragraph (b)(3) of this section and a schedule for eliminating that 
obstacle has been provided as required by paragraph (b)(4) of this 
section.
    (d) Effects of past exclusion. To overcome the effects of past 
exclusion of students on the basis of sex, each educational institution 
to which Sec.  17.225 applies shall include in its transition plan, and 
shall implement, specific steps designed to encourage individuals of the 
previously excluded sex to apply for admission to such institution. Such 
steps shall include instituting recruitment programs that emphasize the 
institution's commitment to enrolling students of the sex previously 
excluded.



Sec.  17.235  Statutory amendments.

    (a) This section, which applies to all provisions of these Title IX 
regulations, addresses statutory amendments to Title IX.
    (b) These Title IX regulations shall not apply to or preclude:
    (1) Any program or activity of the American Legion undertaken in 
connection with the organization or operation of any Boys State 
conference, Boys Nation conference, Girls State conference, or Girls 
Nation conference;
    (2) Any program or activity of a secondary school or educational 
institution specifically for:
    (i) The promotion of any Boys State conference, Boys Nation 
conference, Girls State conference, or Girls Nation conference; or
    (ii) The selection of students to attend any such conference;
    (3) Father-son or mother-daughter activities at an educational 
institution or in an education program or activity, but if such 
activities are provided for students of one sex, opportunities for 
reasonably comparable activities shall be provided to students of the 
other sex;
    (4) Any scholarship or other financial assistance awarded by an 
institution of higher education to an individual because such individual 
has received such award in a single-sex pageant based upon a combination 
of factors related to the individual's personal appearance, poise, and 
talent. The pageant, however, must comply with other nondiscrimination 
provisions of Federal law.

[[Page 186]]

    (c) For purposes of these Title IX regulations, program or activity 
or program means:
    (1) All of the operations of any entity described in paragraphs 
(c)(1)(i) through (iv) of this section, any part of which is extended 
Federal financial assistance:
    (i)(A) A department, agency, special purpose district, or other 
instrumentality of a State or of a local government; or
    (B) The entity of such State or local government that distributes 
such assistance and each such department or agency (and each other State 
or local government entity) to which the assistance is extended, in the 
case of assistance to a State or local government;
    (ii)(A) A college, university, or other postsecondary institution, 
or a public system of higher education; or
    (B) A local educational agency (as defined in 20 U.S.C. 8801), 
system of vocational education, or other school system;
    (iii)(A) An entire corporation, partnership, or other private 
organization, or an entire sole proprietorship:
    (1) If assistance is extended to such corporation, partnership, 
private organization, or sole proprietorship as a whole; or
    (2) Which is principally engaged in the business of providing 
education, health care, housing, social services, or parks and 
recreation; or
    (B) The entire plant or other comparable, geographically separate 
facility to which Federal financial assistance is extended, in the case 
of any other corporation, partnership, private organization, or sole 
proprietorship; or
    (iv) Any other entity that is established by two or more of the 
entities described in paragraphs (c)(1)(i), (ii), or (iii) of this 
section.
    (2)(i) Program or activity does not include any operation of an 
entity that is controlled by a religious organization if the application 
of 20 U.S.C. 1681 to such operation would not be consistent with the 
religious tenets of such organization.
    (ii) For example, all of the operations of a college, university, or 
other postsecondary institution, including but not limited to 
traditional educational operations, faculty and student housing, campus 
shuttle bus service, campus restaurants, the bookstore, and other 
commercial activities are part of a program or activity subject to these 
Title IX regulations if the college, university, or other institution 
receives Federal financial assistance.
    (d)(1) Nothing in these Title IX regulations shall be construed to 
require or prohibit any person, or public or private entity, to provide 
or pay for any benefit or service, including the use of facilities, 
related to an abortion. Medical procedures, benefits, services, and the 
use of facilities, necessary to save the life of a pregnant woman or to 
address complications related to an abortion are not subject to this 
section.
    (2) Nothing in this section shall be construed to permit a penalty 
to be imposed on any person or individual because such person or 
individual is seeking or has received any benefit or service related to 
a legal abortion. Accordingly, subject to paragraph (d)(1) of this 
section, no person shall be excluded from participation in, be denied 
the benefits of, or be subjected to discrimination under any academic, 
extracurricular, research, occupational training, employment, or other 
educational program or activity operated by a recipient that receives 
Federal financial assistance because such individual has sought or 
received, or is seeking, a legal abortion, or any benefit or service 
related to a legal abortion.



     Subpart C_Discrimination on the Basis of Sex in Admission and 
                         Recruitment Prohibited



Sec.  17.300  Admission.

    (a) General. No person shall, on the basis of sex, be denied 
admission, or be subjected to discrimination in admission, by any 
recipient to which Sec. Sec.  17.300 through 17.310 apply, except as 
provided in Sec. Sec.  17.225 and 17.230.
    (b) Specific prohibitions. (1) In determining whether a person 
satisfies any policy or criterion for admission, or in making any offer 
of admission, a recipient to which Sec. Sec.  17.300 through 17.310 
apply shall not:
    (i) Give preference to one person over another on the basis of sex, 
by ranking

[[Page 187]]

applicants separately on such basis, or otherwise;
    (ii) Apply numerical limitations upon the number or proportion of 
persons of either sex who may be admitted; or
    (iii) Otherwise treat one individual differently from another on the 
basis of sex.
    (2) A recipient shall not administer or operate any test or other 
criterion for admission that has a disproportionately adverse effect on 
persons on the basis of sex unless the use of such test or criterion is 
shown to predict validly success in the education program or activity in 
question and alternative tests or criteria that do not have such a 
disproportionately adverse effect are shown to be unavailable.
    (c) Prohibitions relating to marital or parental status. In 
determining whether a person satisfies any policy or criterion for 
admission, or in making any offer of admission, a recipient to which 
Sec. Sec.  17.300 through 17.310 apply:
    (1) Shall not apply any rule concerning the actual or potential 
parental, family, or marital status of a student or applicant that 
treats persons differently on the basis of sex;
    (2) Shall not discriminate against or exclude any person on the 
basis of pregnancy, childbirth, termination of pregnancy, or recovery 
therefrom, or establish or follow any rule or practice that so 
discriminates or excludes;
    (3) Subject to Sec.  17.235(d), shall treat disabilities related to 
pregnancy, childbirth, termination of pregnancy, or recovery therefrom 
in the same manner and under the same policies as any other temporary 
disability or physical condition; and
    (4) Shall not make pre-admission inquiry as to the marital status of 
an applicant for admission, including whether such applicant is ``Miss'' 
or ``Mrs.'' A recipient may make pre-admission inquiry as to the sex of 
an applicant for admission, but only if such inquiry is made equally of 
such applicants of both sexes and if the results of such inquiry are not 
used in connection with discrimination prohibited by these Title IX 
regulations.



Sec.  17.305  Preference in admission.

    A recipient to which Sec. Sec.  17.300 through 17.310 apply shall 
not give preference to applicants for admission, on the basis of 
attendance at any educational institution or other school or entity that 
admits as students only or predominantly members of one sex, if the 
giving of such preference has the effect of discriminating on the basis 
of sex in violation of Sec. Sec.  17.300 through 17.310.



Sec.  17.310  Recruitment.

    (a) Nondiscriminatory recruitment. A recipient to which Sec. Sec.  
17.300 through 17.310 apply shall not discriminate on the basis of sex 
in the recruitment and admission of students. A recipient may be 
required to undertake additional recruitment efforts for one sex as 
remedial action pursuant to Sec.  17.110(a), and may choose to undertake 
such efforts as affirmative action pursuant to Sec.  17.110(b).
    (b) Recruitment at certain institutions. A recipient to which 
Sec. Sec.  17.300 through 17.310 apply shall not recruit primarily or 
exclusively at educational institutions, schools, or entities that admit 
as students only or predominantly members of one sex, if such actions 
have the effect of discriminating on the basis of sex in violation of 
Sec. Sec.  17.300 through 17.310.



 Subpart D_Discrimination on the Basis of Sex in Education Programs or 
                          Activities Prohibited



Sec.  17.400  Education programs or activities.

    (a) General. Except as provided elsewhere in these Title IX 
regulations, no person shall, on the basis of sex, be excluded from 
participation in, be denied the benefits of, or be subjected to 
discrimination under any academic, extracurricular, research, 
occupational training, or other education program or activity operated 
by a recipient that receives Federal financial assistance. Sections 
17.400 through 17.455 do not apply to actions of a recipient in 
connection with admission of its students to an education program or 
activity of a recipient to which Sec. Sec.  17.300 through 17.310 do not 
apply, or an entity, not a recipient, to which Sec. Sec.  17.300 through 
17.310 would not apply if the entity were a recipient.

[[Page 188]]

    (b) Specific prohibitions. Except as provided in Sec. Sec.  17.400 
through 17.455, in providing any aid, benefit, or service to a student, 
a recipient shall not, on the basis of sex:
    (1) Treat one person differently from another in determining whether 
such person satisfies any requirement or condition for the provision of 
such aid, benefit, or service;
    (2) Provide different aid, benefits, or services or provide aid, 
benefits, or services in a different manner;
    (3) Deny any person any such aid, benefit, or service;
    (4) Subject any person to separate or different rules of behavior, 
sanctions, or other treatment;
    (5) Apply any rule concerning the domicile or residence of a student 
or applicant, including eligibility for in-state fees and tuition;
    (6) Aid or perpetuate discrimination against any person by providing 
significant assistance to any agency, organization, or person that 
discriminates on the basis of sex in providing any aid, benefit, or 
service to students or employees; or
    (7) Otherwise limit any person in the enjoyment of any right, 
privilege, advantage, or opportunity.
    (c) Assistance administered by a recipient educational institution 
to study at a foreign institution. A recipient educational institution 
may administer or assist in the administration of scholarships, 
fellowships, or other awards established by foreign or domestic wills, 
trusts, or similar legal instruments, or by acts of foreign governments 
and restricted to members of one sex, that are designed to provide 
opportunities to study abroad, and that are awarded to students who are 
already matriculating at or who are graduates of the recipient 
institution; Provided, that a recipient educational institution that 
administers or assists in the administration of such scholarships, 
fellowships, or other awards that are restricted to members of one sex 
provides, or otherwise makes available, reasonable opportunities for 
similar studies for members of the other sex. Such opportunities may be 
derived from either domestic or foreign sources.
    (d) Aids, benefits or services not provided by recipient. (1) This 
paragraph (d) applies to any recipient that requires participation by 
any applicant, student, or employee in any education program or activity 
not operated wholly by such recipient, or that facilitates, permits, or 
considers such participation as part of or equivalent to an education 
program or activity operated by such recipient, including participation 
in educational consortia and cooperative employment and student-teaching 
assignments.
    (2) Such recipient:
    (i) Shall develop and implement a procedure designed to assure 
itself that the operator or sponsor of such other education program or 
activity takes no action affecting any applicant, student, or employee 
of such recipient that these Title IX regulations would prohibit such 
recipient from taking; and
    (ii) Shall not facilitate, require, permit, or consider such 
participation if such action occurs.



Sec.  17.405  Housing.

    (a) General. A recipient shall not, on the basis of sex, apply 
different rules or regulations, impose different fees or requirements, 
or offer different services or benefits related to housing, except as 
provided in this section (including housing provided only to married 
students).
    (b) Housing provided by recipient. (1) A recipient may provide 
separate housing on the basis of sex.
    (2) Housing provided by a recipient to students of one sex, when 
compared to that provided to students of the other sex, shall be as a 
whole:
    (i) Proportionate in quantity to the number of students of that sex 
applying for such housing; and
    (ii) Comparable in quality and cost to the student.
    (c) Other housing. (1) A recipient shall not, on the basis of sex, 
administer different policies or practices concerning occupancy by its 
students of housing other than that provided by such recipient.
    (2)(i) A recipient which, through solicitation, listing, approval of 
housing, or otherwise, assists any agency, organization, or person in 
making housing available to any of its students, shall

[[Page 189]]

take such reasonable action as may be necessary to assure itself that 
such housing as is provided to students of one sex, when compared to 
that provided to students of the other sex, is as a whole:
    (A) Proportionate in quantity; and
    (B) Comparable in quality and cost to the student.
    (ii) A recipient may render such assistance to any agency, 
organization, or person that provides all or part of such housing to 
students of only one sex.



Sec.  17.410  Comparable facilities.

    A recipient may provide separate toilet, locker room, and shower 
facilities on the basis of sex, but such facilities provided for 
students of one sex shall be comparable to such facilities provided for 
students of the other sex.



Sec.  17.415  Access to course offerings.

    (a) A recipient shall not provide any course or otherwise carry out 
any of its education program or activity separately on the basis of sex, 
or require or refuse participation therein by any of its students on 
such basis, including health, physical education, industrial, business, 
vocational, technical, home economics, music, and adult education 
courses.
    (b)(1) With respect to physical education classes and activities at 
the elementary school level, the recipient shall comply fully with this 
section as expeditiously as possible, but in no event later than one 
year from March 6, 2003. With respect to physical education classes and 
activities at the secondary and post-secondary levels, the recipient 
shall comply fully with this section as expeditiously as possible but in 
no event later than three years from March 6, 2003.
    (2) This section does not prohibit grouping of students in physical 
education classes and activities by ability as assessed by objective 
standards of individual performance developed and applied without regard 
to sex.
    (3) This section does not prohibit separation of students by sex 
within physical education classes or activities during participation in 
wrestling, boxing, rugby, ice hockey, football, basketball, and other 
sports the purpose or major activity of which involves bodily contact.
    (4) Where use of a single standard of measuring skill or progress in 
a physical education class has an adverse effect on members of one sex, 
the recipient shall use appropriate standards that do not have such 
effect.
    (5) Portions of classes in elementary and secondary schools, or 
portions of education programs or activities, that deal exclusively with 
human sexuality may be conducted in separate sessions for boys and 
girls.
    (6) Recipients may make requirements based on vocal range or quality 
that may result in a chorus or choruses of one or predominantly one sex.



Sec.  17.420  Access to schools operated by LEAs.

    A recipient that is a local educational agency shall not, on the 
basis of sex, exclude any person from admission to:
    (a) Any institution of vocational education operated by such 
recipient; or
    (b) Any other school or educational unit operated by such recipient, 
unless such recipient otherwise makes available to such person, pursuant 
to the same policies and criteria of admission, courses, services, and 
facilities comparable to each course, service, and facility offered in 
or through such schools.



Sec.  17.425  Counseling and use of appraisal and counseling materials.

    (a) Counseling. A recipient shall not discriminate against any 
person on the basis of sex in the counseling or guidance of students or 
applicants for admission.
    (b) Use of appraisal and counseling materials. A recipient that uses 
testing or other materials for appraising or counseling students shall 
not use different materials for students on the basis of their sex or 
use materials that permit or require different treatment of students on 
such basis unless such different materials cover the same occupations 
and interest areas and the use of such different materials is shown to 
be essential to eliminate sex bias. Recipients shall develop and use 
internal procedures for ensuring that such materials do not discriminate 
on the basis

[[Page 190]]

of sex. Where the use of a counseling test or other instrument results 
in a substantially disproportionate number of members of one sex in any 
particular course of study or classification, the recipient shall take 
such action as is necessary to assure itself that such disproportion is 
not the result of discrimination in the instrument or its application.
    (c) Disproportion in classes. Where a recipient finds that a 
particular class contains a substantially disproportionate number of 
individuals of one sex, the recipient shall take such action as is 
necessary to assure itself that such disproportion is not the result of 
discrimination on the basis of sex in counseling or appraisal materials 
or by counselors.



Sec.  17.430  Financial assistance.

    (a) General. Except as provided in paragraphs (b) and (c) of this 
section, in providing financial assistance to any of its students, a 
recipient shall not:
    (1) On the basis of sex, provide different amounts or types of such 
assistance, limit eligibility for such assistance that is of any 
particular type or source, apply different criteria, or otherwise 
discriminate;
    (2) Through solicitation, listing, approval, provision of 
facilities, or other services, assist any foundation, trust, agency, 
organization, or person that provides assistance to any of such 
recipient's students in a manner that discriminates on the basis of sex; 
or
    (3) Apply any rule or assist in application of any rule concerning 
eligibility for such assistance that treats persons of one sex 
differently from persons of the other sex with regard to marital or 
parental status.
    (b) Financial aid established by certain legal instruments. (1) A 
recipient may administer or assist in the administration of 
scholarships, fellowships, or other forms of financial assistance 
established pursuant to domestic or foreign wills, trusts, bequests, or 
similar legal instruments or by acts of a foreign government that 
require that awards be made to members of a particular sex specified 
therein; Provided, that the overall effect of the award of such sex-
restricted scholarships, fellowships, and other forms of financial 
assistance does not discriminate on the basis of sex.
    (2) To ensure nondiscriminatory awards of assistance as required in 
paragraph (b)(1) of this section, recipients shall develop and use 
procedures under which:
    (i) Students are selected for award of financial assistance on the 
basis of nondiscriminatory criteria and not on the basis of availability 
of funds restricted to members of a particular sex.
    (ii) An appropriate sex-restricted scholarship, fellowship, or other 
form of financial assistance is allocated to each student selected under 
paragraph (b)(2)(i) of this section; and
    (iii) No student is denied the award for which he or she was 
selected under paragraph (b)(2)(i) of this section because of the 
absence of a scholarship, fellowship, or other form of financial 
assistance designated for a member of that student's sex.
    (c) Athletic scholarships. (1) To the extent that a recipient awards 
athletic scholarships or grants-in-aid, it must provide reasonable 
opportunities for such awards for members of each sex in proportion to 
the number of students of each sex participating in interscholastic or 
intercollegiate athletics.
    (2) A recipient may provide separate athletic scholarships or 
grants-in-aid for members of each sex as part of separate athletic teams 
for members of each sex to the extent consistent with this paragraph (c) 
and Sec.  17.450.



Sec.  17.435  Employment assistance to students.

    (a) Assistance by recipient in making available outside employment. 
A recipient that assists any agency, organization, or person in making 
employment available to any of its students:
    (1) Shall assure itself that such employment is made available 
without discrimination on the basis of sex; and
    (2) Shall not render such services to any agency, organization, or 
person that discriminates on the basis of sex in its employment 
practices.
    (b) Employment of students by recipients. A recipient that employs 
any of its students shall not do so in a manner that violates Sec. Sec.  
17.500 through 17.550.

[[Page 191]]



Sec.  17.440  Health and insurance benefits and services.

    Subject to Sec.  17.235(d), in providing a medical, hospital, 
accident, or life insurance benefit, service, policy, or plan to any of 
its students, a recipient shall not discriminate on the basis of sex, or 
provide such benefit, service, policy, or plan in a manner that would 
violate Sec. Sec.  17.500 through 17.550 if it were provided to 
employees of the recipient. This section shall not prohibit a recipient 
from providing any benefit or service that may be used by a different 
proportion of students of one sex than of the other, including family 
planning services. However, any recipient that provides full coverage 
health service shall provide gynecological care.



Sec.  17.445  Marital or parental status.

    (a) Status generally. A recipient shall not apply any rule 
concerning a student's actual or potential parental, family, or marital 
status that treats students differently on the basis of sex.
    (b) Pregnancy and related conditions. (1) A recipient shall not 
discriminate against any student, or exclude any student from its 
education program or activity, including any class or extracurricular 
activity, on the basis of such student's pregnancy, childbirth, false 
pregnancy, termination of pregnancy, or recovery therefrom, unless the 
student requests voluntarily to participate in a separate portion of the 
program or activity of the recipient.
    (2) A recipient may require such a student to obtain the 
certification of a physician that the student is physically and 
emotionally able to continue participation as long as such a 
certification is required of all students for other physical or 
emotional conditions requiring the attention of a physician.
    (3) A recipient that operates a portion of its education program or 
activity separately for pregnant students, admittance to which is 
completely voluntary on the part of the student as provided in paragraph 
(b)(1) of this section, shall ensure that the separate portion is 
comparable to that offered to non-pregnant students.
    (4) Subject to Sec.  17.235(d), a recipient shall treat pregnancy, 
childbirth, false pregnancy, termination of pregnancy and recovery 
therefrom in the same manner and under the same policies as any other 
temporary disability with respect to any medical or hospital benefit, 
service, plan, or policy that such recipient administers, operates, 
offers, or participates in with respect to students admitted to the 
recipient's educational program or activity.
    (5) In the case of a recipient that does not maintain a leave policy 
for its students, or in the case of a student who does not otherwise 
qualify for leave under such a policy, a recipient shall treat 
pregnancy, childbirth, false pregnancy, termination of pregnancy, and 
recovery therefrom as a justification for a leave of absence for as long 
a period of time as is deemed medically necessary by the student's 
physician, at the conclusion of which the student shall be reinstated to 
the status that she held when the leave began.



Sec.  17.450  Athletics.

    (a) General. No person shall, on the basis of sex, be excluded from 
participation in, be denied the benefits of, be treated differently from 
another person, or otherwise be discriminated against in any 
interscholastic, intercollegiate, club, or intramural athletics offered 
by a recipient, and no recipient shall provide any such athletics 
separately on such basis.
    (b) Separate teams. Notwithstanding the requirements of paragraph 
(a) of this section, a recipient may operate or sponsor separate teams 
for members of each sex where selection for such teams is based upon 
competitive skill or the activity involved is a contact sport. However, 
where a recipient operates or sponsors a team in a particular sport for 
members of one sex but operates or sponsors no such team for members of 
the other sex, and athletic opportunities for members of that sex have 
previously been limited, members of the excluded sex must be allowed to 
try out for the team offered unless the sport involved is a contact 
sport. For the purposes of these Title IX regulations, contact sports 
include boxing, wrestling, rugby, ice hockey, football, basketball, and 
other sports the purpose or major activity of which involves bodily 
contact.

[[Page 192]]

    (c) Equal opportunity. (1) A recipient that operates or sponsors 
interscholastic, intercollegiate, club, or intramural athletics shall 
provide equal athletic opportunity for members of both sexes. In 
determining whether equal opportunities are available, the designated 
agency official will consider, among other factors:
    (i) Whether the selection of sports and levels of competition 
effectively accommodate the interests and abilities of members of both 
sexes;
    (ii) The provision of equipment and supplies;
    (iii) Scheduling of games and practice time;
    (iv) Travel and per diem allowance;
    (v) Opportunity to receive coaching and academic tutoring;
    (vi) Assignment and compensation of coaches and tutors;
    (vii) Provision of locker rooms, practice, and competitive 
facilities;
    (viii) Provision of medical and training facilities and services;
    (ix) Provision of housing and dining facilities and services; and
    (x) Publicity.
    (2) For purposes of paragraph (c)(1) of this section, unequal 
aggregate expenditures for members of each sex or unequal expenditures 
for male and female teams if a recipient operates or sponsors separate 
teams will not constitute noncompliance with this section, but the 
designated agency official may consider the failure to provide necessary 
funds for teams for one sex in assessing equality of opportunity for 
members of each sex.
    (d) Adjustment period. A recipient that operates or sponsors 
interscholastic, intercollegiate, club, or intramural athletics at the 
elementary school level shall comply fully with this section as 
expeditiously as possible but in no event later than one year from March 
6, 2003. A recipient that operates or sponsors interscholastic, 
intercollegiate, club, or intramural athletics at the secondary or 
postsecondary school level shall comply fully with this section as 
expeditiously as possible but in no event later than three years from 
March 6, 2003.



Sec.  17.455  Textbooks and curricular material.

    Nothing in these Title IX regulations shall be interpreted as 
requiring or prohibiting or abridging in any way the use of particular 
textbooks or curricular materials.



Subpart E_Discrimination on the Basis of Sex in Employment in Education 
                    Programs or Activities Prohibited



Sec.  17.500  Employment.

    (a) General. (1) No person shall, on the basis of sex, be excluded 
from participation in, be denied the benefits of, or be subjected to 
discrimination in employment, or recruitment, consideration, or 
selection therefore, whether full-time or part-time, under any education 
program or activity operated by a recipient that receives Federal 
financial assistance.
    (2) A recipient shall make all employment decisions in any education 
program or activity operated by such recipient in a nondiscriminatory 
manner and shall not limit, segregate, or classify applicants or 
employees in any way that could adversely affect any applicant's or 
employee's employment opportunities or status because of sex.
    (3) A recipient shall not enter into any contractual or other 
relationship which directly or indirectly has the effect of subjecting 
employees or students to discrimination prohibited by Sec. Sec.  17.500 
through 17.550, including relationships with employment and referral 
agencies, with labor unions, and with organizations providing or 
administering fringe benefits to employees of the recipient.
    (4) A recipient shall not grant preferences to applicants for 
employment on the basis of attendance at any educational institution or 
entity that admits as students only or predominantly members of one sex, 
if the giving of such preferences has the effect of discriminating on 
the basis of sex in violation of these Title IX regulations.
    (b) Application. Sections 17.500 through 17.550 apply to:
    (1) Recruitment, advertising, and the process of application for 
employment;

[[Page 193]]

    (2) Hiring, upgrading, promotion, consideration for and award of 
tenure, demotion, transfer, layoff, termination, application of nepotism 
policies, right of return from layoff, and rehiring;
    (3) Rates of pay or any other form of compensation, and changes in 
compensation;
    (4) Job assignments, classifications, and structure, including 
position descriptions, lines of progression, and seniority lists;
    (5) The terms of any collective bargaining agreement;
    (6) Granting and return from leaves of absence, leave for pregnancy, 
childbirth, false pregnancy, termination of pregnancy, leave for persons 
of either sex to care for children or dependents, or any other leave;
    (7) Fringe benefits available by virtue of employment, whether or 
not administered by the recipient;
    (8) Selection and financial support for training, including 
apprenticeship, professional meetings, conferences, and other related 
activities, selection for tuition assistance, selection for sabbaticals 
and leaves of absence to pursue training;
    (9) Employer-sponsored activities, including social or recreational 
programs; and
    (10) Any other term, condition, or privilege of employment.



Sec.  17.505  Employment criteria.

    A recipient shall not administer or operate any test or other 
criterion for any employment opportunity that has a disproportionately 
adverse effect on persons on the basis of sex unless:
    (a) Use of such test or other criterion is shown to predict validly 
successful performance in the position in question; and
    (b) Alternative tests or criteria for such purpose, which do not 
have such disproportionately adverse effect, are shown to be 
unavailable.



Sec.  17.510  Recruitment.

    (a) Nondiscriminatory recruitment and hiring. A recipient shall not 
discriminate on the basis of sex in the recruitment and hiring of 
employees. Where a recipient has been found to be presently 
discriminating on the basis of sex in the recruitment or hiring of 
employees, or has been found to have so discriminated in the past, the 
recipient shall recruit members of the sex so discriminated against so 
as to overcome the effects of such past or present discrimination.
    (b) Recruitment patterns. A recipient shall not recruit primarily or 
exclusively at entities that furnish as applicants only or predominantly 
members of one sex if such actions have the effect of discriminating on 
the basis of sex in violation of Sec. Sec.  17.500 through 17.550.



Sec.  17.515  Compensation.

    A recipient shall not make or enforce any policy or practice that, 
on the basis of sex:
    (a) Makes distinctions in rates of pay or other compensation;
    (b) Results in the payment of wages to employees of one sex at a 
rate less than that paid to employees of the opposite sex for equal work 
on jobs the performance of which requires equal skill, effort, and 
responsibility, and that are performed under similar working conditions.



Sec.  17.520  Job classification and structure.

    A recipient shall not:
    (a) Classify a job as being for males or for females;
    (b) Maintain or establish separate lines of progression, seniority 
lists, career ladders, or tenure systems based on sex; or
    (c) Maintain or establish separate lines of progression, seniority 
systems, career ladders, or tenure systems for similar jobs, position 
descriptions, or job requirements that classify persons on the basis of 
sex, unless sex is a bona fide occupational qualification for the 
positions in question as set forth in Sec.  17.550.



Sec.  17.525  Fringe benefits.

    (a) ``Fringe benefits'' defined. For purposes of these Title IX 
regulations, the term fringe benefits means any medical, hospital, 
accident, life insurance, or retirement benefit, service, policy or 
plan, any profit-sharing or bonus plan, leave, and any other benefit or 
service

[[Page 194]]

of employment not subject to the provisions of Sec.  17.515.
    (b) Prohibitions. A recipient shall not:
    (1) Discriminate on the basis of sex with regard to making fringe 
benefits available to employees or make fringe benefits available to 
spouses, families, or dependents of employees differently upon the basis 
of the employee's sex;
    (2) Administer, operate, offer, or participate in a fringe benefit 
plan that does not provide for equal periodic benefits for members of 
each sex and for equal contributions to the plan by such recipient for 
members of each sex; or
    (3) Administer, operate, offer, or participate in a pension or 
retirement plan that establishes different optional or compulsory 
retirement ages based on sex or that otherwise discriminates in benefits 
on the basis of sex.



Sec.  17.530  Marital or parental status.

    (a) General. A recipient shall not apply any policy or take any 
employment action:
    (1) Concerning the potential marital, parental, or family status of 
an employee or applicant for employment that treats persons differently 
on the basis of sex; or
    (2) Which is based upon whether an employee or applicant for 
employment is the head of household or principal wage earner in such 
employee's or applicant's family unit.
    (b) Pregnancy. A recipient shall not discriminate against or exclude 
from employment any employee or applicant for employment on the basis of 
pregnancy, childbirth, false pregnancy, termination of pregnancy, or 
recovery therefrom.
    (c) Pregnancy as a temporary disability. Subject to Sec.  17.235(d), 
a recipient shall treat pregnancy, childbirth, false pregnancy, 
termination of pregnancy, recovery therefrom, and any temporary 
disability resulting therefrom as any other temporary disability for all 
job-related purposes, including commencement, duration, and extensions 
of leave, payment of disability income, accrual of seniority and any 
other benefit or service, and reinstatement, and under any fringe 
benefit offered to employees by virtue of employment.
    (d) Pregnancy leave. In the case of a recipient that does not 
maintain a leave policy for its employees, or in the case of an employee 
with insufficient leave or accrued employment time to qualify for leave 
under such a policy, a recipient shall treat pregnancy, childbirth, 
false pregnancy, termination of pregnancy, and recovery therefrom as a 
justification for a leave of absence without pay for a reasonable period 
of time, at the conclusion of which the employee shall be reinstated to 
the status that she held when the leave began or to a comparable 
position, without decrease in rate of compensation or loss of 
promotional opportunities, or any other right or privilege of 
employment.



Sec.  17.535  Effect of state or local law or other requirements.

    (a) Prohibitory requirements. The obligation to comply with 
Sec. Sec.  17.500 through 17.550 is not obviated or alleviated by the 
existence of any State or local law or other requirement that imposes 
prohibitions or limits upon employment of members of one sex that are 
not imposed upon members of the other sex.
    (b) Benefits. A recipient that provides any compensation, service, 
or benefit to members of one sex pursuant to a State or local law or 
other requirement shall provide the same compensation, service, or 
benefit to members of the other sex.



Sec.  17.540  Advertising.

    A recipient shall not in any advertising related to employment 
indicate preference, limitation, specification, or discrimination based 
on sex unless sex is a bona fide occupational qualification for the 
particular job in question.



Sec.  17.545  Pre-employment inquiries.

    (a) Marital status. A recipient shall not make pre-employment 
inquiry as to the marital status of an applicant for employment, 
including whether such applicant is ``Miss'' or ``Mrs.''
    (b) Sex. A recipient may make pre-employment inquiry as to the sex 
of an applicant for employment, but only if such inquiry is made equally 
of such applicants of both sexes and if the results of such inquiry are 
not used in connection with discrimination prohibited by these Title IX 
regulations.

[[Page 195]]



Sec.  17.550  Sex as a bona fide occupational qualification.

    A recipient may take action otherwise prohibited by Sec. Sec.  
17.500 through 17.550 provided it is shown that sex is a bona fide 
occupational qualification for that action, such that consideration of 
sex with regard to such action is essential to successful operation of 
the employment function concerned. A recipient shall not take action 
pursuant to this section that is based upon alleged comparative 
employment characteristics or stereotyped characterizations of one or 
the other sex, or upon preference based on sex of the recipient, 
employees, students, or other persons, but nothing contained in this 
section shall prevent a recipient from considering an employee's sex in 
relation to employment in a locker room or toilet facility used only by 
members of one sex.



                          Subpart F_Procedures



Sec.  17.600  Notice of covered programs.

    Within 60 days of March 6, 2003, each component of the Department 
that awards Federal financial assistance shall publish in the Federal 
Register a notice of the programs covered by these Title IX regulations. 
Each such component shall periodically republish the notice of covered 
programs to reflect changes in covered programs. Copies of this notice 
also shall be made available upon request to the Department's office 
that enforces Title IX.



Sec.  17.605  Enforcement procedures.

    The investigative, compliance, and enforcement procedural provisions 
of Title VI of the Civil Rights Act of 1964 (42 U.S.C. 2000d) (``Title 
VI'') are hereby adopted and applied to these Title IX regulations. 
These procedures may be found at 6 CFR part 21.



Sec.  17.635  Forms and instructions; coordination.

    (a) Forms and instructions. The designated agency official shall 
issue and promptly make available to interested persons forms and 
detailed instructions and procedures for effectuating these Title IX 
regulations.
    (b) Supervision and coordination. The designated agency official may 
from time to time assign to officials of the Department, or to officials 
of other departments or agencies of the Government with the consent of 
such departments or agencies, responsibilities in connection with the 
effectuation of the purposes of Title IX and these Title IX regulations 
(other than responsibility for review as provided in Sec.  17.625(e)), 
including the achievements of effective coordination and maximum 
uniformity within the Department and within the Executive Branch of the 
Government in the application of Title IX and these Title IX regulations 
to similar programs and in similar situations. Any action taken, 
determination made, or requirement imposed by an official of another 
department or agency acting pursuant to an assignment of responsibility 
under this section shall have the same effect as though such action had 
been taken by the designated official of this Department.



PART 19_NONDISCRIMINATION IN MATTERS PERTAINING TO FAITH-BASED
ORGANIZATIONS--Table of Contents



Sec.
19.1 Purpose.
19.2 Definitions.
19.3 Equal ability for faith-based organizations to seek and receive 
          financial assistance through DHS social service programs.
19.4 Explicitly religious activities.
19.5 Nondiscrimination requirements.
19.6 How to prove nonprofit status.
19.7 [Reserved]
19.8 Independence of faith-based organizations.
19.9 Exemption from Title VII employment discrimination requirements.
19.10 Commingling of Federal assistance.
19.11 Nondiscrimination among faith-based organizations.

Appendix A to Part 19--Notice or Announcement of Award Opportunities
Appendix B to Part 19--Notice of Award or Contract

    Authority: 5 U.S.C. 301; Pub. L. 107-296, 116 Stat. 2135 (6 U.S.C. 
101 et seq.); E.O. 13279, 67 FR 77141, 3 CFR, 2002 Comp., p. 258; E.O. 
13403, 71 FR 28543, 3 CFR, 2006 Comp., p. 228; E.O. 13498, 74 FR 6533, 3 
CFR, 2009 Comp., p. 219; E.O. 13559, 75 FR 71319, 3 CFR, 2010 Comp., p. 
273; and E.O. 13831, 83 FR 20715, 3 CFR, 2018 Comp., p. 806; 42 U.S.C. 
2000bb et seq.

[[Page 196]]


    Source: 81 FR 19410, Apr. 4, 2016, unless otherwise noted.



Sec.  19.1  Purpose.

    It is the policy of the Department of Homeland Security (DHS) to 
ensure the equal treatment of faith-based organizations in social 
service programs administered or supported by DHS or its component 
agencies, enabling those organizations to participate in providing 
important social services to beneficiaries. The equal treatment policies 
and requirements contained in this part are generally applicable to 
faith-based organizations participating or seeking to participate in any 
such programs. More specific policies and requirements regarding the 
participation of faith-based organizations in individual programs may be 
provided in the statutes, regulations, or guidance governing those 
programs, such as regulations in title 44 of the Code of Federal 
Regulations. DHS or its components may issue policy guidance and 
reference materials at a future time with respect to the applicability 
of this policy and this part to particular programs.



Sec.  19.2  Definitions.

    For purposes of this part:
    Beneficiary means an individual recipient of goods or services 
provided as part of a social service program specifically supported by 
Federal financial assistance. ``Beneficiary'' does not mean an 
individual who may incidentally benefit from Federal financial 
assistance provided to a State, local, or Tribal government, or a 
private nonprofit organization. Except where expressly noted or where 
inapplicable, ``beneficiary'' includes a prospective beneficiary.
    Direct Federal financial assistance or Federal financial assistance 
provided directly means financial assistance received by an entity 
selected by the Government or an intermediary (under this part) to carry 
out a service (e.g., by contract, grant, or cooperative agreement). 
References to ``Federal financial assistance'' will be deemed to be 
references to direct Federal financial assistance, unless the referenced 
assistance meets the definition of ``indirect Federal financial 
assistance'' or ``Federal financial assistance provided indirectly''.
    Explicitly religious activities include activities that involve 
overt religious content such as worship, religious instruction, or 
proselytization. An activity is not explicitly religious merely because 
it is motivated by religious faith.
    Financial assistance means assistance that non-Federal entities 
receive or administer in the form of grants, sub-grants, contracts, 
subcontracts, prime awards, loans, loan guarantees, property, 
cooperative agreements, food, direct appropriations, or other 
assistance, including materiel for emergency response and incident 
management. Financial assistance includes assistance provided by DHS, 
its component organizations, regional offices, and DHS financial 
assistance administered by intermediaries such as State, local, and 
Tribal governments, such as formula or block grants. Financial 
assistance does not include a tax credit, deduction, exemption, guaranty 
contract, or the use of any assistance by any individual who is the 
ultimate beneficiary under any such program.
    Indirect Federal financial assistance or Federal financial 
assistance provided indirectly means financial assistance received by a 
service provider when the service provider is paid for services rendered 
by means of a voucher, certificate, or other means of government-funded 
payment provided to a beneficiary who is able to make a choice of a 
service provider. Federal financial assistance provided to an 
organization is considered ``indirect'' when:
    (1) The government program through which the beneficiary receives 
the voucher, certificate, or other similar means of government-funded 
payment is neutral toward religion; and
    (2) The organization receives the assistance as a result of a 
genuine, independent choice of the beneficiary.
    Intermediary means an entity, including a non-governmental 
organization, acting under a contract, grant, or other agreement with 
the Federal government or with a State or local government, that accepts 
Federal financial assistance and distributes that assistance to other 
organizations that, in turn, provide government-funded social

[[Page 197]]

services. If an intermediary, acting under a contract, grant, or other 
agreement with the Federal government or with a State or local 
government that is administering a program supported by Federal 
financial assistance, is given the authority under the contract, grant, 
or agreement to select non-governmental organizations to provide 
services supported by the Federal government, the intermediary must 
ensure compliance with the provisions of Executive Order 13559 and any 
implementing rules or guidance by the recipient of a contract, grant or 
agreement. If the intermediary is a non-governmental organization, it 
retains all other rights of a non-governmental organization under the 
program's statutory and regulatory provisions.
    Religious exercise has the meaning given to the term in 42 U.S.C. 
2000cc-5(7)(A).
    Social service program means a program that is administered by the 
Federal government, or by a State or local government using Federal 
financial assistance, and that provides services directed at reducing 
poverty, improving opportunities for low-income children, revitalizing 
low-income communities, empowering low-income families and low-income 
individuals to become self-sufficient, or otherwise helping people in 
need. Such programs include, but are not limited to, the following:
    (1) Child care services, protective services for children and 
adults, services for children and adults in foster care, adoption 
services, services related to the management and maintenance of the 
home, day care services for adults, and services to meet the special 
needs of children, older individuals, and individuals with disabilities 
(including physical, mental, or emotional disabilities);
    (2) Transportation services;
    (3) Job training and related services, and employment services;
    (4) Information, referral, and counseling services;
    (5) The preparation and delivery of meals and services related to 
soup kitchens or food banks;
    (6) Health support services;
    (7) Literacy and mentoring programs;
    (8) Services for the prevention and treatment of juvenile 
delinquency and substance abuse, services for the prevention of crime 
and the provision of assistance to the victims and the families of 
criminal offenders, and services related to intervention in, and 
prevention of, domestic violence; and
    (9) Services related to the provision of assistance for housing 
under Federal law.

[81 FR 19410, Apr. 4, 2016, as amended at 85 FR 82130, Dec. 17, 2020]



Sec.  19.3  Equal ability for faith-based organizations to seek and
receive financial assistance through DHS social service programs.

    (a) Faith-based organizations are eligible, on the same basis as any 
other organization and considering any religious accommodations 
appropriate under the Constitution or other provisions of Federal law, 
including but not limited to 42 U.S.C. 2000bb et seq., 42 U.S.C. 238n, 
42 U.S.C. 18113, 42 U.S.C. 2000e-1(a) and 2000e-2(e), 42 U.S.C. 
12113(d), and the Weldon Amendment, to seek and receive direct financial 
assistance from DHS for social service programs or to participate in 
social service programs administered or financed by DHS.
    (b) Neither DHS, nor a State or local government, nor any other 
entity that administers any social service program supported by direct 
financial assistance from DHS, shall discriminate for or against an 
organization on the basis of the organization's religious motivation, 
character, affiliation, or exercise. For purposes of this part, to 
discriminate against an organization on the basis of the organization's 
religious exercise means to disfavor an organization, including by 
failing to select an organization, disqualifying an organization, or 
imposing any condition or selection criterion that otherwise disfavors 
or penalizes an organization in the selection process or has such an 
effect:
    (1) Because of conduct that would not be considered grounds to 
disfavor a secular organization,
    (2) Because of conduct that must or could be granted an appropriate 
accommodation in a manner consistent with RFRA (42 U.S.C. 2000bb through 
2000bb-4) or the Religion Clauses of the First Amendment to the 
Constitution; or

[[Page 198]]

    (3) Because of the actual or suspected religious motivation of the 
organization's religious exercise.
    (c) Decisions about awards of Federal financial assistance must be 
free from political interference or even the appearance of such 
interference and must be made on the basis of merit, not on the basis of 
religion or religious belief or lack thereof, or on the basis of 
religious or political affiliation.
    (d) Nothing in this part shall be construed to preclude DHS or any 
of its components from accommodating religious organizations and persons 
to the fullest extent consistent with the Constitution and laws of the 
United States.
    (e) All organizations that participate in DHS social service 
programs, including faith-based organizations, must carry out eligible 
activities in accordance with all program requirements, subject to any 
reasonable religious accommodation, and other applicable requirements 
governing the conduct of DHS-funded activities, including those 
prohibiting the use of direct financial assistance from DHS to engage in 
explicitly religious activities. No grant document, agreement, covenant, 
memorandum of understanding, policy, or regulation that is used by DHS 
or an intermediary in administering financial assistance from DHS shall 
disqualify a faith-based organization from participating in DHS's social 
service programs because such organization is motivated or influenced by 
religious faith to provide social services or because of its religious 
character or affiliation, or on grounds that discriminate against an 
organization on the basis of the organization's religious exercise, as 
defined in this part.
    (f) No grant document, agreement, covenant, memorandum of 
understanding, policy, or regulation used by DHS or an intermediary in 
administering financial assistance from DHS shall require faith-based 
organizations to provide assurances or notices where they are not 
required of non-faith-based organizations. Any restrictions on the use 
of grant funds shall apply equally to faith-based and non-faith-based 
organizations.

[81 FR 19410, Apr. 4, 2016, as amended at 85 FR 82130, Dec. 17, 2020]



Sec.  19.4  Explicitly religious activities.

    (a) Organizations that receive direct financial assistance from DHS 
to participate in or administer any social service program may not use 
direct Federal financial assistance that it receives (including through 
a prime or sub-award) to support or engage in any explicitly religious 
activities (including activities that involve overt religious content 
such as worship, religious instruction, or proselytization) or in any 
other manner prohibited by law.
    (b) Organizations receiving direct financial assistance from DHS for 
social service programs are free to engage in explicitly religious 
activities, but such activities must be offered separately, in time or 
location, from the programs or services funded with direct financial 
assistance from DHS, and participation must be voluntary for 
beneficiaries of the programs or services funded with such assistance.
    (c) All organizations that participate in DHS social service 
programs, including faith-based organizations, must carry out eligible 
activities in accordance with all program requirements, subject to any 
religious accommodations appropriate under the Constitution or other 
provisions of Federal law, including but not limited to 42 U.S.C. 2000bb 
et seq., 42 U.S.C. 238n, 42 U.S.C. 18113, 42 U.S.C. 2000e-1(a) and 
2000e-2(e), 42 U.S.C. 12113(d), and the Weldon Amendment, and in 
accordance with all other applicable requirements governing the conduct 
of DHS-funded activities, including those prohibiting the use of direct 
financial assistance from DHS to engage in explicitly religious 
activities. No grant document, agreement, covenant, memorandum of 
understanding, policy, or regulation that is used by DHS or a State or 
local government in administering financial assistance from DHS shall 
disqualify a faith-based organization from participating in DHS's social 
service programs because such organization is motivated or influenced by 
religious faith to provide social services or because of its religious 
character or affiliation, or on grounds that discriminate against an 
organization on the basis of the organization's religious exercise, as 
defined in this part.

[[Page 199]]

    (d) The use of indirect Federal financial assistance is not subject 
to the restriction in paragraphs (a), (b), and (c) of this section.
    (e) Nothing in this part restricts DHS's authority under applicable 
federal law to fund activities, such as the provision of chaplaincy 
services, that can be directly funded by the Government consistent with 
the Establishment Clause.

[81 FR 19410, Apr. 4, 2016, as amended at 85 FR 82131, Dec. 17, 2020]



Sec.  19.5  Nondiscrimination requirements.

    An organization that receives financial assistance from DHS for a 
social service program shall not, in providing services or in outreach 
activities related to such services, favor or discriminate against a 
beneficiary of said program or activity on the basis of religion or 
religious belief, a refusal to hold a religious belief, or a refusal to 
attend or participate in a religious practice. Organizations that favor 
or discriminate against a beneficiary will be subject to applicable 
sanctions and penalties, as established by the requirements of the 
particular DHS social service program or activity. However, an 
organization that participates in a program funded by indirect financial 
assistance need not modify its program activities to accommodate a 
beneficiary who chooses to expend the indirect aid on the organization's 
program and may require attendance at all activities that are 
fundamental to the program.

[81 FR 19410, Apr. 4, 2016, as amended at 85 FR 82131, Dec. 17, 2020]



Sec.  19.6  How to prove nonprofit status.

    In general, DHS does not require that a recipient, including a 
faith-based organization, obtain tax-exempt status under section 
501(c)(3) of the Internal Revenue Code to be eligible for funding under 
DHS social service programs. Many grant programs, however, do require an 
organization to be a nonprofit organization in order to be eligible for 
funding. Funding announcements and other grant application solicitations 
for social service programs that require organizations to have nonprofit 
status will specifically so indicate in the eligibility section of the 
solicitation. In addition, any solicitation for social service programs 
that requires an organization to maintain tax-exempt status will 
expressly state the statutory authority for requiring such status. 
Recipients should consult with the appropriate DHS program office to 
determine the scope of any applicable requirements. In DHS social 
service programs in which an applicant for funding must show that it is 
a nonprofit organization, the applicant may do so by any of the 
following means:
    (a) Proof that the Internal Revenue Service currently recognizes the 
applicant as an organization to which contributions are tax deductible 
under section 501(c)(3) of the Internal Revenue Code;
    (b) A statement from a State or other governmental taxing body or 
the State secretary of State certifying that:
    (1) The organization is a nonprofit organization operating within 
the State; and
    (2) No part of its net earnings may benefit any private shareholder 
or individual;
    (c) A certified copy of the applicant's certificate of incorporation 
or similar document that clearly establishes the nonprofit status of the 
applicant;
    (d) Any item described in paragraphs (a) through (c) of this section 
if that item applies to a State or national parent organization, 
together with a statement by the State or parent organization that the 
applicant is a local nonprofit affiliate; or
    (e) For an entity that holds a sincerely held religious belief that 
it cannot apply for a determination as an entity that is tax-exempt 
under section 501(c)(3) of the Internal Revenue Code, evidence 
sufficient to establish that the entity would otherwise qualify as a 
nonprofit organization under paragraphs (a) through (d) of this section.

[85 FR 82131, Dec. 17, 2020]



Sec.  19.7  [Reserved]



Sec.  19.8  Independence of faith-based organizations.

    (a) A faith-based organization that applies for, or participates in, 
a social

[[Page 200]]

service program supported with Federal financial assistance will retain 
its autonomy; right of expression; religious character; authority over 
its governance; and independence from Federal, State, and local 
governments; and may continue to carry out its mission, including the 
definition, development, practice, and expression of its religious 
beliefs, provided that it does not use direct Federal financial 
assistance contrary to Sec.  19.4.
    (b) Faith-based organizations may use space in their facilities to 
provide social services using financial assistance from DHS without 
removing, concealing, or altering religious articles, texts, art, or 
symbols.
    (c) A faith-based organization using financial assistance from DHS 
for social service programs retains its authority over its internal 
governance, and it may retain religious terms in its organization's 
name, select its board members on the basis of their acceptance of or 
adherence to the religious tenets of the organization, and include 
religious references in its organization's mission statements and other 
governing documents.

[85 FR 82131, Dec. 17, 2020]



Sec.  19.9  Exemption from Title VII employment discrimination
requirements.

    (a) A faith-based organization's exemption, set forth in section 
702(a) of the Civil Rights Act of 1964 (42 U.S.C. 2000e-1), from the 
Federal prohibition on employment discrimination on the basis of 
religion is not forfeited when the organization seeks or receives 
financial assistance from DHS for a social service program or otherwise 
participates in a DHS program.
    (b) Where a DHS program contains independent statutory or regulatory 
provisions that impose nondiscrimination requirements on all grantees, 
those provisions are not waived or mitigated by this part. Accordingly, 
grantees should consult with the appropriate DHS program office to 
determine the scope of any applicable requirements.



Sec.  19.10  Commingling of Federal assistance.

    (a) If a State, local, or Tribal government voluntarily contributes 
its own funds to supplement Federally supported activities, the State, 
local, or Tribal government has the option to segregate the Federal 
assistance or commingle it.
    (b) If the State, local, or Tribal government chooses to commingle 
its own and Federal funds, the requirements of this part apply to all of 
the commingled funds.
    (c) If a State, local, or Tribal government is required to 
contribute matching funds to supplement a Federally supported activity, 
the matching funds are considered commingled with the Federal assistance 
and therefore subject to the requirements of this part.



Sec.  19.11  Nondiscrimination among faith-based organizations.

    Neither DHS nor any State or local government or other intermediary 
receiving funds under any DHS social service program shall construe 
these provisions in such a way as to advantage or disadvantage faith-
based organizations affiliated with historic or well-established 
religions or sects in comparison with other religions or sects.

[85 FR 82132, Dec. 17, 2020]



      Sec. Appendix A to Part 19--Notice or Announcement of Award.

    (a) Faith-based organizations may apply for this award on the same 
basis as any other organization, as set forth at and subject to the 
protections and requirements of this part and 42 U.S.C. 2000bb et seq. 
DHS will not, in the selection of recipients, discriminate against an 
organization on the basis of the organization's religious character, 
affiliation, or exercise.
    (b) A faith-based organization that participates in this program 
will retain its independence from the Government and may continue to 
carry out its mission consistent with religious freedom and conscience 
protections in Federal law, including the Free Speech and Free Exercise 
Clauses of the Constitution, 42 U.S.C. 2000bb et seq., 42 U.S.C. 238n, 
42 U.S.C. 18113, 42 U.S.C. 2000e-1(a) and 2000e-2(e), 42 U.S.C. 
12113(d), and the Weldon Amendment, among others. Religious 
accommodations may also be sought under many of these religious freedom 
and conscience protection laws.

[[Page 201]]

    (c) A faith-based organization may not use direct financial 
assistance from DHS to support or engage in any explicitly religious 
activities except where consistent with the Establishment Clause and any 
other applicable requirements. Such an organization also may not, in 
providing services funded by DHS, discriminate against a program 
beneficiary or prospective program beneficiary on the basis of religion, 
a religious belief, a refusal to hold a religious belief, or a refusal 
to attend or participate in a religious practice.

[85 FR 82132, Dec. 17, 2020]



         Sec. Appendix B to Part 19--Notice of Award or Contract

    (a) A faith-based organization that participates in this program 
retains its independence from the Government and may continue to carry 
out its mission consistent with religious freedom and conscience 
protections in Federal law, including the Free Speech and Free Exercise 
Clauses of the Constitution, 42 U.S.C. 2000bb et seq., 42 U.S.C. 238n, 
42 U.S.C. 18113, 42 U.S.C. 2000e-1(a) and 2000e-2(e), 42 U.S.C. 
12113(d), and the Weldon Amendment, among others. Religious 
accommodations may also be sought under many of these religious freedom 
and conscience protection laws.
    (b) A faith-based organization may not use direct financial 
assistance from DHS to support or engage in any explicitly religious 
activities except when consistent with the Establishment Clause and any 
other applicable requirements. Such an organization also may not, in 
providing services funded by DHS, discriminate against a program 
beneficiary or prospective program beneficiary on the basis of religion, 
a religious belief, a refusal to hold a religious belief, or a refusal 
to attend or participate in a religious practice.

[85 FR 82132, Dec. 17, 2020]



 PART 21_NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN
 IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE FROM
 THE DEPARTMENT OF HOMELAND SECURITY--Table of Contents



Sec.
21.1 Purpose.
21.3 Application.
21.4 Definitions.
21.5 Discrimination prohibited.
21.7 Assurances required.
21.9 Compliance information.
21.11 Conduct of investigations.
21.13 Procedure for effecting compliance.
21.15 Hearings.
21.17 Decisions and notices.
21.19 Judicial review.
21.21 Effect on other regulations, forms, and instructions.

Appendix A to Part 21--Activities to Which This Part Applies
Appendix B to Part 21--Activities to Which This Part Applies When a 
          Primary Objective of the Federal Financial Assistance Is To 
          Provide Employment

    Authority: 5 U.S.C. 310, 42 U.S.C. 2000d-2000d-7.

    Source: 68 FR 10904, Mar. 6, 2003, unless otherwise noted.



Sec.  21.1  Purpose.

    The purpose of this part is to effectuate the provisions of title VI 
of the Civil Rights Act of 1964 (the Act) to the end that no person in 
the United States shall, on the grounds of race, color, or national 
origin, be excluded from participation in, be denied the benefits of, or 
be otherwise subjected to discrimination under any program or activity 
receiving Federal financial assistance from the Department of Homeland 
Security. The provisions established by this part shall be effective for 
all components of the Department, including all Department components 
that are transferred to the Department, except to the extent that a 
Department component already has existing title VI regulations.



Sec.  21.3  Application.

    (a) This part applies to any program for which Federal financial 
assistance is authorized under a law administered by the Department, 
including the types of Federal financial assistance listed in appendix A 
to this part. It also applies to money paid, property transferred, or 
other Federal financial assistance extended after the effective date of 
this part pursuant to an application approved before that effective 
date. This part does not apply to:
    (1) Any Federal financial assistance by way of insurance or guaranty 
contracts;
    (2) Money paid, property transferred, or other assistance extended 
before the effective date of this part, except where such assistance was 
subject to the title VI regulations of any agency whose responsibilities 
are now exercised by this Department;

[[Page 202]]

    (3) Any assistance to any individual who is the ultimate 
beneficiary; or
    (4) Any employment practice, under any such program, of any 
employer, employment agency, or labor organization, except to the extent 
described in Sec.  21.5(c). The fact that a type of Federal financial 
assistance is not listed in appendix A to this part shall not mean, if 
title VI of the Act is otherwise applicable, that a program is not 
covered. Other types of Federal financial assistance under statutes now 
in force or hereinafter enacted may be added to appendix A to this part.
    (b) In any program receiving Federal financial assistance in the 
form, or for the acquisition, of real property or an interest in real 
property, to the extent that rights to space on, over, or under any such 
property are included as part of the program receiving that assistance, 
the nondiscrimination requirement of this part shall extend to any 
facility located wholly or in part in that space.



Sec.  21.4  Definitions.

    Unless the context requires otherwise, as used in this part:
    (a) Applicant means a person who submits an application, request, or 
plan required to be approved by the Secretary, or designee thereof, or 
by a primary recipient, as a condition to eligibility for Federal 
financial assistance, and application means such an application, 
request, or plan.
    (b) Facility includes all or any part of structures, equipment, or 
other real or personal property or interests therein, and the provision 
of facilities includes the construction, expansion, renovation, 
remodeling, alteration or acquisition of facilities.
    (c) Federal financial assistance includes:
    (1) Grants and loans of Federal funds;
    (2) The grant or donation of Federal property and interests in 
property;
    (3) The detail of Federal personnel;
    (4) The sale and lease of, and the permission to use (on other than 
a casual or transient basis), Federal property or any interest in such 
property without consideration or at a nominal consideration, or at a 
consideration which is reduced for the purpose of assisting the 
recipient, or in recognition of the public interest to be served by such 
sale or lease to the recipient; and
    (5) Any Federal agreement, arrangement, or other contract which has 
as one of its purposes the provision of assistance.
    (d) Primary recipient means any recipient that is authorized or 
required to extend Federal financial assistance to another recipient.
    (e) Program or activity and program mean all of the operations of 
any entity described in paragraphs (e)(1) through (4) of this section, 
any part of which is extended Federal financial assistance:
    (1)(i) A department, agency, special purpose district, or other 
instrumentality of a State or of a local government; or
    (ii) The entity of such State or local government that distributes 
such assistance and each such department or agency (and each other State 
or local government entity) to which the assistance is extended, in the 
case of assistance to a State or local government;
    (2)(i) A college, university, or other postsecondary institution, or 
a public system of higher education; or
    (ii) A local educational agency (as defined in 20 U.S.C. 8801), 
system of vocational education, or other school system;
    (3)(i) An entire corporation, partnership, or other private 
organization, or an entire sole proprietorship--
    (A) If assistance is extended to such corporation, partnership, 
private organization, or sole proprietorship as a whole; or
    (B) Which is principally engaged in the business of providing 
education, health care, housing, social services, or parks and 
recreation; or
    (ii) The entire plant or other comparable, geographically separate 
facility to which Federal financial assistance is extended, in the case 
of any other corporation, partnership, private organization or sole 
proprietorship; or
    (4) Any other entity which is established by two or more of the 
entities described in paragraph (e)(1), (2), or (3) of this section.
    (f) Recipient may mean any State, territory, possession, the 
District of Columbia, or the Commonwealth of

[[Page 203]]

Puerto Rico, or any political subdivision thereof, or instrumentality 
thereof, any public or private agency, institution, or organization, or 
other entity, or any individual, in any State, territory, possession, 
the District of Columbia, or the Commonwealth of Puerto Rico, to whom 
Federal financial assistance is extended, directly or through another 
recipient, including any successor, assignee, or transferee thereof, but 
such term does not include any ultimate beneficiary.
    (g) Secretary means the Secretary of the Department of Homeland 
Security or, except in Sec.  21.17(e), any delegatee of the Secretary.



Sec.  21.5  Discrimination prohibited.

    (a) General. No person in the United States shall, on the grounds of 
race, color, or national origin be excluded from participation in, be 
denied the benefits of, or be otherwise subjected to discrimination 
under, any program to which this part applies.
    (b) Specific discriminatory actions prohibited. (1) A recipient to 
which this part applies may not, directly or through contractual or 
other arrangements, on the grounds of race, color, or national origin:
    (i) Deny a person any service, financial aid, or other benefit 
provided under the program;
    (ii) Provide any service, financial aid, or other benefit to a 
person which is different, or is provided in a different manner, from 
that provided to others under the program;
    (iii) Subject a person to segregation or separate treatment in any 
matter related to his receipt of any service, financial aid, or other 
benefit under the program;
    (iv) Restrict a person in any way in the enjoyment of any advantage 
or privilege enjoyed by others receiving any service, financial aid, or 
other benefit under the program;
    (v) Treat a person differently from others in determining whether he 
satisfies any admission, enrollment, quota, eligibility, membership, or 
other requirement or condition which persons must meet in order to be 
provided any service, financial aid, or other benefit provided under the 
program;
    (vi) Deny a person an opportunity to participate in the program 
through the provision of services or otherwise or afford him an 
opportunity to do so which is different from that afforded others under 
the program; or
    (vii) Deny a person the opportunity to participate as a member of a 
planning, advisory, or similar body which is an integral part of the 
program.
    (2) A recipient, in determining the types of services, financial 
aid, or other benefits, or facilities which will be provided under any 
such program, or the class of person to whom, or the situations in 
which, such services, financial aid, other benefits, or facilities will 
be provided under any such program, or the class of persons to be 
afforded an opportunity to participate in any such program; may not, 
directly or through contractual or other arrangements, utilize criteria 
or methods of administration which have the effect of subjecting persons 
to discrimination because of their race, color, or national origin or 
have the effect of defeating or substantially impairing accomplishment 
of the objectives of the program with respect to individuals of a 
particular race, color, or national origin.
    (3) In determining the site or location of facilities, a recipient 
or applicant may not make selections with the purpose or effect of 
excluding persons from, denying them the benefits of, or subjecting them 
to discrimination under any program to which this regulation applies, on 
the grounds of race, color, or national origin; or with the purpose or 
effect of defeating or substantially impairing the accomplishment of the 
objectives of the Act or this part.
    (4) As used in this section the services, financial aid, or other 
benefits provided under a program receiving Federal financial assistance 
include any service, financial aid, or other benefit provided in or 
through a facility provided with the aid of Federal financial 
assistance.
    (5) The enumeration of specific forms of prohibited discrimination 
in this paragraph does not limit the generality of the prohibition in 
paragraph (a) of this section.

[[Page 204]]

    (6) This part does not prohibit the consideration of race, color, or 
national origin if the purpose and effect are to remove or overcome the 
consequences of practices or impediments which have restricted the 
availability of, or participation in, the program or activity receiving 
Federal financial assistance, on the grounds of race, color, or national 
origin. Where prior discriminatory practice or usage tends, on the 
grounds of race, color, or national origin to exclude individuals from 
participation in, to deny them the benefits of, or to subject them to 
discrimination under any program or activity to which this part applies, 
the applicant or recipient must take affirmative action to remove or 
overcome the effects of the prior discriminatory practice or usage. Even 
in the absence of prior discriminatory practice or usage, a recipient in 
administering a program or activity to which this part applies, may take 
affirmative action to assure that no person is excluded from 
participation in or denied the benefits of the program or activity on 
the grounds of race, color, or national origin.
    (c) Employment practices. (1) Where a primary objective of the 
Federal financial assistance to a program to which this part applies is 
to provide employment, a recipient subject to this part shall not, 
directly or through contractual or other arrangements, subject a person 
to discrimination on the ground of race, color, or national origin in 
its employment practices under such program (including recruitment or 
recruitment advertising, hiring, firing, upgrading, promotion, demotion, 
transfer, layoff, termination, rates of pay or other forms of 
compensation or benefits, selection for training or apprenticeship, and 
use of facilities). Such recipient shall take affirmative action to 
insure that applicants are employed, and employees are treated during 
employment, without regard to their race, color, or national origin. The 
requirements applicable to construction employment under any such 
program shall be those specified in or pursuant to Part III of Executive 
Order 11246 or any Executive order which supersedes it.
    (2) Federal financial assistance to programs under laws funded or 
administered by the Department which have as a primary objective the 
providing of employment include those set forth in appendix B to this 
part.
    (3) Where a primary objective of the Federal financial assistance is 
not to provide employment, but discrimination on the grounds of race, 
color, or national origin in the employment practices of the recipient 
or other persons subject to the regulation tends, on the grounds of 
race, color, or national origin, to exclude individuals from 
participation in, deny them the benefits of, or subject them to 
discrimination under any program to which this regulation applies, the 
provisions of paragraph (c)(1) of this section shall apply to the 
employment practices of the recipient or other persons subject to the 
regulation, to the extent necessary to assure equality of opportunity 
to, and nondiscriminatory treatment of, beneficiaries.
    (d) Facility location or site. A recipient may not make a selection 
of a site or location of a facility if the purpose of that selection, or 
its effect when made, is to exclude individuals from participation in, 
to deny them the benefits of, or to subject them to discrimination under 
any program or activity to which this rule applies, on the grounds of 
race, color, or national origin; or if the purpose is to, or its effect 
when made will substantially impair the accomplishment of the objectives 
of this part.



Sec.  21.7  Assurances required.

    (a) General. (1) Every application for Federal financial assistance 
to which this part applies, except an application to which paragraph (b) 
of this section applies, and every application for Federal financial 
assistance to provide a facility shall, as a condition to its approval 
and the extension of any Federal financial assistance pursuant to the 
application, contain or be accompanied by, an assurance that the program 
will be conducted or the facility operated in compliance with all 
requirements imposed by or pursuant to this part. Every award of Federal 
financial assistance shall require the submission of such an assurance. 
In the case where the Federal financial assistance is to provide or is 
in the form of

[[Page 205]]

personal property, or real property or interest therein or structures 
thereon, the assurance shall obligate the recipient, or, in the case of 
a subsequent transfer, the transferee, for the period during which the 
property is used for a purpose for which the Federal financial 
assistance is extended or for another purpose involving the provision of 
similar services or benefits, or for as long as the recipient retains 
ownership or possession of the property, whichever is longer. In all 
other cases the assurance shall obligate the recipient for the period 
during which Federal financial assistance is extended to the program. 
The Secretary shall specify the form of the foregoing assurances, and 
the extent to which like assurances will be required of subgrantees, 
contractors and subcontractors, transferees, successors in interest, and 
other participants. Any such assurance shall include provisions which 
give the United States a right to seek its judicial enforcement.
    (2) In the case where Federal financial assistance is provided in 
the form of a transfer of real property, structures, or improvements 
thereon, or interest therein, from the Federal Government, the 
instrument effecting or recording the transfer shall contain a covenant 
running with the land assuring nondiscrimination for the period during 
which the real property is used for a purpose for which the Federal 
financial assistance is extended or for another purpose involving the 
provision of similar services or benefits. Where no transfer of property 
or interest therein from the Federal Government is involved, but 
property is acquired or improved with Federal financial assistance, the 
recipient shall agree to include such covenant in any subsequent 
transfer of such property. When the property is obtained from the 
Federal Government, such covenant may also include a condition coupled 
with a right to be reserved by the Department to revert title to the 
property in the event of a breach of the covenant where, in the 
discretion of the Secretary, such a condition and right of reverter is 
appropriate to the statute under which the real property is obtained and 
to the nature of the grant and the grantee. In such event if a 
transferee of real property proposes to mortgage or otherwise encumber 
the real property as security for financing construction of new, or 
improvement of existing, facilities on such property for the purposes 
for which the property was transferred, the Secretary may agree, upon 
request of the transferee and if necessary to accomplish such financing, 
and upon such conditions as he deems appropriate, to subordinate such 
right of reversion to the lien of such mortgage or other encumbrance.
    (b) Continuing Federal financial assistance. Every application by a 
State or a State agency for continuing Federal financial assistance to 
which this part applies (including the types of Federal financial 
assistance listed in appendix A to this part) shall as a condition to 
its approval and the extension of any Federal financial assistance 
pursuant to the application:
    (1) Contain or be accompanied by a statement that the program is 
(or, in the case of a new program, will be) conducted in compliance with 
all requirements imposed by or pursuant to this part; and
    (2) Provide or be accompanied by provision for such methods of 
administration for the program as are found by the Secretary to give 
reasonable guarantee that the applicant and all recipients of Federal 
financial assistance under such program will comply with all 
requirements imposed by or pursuant to this part.
    (c) Assurance from institutions. (1) In the case of any application 
for Federal financial assistance to an institution of higher education 
(including assistance for construction, for research, for special 
training projects, for student loans or for any other purpose), the 
assurance required by this section shall extend to admission practices 
and to all other practices relating to the treatment of students.
    (2) The assurance required with respect to an institution of higher 
education, hospital, or any other institution, insofar as the assurance 
relates to the institution's practices with respect to admission or 
other treatment of individuals as students, patients, or clients of the 
institution or to the opportunity to participate in the provision

[[Page 206]]

of services or other benefits to such individuals, shall be applicable 
to the entire institution.



Sec.  21.9  Compliance information.

    (a) Cooperation and assistance. The Secretary shall to the fullest 
extent practicable seek the cooperation of recipients in obtaining 
compliance with this part and shall provide assistance and guidance to 
recipients to help them comply voluntarily with this part.
    (b) Compliance reports. Each recipient shall keep such records and 
submit to the Secretary timely, complete, and accurate compliance 
reports at such times, and in such form and containing such information, 
as the Secretary may determine to be necessary to enable him to 
ascertain whether the recipient has complied or is complying with this 
part. In the case in which a primary recipient extends Federal financial 
assistance to any other recipient, such other recipient shall also 
submit such compliance reports to the primary recipient as may be 
necessary to enable the primary recipient to carry out its obligations 
under this part. In general, recipients should have available for the 
Secretary racial and ethnic data showing the extent to which members of 
minority groups are beneficiaries of programs receiving Federal 
financial assistance.
    (c) Access to sources of information. Each recipient shall permit 
access by the Secretary during normal business hours to such of its 
books, records, accounts, and other sources of information, and its 
facilities as may be pertinent to ascertain compliance with this part. 
Where any information required of a recipient is in the exclusive 
possession of any other agency, institution, or person and this agency, 
institution, or person fails or refuses to furnish this information, the 
recipient shall so certify in its report and shall set forth what 
efforts it has made to obtain the information.
    (d) Information to beneficiaries and participants. Each recipient 
shall make available to participants, beneficiaries, and other 
interested persons such information regarding the provisions of this 
part and its applicability to the program for which the recipient 
receives Federal financial assistance, and make such information 
available to them in such manner, as the Secretary finds necessary to 
apprise such persons of the protections against discrimination assured 
them by the Act and this part.



Sec.  21.11  Conduct of investigations.

    (a) Periodic compliance reviews. The Secretary shall from time to 
time review the practices of recipients to determine whether they are 
complying with this part.
    (b) Complaints. Any person who believes that he or she, or any 
specific class of persons, has been subjected to discrimination 
prohibited by this part may by himself or herself, or by a 
representative, file with the Secretary a written complaint. A complaint 
must be filed not later than 180 days after the date of the alleged 
discrimination, unless the time for filing is extended by the Secretary.
    (c) Investigations. The Secretary will make a prompt investigation 
whenever a compliance review, report, complaint, or any other 
information indicates a possible failure to comply with this part. The 
investigation will include, where appropriate, a review of the pertinent 
practices and policies of the recipient, the circumstances under which 
the possible noncompliance with this part occurred, and other factors 
relevant to a determination as to whether the recipient has failed to 
comply with this part.
    (d) Resolution of matters. (1) If an investigation pursuant to 
paragraph (c) of this section indicates a failure to comply with this 
part, the Secretary will so inform the recipient and the matter will be 
resolved by informal means whenever possible. If it has been determined 
that the matter cannot be resolved by informal means, action will be 
taken as provided for in Sec.  21.13.
    (2) If an investigation does not warrant action pursuant to 
paragraph (d)(1) of this section the Secretary will so inform the 
recipient and the complainant, if any, in writing.
    (e) Intimidatory or retaliatory acts prohibited. No recipient or 
other person shall intimidate, threaten, coerce, or discriminate against 
any individual for the purpose of interfering with any

[[Page 207]]

right or privilege secured by section 601 of the Act or this part, or 
because he has made a complaint, testified, assisted, or participated in 
any manner in an investigation, proceeding, or hearing under this part. 
The identity of complainants shall be kept confidential except to the 
extent necessary to carry out the purposes of this part, including the 
conduct of any investigation, hearing, or judicial proceeding arising 
thereunder.



Sec.  21.13  Procedure for effecting compliance.

    (a) General. If there appears to be a failure or threatened failure 
to comply with this part, and if the noncompliance or threatened 
noncompliance cannot be corrected by informal means, compliance with 
this part may be effected by the suspension or termination of or refusal 
to grant or to continue Federal financial assistance or by any other 
means authorized by law. Such other means may include, but are not 
limited to:
    (1) A referral to the Department of Justice with a recommendation 
that appropriate proceedings be brought to enforce any rights of the 
United States under any law of the United States (including other titles 
of the Act), or any assurance or other contractual undertaking; and
    (2) Any applicable proceeding under State or local law.
    (b) Noncompliance with Sec.  21.7. If an applicant fails or refuses 
to furnish an assurance required under Sec.  21.7 or otherwise fails or 
refuses to comply with a requirement imposed by or pursuant to that 
section, Federal financial assistance may be refused in accordance with 
the procedures of paragraph (c) of this section. The Department shall 
not be required to provide assistance in such a case during the pendency 
of the administrative proceedings under such paragraph. However, subject 
to Sec.  21.21, the Department shall continue assistance during the 
pendency of such proceedings where such assistance is due and payable 
pursuant to an application approved prior to the effective date of this 
part.
    (c) Termination of or refusal to grant or to continue Federal 
financial assistance. (1) No order suspending, terminating, or refusing 
to grant or continue Federal financial assistance shall become effective 
until:
    (i) The Secretary has advised the applicant or recipient of his 
failure to comply and has determined that compliance cannot be secured 
by voluntary means;
    (ii) There has been an express finding on the record, after 
opportunity for hearing, of a failure by the applicant or recipient to 
comply with a requirement imposed by or pursuant to this part;
    (iii) The action has been approved by the Secretary pursuant to 
Sec.  21.17(e); and
    (iv) The expiration of 30 days after the Secretary has filed with 
the committee of the House and the committee of the Senate having 
legislative jurisdiction over the program involved, a full written 
report of the circumstances and the grounds for such action.
    (2) Any action to suspend or terminate or to refuse to grant or to 
continue Federal financial assistance shall be limited to the particular 
political entity, or part thereof, or other applicant or recipient as to 
whom such a finding has been made and shall be limited in its effect to 
the particular program, or part thereof, in which such noncompliance has 
been so found.
    (d) Other means authorized by law. No action to effect compliance 
with title VI of the Act by any other means authorized by law shall be 
taken by this Department until:
    (1) The Secretary has determined that compliance cannot be secured 
by voluntary means;
    (2) The recipient or other person has been notified of its failure 
to comply and of the action to be taken to effect compliance; and
    (3) The expiration of at least 10 days from the mailing of such 
notice to the recipient or other person. During this period of at least 
10 days, additional efforts shall be made to persuade the recipient or 
other person to comply with the regulation and to take such corrective 
action as may be appropriate.



Sec.  21.15  Hearings.

    (a) Opportunity for hearing. Whenever an opportunity for a hearing 
is required by Sec.  21.13(c), reasonable notice shall be given by 
registered or certified

[[Page 208]]

mail, return receipt requested, to the affected applicant or recipient. 
This notice shall advise the applicant or recipient of the action 
proposed to be taken, the specific provision under which the proposed 
action against it is to be taken, and the matters of fact or law 
asserted as the basis for this action, and either:
    (1) Fix a date not less than 20 days after the date of such notice 
within which the applicant or recipient may request of the Secretary 
that the matter be scheduled for hearing; or
    (2) Advise the applicant or recipient that the matter in question 
has been set down for hearing at a stated place and time. The time and 
place so fixed shall be reasonable and shall be subject to change for 
cause. The complainant, if any, shall be advised of the time and place 
of the hearing. An applicant or recipient may waive a hearing and submit 
written information and argument for the record. The failure of an 
applicant or recipient to request a hearing under this paragraph or to 
appear at a hearing for which a date has been set shall be deemed to be 
a waiver of the right to a hearing under section 602 of the Act and 
Sec.  21.13(c) and consent to the making of a decision on the basis of 
such information as is available.
    (b) Time and place of hearing. Hearings shall be held at the offices 
of the Department in Washington, DC, at a time fixed by the Secretary 
unless he determines that the convenience of the applicant or recipient 
or of the Department requires that another place be selected. Hearings 
shall be held before the Secretary, or at his discretion, before a 
hearing examiner appointed in accordance with section 3105 of title 5, 
United States Code, or detailed under section 3344 of title 5, United 
States Code.
    (c) Right to counsel. In all proceedings under this section, the 
applicant or recipient and the Department shall have the right to be 
represented by counsel.
    (d) Procedures, evidence, and record. (1) The hearing, decision, and 
any administrative review thereof shall be conducted in conformity with 
sections 554 through 557 of title 5, United States Code, and in 
accordance with such rules of procedure as are proper (and not 
inconsistent with this section) relating to the conduct of the hearing, 
giving of notices subsequent to those provided for in paragraph (a) of 
this section, taking of testimony, exhibits, arguments and briefs, 
requests for findings, and other related matters. Both the Department 
and the applicant or recipient shall be entitled to introduce all 
relevant evidence on the issues as stated in the notice for hearing or 
as determined by the officer conducting the hearing at the outset of or 
during the hearing.
    (2) Technical rules of evidence do not apply to hearings conducted 
pursuant to this part, but rules or principles designed to assure 
production of the most credible evidence available and to subject 
testimony to test by cross-examination shall be applied where reasonably 
necessary by the officer conducting the hearing. The hearing officer may 
exclude irrelevant, immaterial, or unduly repetitious evidence. All 
documents and other evidence offered or taken for the record shall be 
open to examination by the parties and opportunity shall be given to 
refute facts and arguments advanced on either side of the issues. A 
transcript shall be made of the oral evidence except to the extent the 
substance thereof is stipulated for the record. All decisions shall be 
based upon the hearing record and written findings shall be made.
    (e) Consolidated or joint hearings. In cases in which the same or 
related facts are asserted to constitute noncompliance with this part 
with respect to two or more Federal statutes, authorities, or other 
means by which Federal financial assistance is extended and to which 
this part applies, or noncompliance with this part and the regulations 
of one or more other Federal departments or agencies issued under title 
VI of the Act, the Secretary may, by agreement with such other 
departments or agencies, where applicable, provide for the conduct of 
consolidated or joint hearings, and for the application to such hearings 
of rules or procedures not inconsistent with this part. Final decisions 
in such cases, insofar as this regulation is concerned, shall be made in 
accordance with Sec.  21.17.

[[Page 209]]



Sec.  21.17  Decisions and notices.

    (a) Procedure on decisions by hearing examiner. If the hearing is 
held by a hearing examiner, the hearing examiner shall either make an 
initial decision, if so authorized, or certify the entire record 
including his recommended findings and proposed decision to the 
Secretary for a final decision, and a copy of such initial decision or 
certification shall be mailed to the applicant or recipient. Where the 
initial decision is made by the hearing examiner the applicant or 
recipient may, within 30 days after the mailing of such notice of 
initial decision, file with the Secretary his exceptions to the initial 
decision, with his reasons therefor. In the absence of exceptions, the 
Secretary may, on his own motion, within 45 days after the initial 
decision, serve on the applicant or recipient a notice that he will 
review the decision. Upon the filing of such exceptions or of notice of 
review, the Secretary shall review the initial decision and issue his 
own decision thereon including the reasons therefor. In the absence of 
either exceptions or a notice of review the initial decision shall, 
subject to paragraph (e) of this section, constitute the final decision 
of the Secretary.
    (b) Decisions on record or review by the Secretary. Whenever a 
record is certified to the Secretary for decision or he reviews the 
decision of a hearing examiner pursuant to paragraph (a) of this 
section, or whenever the Secretary conducts the hearing, the applicant 
or recipient shall be given reasonable opportunity to file with him 
briefs or other written statements of its contentions, and a written 
copy of the final decision of the Secretary shall be sent to the 
applicant or recipient and to the complainant, if any.
    (c) Decisions on record where a hearing is waived. Whenever a 
hearing is waived pursuant to Sec.  21.15, a decision shall be made by 
the Secretary on the record and a written copy of such decision shall be 
sent to the applicant or recipient, and to the complainant, if any.
    (d) Rulings required. Each decision of a hearing examiner or the 
Secretary shall set forth his ruling on each finding, conclusion, or 
exception presented, and shall identify the requirement or requirements 
imposed by or pursuant to this part with which it is found that the 
applicant or recipient has failed to comply.
    (e) Approval by Secretary. Any final decision by an official of the 
Department, other than the Secretary personally, which provides for the 
suspension or termination of, or the refusal to grant or continue 
Federal financial assistance, or the imposition of any other sanction 
available under this part or the Act, shall promptly be transmitted to 
the Secretary personally, who may approve such decision, may vacate it, 
or remit or mitigate any sanction imposed.
    (f) Content of orders. The final decision may provide for suspension 
or termination of, or refusal to grant or continue Federal financial 
assistance, in whole or in part, to which this regulation applies, and 
may contain such terms, conditions, and other provisions as are 
consistent with and will effectuate the purposes of the Act and this 
part, including provisions designed to assure that no Federal financial 
assistance to which this regulation applies will thereafter be extended 
to the applicant or recipient determined by such decision to be in 
default in its performance of an assurance given by it pursuant to this 
part, or to have otherwise failed to comply with this part, unless and 
until it corrects its noncompliance and satisfies the Secretary that it 
will fully comply with this part.
    (g) Post termination proceedings. (1) An applicant or recipient 
adversely affected by an order issued under paragraph (f) of this 
section shall be restored to full eligibility to receive Federal 
financial assistance if it satisfies the terms and conditions of that 
order for such eligibility or if it brings itself into compliance with 
this part and provides reasonable assurance that it will fully comply 
with this part.
    (2) Any applicant or recipient adversely affected by an order 
entered pursuant to paragraph (f) of this section may at any time 
request the Secretary to restore fully its eligibility to receive 
Federal financial assistance. Any such request shall be supported by 
information showing that the applicant or recipient has met the 
requirements of paragraph (g)(1) of this section. If the Secretary 
determines that those

[[Page 210]]

requirements have been satisfied, he shall restore such eligibility.
    (3) If the Secretary denies any such request, the applicant or 
recipient may submit a request for a hearing in writing, specifying why 
it believes such official to have been in error. It shall thereupon be 
given an expeditious hearing, with a decision on the record in 
accordance with rules or procedures issued by the Secretary. The 
applicant or recipient will be restored to such eligibility if it proves 
at such a hearing that it satisfied the requirements of paragraph (g)(1) 
of this section. While proceedings under this paragraph are pending, the 
sanctions imposed by the order issued under paragraph (f) of this 
section shall remain in effect.



Sec.  21.19  Judicial review.

    Action taken pursuant to section 602 of the Act is subject to 
judicial review as provided in section 603 of the Act.



Sec.  21.21  Effect on other regulations, forms, and instructions.

    (a) Effect on other regulations. All regulations, orders, or like 
directions issued before the effective date of this part by any officer 
of the Department which impose requirements designed to prohibit any 
discrimination against individuals on the grounds of race, color, or 
national origin under any program to which this part applies, and which 
authorize the suspension or termination of or refusal to grant or to 
continue Federal financial assistance to any applicant for a recipient 
of such assistance for failure to comply with such requirements, are 
hereby superseded to the extent that such discrimination is prohibited 
by this part, except that nothing in this part may be considered to 
relieve any person of any obligation assumed or imposed under any such 
superseded regulation, order, instruction, or like direction before the 
effective date of this part. Nothing in this part, however, supersedes 
any of the following (including future amendments thereof):
    (1) Executive Order 11246 (3 CFR, 1965 Supp., p. 167) and 
regulations issued thereunder; or
    (2) Any other orders, regulations, or instructions, insofar as such 
orders, regulations, or instructions prohibit discrimination on the 
ground of race, color, or national origin in any program or situation to 
which this part is inapplicable, or prohibit discrimination on any other 
ground.
    (b) Forms and instructions. The Secretary shall issue and promptly 
make available to all interested persons forms and detailed instructions 
and procedures for effectuating this part as applied to programs to 
which this part applies and for which he is responsible.
    (c) Supervision and coordination. The Secretary may from time to 
time assign to officials of the Department, or to officials of other 
departments or agencies of the Government with the consent of such 
departments or agencies, responsibilities in connection with the 
effectuation of the purposes of title VI of the Act and this part (other 
than responsibility for final decision as provided in Sec.  21.17), 
including the achievement of effective coordination and maximum 
uniformity within the Department and within the Executive Branch of the 
Government in the application of title VI and this part to similar 
programs and in similar situations. Any action taken, determination made 
or requirement imposed by an official of another department or agency 
acting pursuant to an assignment of responsibility under this paragraph 
shall have the same effect as though such action had been taken by the 
Secretary of this Department.



    Sec. Appendix A to Part 21--Activities to Which This Part Applies

    Note: Failure to list a type of Federal assistance in appendix A 
shall not mean, if title VI is otherwise applicable, that a program is 
not covered.
    1. Lease of real property and the grant of permits, licenses, 
easements and rights-of-way covering real property under control of the 
U.S. Coast Guard (14 U.S.C. 93 (n) and (o)).
    2. Utilization of U.S. Coast Guard personnel and facilities by any 
State, territory, possession, or political subdivision thereof (14 
U.S.C. 141(a)).
    3. Use of U.S. Coast Guard personnel for duty in connection with 
maritime instruction and training by the States, territories, and the 
Commonwealth of Puerto Rico (14 U.S.C. 148).
    4. Use of obsolete and other U.S. Coast Guard material by sea scout 
service of Boy Scouts of America, any incorporated unit of

[[Page 211]]

the U.S. Coast Guard auxiliary, and public body or private organization 
not organized for profit (14 U.S.C. 641(a)).
    5. U.S. Coast Guard Auxiliary Program (14 U.S.C. 821-832).
    6. U.S. Coast Guard Boating Safety Financial Assistance program.
    7. U.S. Coast Guard State Access to Oil Spill Liability Trust Fund.
    8. U.S. Coast Guard Bridge Alteration.
    9. Use of Customs personnel and facilities by any State, territory, 
possession, or political subdivision thereof.
    10. Use of Customs personnel for duty in connection with instruction 
and training by the States, territories and the Commonwealth of Puerto 
Rico.
    11. Grants to educational institutions, associations, States, or 
other entities for research, analysis, or programs or strategies 
relating to trade issues.



Sec. Appendix B to Part 21--Activities to Which This Part Applies When a 
  Primary Objective of the Federal Financial Assistance Is To Provide 
                               Employment

    Note: Failure to list a type of Federal assistance in appendix B 
shall not mean, if title VI is otherwise applicable, that a program is 
not covered.
[Reserved]



PART 25_REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE 
TECHNOLOGIES--Table of Contents



Sec.
25.1 Purpose.
25.2 Definitions.
25.3 Delegation.
25.4 Designation of qualified anti-terrorism technologies.
25.5 Obligations of seller.
25.6 Procedures for designation of qualified anti-terrorism 
          technologies.
25.7 Litigation management.
25.8 Government contractor Defense.
25.9 Procedures for certification of approved products for Homeland 
          Security.
25.10 Confidentiality and protection of intellectual property.

    Authority: Subtitle G, of Title VIII, Public Law 107-296, 116 Stat. 
2238 (6 U.S.C. 441-444).

    Source: 71 FR 33159, June 8, 2006, unless otherwise noted.



Sec.  25.1  Purpose.

    This part implements the Support Anti-terrorism by Fostering 
Effective Technologies Act of 2002, sections 441-444 of title 6, United 
States Code (the ``SAFETY Act'' or ``the Act'').



Sec.  25.2  Definitions.

    Act of Terrorism--The term ``Act of Terrorism'' means any act 
determined to have met the following requirements or such other 
requirements as defined and specified by the Secretary:
    (1) Is unlawful;
    (2) Causes harm, including financial harm, to a person, property, or 
entity, in the United States, or in the case of a domestic United States 
air carrier or a United States-flag vessel (or a vessel based 
principally in the United States on which United States income tax is 
paid and whose insurance coverage is subject to regulation in the United 
States), in or outside the United States; and
    (3) Uses or attempts to use instrumentalities, weapons or other 
methods designed or intended to cause mass destruction, injury or other 
loss to citizens or institutions of the United States.
    Certification--The term ``Certification'' means (unless the context 
requires otherwise) the certification issued pursuant to section 25.9 
that a Qualified Anti-Terrorism Technology for which a Designation has 
been issued will perform as intended, conforms to the Seller's 
specifications, and is safe for use as intended.
    Contractor--The term ``contractor'' means any person, firm, or other 
entity with whom or with which a Seller has a contract or contractual 
arrangement relating to the manufacture, sale, use, or operation of 
anti-terrorism Technology for which a Designation is issued (regardless 
of whether such contract is entered into before or after the issuance of 
such Designation), including, without limitation, an independent 
laboratory or other entity engaged in testing or verifying the safety, 
utility, performance, or effectiveness of such Technology, or the 
conformity of such Technology to the Seller's specifications.
    Designation--The term ``Designation'' means the designation of a 
Qualified Anti-Terrorism Technology under the SAFETY Act issued by the 
Under Secretary under authority delegated to

[[Page 212]]

the Under Secretary by the Secretary of Homeland Security.
    Loss--The term ``loss'' means death, bodily injury, or loss of or 
damage to property, including business interruption loss (which is a 
component of loss of or damage to property).
    Noneconomic damages--The term ``noneconomic damages'' means damages 
for losses for physical and emotional pain, suffering, inconvenience, 
physical impairment, mental anguish, disfigurement, loss of enjoyment of 
life, loss of society and companionship, loss of consortium, hedonic 
damages, injury to reputation, and any other nonpecuniary losses.
    Office of SAFETY Act Implementation--The term ``Office of SAFETY Act 
Implementation'' or ``OSAI'' means the office within the Department of 
Homeland Security's Directorate of Science and Technology that assists 
with the implementation of the SAFETY Act. The responsibilities of the 
Office of SAFETY Act Implementation may include, without limitation, 
preparing the SAFETY Act Application Kit, receiving and facilitating the 
evaluation of applications, managing the SAFETY Act Web site and 
otherwise providing the public with information regarding the SAFETY Act 
and the application process.
    Physical harm--The term ``physical harm'' as used in the Act and 
this part means any physical injury to the body, including an injury 
that caused, either temporarily or permanently, partial or total 
physical disability, incapacity or disfigurement. In no event shall 
physical harm include mental pain, anguish, or suffering, or fear of 
injury.
    Qualified Anti-Terrorism Technology or QATT--The term ``Qualified 
Anti-Terrorism Technology'' or ``QATT'' means any Technology (including 
information technology) designed, developed, modified, procured, or sold 
for the purpose of preventing, detecting, identifying, or deterring acts 
of terrorism or limiting the harm such acts might otherwise cause, for 
which a Designation has been issued pursuant to this part.
    SAFETY Act or Act--The term ``SAFETY Act'' or ``Act'' means the 
Support Anti-terrorism by Fostering Effective Technologies Act of 2002, 
sections 441-444 of title 6, United States Code.
    SAFETY Act Application Kit --The term ``SAFETY Act Application Kit'' 
means the Application Kit containing the instructions and forms 
necessary to apply for Designation or Certification. The SAFETY Act 
Application Kit shall be published at http://www.safetyact.gov or made 
available in hard copy upon written request to: Directorate of Science 
and Technology, SAFETY Act/room 4320, Department of Homeland Security, 
Washington, DC 20528.
    SAFETY Act Confidential Information--Any and all information and 
data voluntarily submitted to the Department under this part (including 
Applications, Pre-Applications, other forms, supporting documents and 
other materials relating to any of the foregoing, and responses to 
requests for additional information), including, but not limited to, 
inventions, devices, Technology, know-how, designs, copyrighted 
information, trade secrets, confidential business information, analyses, 
test and evaluation results, manuals, videotapes, contracts, letters, 
facsimile transmissions, electronic mail and other correspondence, 
financial information and projections, actuarial calculations, liability 
estimates, insurance quotations, and business and marketing plans. 
Notwithstanding the foregoing, ``SAFETY Act Confidential Information'' 
shall not include any information or data that is in the public domain 
or becomes part of the public domain by any means other than the 
violation of this section.
    Secretary--The term ``Secretary'' means the Secretary of Homeland 
Security as established by section 102 of the Homeland Security Act of 
2002.
    Seller--The term ``Seller'' means any person, firm, or other entity 
that sells or otherwise provides Qualified Anti-Terrorism Technology to 
any customer(s) and to whom or to which (as appropriate) a Designation 
and/or Certification has been issued under this part (unless the context 
requires otherwise).
    Technology--The term ``Technology'' means any product, equipment, 
service (including support services), device, or technology (including 
information

[[Page 213]]

technology) or any combination of the foregoing. Design services, 
consulting services, engineering services, software development 
services, software integration services, threat assessments, 
vulnerability studies, and other analyses relevant to homeland security 
may be deemed a Technology under this part.
    Under Secretary--The term ``Under Secretary'' means the Under 
Secretary for Science and Technology of the Department of Homeland 
Security.



Sec.  25.3  Delegation.

    All of the Secretary's responsibilities, powers, and functions under 
the SAFETY Act, except the authority to declare that an act is an Act of 
Terrorism for purposes of section 865(2) of the SAFETY Act, may be 
exercised by the Under Secretary for Science and Technology of the 
Department of Homeland Security or the Under Secretary's designees.



Sec.  25.4  Designation of qualified anti-terrorism technologies.

    (a) General. The Under Secretary may Designate as a Qualified Anti-
Terrorism Technology for purposes of the protections under the system of 
litigation and risk management set forth in sections 441-444 of Title 6, 
United States Code, any qualifying Technology designed, developed, 
modified, provided or procured for the specific purpose of preventing, 
detecting, identifying, or deterring acts of terrorism or limiting the 
harm such acts might otherwise cause.
    (b) Criteria to be Considered. (1) In determining whether to issue 
the Designation under paragraph (a) of this section, the Under Secretary 
may exercise discretion and judgment in considering the following 
criteria and evaluating the Technology:
    (i) Prior United States Government use or demonstrated substantial 
utility and effectiveness.
    (ii) Availability of the Technology for immediate deployment in 
public and private settings.
    (iii) Existence of extraordinarily large or extraordinarily 
unquantifiable potential third party liability risk exposure to the 
Seller or other provider of such anti-terrorism Technology.
    (iv) Substantial likelihood that such anti-terrorism Technology will 
not be deployed unless protections under the system of risk management 
provided under sections 441-444 of title 6, United States Code, are 
extended.
    (v) Magnitude of risk exposure to the public if such anti-terrorism 
Technology is not deployed.
    (vi) Evaluation of all scientific studies that can be feasibly 
conducted in order to assess the capability of the Technology to 
substantially reduce risks of harm.
    (vii) Anti-terrorism Technology that would be effective in 
facilitating the defense against acts of terrorism, including 
Technologies that prevent, defeat or respond to such acts.
    (viii) A determination made by Federal, State, or local officials, 
that the Technology is appropriate for the purpose of preventing, 
detecting, identifying or deterring acts of terrorism or limiting the 
harm such acts might otherwise cause.
    (ix) Any other factor that the Under Secretary may consider to be 
relevant to the determination or to the homeland security of the United 
States.
    (2) The Under Secretary has discretion to give greater weight to 
some factors over others, and the relative weighting of the various 
criteria may vary depending upon the particular Technology at issue and 
the threats that the Technology is designed to address. The Under 
Secretary may, in his discretion, determine that failure to meet a 
particular criterion justifies denial of an application under the SAFETY 
Act. However, the Under Secretary is not required to reject an 
application that fails to meet one or more of the criteria. The Under 
Secretary may conclude, after considering all of the relevant criteria 
and any other relevant factors, that a particular Technology merits 
Designation as a Qualified Anti-Terrorism Technology even if one or more 
particular criteria are not satisfied. The Under Secretary's 
considerations will take into account evolving threats and conditions 
that give rise to the need for the anti-terrorism Technologies.

[[Page 214]]

    (c) Use of Standards. From time to time, the Under Secretary may 
develop, issue, revise, adopt, and recommend technical standards for 
various categories or components of anti-terrorism Technologies 
(``Adopted Standards''). In the case of Adopted Standards that are 
developed by the Department or that the Department has the right or 
license to reproduce, the Department will make such standards available 
to the public consistent with necessary protection of sensitive homeland 
security information. In the case of Adopted Standards that the 
Department does not have the right or license to reproduce, the 
Directorate of Science and Technology will publish a list and summaries 
of such standards and may publish information regarding the sources for 
obtaining copies of such standards. Compliance with any Adopted Standard 
or other technical standards that are applicable to a particular anti-
terrorism Technology may be considered in determining whether a 
Technology will be Designated pursuant to paragraph (a) of this section. 
Depending on whether an Adopted Standard otherwise meets the criteria 
set forth in section 862 of the Homeland Security Act; 6 U.S.C. 441, the 
Adopted Standard itself may be deemed a Technology that may be 
Designated as a Qualified Anti-Terrorism Technology.
    (d) Consideration of Substantial Equivalence. In considering the 
criteria in paragraph (b) of this section, or evaluating whether a 
particular anti-terrorism Technology complies with any Adopted Standard 
referenced in paragraph (c) of this section, the Under Secretary may 
consider evidence that the Technology is substantially equivalent to 
other Technologies (``Predicate Technologies'') that previously have 
been Designated as Qualified Anti-Terrorism Technologies under the 
SAFETY Act. A Technology may be deemed to be substantially equivalent to 
a Predicate Technology if:
    (1) It has the same intended use as the Predicate Technology; and
    (2) It has the same or substantially similar performance or 
technological characteristics as the Predicate Technology.
    (e) Pre-Application Consultations. To the extent that he deems it to 
be appropriate, the Under Secretary may consult with prospective and 
current SAFETY Act applicants regarding their particular anti-terrorism 
Technologies. Prospective applicants may request such consultations 
through the Office of SAFETY Act Implementation. The confidentiality 
provisions in Sec.  25.10 shall be applicable to such consultations.
    (f) Developmental Testing & Evaluation (DT&E) Designations. With 
respect to any Technology that is being developed, tested, evaluated, 
modified or is otherwise being prepared for deployment for the purpose 
of preventing, detecting, identifying, or deterring acts of terrorism or 
limiting the harm such acts might otherwise cause, the Under Secretary 
may Designate such Technology as a Qualified Anti-Terrorism Technology 
and make such Technology eligible for the protections under the system 
of litigation and risk management set forth in sections 441-444 of title 
6, United States Code. A Designation made pursuant to this paragraph 
shall be referred to as a ``DT&E Designation,'' and shall confer all of 
the rights, privileges and obligations that accompany Designations made 
pursuant to paragraph (a) of this section except as modified by the 
terms of this paragraph or the terms of the particular DT&E Designation. 
The intent of this paragraph is to make eligible for SAFETY Act 
protections qualifying Technologies that are undergoing testing and 
evaluation and that may need to be deployed in the field either for 
developmental testing and evaluation purposes or on an emergency basis, 
including during a period of heightened risk. DT&E Designations shall 
describe the subject Technology (in such detail as the Under Secretary 
deems to be appropriate); identify the Seller of the subject Technology; 
be limited to the period of time set forth in the applicable DT&E 
Designation, which in no instance shall exceed a reasonable period for 
testing or evaluating the Technology (presumptively not longer than 36 
months); be terminable by the Under Secretary at any time upon notice to 
the Seller; be subject to the limitations on the use or deployment of 
the

[[Page 215]]

QATT set forth in the DT&E Designation; and be subject to such other 
limitations as established by the Under Secretary. The protections 
associated with a DT&E Designation shall apply only during the period 
specified in the applicable DT&E Designation. Consent of the Seller of a 
QATT Designated pursuant to this paragraph will be a condition precedent 
to the establishment of any deployment or use condition and any other 
obligation established by the Under Secretary pursuant to this 
paragraph. Those seeking a DT&E Designation for a QATT pursuant to this 
paragraph (f) shall follow the procedures for DT&E Designations set 
forth in the SAFETY Act Application Kit.



Sec.  25.5  Obligations of seller.

    (a) Liability Insurance Required. The Seller shall obtain liability 
insurance of such types and in such amounts as shall be required in the 
applicable Designation, which shall be the amounts and types certified 
by the Under Secretary to satisfy otherwise compensable third-party 
claims arising out of, relating to, or resulting from an Act of 
Terrorism when Qualified Anti-Terrorism Technologies have been deployed 
in defense against, response to, or recovery from, such act. The Under 
Secretary may request at any time that the Seller of a Qualified Anti-
Terrorism Technology submit any information that would:
    (1) Assist in determining the amount of liability insurance 
required; or
    (2) Show that the Seller or any other provider of Qualified Anti-
Terrorism Technology otherwise has met all of the requirements of this 
section.
    (b) Amount of Liability Insurance. (1) The Under Secretary may 
determine the appropriate amounts and types of liability insurance that 
the Seller will be required to obtain and maintain based on criteria he 
may establish to satisfy compensable third-party claims arising from, 
relating to or resulting from an Act of Terrorism. In determining the 
amount of liability insurance required, the Under Secretary may consider 
any factor, including, but not limited to, the following:
    (i) The particular Technology at issue;
    (ii) The amount of liability insurance the Seller maintained prior 
to application;
    (iii) The amount of liability insurance maintained by the Seller for 
other Technologies or for the Seller's business as a whole;
    (iv) The amount of liability insurance typically maintained by 
Sellers of comparable Technologies;
    (v) Information regarding the amount of liability insurance offered 
on the world market;
    (vi) Data and history regarding mass casualty losses;
    (vii) The intended use of the Technology; and
    (viii) The possible effects of the cost of insurance on the price of 
the product, and the possible consequences thereof for development, 
production, or deployment of the Technology.
    (2) In determining the appropriate amounts and types of insurance 
that a particular Seller is obligated to carry, the Under Secretary may 
not require any type of insurance or any amount of insurance that is not 
available on the world market, and may not require any type or amount of 
insurance that would unreasonably distort the sales price of the 
Seller's anti-terrorism Technology
    (c) Scope of Coverage. (1) Liability insurance required to be 
obtained pursuant to this section shall, in addition to the Seller, 
protect the following, to the extent of their potential liability for 
involvement in the manufacture, qualification, sale, use, or operation 
of Qualified Anti-Terrorism Technologies deployed in defense against, 
response to, or recovery from, an Act of Terrorism:
    (i) Contractors, subcontractors, suppliers, vendors and customers of 
the Seller.
    (ii) Contractors, subcontractors, suppliers, and vendors of the 
customer.
    (2) Notwithstanding the foregoing, in appropriate instances the 
Under Secretary will specify in a particular Designation that, 
consistent with the Department's interpretation of the SAFETY Act, an 
action for the recovery of damages proximately caused by a Qualified 
Anti-Terrorism Technology that arises out of, relates to, or results 
from an Act of Terrorism may properly

[[Page 216]]

be brought only against the Seller and, accordingly, the liability 
insurance required to be obtained pursuant to this section shall be 
required to protect only the Seller.
    (d) Third Party Claims. To the extent available pursuant to the 
SAFETY Act, liability insurance required to be obtained pursuant to this 
section shall provide coverage against third party claims arising out 
of, relating to, or resulting from an Act of Terrorism when the 
applicable Qualified Anti-Terrorism Technologies have been deployed in 
defense against, response to, or recovery from such act.
    (e) Reciprocal Waiver of Claims. The Seller shall enter into a 
reciprocal waiver of claims with its contractors, subcontractors, 
suppliers, vendors, and customers, and contractors and subcontractors of 
the customers, involved in the manufacture, sale, use, or operation of 
Qualified Anti-Terrorism Technologies, under which each party to the 
waiver agrees to be responsible for losses, including business 
interruption losses, that it sustains, or for losses sustained by its 
own employees resulting from an activity resulting from an Act of 
Terrorism when Qualified Anti-Terrorism Technologies have been deployed 
in defense against, response to, or recovery from such act. 
Notwithstanding the foregoing, provided that the Seller has used 
diligent efforts in good faith to obtain all required reciprocal 
waivers, obtaining such waivers shall not be a condition precedent or 
subsequent for, nor shall the failure to obtain one or more of such 
waivers adversely affect, the issuance, validity, effectiveness, 
duration, or applicability of a Designation or a Certification. Nothing 
in this paragraph (e) shall be interpreted to render the failure to 
obtain one or more of such waivers a condition precedent or subsequent 
for the issuance, validity, effectiveness, duration, or applicability of 
a Designation or a Certification.
    (f) Information to be Submitted by the Seller. As part of any 
application for a Designation, the Seller shall provide all information 
that may be requested by the Under Secretary or his designee, regarding 
a Seller's liability insurance coverage applicable to third-party claims 
arising out of, relating to, or resulting from an Act of Terrorism when 
the Seller's Qualified Anti-Terrorism Technology has been deployed in 
defense against, response to, or recovery from such act, including:
    (1) Names of insurance companies, policy numbers, and expiration 
dates;
    (2) A description of the types and nature of such insurance 
(including the extent to which the Seller is self-insured or intends to 
self-insure);
    (3) Dollar limits per occurrence and annually of such insurance, 
including any applicable sublimits;
    (4) Deductibles or self-insured retentions, if any, that are 
applicable;
    (5) Any relevant exclusions from coverage under such policies or 
other factors that would affect the amount of insurance proceeds that 
would be available to satisfy third party claims arising out of, 
relating to, or resulting from an Act of Terrorism;
    (6) The price for such insurance, if available, and the per-unit 
amount or percentage of such price directly related to liability 
coverage for the Seller's Qualified Anti-Terrorism Technology deployed 
in defense against, or response to, or recovery from an Act of 
Terrorism;
    (7) Where applicable, whether the liability insurance, in addition 
to the Seller, protects contractors, subcontractors, suppliers, vendors 
and customers of the Seller and contractors, subcontractors, suppliers, 
vendors and customers of the customer to the extent of their potential 
liability for involvement in the manufacture, qualification, sale, use 
or operation of Qualified Anti-terrorism Technologies deployed in 
defense against, response to, or recovery from an Act of Terrorism; and
    (8) Any limitations on such liability insurance.
    (g) Under Secretary's Certification. For each Qualified Anti-
Terrorism Technology, the Under Secretary shall certify the amount of 
liability insurance the Seller is required to carry pursuant to section 
443(a) of title 6, United States Code, and paragraphs (a), (b), and (c) 
of this section. The Under Secretary shall include the insurance 
certification under this section as a part

[[Page 217]]

of the applicable Designation. The insurance certification may specify a 
period of time for which such insurance certification will apply. The 
Seller of a Qualified Anti-Terrorism Technology may at any time petition 
the Under Secretary for a revision of the insurance certification under 
this section, and the Under Secretary may revise such insurance 
certification in response to such a petition. The Under Secretary may at 
any time request information from the Seller regarding the insurance 
carried by the Seller or the amount of insurance available to the 
Seller.
    (h) Seller's Continuing Obligations. Within 30 days after the Under 
Secretary's insurance certification required by paragraph (g) of this 
section, the Seller shall certify to the Under Secretary in writing that 
the Seller has obtained the required insurance. Within 30 days of each 
anniversary of the issuance of a Designation or at any other time as he 
may determine, the Under Secretary may require, by written notice to the 
Seller, that the Seller certify to the Under Secretary in writing that 
the Seller has maintained the required insurance. The Under Secretary 
may terminate a Designation if the Seller fails to provide any of the 
insurance certifications required by this paragraph (h) or provides a 
false certification.



Sec.  25.6  Procedures for designation of qualified anti-terrorism 
technologies.

    (a) Application Procedure. Any person, firm or other entity seeking 
a Designation shall submit an application to the Under Secretary or such 
other official as may be named from time to time by the Under Secretary. 
Such applications shall be submitted according to the procedures set 
forth in and using the appropriate forms contained in the SAFETY Act 
Application Kit prescribed by the Under Secretary, which shall be made 
available at http://www.safetyact.gov and by mail upon written request 
to: Directorate of Science and Technology, SAFETY Act/room 4320, 
Department of Homeland Security, Washington, DC 20528. The burden is on 
the applicant to make timely submission of all relevant data requested 
in the SAFETY Act Application Kit to substantiate an application for 
Designation. An applicant may withdraw a submitted application at any 
time and for any reason by making a written request for withdrawal with 
the Department. Withdrawal of a SAFETY Act application shall have no 
prejudicial effect on any other application.
    (b) Initial Notification. Within 30 days after receipt of an 
application for a Designation, the Under Secretary his designee shall 
notify the applicant in writing that:
    (1) The application is complete and will be reviewed and evaluated, 
or
    (2) That the application is incomplete, in which case the missing or 
incomplete parts will be specified.
    (c) Review Process. (1) The Under Secretary or his designee will 
review each complete application and any included supporting materials. 
In performing this function, the Under Secretary or his designee may but 
is not required to:
    (i) Request additional information from the Seller;
    (ii) Meet with representatives of the Seller;
    (iii) Consult with, and rely upon the expertise of, any other 
Federal or non-Federal entity;
    (iv) Perform studies or analyses of the subject Technology or the 
insurance market for such Technology; and
    (v) Seek information from insurers regarding the availability of 
insurance for such Technology.
    (2) For Technologies with which a Federal, State, or local 
government agency already has substantial experience or data (through 
the procurement process or through prior use or review), the review may 
rely in part upon such prior experience and, thus, may be expedited. The 
Under Secretary may consider any scientific studies, testing, field 
studies, or other experience with the Technology that he deems 
appropriate and that are available or can be feasibly conducted or 
obtained, including test results produced by an independent laboratory 
or other entity engaged to test or verify the safety, utility, 
performance, in order to assess the effectiveness of the Technology or 
the capability of the Technology to substantially reduce risks of harm. 
Such

[[Page 218]]

studies may, in the Under Secretary's discretion, include, without 
limitation:
    (i) Public source studies;
    (ii) Classified and otherwise confidential studies;
    (iii) Studies, tests, or other performance records or data provided 
by or available to the producer of the specific Technology; and
    (iv) Proprietary studies that are available to the Under Secretary.
    (3) In considering whether or the extent to which it is feasible to 
defer a decision on a Designation until additional scientific studies 
can be conducted on a particular Technology, the Under Secretary will 
bring to bear his expertise concerning the protection of the security of 
the United States and will consider the urgency of the need for the 
Technology.
    (d) Action by the Under Secretary. Within 90 days of notification to 
the Seller that an application for a Designation is complete in 
accordance with paragraph (b)(1) of this section, the Under Secretary 
shall take one of the following actions:
    (1) Approve the application and issue an appropriate Designation to 
the applicant for the Technology, which shall include the insurance 
certification required by Sec.  25.5(h) of this part;
    (2) Notify the applicant in writing that the Technology is 
potentially eligible for a Designation, but that additional specified 
information is needed before a decision may be reached; or
    (3) Deny the application, and notify the applicant in writing of 
such decision. The Under Secretary may extend the 90-day time period for 
up to 45 days upon notice to the Seller. The Under Secretary is not 
required to provide a reason or cause for such extension. The Under 
Secretary's decision shall be final and not subject to review, except at 
the discretion of the Under Secretary.
    (e) Content of Designation. (1) A Designation shall:
    (i) Describe the Qualified Anti-Terrorism Technology (in such detail 
as the Under Secretary deems to be appropriate);
    (ii) Identify the Seller(s) of the Qualified Anti-Terrorism 
Technology;
    (iii) Specify the earliest date of sale of the Qualified Anti-
Terrorism Technology to which the Designation shall apply (which shall 
be determined by the Under Secretary in his discretion, and may be prior 
to, but shall not be later than, the effective date of the Designation);
    (iv) Set forth the insurance certification required by Sec.  
25.5(g); and
    (v) To the extent practicable, include such standards, 
specifications, requirements, performance criteria, limitations, or 
other information as the Department in its sole and unreviewable 
discretion may deem appropriate.
    (2) The Designation may, but need not, specify other entities that 
are required to be covered by the liability insurance required to be 
purchased by the Seller. The failure to specify a covered person, firm, 
or other entity in a Designation will not preclude the application or 
applicability of the Act's protections to that person, firm, or other 
entity.
    (f) Term of Designation; Renewal. A Designation shall be valid and 
effective for a term of five to eight years (as determined by the Under 
Secretary) commencing on the date of issuance, and the protections 
conferred by the Designation shall continue in full force and effect 
indefinitely to all sales of Qualified Anti-Terrorism Technologies 
covered by the Designation. At any time within two years prior to the 
expiration of the term of the Designation, the Seller may apply for 
renewal of the Designation. The Under Secretary shall make the 
application form for renewal available at http://www.safetyact.gov and 
by mail upon request sent to: Directorate of Science and Technology, 
SAFETY Act/room 4320, Department of Homeland Security, Washington, DC 
20528.
    (g) Government Procurements--(1) Overview. The Under Secretary may 
coordinate the review of a Technology for SAFETY Act purposes in 
connection with a Federal, State, or local government agency procurement 
of an anti-terrorism Technology in any manner he deems appropriate 
consistent with the Act and other applicable law. A determination by the 
Under Secretary to issue a Designation, or not to issue a Designation 
for a particular Technology as a QATT is not a determination that the 
Technology meets, or

[[Page 219]]

fails to meet, the requirements of any solicitation issued by any 
Federal government customer or non-Federal government customer. 
Determinations by the Under Secretary with respect to whether to issue a 
Designation for Technologies submitted for his review shall be based on 
the factors identified in Sec.  25.4(b).
    (2) Procedure. Any Federal, State, or local government agency that 
engages in or is planning to engage in the procurement of a Technology 
that potentially qualifies as a Qualified Anti-terrorism Technology, 
through the use of a solicitation of proposals or otherwise, may request 
that the Under Secretary issue a notice stating that the Technology to 
be procured either affirmatively or presumptively satisfies the 
technical criteria necessary to be deemed a Qualified Anti-Terrorism 
Technology (a ``Pre-Qualification Designation Notice''). The Pre-
Qualification Designation Notice will provide that the vendor(s) chosen 
to provide the Technology (the ``Selected Vendor(s)''), upon submitting 
an application for SAFETY Act Designation will: Receive expedited review 
of their application for Designation; either affirmatively or 
presumptively (as the case may be) be deemed to have satisfied the 
technical criteria for SAFETY Act Designation with respect to the 
Technology identified in the Pre-Qualification Designation Notice; and 
be authorized to submit a streamlined application as set forth in the 
Pre-Qualification Designation Notice. In instances in which the subject 
procurement involves Technology with respect to which a Block 
Designation or Block Certification has been issued, the Department may 
determine that the vendor providing such Technology will affirmatively 
receive Designation or Certification with respect to such Technology, 
provided the vendor satisfy each other applicable requirement for 
Designation or Certification. Government agencies seeking a Pre-
Qualification Designation Notice shall submit a written request using 
the ``Procurement Pre-Qualification Request'' form prescribed by the 
Under Secretary and made available at http://www.safetyact.gov and by 
mail upon request sent to: Directorate of Science and Technology, SAFETY 
Act/room 4320, Department of Homeland Security, Washington, DC 20528.
    (3) Actions. Within 60 days after the receipt of a complete 
Procurement Pre-Qualification Request, the Under Secretary shall take 
one of the following actions:
    (i) Approve the Procurement Pre-Qualification Request and issue an 
appropriate Pre-Qualification Designation Notice to the requesting 
agency that it may include in the government contract or in the 
solicitation materials, as appropriate; or
    (ii) Notify the requesting agency in writing that the relevant 
procurement is potentially eligible for a Pre-Qualification Designation 
Notice, but that additional information is needed before a decision may 
be reached; or
    (iii) Deny the Procurement Pre-Qualification Request and notify the 
requesting agency in writing of such decision, including the reasons for 
such denial.
    (4) Contents of Notice. A Pre-Qualification Designation Notice shall 
contain, at a minimum, the following:
    (i) A detailed description of and detailed specifications for the 
Technology to which the Pre-Qualification Designation Notice applies, 
which may incorporate by reference all or part of the procurement 
solicitation documents issued or to be issued by the requesting agency;
    (ii) A statement that the Technology to which the Pre-Qualification 
Designation Notice applies satisfies the technical criteria to be deemed 
a Qualified Anti-Terrorism Technology and that the Selected Vendor(s) 
may presumptively or will qualify for the issuance of a Designation for 
such Technology upon compliance with the terms and conditions set forth 
in such Pre-Qualification Designation Notice and the approval of the 
streamlined application;
    (iii) A list of the portions of the application referenced in Sec.  
25.6(a) that the Selected Vendor(s) must complete and submit to the 
Department in order to obtain Designation and the appropriate period of 
time for such submission;
    (iv) The period of time within which the Under Secretary will take 
action upon such submission;

[[Page 220]]

    (v) The date of expiration of such Pre-Qualification Designation 
Notice; and
    (vi) Any other terms or conditions that the Under Secretary deems to 
be appropriate in his discretion.
    (5) Review of Completed Applications. The application for 
Designation from the Selected Vendor(s) shall be considered, processed, 
and acted upon in accordance with the procedures set forth in Sec.  25.6 
(which shall be deemed to be modified by the terms and conditions set 
forth in the applicable Pre-Qualification Designation Notice). However, 
the review and evaluation of the Technology to be procured from the 
Selected Vendor(s), in relation to the criteria set forth in Sec.  
25.4(b), shall ordinarily consist of a validation that that the 
Technology complies with the detailed description of and detailed 
specifications for the Technology set forth in the applicable Pre-
Qualification Designation Notice.
    (h) Block Designations. (1) From time to time, the Under Secretary, 
in response to an application submitted pursuant to Sec.  25.6(a) or 
upon his own initiative, may issue a Designation that is applicable to 
any person, firm, or other entity that is a qualified Seller of the QATT 
described in such Designation (a ``Block Designation''). A Block 
Designation will be issued only for Technology that relies on 
established performance standards or defined technical characteristics. 
All Block Designations shall be published by the Department within ten 
days after the issuance thereof at http://www.safetyact.gov, and copies 
may also be obtained by mail by sending a request to: Directorate of 
Science and Technology, SAFETY Act/room 4320, Department of Homeland 
Security, Washington, DC 20528. Any person, firm, or other entity that 
desires to qualify as a Seller of a QATT that has received a Block 
Designation shall complete only such portions of the application 
referenced in Sec.  25.6(a) as are specified in such Block Designation 
and shall submit an application to the Department in accordance with 
Sec.  25.6(a) and the terms of the Block Designation. Applicants seeking 
to be qualified Sellers of a QATT pursuant to a Block Designation will 
receive expedited review of their applications and shall not be required 
to provide information with respect to the technical merits of the QATT 
that has received Block Designation. Within 60 days (or such other 
period of time as may be specified in the applicable Block Designation) 
after the receipt by the Department of a complete application, the Under 
Secretary shall take one of the following actions:
    (i) Approve the application and notify the applicant in writing of 
such approval, which notification shall include the certification 
required by Sec.  25.5(g); or
    (ii) Deny the application, and notify the applicant in writing of 
such decision, including the reasons for such denial.
    (2) If the application is approved, commencing on the date of such 
approval the applicant shall be deemed to be a Seller under the 
applicable Block Designation for all purposes under the SAFETY Act, this 
part, and such Block Designation. A Block Designation shall be valid and 
effective for a term of five to eight years (as determined by the Under 
Secretary in his discretion) commencing on the date of issuance, and may 
be renewed or extended by the Under Secretary at his own initiative or 
in response to an application for renewal submitted by a qualified 
Seller under such Block Designation in accordance with Sec.  25.6(h). 
Except as otherwise specifically provided in this paragraph, a Block 
Designation shall be deemed to be a Designation for all purposes under 
the SAFETY Act and this part.
    (i) Other Bases for Expedited Review of Applications. The Under 
Secretary may identify other categories or types of Technologies for 
which expedited processing may be granted. For example, the Under 
Secretary may conduct expedited processing for applications addressing a 
particular threat or for particular types of anti-terrorism 
Technologies. The Under Secretary shall notify the public of any such 
opportunities for expedited processing by publishing such notice in the 
Federal Register.
    (j) Transfer of Designation. Except as may be restricted by the 
terms and

[[Page 221]]

conditions of a Designation, any Designation may be transferred and 
assigned to any other person, firm, or other entity to which the Seller 
transfers and assigns all right, title, and interest in and to the 
Technology covered by the Designation, including the intellectual 
property rights therein (or, if the Seller is a licensee of the 
Technology, to any person, firm, or other entity to which such Seller 
transfers all of its right, title, and interest in and to the applicable 
license agreement). Such transfer and assignment of a Designation will 
not be effective unless and until the Under Secretary is notified in 
writing of the transfer using the ``Application for Transfer of 
Designation'' form issued by the Under Secretary (the Under Secretary 
shall make this application form available at http://www.safetyact.gov 
and by mail by written request sent to: Directorate of Science and 
Technology, SAFETY Act/room 4320, Department of Homeland Security, 
Washington, DC 20528). Upon the effectiveness of such transfer and 
assignment, the transferee will be deemed to be a Seller in the place 
and stead of the transferor with respect to the applicable Technology 
for all purposes under the SAFETY Act, this part, and the transferred 
Designation. The transferred Designation will continue to apply to the 
transferor with respect to all transactions and occurrences that 
occurred through the time at which the transfer and assignment of the 
Designation became effective, as specified in the applicable Application 
for Transfer of Designation.
    (k) Application of Designation to Licensees. Except as may be 
restricted by the terms and conditions of a Designation, any Designation 
shall apply to any other person, firm, or other entity to which the 
Seller licenses (exclusively or nonexclusively) the right to 
manufacture, use, or sell the Technology, in the same manner and to the 
same extent that such Designation applies to the Seller, effective as of 
the date of commencement of the license, provided that the Seller 
notifies the Under Secretary of such license by submitting, within 30 
days after such date of commencement, a ``Notice of License of Qualified 
Anti-terrorism Technology'' form issued by the Under Secretary. The 
Under Secretary shall make this form available at http://
www.safetyact.gov and by mail upon request sent to: Directorate of 
Science and Technology, SAFETY Act/room 4320, Department of Homeland 
Security, Washington, DC 20528. Such notification shall not be required 
for any licensee listed as a Seller on the applicable Designation.
    (l) Significant Modification of Qualified Anti-terrorism 
Technologies. (1) The Department recognizes that Qualified Anti-
Terrorism Technologies may routinely undergo changes or modifications in 
their manufacturing, materials, installation, implementation, operating 
processes, component assembly, or in other respects from time to time. 
When a Seller makes routine changes or modifications to a Qualified 
Anti-Terrorism Technology, such that the QATT remains within the scope 
of the description set forth in the applicable Designation or 
Certification, the Seller shall not be required to provide notice under 
this subsection, and the changes or modifications shall not adversely 
affect the force or effect of the Seller's QATT Designation or 
Certification.
    (2) A Seller shall promptly notify the Department and provide 
details of any change or modification to a QATT that causes the QATT no 
longer to be within the scope of the Designation or Certification by 
submitting to the Department a completed ``Notice of Modification to 
Qualified Anti-Terrorism Technology'' form issued by the Under Secretary 
(a ``Modification Notice''). A Seller is not required to notify the 
Department of any change or modification of a particular Qualified Anti-
Terrorism Technology that is made post-sale by a purchaser unless the 
Seller has consented expressly to the modification. The Under Secretary 
shall make an appropriate form available at http://www.safetyact.gov and 
by mail upon request sent to: Directorate of Science and Technology, 
SAFETY Act/room 4320, Department of Homeland Security, Washington, DC 
20528. The Department will promptly acknowledge receipt of a 
Modification Notice by providing the relevant Seller with written notice 
to that effect. Within 60 days of the receipt of a Modification

[[Page 222]]

Notice, the Under Secretary may, in his sole and unreviewable 
discretion:
    (i) Inform the submitting Seller that the QATT as changed or 
modified is consistent with, and is not outside the scope of, the 
Seller's Designation or Certification;
    (ii) Issue to the Seller a modified Designation or Certification 
incorporating some or all of the notified changes or modifications;
    (iii) Seek further information regarding the changes or 
modifications and temporarily suspend the 60-day period of review;
    (iv) Inform the submitting Seller that the changes or modifications 
might cause the QATT as changed or modified to be outside the scope of 
the Seller's Designation or Certification, and require further review 
and consideration by the Department;
    (v) Inform the submitting Seller that the QATT as changed or 
modified is outside the scope of the subject Seller's Designation or 
Certification, and require that the QATT be brought back into 
conformance with the Seller's Designation or Certification; or
    (vi) If the Seller fails to bring the subject QATT into conformance 
in accordance with the Under Secretary's direction pursuant to paragraph 
(l)(2)(v) of this section, issue a public notice stating that the QATT 
as changed or modified is outside the scope of the submitting Seller's 
Designation or Certification and, consequentially, that such Designation 
or Certification is not applicable to the QATT as changed or modified. 
If the Under Secretary does not take one or more of such actions within 
the 60-day period following the Department's receipt of a Seller's 
Modification Notice, the changes or modifications identified in the 
Modification Notice will be deemed to be approved by the Under Secretary 
and the QATT, as changed or modified, will be conclusively established 
to be within the scope of the description of the QATT in the Seller's 
Designation or Certification.
    (3) Notwithstanding anything to the contrary herein, a Seller's 
original QATT Designation or Certification will continue in full force 
and effect in accordance with its terms unless modified, suspended, or 
terminated by the Under Secretary in his discretion, including during 
the pendency of the review of the Seller's Modification Notice. In no 
event will any SAFETY Act Designation or Certification terminate 
automatically or retroactively under this section. A Seller is not 
required to notify the Under Secretary of any change or modification 
that is made post-sale by a purchaser or end-user of the QATT without 
the Seller's consent, but the Under Secretary may, in appropriate 
circumstances, require an end-user to provide periodic reports on 
modifications or permit inspections or audits.



Sec.  25.7  Litigation management.

    (a) Liability for all claims against a Seller arising out of, 
relating to, or resulting from an Act of Terrorism when such Seller's 
Qualified Anti-Terrorism Technology has been deployed in defense 
against, response to, or recovery from such act and such claims result 
or may result in loss to the Seller shall not be in an amount greater 
than the limits of liability insurance coverage required to be 
maintained by the Seller under this section or as specified in the 
applicable Designation.
    (b) In addition, in any action for damages brought under section 442 
of Title 6, United States Code:
    (1) No punitive damages intended to punish or deter, exemplary 
damages, or other damages not intended to compensate a plaintiff for 
actual losses may be awarded, nor shall any party be liable for interest 
prior to the judgment;
    (2) Noneconomic damages may be awarded against a defendant only in 
an amount directly proportional to the percentage of responsibility of 
such defendant for the harm to the plaintiff, and no plaintiff may 
recover noneconomic damages unless the plaintiff suffered physical harm; 
and
    (3) Any recovery by a plaintiff shall be reduced by the amount of 
collateral source compensation, if any, that the plaintiff has received 
or is entitled to receive as a result of such Acts of Terrorism that 
result or may result in loss to the Seller.

[[Page 223]]

    (c) Without prejudice to the authority of the Under Secretary to 
terminate a Designation pursuant to paragraph (h) of Sec.  25.6, the 
liability limitations and reductions set forth in this section shall 
apply in perpetuity to all sales or deployments of a Qualified Anti-
Terrorism Technology in defense against, response to, or recovery from 
any Act of Terrorism that occurs on or after the effective date of the 
Designation applicable to such Qualified Anti-Terrorism Technology, 
regardless of whether any liability insurance coverage required to be 
obtained by the Seller is actually obtained or maintained or not, 
provided that the sale of such Qualified Anti-Terrorism Technology was 
consummated by the Seller on or after the earliest date of sale of such 
Qualified Anti-Terrorism Technology specified in such Designation and 
prior to the earlier of the expiration or termination of such 
Designation.
    (d) There shall exist only one cause of action for loss of property, 
personal injury, or death for performance or non-performance of the 
Seller's Qualified Anti-Terrorism Technology in relation to an Act of 
Terrorism. Such cause of action may be brought only against the Seller 
of the Qualified Anti-Terrorism Technology and may not be brought 
against the buyers, the buyers' contractors, or downstream users of the 
Technology, the Seller's suppliers or contractors, or any other person 
or entity. In addition, such cause of action must be brought in the 
appropriate district court of the United States.



Sec.  25.8  Government contractor Defense.

    (a) Criteria for Certification. The Under Secretary may issue a 
Certification for a Qualified Anti-Terrorism Technology as an Approved 
Product for Homeland Security for purposes of establishing a rebuttable 
presumption of the applicability of the government contractor defense. 
In determining whether to issue such Certification, the Under Secretary 
or his designee shall conduct a comprehensive review of the design of 
such Technology and determine whether it will perform as intended, 
conforms to the Seller's specifications, and is safe for use as 
intended. The Seller shall provide safety and hazard analyses and other 
relevant data and information regarding such Qualified Anti-Terrorism 
Technology to the Department in connection with an application. The 
Under Secretary or his designee may require that the Seller submit any 
information that the Under Secretary or his designee considers relevant 
to the application for approval. The Under Secretary or his designee may 
consult with, and rely upon the expertise of, any other governmental or 
non-governmental person, firm, or entity, and may consider test results 
produced by an independent laboratory or other person, firm, or other 
entity engaged by the Seller.
    (b) Extent of liability. Should a product liability or other lawsuit 
be filed for claims arising out of, relating to, or resulting from an 
Act of Terrorism when Qualified Anti-Terrorism Technologies Certified by 
the Under Secretary as provided in Sec. Sec.  25.8 and 25.9 of this part 
have been deployed in defense against or response or recovery from such 
act and such claims result or may result in loss to the Seller, there 
shall be a rebuttable presumption that the government contractor defense 
applies in such lawsuit. This presumption shall only be overcome by 
clear and convincing evidence showing that the Seller acted fraudulently 
or with willful misconduct in submitting information to the Department 
during the course of the consideration of such Technology under this 
section and Sec.  25.9 of this part. A claimant's burden to show fraud 
or willful misconduct in connection with a Seller's SAFETY Act 
application cannot be satisfied unless the claimant establishes there 
was a knowing and deliberate intent to deceive the Department. This 
presumption of the government contractor defense shall apply regardless 
of whether the claim against the Seller arises from a sale of the 
product to Federal Government or non-Federal Government customers. Such 
presumption shall apply in perpetuity to all deployments of a Qualified 
Anti-Terrorism Technology (for which a Certification has been issued by 
the Under Secretary as provided in this section and Sec.  25.9 of this 
part) in

[[Page 224]]

defense against, response to, or recovery from any Act of Terrorism that 
occurs on or after the effective date of the Certification applicable to 
such Technology, provided that the sale of such Technology was 
consummated by the Seller on or after the earliest date of sale of such 
Technology specified in such Certification (which shall be determined by 
the Under Secretary in his discretion, and may be prior to, but shall 
not be later than, such effective date) and prior to the expiration or 
termination of such Certification.
    (c) Establishing applicability of the government contractor defense. 
The Under Secretary will be exclusively responsible for the review and 
approval of anti-terrorism Technology for purposes of establishing the 
government contractor defense in any product liability lawsuit for 
claims arising out of, relating to, or resulting from an Act of 
Terrorism when Qualified Anti-Terrorism Technologies approved by the 
Under Secretary, as provided in this final rule, have been deployed in 
defense against or response or recovery from such act and such claims 
result or may result in loss to the Seller. The Certification of a 
Technology as an Approved Product for Homeland Security shall be the 
only evidence necessary to establish that the Seller of the Qualified 
Anti-Terrorism Technology that has been issue a Certification is 
entitled to a presumption of dismissal from a cause of action brought 
against a Seller arising out of, relating to, or resulting from an Act 
of Terrorism when the Qualified Anti-Terrorism Technology was deployed 
in defense against or response to or recovery from such Act of 
Terrorism. This presumption of dismissal is based upon the statutory 
government contractor defense conferred by the SAFETY Act.



Sec.  25.9  Procedures for certification of approved products for
Homeland Security.

    (a) Application procedure. An applicant seeking a Certification of 
anti-terrorism Technology as an Approved Product for Homeland Security 
under Sec.  25.8 shall submit information supporting such request to the 
Under Secretary. The Under Secretary shall make application forms 
available at http://www.safetyact.gov, and copies may also be obtained 
by mail by sending a request to: Directorate of Science and Technology, 
SAFETY Act/room 4320, Department of Homeland Security, Washington, DC 
20528. An application for a Certification may not be filed unless the 
applicant has also filed an application for a Designation for the same 
Technology in accordance with Sec.  25.6(a). Such applications may be 
filed simultaneously and may be reviewed simultaneously by the 
Department.
    (b) Initial notification. Within 30 days after receipt of an 
application for a Certification, the Under Secretary or his designee 
shall notify the applicant in writing that:
    (1) The application is complete and will be reviewed, or
    (2) That the application is incomplete, in which case the missing or 
incomplete parts will be specified.
    (c) Review process. The Under Secretary or his designee will review 
each complete application for a Certification and any included 
supporting materials. In performing this function, the Under Secretary 
or his designee may, but is not required to:
    (1) Request additional information from the Seller;
    (2) Meet with representatives of the Seller;
    (3) Consult with, and rely upon the expertise of, any other Federal 
or non-Federal entity; and
    (4) Perform or seek studies or analyses of the Technology.
    (d) Action by the Under Secretary. (1) Within 90 days after receipt 
of a complete application for a Certification, the Under Secretary shall 
take one of the following actions:
    (i) Approve the application and issue an appropriate Certification 
to the Seller;
    (ii) Notify the Seller in writing that the Technology is potentially 
eligible for a Certification, but that additional specified information 
is needed before a decision may be reached; or
    (iii) Deny the application, and notify the Seller in writing of such 
decision.
    (2) The Under Secretary may extend the time period one time for 45 
days upon notice to the Seller, and the

[[Page 225]]

Under Secretary is not required to provide a reason or cause for such 
extension. The Under Secretary's decision shall be final and not subject 
to review, except at the discretion of the Under Secretary.
    (e) Designation is a pre-condition. The Under Secretary may approve 
an application for a Certification only if the Under Secretary has also 
approved an application for a Designation for the same Technology in 
accordance with Sec.  25.4.
    (f) Content and term of certification; renewal. (1) A Certification 
shall:
    (i) Describe the Qualified Anti-Terrorism Technology (in such detail 
as the Under Secretary deems to be appropriate);
    (ii) Identify the Seller(s) of the Qualified Anti-Terrorism 
Technology;
    (iii) Specify the earliest date of sale of the Qualified Anti-
Terrorism Technology to which the Certification shall apply (which shall 
be determined by the Under Secretary in his discretion, and may be prior 
to, but shall not be later than, the effective date of the 
Certification); and
    (iv) To the extent practicable, include such standards, 
specifications, requirements, performance criteria, limitations, or 
other information as the Department in its sole and unreviewable 
discretion may deem appropriate.
    (2) A Certification shall be valid and effective for the same period 
of time for which the related Designation is issued, and shall terminate 
upon the termination of such related Designation. The Seller may apply 
for renewal of the Certification in connection with an application for 
renewal of the related Designation. An application for renewal must be 
made using the ``Application for Certification of an Approved Product 
for Homeland Security'' form issued by the Under Secretary.
    (g) Application of Certification to licensees. A Certification shall 
apply to any other person, firm, or other entity to which the applicable 
Seller licenses (exclusively or nonexclusively) the right to 
manufacture, use, or and sell the Technology, in the same manner and to 
the same extent that such Certification applies to the Seller, effective 
as of the date of commencement of the license, provided that the Seller 
notifies the Under Secretary of such license by submitting, within 30 
days after such date of commencement, a ``Notice of License of Approved 
Anti-terrorism Technology'' form issued by the Under Secretary. The 
Under Secretary shall make this form available at http://
www.safetyact.gov and by mail upon request sent to: Directorate of 
Science and Technology, SAFETY Act/room 4320, Department of Homeland 
Security, Washington, DC 20528. Such notification shall not be required 
for any licensee listed as a Seller on the applicable Certification.
    (h) Transfer of Certification. In the event of any permitted 
transfer and assignment of a Designation, any related Certification for 
the same anti-terrorism Technology shall automatically be deemed to be 
transferred and assigned to the same transferee to which such 
Designation is transferred and assigned. The transferred Certification 
will continue to apply to the transferor with respect to all 
transactions and occurrences that occurred through the time at which 
such transfer and assignment of the Certification became effective.
    (i) Issuance of Certificate; Approved Product List. For anti-
terrorism Technology reviewed and approved by the Under Secretary and 
for which a Certification is issued, the Under Secretary shall issue a 
certificate of conformance to the Seller and place the anti-terrorism 
Technology on an Approved Product List for Homeland Security, which 
shall be published by the Department.
    (j) Block Certifications. (1) From time to time, the Under 
Secretary, in response to an application submitted pursuant to Sec.  
25.9(a) or at his own initiative, may issue a Certification that is 
applicable to any person, firm or other entity that is a qualified 
Seller of the Approved Product for Homeland Security described in such 
Certification (a ``Block Certification''). All Block Certifications 
shall be published by the Department within ten days after the issuance 
thereof at http://www.safetyact.gov, and copies may also be obtained by 
mail by sending a request to: Directorate of Science and

[[Page 226]]

Technology, SAFETY Act/room 4320, Department of Homeland Security, 
Washington, DC 20528. Any person, firm, or other entity that desires to 
qualify as a Seller of an Approved Product for Homeland Security under a 
Block Certification shall complete only such portions of the application 
referenced in Sec.  25.9(a) as are specified in such Block Certification 
and shall submit such application to the Department in accordance with 
Sec.  9(a). Applicants seeking to be qualified Sellers of an Approved 
Product for Homeland Security pursuant to a Block Certification will 
receive expedited review of their applications and shall not be required 
to provide information with respect to the technical merits of the 
Approved Product for Homeland Security that has received Block 
Certification. Within 60 days (or such other period of time as may be 
specified in the applicable Block Certification) after the receipt by 
the Department of a complete application, the Under Secretary shall take 
one of the following actions:
    (i) Approve the application and notify the applicant in writing of 
such approval; or
    (ii) Deny the application, and notify the applicant in writing of 
such decision, including the reasons for such denial.
    (2) If the application is approved, commencing on the date of such 
approval, the applicant shall be deemed to be a Seller under the 
applicable Block Certification for all purposes under the SAFETY Act, 
this part, and such Block Certification. A Block Certification shall be 
valid and effective for the same period of time for which the related 
Block Designation is issued. A Block Certification may be renewed by the 
Under Secretary at his own initiative or in response to an application 
for renewal submitted by a qualified Seller under such Block 
Certification in accordance with Sec.  25.9(g). Except as otherwise 
specifically provided in this paragraph, a Block Certification shall be 
deemed to be a Certification for all purposes under the SAFETY Act and 
this part.



Sec.  25.10  Confidentiality and protection of Intellectual Property.

    (a) General. The Secretary, in consultation with the Office of 
Management and Budget and appropriate Federal law enforcement and 
intelligence officials, and in a manner consistent with existing 
protections for sensitive or classified information, shall establish 
confidentiality procedures for safeguarding, maintenance and use of 
information submitted to the Department under this part. Such protocols 
shall, among other things, ensure that the Department will utilize all 
appropriate exemptions from the Freedom of Information Act.
    (b) Non-disclosure. Except as otherwise required by applicable law 
or regulation or a final order of a court of competent jurisdiction, or 
as expressly authorized in writing by the Under Secretary, no person, 
firm, or other entity may:
    (1) Disclose SAFETY Act Confidential Information (as defined above) 
to any person, firm, or other entity, or
    (2) Use any SAFETY Act Confidential Information for his, her, or its 
own benefit or for the benefit of any other person, firm, or other 
entity, unless the applicant has consented to the release of such SAFETY 
Act Confidential Information.
    (c) Legends. Any person, firm, or other entity that submits data or 
information to the Department under this part may place a legend on such 
data or information indicating that the submission constitutes SAFETY 
Act Confidential Information. The absence of such a legend shall not 
prevent any data or information submitted to the Department under this 
part from constituting or being considered by the Department to 
constitute SAFETY Act Confidential Information.



PART 27_CHEMICAL FACILITY ANTI-TERRORISM STANDARDS--Table of Contents



                            Subpart A_General

Sec.
27.100 Purpose.
27.105 Definitions.
27.110 Applicability.
27.115 Implementation.

[[Page 227]]

27.120 Designation of a Coordinating Official; consultations and 
          technical assistance.
27.125 Severability.

              Subpart B_Chemical Facility Security Program

27.200 Information regarding security risk for a chemical facility.
27.203 Calculating the screening threshold quantity by security issue.
27.204 Minimum concentration by security issue.
27.205 Determination that a chemical facility ``presents a high level of 
          security risk.''
27.210 Submissions schedule.
27.215 Security vulnerability assessments.
27.220 Tiering.
27.225 Site security plans.
27.230 Risk-based performance standards.
27.235 Alternative security program.
27.240 Review and approval of security vulnerability assessments.
27.245 Review and approval of site security plans.
27.250 Inspections and audits.
27.255 Recordkeeping requirements.

                   Subpart C_Orders and Adjudications

27.300 Orders.
27.305 Neutral adjudications.
27.310 Commencement of adjudication proceedings.
27.315 Presiding officers for proceedings.
27.320 Prohibition on ex parte communications during proceedings.
27.325 Burden of proof.
27.330 Summary decision procedures.
27.335 Hearing procedures.
27.340 Completion of adjudication proceedings.
27.345 Appeals.

                             Subpart D_Other

27.400 Chemical-terrorism vulnerability information.
27.405 Review and preemption of State laws and regulations.
27.410 Third-party actions.

Appendix A to Part 27--DHS Chemicals of Interest

    Authority: 6 U.S.C. 624; Pub. L. 101-410, 104 Stat. 890, as amended 
by Pub. L. 114-74, 129 Stat. 599; Pub. L. 113-254, 128 Stat. 2898, as 
amended by Pub. L. 116-150, 134 Stat. 679.

    Source: 72 FR 17729, Apr. 9, 2007, unless otherwise noted.



                            Subpart A_General



Sec.  27.100  Purpose.

    The purpose of this part is to enhance the security of our Nation by 
furthering the mission of the Department as provided in 6 U.S.C. 
111(b)(1) and by lowering the risk posed by certain chemical facilities.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41890, Aug. 4, 2021]



Sec.  27.105  Definitions.

    As used in this part:
    A Commercial Grade (ACG) shall refer to any quality or concentration 
of a chemical of interest offered for commercial sale that a facility 
uses, stores, manufactures, or ships.
    A Placarded Amount (APA) shall refer to the screening threshold 
quantity (STQ) for a sabotage and contamination chemical of interest, as 
calculated in accordance with Sec.  27.203(d).
    Alternative Security Program or ASP shall mean a third-party or 
industry organization program, a local authority, State or Federal 
government program, or any element or aspect thereof, that the Executive 
Assistant Director has determined meets the requirements of this part 
and provides for an equivalent level of security to that established by 
this part.
    Associate Director for Chemical Security shall mean the Associate 
Director for Chemical Security, Infrastructure Security Division, 
Cybersecurity and Infrastructure Security Agency, Department of Homeland 
Security, or any successors to that position within the Department, or 
designee.
    Chemical Facility or facility shall mean any establishment that 
possesses or plans to possess, at any relevant point in time, a quantity 
of a chemical substance determined by the Secretary to be potentially 
dangerous or that meets other risk-related criteria identified by the 
Department. As used herein, the term chemical facility or facility shall 
also refer to the owner or operator of the chemical facility. Where 
multiple owners and/or operators function within a common infrastructure 
or within a single fenced area, the Executive Assistant Director may 
determine that

[[Page 228]]

such owners and/or operators constitute a single chemical facility or 
multiple chemical facilities depending on the circumstances.
    Chemical of Interest shall refer to a chemical listed in appendix A 
to part 27.
    Chemical Security Assessment Tool or CSAT shall mean a suite of 
applications through which the Department will collect and analyze key 
data from chemical facilities.
    Chemical-terrorism Vulnerability Information (CVI) shall mean the 
information listed in Sec.  27.400(b).
    Coordinating Official shall mean the person (or designee(s)) 
selected by the Executive Assistant Director to ensure that the 
regulations are implemented in a uniform, impartial, and fair manner.
    Covered Facility or Covered Chemical Facility shall mean a chemical 
facility determined by the Executive Assistant Director to present high 
levels of security risk, or a facility that the Executive Assistant 
Director has determined is presumptively high risk under Sec.  27.200.
    CUM 100g shall refer to the cumulative STQ of 100 grams for 
designated Chemical Weapons (CW), located in appendix A to part 27 as 
the entry for the STQ and Minimum Concentration of certain Theft-CW/CWP 
chemicals.
    Department shall mean the Department of Homeland Security.
    Director shall mean the Director of the Cybersecurity and 
Infrastructure Security Agency, Department of Homeland Security, or any 
successors to that position within the Department, or designee.
    Executive Assistant Director shall mean the Executive Assistant 
Director for the Infrastructure Security Division, Cybersecurity and 
Infrastructure Security Agency, Department of Homeland Security, any 
successors to that position within the Department, or designee.
    Office of the Chief Counsel shall mean the Office of the Chief 
Counsel of the Cybersecurity and Infrastructure Security Agency, 
Department of Homeland Security, or any successors within the 
Department.
    Operator shall mean a person who has responsibility for the daily 
operations of a facility or facilities subject to this part.
    Owner shall mean the person or entity that owns any facility subject 
to this part.
    Present high levels of security risk and high risk shall refer to a 
chemical facility that, in the discretion of the Secretary of Homeland 
Security, presents a high risk of significant adverse consequences for 
human life or health, national security, and/or critical economic assets 
if subjected to terrorist attack, compromise, infiltration, or 
exploitation.
    Risk profiles shall mean criteria identified by the Executive 
Assistant Director for determining which chemical facilities will 
complete the Top-Screen or provide other risk assessment information.
    Screening Threshold Quantity or STQ shall mean the quantity of a 
chemical of interest, upon which the facility's obligation to complete 
and submit the CSAT Top-Screen is based.
    Secretary or Secretary of Homeland Security shall mean the Secretary 
of the Department of Homeland Security or any person, officer, or entity 
within the Department to whom the Secretary's authority under 6 U.S.C. 
621 et seq. is delegated.
    Security Issue shall refer to the type of risks associated with a 
given chemical. For purposes of this part, there are four main security 
issues:
    (1) Release (including toxic, flammable, and explosive);
    (2) Theft and diversion (including chemical weapons and chemical 
weapons precursors, weapons of mass effect, and explosives and 
improvised explosive device precursors);
    (3) Sabotage and contamination; and
    (4) Critical to government mission and national economy.
    Terrorist attack or terrorist incident shall mean any incident or 
attempt that constitutes terrorism or terrorist activity under 6 U.S.C. 
101(16) or 18 U.S.C. 2331(5) or 8 U.S.C. 1182(a)(3)(B)(iii), including 
any incident or attempt that involves or would involve sabotage of 
chemical facilities or theft, misappropriation, or misuse of a dangerous 
quantity of chemicals.
    Tier shall mean the risk level associated with a covered chemical 
facility

[[Page 229]]

that is assigned to a facility by the Department. For purposes of this 
part, there are four risk-based tiers, ranging from highest risk at Tier 
1 to lowest risk at Tier 4.
    Top-Screen shall mean an initial screening process designed by the 
Executive Assistant Director through which chemical facilities provide 
information to the Department for use pursuant to Sec.  27.200 of these 
regulations.

[72 FR 17729, Apr. 9, 2007, as amended at 72 FR 65418, Nov. 20, 2007; 86 
FR 41890, Aug. 4, 2021]



Sec.  27.110  Applicability.

    (a) This part applies to chemical facilities and to covered 
facilities as set out herein; and
    (b) This part does not apply to a facility that is excluded as set 
forth in 6 U.S.C. 621(4):
    (1) A facility regulated under the Maritime Transportation Security 
Act of 2002 (Pub. L. 107-295; 116 Stat. 2064);
    (2) A public water system, as that term is defined in 42 U.S.C. 
300f;
    (3) A Treatment Works, as that term is defined in 33 U.S.C. 1292;
    (4) A facility owned or operated by the Department of Defense or the 
Department of Energy; or
    (5) A facility subject to regulation by the Nuclear Regulatory 
Commission, or by a State that has entered into an agreement with the 
Nuclear Regulatory Commission under 42 U.S.C. 2021(b) to protect against 
unauthorized access of any material, activity, or structure licensed by 
the Nuclear Regulatory Commission.

[86 FR 41890, Aug. 4, 2021]



Sec.  27.115  Implementation.

    The Executive Assistant Director may implement this part in a phased 
manner, selecting certain chemical facilities for expedited initial 
processes under these regulations and identifying other chemical 
facilities or types or classes of chemical facilities for other phases 
of program implementation. The Executive Assistant Director has 
flexibility to designate particular chemical facilities for specific 
phases of program implementation based on potential risk or any other 
factor consistent with this part.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41891, Aug. 4, 2021]



Sec.  27.120  Designation of a Coordinating Official; consultations and 
technical assistance.

    (a) The Executive Assistant Director will designate a Coordinating 
Official who will be responsible for ensuring that these regulations are 
implemented in a uniform, impartial, and fair manner.
    (b) The Coordinating Official shall provide guidance to covered 
facilities regarding compliance with this part and shall, as necessary 
and to the extent that resources permit, be available to consult and to 
provide technical assistance to an owner or operator who seeks such 
consultation or assistance.
    (c) In order to initiate consultations or seek technical assistance, 
a covered facility shall submit a written request for consultation or 
technical assistance to the Coordinating Official or contact the 
Department in any other manner specified in any subsequent guidance. 
Requests for consultation or technical guidance do not serve to toll any 
of the applicable timelines set forth in this part.
    (d) If a covered facility modifies its facility, processes, or the 
types or quantities of materials that it possesses, and believes that 
such changes may impact the covered facility's obligations under this 
part, the covered facility may request a consultation with the 
Coordinating Official as specified in paragraph (c).

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41891, Aug. 4, 2021]



Sec.  27.125  Severability.

    If a court finds any portion of this part to have been promulgated 
without proper authority, the remainder of this part will remain in full 
effect.

[[Page 230]]



              Subpart B_Chemical Facility Security Program



Sec.  27.200  Information regarding security risk for a chemical facility.

    (a) Information to determine security risk. In order to determine 
the security risk posed by chemical facilities, the Secretary may, at 
any time, request information from chemical facilities that may reflect 
potential consequences of or vulnerabilities to a terrorist attack or 
incident, including questions specifically related to the nature of the 
business and activities conducted at the facility; information 
concerning the names, nature, conditions of storage, quantities, 
volumes, properties, customers, major uses, and other pertinent 
information about specific chemicals or chemicals meeting a specific 
criterion; information concerning facilities' security, safety, and 
emergency response practices, operations, and procedures; information 
regarding incidents, history, funding, and other matters bearing on the 
effectiveness of the security, safety, and emergency response programs, 
and other information as necessary.
    (b) Obtaining information from facilities. (1) The Executive 
Assistant Director may seek the information provided in paragraph (a) of 
this section by contacting chemical facilities individually or by 
publishing a notice in the Federal Register seeking information from 
chemical facilities that meet certain criteria, which the Department 
will use to determine risk profiles. Through any such individual or 
Federal Register notification, the Executive Assistant Director may 
instruct such facilities to complete and submit a Top-Screen process, 
which may be completed through a secure Department Web site or through 
other means approved by the Executive Assistant Director.
    (2) A facility must complete and submit a Top-Screen in accordance 
with the schedule provided in Sec.  27.210, the calculation provisions 
in Sec.  27.203, and the minimum concentration provisions in Sec.  
27.204 if it possesses any of the chemicals listed in appendix A to this 
part at or above the STQ for any applicable Security Issue.
    (3) Where the Department requests that a facility complete and 
submit a Top-Screen, the facility must designate a person who is 
responsible for the submission of information through the CSAT system 
and who attests to the accuracy of the information contained in any CSAT 
submissions. Such submitter must be an officer of the corporation or 
other person designated by an officer of the corporation and must be 
domiciled in the United States.
    (c) Presumptively High-Risk Facilities. (1) If a chemical facility 
subject to paragraph (a) or (b) of this section fails to provide 
information requested or complete the Top-Screen within the time frame 
provided in Sec.  27.210, the Executive Assistant Director may, after 
attempting to consult with the facility, reach a preliminary 
determination, based on the information then available, that the 
facility presumptively presents a high level of security risk. The 
Executive Assistant Director shall then issue a notice to the entity of 
this determination and, if necessary, order the facility to provide 
information or complete the Top-Screen pursuant to these rules. If the 
facility then fails to do so, it may be subject to civil penalties 
pursuant to Sec.  27.300, audit and inspection under Sec.  27.250, or, 
if appropriate, an order to cease operations under Sec.  27.300.
    (2) If the facility deemed ``presumptively high risk'' pursuant to 
paragraph (c)(1) of this section completes the Top-Screen, and the 
Department determines that it does not present a high level of security 
risk under Sec.  27.205, its status as ``presumptively high risk'' will 
terminate, and the Department will issue a notice to the facility to 
that effect.

[72 FR 17729, Apr. 9, 2007, as amended at 72 FR 65418, Nov. 20, 2007; 86 
FR 41891, Aug. 4, 2021]



Sec.  27.203  Calculating the screening threshold quantity by security issue.

    (a) General. In calculating whether a facility possesses a chemical 
of interest that meets the STQ for any security issue, a facility need 
not include chemicals of interest:
    (1) Used as a structural component;

[[Page 231]]

    (2) Used as products for routine janitorial maintenance;
    (3) Contained in food, drugs, cosmetics, or other personal items 
used by employees;
    (4) In process water or non-contact cooling water as drawn from 
environment or municipal sources;
    (5) In air either as compressed air or as part of combustion;
    (6) Contained in articles, as defined in 40 CFR 68.3;
    (7) In solid waste (including hazardous waste) regulated under the 
Resource Conservation and Recovery Act, 42 U.S.C. 6901 et seq., except 
for the waste described in 40 CFR 261.33; or
    (8) In naturally occurring hydrocarbon mixtures prior to entry of 
the mixture into a natural gas processing plant or a petroleum refining 
process unit. Naturally occurring hydrocarbon mixtures include 
condensate, crude oil, field gas, and produced water as defined in 40 
CFR 68.3.
    (b) Release chemicals--(1) Release-toxic, release-flammable, and 
release-explosive chemicals. Except as provided in paragraphs (b)(2) and 
(b)(3), in calculating whether a facility possesses an amount that meets 
the STQ for release chemicals of interest, the facility shall only 
include release chemicals of interest:
    (i) In a vessel as defined in 40 CFR 68.3, in a underground storage 
facility, or stored in a magazine as defined in 27 CFR 555.11;
    (ii) In transportation containers used for storage not incident to 
transportation, including transportation containers connected to 
equipment at a facility for loading or unloading and transportation 
containers detached from the motive power that delivered the container 
to the facility;
    (iii) Present as process intermediates, by-products, or materials 
produced incidental to the production of a product if they exist at any 
given time;
    (iv) In natural gas or liquefied natural gas stored in peak shaving 
facilities; and
    (v) In gasoline, diesel, kerosene, or jet fuel (including fuels that 
have flammability hazard ratings of 1, 2, 3, or 4, as determined by 
using National Fire Protection Association (NFPA) 704: Standard System 
for the Identification of the Hazards of Materials for Emergency 
Response [2007 ed.], which is incorporated by reference at Sec.  
27.204(a)(2)), stored in aboveground tank farms, including tank farms 
that are part of pipeline systems;
    (2) Release-toxic, release-flammable, and release-explosive 
chemicals. Except as provided in paragraph (b)(2)(i), in calculating 
whether a facility possesses an amount that meets the STQ for release-
toxic, release-flammable, and release-explosive chemicals, a facility 
need not include release-toxic, release-flammable, or release-explosive 
chemicals of interest that a facility manufactures, processes, or uses 
in a laboratory at the facility under the supervision of a technically 
qualified individual as defined in 40 CFR 720.3.
    (i) This exemption does not apply to specialty chemical production; 
manufacture, processing, or use of substances in pilot plant scale 
operations; or activities, including research and development, involving 
chemicals of interest conducted outside the laboratory.
    (ii) [Reserved]
    (3) Propane. In calculating whether a facility possesses an amount 
that meets the STQ for propane, a facility need not include propane in 
tanks of 10,000 pounds or less.
    (c) Theft and diversion chemicals. In calculating whether a facility 
possesses an amount of a theft/diversion chemical of interest that meets 
the STQ, the facility shall only include theft/diversion chemicals of 
interest in a transportation packaging, as defined in 49 CFR 171.8. 
Where a theft/diversion-CW chemical is designated by ``CUM 100g,'' a 
facility shall total the quantity of all such designated chemicals in 
its possession to determine whether the facility possesses theft/
diversion-CW chemicals that meet or exceed the STQ of 100 grams.
    (d) Sabotage and contamination chemicals. A facility meets the STQ 
for a sabotage/contamination chemical of interest if it ships the 
chemical and is required to placard the shipment of that chemical 
pursuant to the provisions of subpart F of 49 CFR part 172.

[72 FR 65419, Nov. 20, 2007, as amended at 86 FR 41891, Aug. 4, 2021]

[[Page 232]]



Sec.  27.204  Minimum concentration by security issue.

    (a) Release chemicals--(1) Release-toxic chemicals. If a release-
toxic chemical of interest is present in a mixture, and the 
concentration of the chemical is equal to or greater than one percent 
(1%) by weight, the facility shall count the amount of the chemical of 
interest in the mixture toward the STQ. If a release-toxic chemical of 
interest is present in a mixture, and the concentration of the chemical 
is less than one percent (1%) by weight of the mixture, the facility 
need not count the amount of that chemical in the mixture in determining 
whether the facility possesses the STQ. Except for oleum, if the 
concentration of the chemical of interest in the mixture is one percent 
(1%) or greater by weight, but the facility can demonstrate that the 
partial pressure of the regulated substance in the mixture (solution) 
under handling or storage conditions in any portion of the process is 
less than 10 millimeters of mercury (mm Hg), the amount of the substance 
in the mixture in that portion of a vessel need not be considered when 
determining the STQ. The facility shall document this partial pressure 
measurement or estimate.
    (2) Release-flammable chemicals. If a release-flammable chemical of 
interest is present in a mixture in a concentration equal to or greater 
than one percent (1%) by weight of the mixture, and the mixture has a 
NFPA flammability hazard rating of 4, the facility shall count the 
entire amount of the mixture toward the STQ. Except as provided in Sec.  
27.203(b)(1)(v) for fuels that are stored in aboveground tank farms 
(including farms that are part of pipeline systems), if a release-
flammable chemical of interest is present in a mixture in a 
concentration equal to or greater than one percent (1%) by weight of the 
mixture, and the mixture has a NFPA flammability hazard rating of 1, 2, 
or 3, the facility need not count the mixture toward the STQ. The 
flammability hazard ratings are defined in NFPA 704: Standard System for 
the Identification of the Hazards of Materials for Emergency Response 
[2007 ed.]. The Director of the Federal Register approves the 
incorporation by reference of this standard in accordance with 5 U.S.C. 
552(a) and 1 CFR part 51. You may obtain a copy of the incorporated 
standard from the NFPA at 1 Batterymarch Park, Quincy, MA 02169-7471 or 
http://www.nfpa.org. You may inspect a copy of the incorporated standard 
at the Department of Homeland Security, 1621 Kent Street, 9th Floor, 
Rosslyn, VA (please call 703-235-0709 to make an appointment), or at the 
National Archives and Records Administration (NARA). For information on 
the availability of material at NARA, call 202-741-6030, or go to http:/
/www.archives.gov/federal_register/code_of_federal_regulations/
ibr_locations.html. If a release-flammable chemical of interest is 
present in a mixture, and the concentration of the chemical is less than 
one percent (1%) by weight, the facility need not count the mixture in 
determining whether the facility possesses the STQ.
    (3) Release-explosive chemicals. For each release-explosive chemical 
of interest, a facility shall count the total quantity of all commercial 
grades of the chemical of interest toward the STQ, unless a specific 
minimum concentration is assigned in the Minimum Concentration column of 
appendix A to part 27, in which case the facility should count the total 
quantity of all commercial grades of the chemical at the specified 
minimum concentration.
    (b) Theft and diversion chemicals--(1) Theft/Diversion-Chemical 
Weapons (CW) and Chemical Weapons Precursors (CWP) chemicals. Where a 
theft/diversion-CW/CWP chemical of interest is not designated by ``CUM 
100g'' in appendix A, and the chemical is present in a mixture at or 
above the minimum concentration amount listed in the Minimum 
Concentration column of appendix A to part 27, the facility shall count 
the entire amount of the mixture toward the STQ.
    (2) Theft/Diversion-Weapon of Mass Effect (WME) chemicals. If a 
theft/diversion-WME chemical of interest is present in a mixture at or 
above the minimum concentration amount listed in the Minimum 
Concentration column of appendix A to part 27, the facility shall count 
the entire amount of the mixture toward the STQ.

[[Page 233]]

    (3) Theft/Diversion-Explosives/Improvised Explosive Device Precursor 
(EXP/IEDP) chemicals. For each theft/diversion-EXP/IEDP chemical of 
interest, a facility shall count the total quantity of all commercial 
grades of the chemical toward the STQ, unless a specific minimum 
concentration is assigned in the Minimum Concentration column of 
appendix A to part 27, in which case the facility should count the total 
quantity of all commercial grades of the chemical at the specified 
minimum concentration.
    (c) Sabotage and contamination chemicals. For each sabotage and 
contamination chemical of interest, a facility shall count the total 
quantity of all commercial grades of the chemical toward the STQ.

[72 FR 65419, Nov. 20, 2007, as amended at 86 FR 41891, Aug. 4, 2021]



Sec.  27.205  Determination that a chemical facility ``presents a high
level of security risk.''

    (a) Initial determination. The Executive Assistant Director may 
determine at any time that a chemical facility presents a high level of 
security risk based on any information available (including any 
information submitted to the Department under Sec.  27.200) that, in the 
Secretary's discretion, indicates the potential that a terrorist attack 
involving the facility could result in significant adverse consequences 
for human life or health, national security, or critical economic 
assets. Upon determining that a facility presents a high level of 
security risk, the Department shall notify the facility in writing of 
such initial determination and may also notify the facility of the 
Department's preliminary determination of the facility's placement in a 
risk-based tier pursuant to Sec.  27.220(a).
    (b) Redetermination. If a covered facility previously determined to 
present a high level of security risk has materially altered its 
operations, it may seek a redetermination by filing a Request for 
Redetermination with the Executive Assistant Director, and may request a 
meeting regarding the Request. Within 45 calendar days of receipt of 
such a Request, or within 45 calendar days of a meeting under this 
paragraph, the Executive Assistant Director shall notify the covered 
facility in writing of the Department's decision on the Request for 
Redetermination.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41891, Aug. 4, 2021]



Sec.  27.210  Submissions schedule.

    (a) Initial submission. The time frames in paragraphs (a)(2) and 
(a)(3) of this section also apply to covered facilities that submit an 
Alternative Security Program pursuant to Sec.  27.235.
    (1) Top-Screen. Facilities shall complete and submit a Top-Screen 
within the following time frames:
    (i) Unless otherwise notified, within 60 calendar days of November 
20, 2007 for facilities that possess any of the chemicals listed in 
appendix A at or above the STQ for any applicable Security Issue, or 
within 60 calendar days for facilities that come into possession of any 
of the chemicals listed in appendix A at or above the STQ for any 
applicable Security Issue; or
    (ii) Within the time frame provided in any written notification from 
the Department or specified in any subsequent Federal Register notice.
    (2) Security Vulnerability Assessment. Unless otherwise notified, a 
covered facility must complete and submit a Security Vulnerability 
Assessment within 90 calendar days of written notification from the 
Department or within the time frame specified in any subsequent Federal 
Register notice.
    (3) Site Security Plan. Unless otherwise notified, a covered 
facility must complete and submit a Site Security Plan within 120 
calendar days of written notification from the Department or within the 
time frame specified in any subsequent Federal Register notice.
    (b) Resubmission schedule for covered facilities. The timeframes in 
this subsection also apply to covered facilities who submit an 
Alternative Security Program pursuant to Sec.  27.235.
    (1) Top-Screen. Unless otherwise notified:
    (i) Tier 1 and Tier 2 covered facilities must complete and submit a 
new Top-Screen no less than two years, and no more than two years and 60 
calendar days, from the date of the Department's approval of the 
facility's most recent Site Security Plan.

[[Page 234]]

    (ii) Tier 3 and Tier 4 covered facilities must routinely complete 
and submit a Top-Screen no less than three years, and no more than three 
years and 60 calendar days, from the date of the Department's approval 
of the facility's most recent Site Security Plan.
    (2) Security Vulnerability Assessment. Unless otherwise notified and 
following a Top-Screen resubmission pursuant to paragraph (b)(1) of this 
section, a covered facility must complete and submit a new Security 
Vulnerability Assessment within 90 calendar days of written notification 
from the Department or within the time frame specified in any subsequent 
Federal Register notice.
    (3) Site Security Plan. Unless otherwise notified and following a 
Security Vulnerability Assessment resubmission pursuant to paragraph 
(b)(2) of this section, a covered facility must complete and submit a 
new Site Security Plan within 120 calendar days of written notification 
from the Department or within the time frame specified in any subsequent 
Federal Register notice.
    (c) The Executive Assistant Director retains the authority to modify 
the schedule in this part as needed. The Executive Assistant Director 
may shorten or extend these time periods based on the operations at the 
facility, the nature of the covered facility's vulnerabilities, the 
level and immediacy of security risk, or for other reasons. If the 
Department alters the time periods for a specific facility, the 
Department will do so in written notice to the facility.
    (d) If a covered facility makes material modifications to its 
operations or site, the covered facility must complete and submit a 
revised Top-Screen to the Department within 60 days of the material 
modification. In accordance with the resubmission requirements in Sec.  
27.210(b)(2) and (3), the Department will notify the covered facility as 
to whether the covered facility must submit a revised Security 
Vulnerability Assessment, Site Security Plan, or both.

[72 FR 17729, Apr. 9, 2007, as amended at 72 FR 65420, Nov. 20, 2007; 86 
FR 41891, Aug. 4, 2021]



Sec.  27.215  Security vulnerability assessments.

    (a) Initial assessment. If the Executive Assistant Director 
determines that a chemical facility is high risk, the facility must 
complete a Security Vulnerability Assessment. A Security Vulnerability 
Assessment shall include:
    (1) Asset Characterization, which includes the identification and 
characterization of potential critical assets; identification of hazards 
and consequences of concern for the facility, its surroundings, its 
identified critical asset(s), and its supporting infrastructure; and 
identification of existing layers of protection;
    (2) Threat Assessment, which includes a description of possible 
internal threats, external threats, and internally-assisted threats;
    (3) Security Vulnerability Analysis, which includes the 
identification of potential security vulnerabilities and the 
identification of existing countermeasures and their level of 
effectiveness in both reducing identified vulnerabilities and in meeting 
the applicable risk-based performance standards;
    (4) Risk Assessment, including a determination of the relative 
degree of risk to the facility in terms of the expected effect on each 
critical asset and the likelihood of a success of an attack; and
    (5) Countermeasures Analysis, including strategies that reduce the 
probability of a successful attack or reduce the probable degree of 
success, strategies that enhance the degree of risk reduction, the 
reliability and maintainability of the options, the capabilities and 
effectiveness of mitigation options, and the feasibility of the options.
    (b) Except as provided in Sec.  27.235, a covered facility must 
complete the Security Vulnerability Assessment through the CSAT process, 
or through any other methodology or process identified or issued by the 
Executive Assistant Director.
    (c) Covered facilities must submit a Security Vulnerability 
Assessment to the Department in accordance with the schedule provided in 
Sec.  27.210.
    (d) Updates and revisions. (1) A covered facility must update and 
revise its

[[Page 235]]

Security Vulnerability Assessment in accordance with the schedule 
provided in Sec.  27.210.
    (2) Notwithstanding paragraph (d)(1) of this section, a covered 
facility must update, revise, or otherwise alter its Security 
Vulnerability Assessment to account for new or differing modes of 
potential terrorist attack or for other security-related reasons, if 
requested by the Executive Assistant Director.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41891, Aug. 4, 2021]



Sec.  27.220  Tiering.

    (a) Preliminary determination of risk-based tiering. Based on the 
information the Department receives in accordance with Sec. Sec.  27.200 
and 27.205 (including information submitted through the Top-Screen 
process) and following its initial determination in Sec.  27.205(a) that 
a facility presents a high level of security risk, the Department shall 
notify a facility of the Department's preliminary determination of the 
facility's placement in a risk-based tier.
    (b) Confirmation or alteration of risk-based tiering. Following 
review of a covered facility's Security Vulnerability Assessment, the 
Executive Assistant Director shall notify the covered facility of its 
final placement within a risk-based tier, or for covered facilities 
previously notified of a preliminary tiering, confirm or alter such 
tiering.
    (c) The Department shall place covered facilities in one of four 
risk-based tiers, ranging from highest risk facilities in Tier 1 to 
lowest risk facilities in Tier 4.
    (d) The Executive Assistant Director may provide the facility with 
guidance regarding the risk-based performance standards and any other 
necessary guidance materials applicable to its assigned tier.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41892, Aug. 4, 2021]



Sec.  27.225  Site security plans.

    (a) The Site Security Plan must meet the following standards:
    (1) Address each vulnerability identified in the facility's Security 
Vulnerability Assessment, and identify and describe the security 
measures to address each such vulnerability;
    (2) Identify and describe how security measures selected by the 
facility will address the applicable risk-based performance standards 
and potential modes of terrorist attack including, as applicable, 
vehicle-borne explosive devices, water-borne explosive devices, ground 
assault, or other modes or potential modes identified by the Department;
    (3) Identify and describe how security measures selected and 
utilized by the facility will meet or exceed each applicable performance 
standard for the appropriate risk-based tier for the facility; and
    (4) Specify other information the Executive Assistant Director deems 
necessary regarding chemical facility security.
    (b) Except as provided in Sec.  27.235, a covered facility must 
complete the Site Security Plan through the CSAT process, or through any 
other methodology or process identified or issued by the Executive 
Assistant Director.
    (c) Covered facilities must submit a Site Security Plan to the 
Department in accordance with the schedule provided in Sec.  27.210.
    (d) Updates and revisions. (1) When a covered facility updates, 
revises, or otherwise alters its Security Vulnerability Assessment 
pursuant to Sec.  27.215(d), the covered facility shall make 
corresponding changes to its Site Security Plan.
    (2) A covered facility must also update and revise its Site Security 
Plan in accordance with the schedule in Sec.  27.210.
    (e) A covered facility must conduct an annual audit of its 
compliance with its Site Security Plan.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41892, Aug. 4, 2021]



Sec.  27.230  Risk-based performance standards.

    (a) Covered facilities must satisfy the performance standards 
identified in this section. The Executive Assistant Director will issue 
guidance on the application of these standards to risk-based tiers of 
covered facilities, and the acceptable layering of measures used to meet 
these standards will vary by risk-based tier. Each covered facility must 
select, develop in their Site

[[Page 236]]

Security Plan, and implement appropriately risk-based measures designed 
to satisfy the following performance standards:
    (1) Restrict area perimeter. Secure and monitor the perimeter of the 
facility;
    (2) Secure site assets. Secure and monitor restricted areas or 
potentially critical targets within the facility;
    (3) Screen and control access. Control access to the facility and to 
restricted areas within the facility by screening and/or inspecting 
individuals and vehicles as they enter, including,
    (i) Measures to deter the unauthorized introduction of dangerous 
substances and devices that may facilitate an attack or actions having 
serious negative consequences for the population surrounding the 
facility; and
    (ii) Measures implementing a regularly updated identification system 
that checks the identification of facility personnel and other persons 
seeking access to the facility and that discourages abuse through 
established disciplinary measures;
    (4) Deter, detect, and delay. Deter, detect, and delay an attack, 
creating sufficient time between detection of an attack and the point at 
which the attack becomes successful, including measures to:
    (i) Deter vehicles from penetrating the facility perimeter, gaining 
unauthorized access to restricted areas or otherwise presenting a hazard 
to potentially critical targets;
    (ii) Deter attacks through visible, professional, well maintained 
security measures and systems, including security personnel, detection 
systems, barriers and barricades, and hardened or reduced value targets;
    (iii) Detect attacks at early stages, through countersurveillance, 
frustration of opportunity to observe potential targets, surveillance 
and sensing systems, and barriers and barricades; and
    (iv) Delay an attack for a sufficient period of time so to allow 
appropriate response through on-site security response, barriers and 
barricades, hardened targets, and well-coordinated response planning;
    (5) Shipping, receipt, and storage. Secure and monitor the shipping, 
receipt, and storage of hazardous materials for the facility;
    (6) Theft and diversion. Deter theft or diversion of potentially 
dangerous chemicals;
    (7) Sabotage. Deter insider sabotage;
    (8) Cyber. Deter cyber sabotage, including by preventing 
unauthorized onsite or remote access to critical process controls, such 
as Supervisory Control and Data Acquisition (SCADA) systems, Distributed 
Control Systems (DCS), Process Control Systems (PCS), Industrial Control 
Systems (ICS), critical business system, and other sensitive 
computerized systems;
    (9) Response. Develop and exercise an emergency plan to respond to 
security incidents internally and with assistance of local law 
enforcement and first responders;
    (10) Monitoring. Maintain effective monitoring, communications and 
warning systems, including,
    (i) Measures designed to ensure that security systems and equipment 
are in good working order and inspected, tested, calibrated, and 
otherwise maintained;
    (ii) Measures designed to regularly test security systems, note 
deficiencies, correct for detected deficiencies, and record results so 
that they are available for inspection by the Department; and
    (iii) Measures to allow the facility to promptly identify and 
respond to security system and equipment failures or malfunctions;
    (11) Training. Ensure proper security training, exercises, and 
drills of facility personnel;
    (12) Personnel surety. Perform appropriate background checks on and 
ensure appropriate credentials for facility personnel, and as 
appropriate, for unescorted visitors with access to restricted areas or 
critical assets, including,
    (i) Measures designed to verify and validate identity;
    (ii) Measures designed to check criminal history;
    (iii) Measures designed to verify and validate legal authorization 
to work; and
    (iv) Measures designed to identify people with terrorist ties;

[[Page 237]]

    (13) Elevated threats. Escalate the level of protective measures for 
periods of elevated threat;
    (14) Specific threats, vulnerabilities, or risks. Address specific 
threats, vulnerabilities or risks identified by the Executive Assistant 
Director for the particular facility at issue;
    (15) Reporting of significant security incidents. Report significant 
security incidents to the Department and to local law enforcement 
officials;
    (16) Significant security incidents and suspicious activities. 
Identify, investigate, report, and maintain records of significant 
security incidents and suspicious activities in or near the site;
    (17) Officials and organization. Establish official(s) and an 
organization responsible for security and for compliance with these 
standards;
    (18) Records. Maintain appropriate records; and
    (19) Address any additional performance standards the Executive 
Assistant Director may specify.
    (b) [Reserved]

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41892, Aug. 4, 2021]



Sec.  27.235  Alternative security program.

    (a) Covered facilities may submit an Alternative Security Program 
(ASP) pursuant to the requirements of this section. The Executive 
Assistant Director may approve an ASP, in whole, in part, or subject to 
revisions or supplements, upon a determination that the ASP meets the 
requirements of this part and provides for an equivalent level of 
security to that established by this part.
    (1) A Tier 4 facility may submit an ASP in lieu of a Security 
Vulnerability Assessment, Site Security Plan, or both.
    (2) Tier 1, Tier 2, or Tier 3 facilities may submit an ASP in lieu 
of a Site Security Plan. Tier 1, Tier 2, and Tier 3 facilities may not 
submit an ASP in lieu of a Security Vulnerability Assessment.
    (b) The Department will provide notice to a covered facility about 
the approval or disapproval, in whole or in part, of an ASP, using the 
procedure specified in Sec.  27.240 if the ASP is intended to take the 
place of a Security Vulnerability Assessment or using the procedure 
specified in Sec.  27.245 if the ASP is intended to take the place of a 
Site Security Plan.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41892, Aug. 4, 2021]



Sec.  27.240  Review and approval of security vulnerability assessments.

    (a) Review and approval. The Department will review and approve in 
writing all Security Vulnerability Assessments that satisfy the 
requirements of Sec.  27.215, including ASPs submitted pursuant to Sec.  
27.235.
    (b) If a Security Vulnerability Assessment does not satisfy the 
requirements of Sec.  27.215, the Department will provide the facility 
with a written notification that includes a clear explanation of 
deficiencies in the Security Vulnerability Assessment. The facility 
shall then enter further consultations with the Department and resubmit 
a sufficient Security Vulnerability Assessment by the time specified in 
the written notification provided by the Department under this section. 
If the resubmitted Security Vulnerability Assessment does not satisfy 
the requirements of Sec.  27.215, the Department will provide the 
facility with written notification (including a clear explanation of 
deficiencies in the Security Vulnerability Assessment) of the 
Department's disapproval of the Security Vulnerability Assessment.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41892, Aug. 4, 2021]



Sec.  27.245  Review and approval of site security plans.

    (a) Review and approval. (1) The Department will review, and either 
approve or disapprove, all Site Security Plans that satisfy the 
requirements of Sec.  27.225, including ASPs submitted pursuant to Sec.  
27.235.
    (i) The Department will review Site Security Plans through a two-
step process. Upon receipt of the Site Security Plan from the covered 
facility, the Department will review the documentation and make a 
preliminary determination as to whether it satisfies the requirements of 
Sec.  27.225. If the Department finds that the requirements are 
satisfied, the Department will issue a Letter of Authorization to the 
covered facility.

[[Page 238]]

    (ii) Following issuance of the Letter of Authorization, the 
Department will inspect the covered facility in accordance with Sec.  
27.250 for purposes of determining compliance with the requirements of 
this part.
    (iii) If the Department approves the Site Security Plan in 
accordance with Sec.  27.250, the Department will issue a Letter of 
Approval to the facility, and the facility shall implement the approved 
Site Security Plan.
    (2) The Department will not disapprove a Site Security Plan 
submitted under this part based on the presence or absence of a 
particular security measure. The Department may disapprove a Site 
Security Plan that fails to satisfy the risk-based performance standards 
established in Sec.  27.230.
    (b) When the Department disapproves a preliminary Site Security Plan 
issued prior to inspection or a Site Security Plan following inspection, 
the Department will provide the facility with a written notification 
that includes a clear explanation of deficiencies in the Site Security 
Plan. The facility shall then enter further consultations with the 
Department and resubmit a sufficient Site Security Plan by the time 
specified in the written notification provided by the Department under 
this section. If the resubmitted Site Security Plan does not satisfy the 
requirements of Sec.  27.225, the Department will provide the facility 
with written notification (including a clear explanation of deficiencies 
in the Site Security Plan) of the Department's disapproval of the Site 
Security Plan.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41892, Aug. 4, 2021]



Sec.  27.250  Inspections and audits.

    (a) Authority. In order to assess compliance with the requirements 
of this part, authorized Department officials may enter, inspect, and 
audit the property, equipment, operations, and records of covered 
facilities.
    (b) Following preliminary approval of a Site Security Plan in 
accordance with Sec.  27.245, the Department will inspect the covered 
facility for purposes of determining compliance with the requirements of 
this part.
    (1) If after the inspection, the Department determines that the 
requirements of Sec.  27.225 have been met, the Department will issue a 
Letter of Approval to the covered facility.
    (2) If after the inspection, the Department determines that the 
requirements of Sec.  27.225 have not been met, the Department will 
proceed as directed by Sec.  27.245(b) in ``Review and Approval of Site 
Security Plans.''
    (c) Time and manner. Authorized Department officials will conduct 
audits and inspections at reasonable times and in a reasonable manner. 
The Department will provide covered facility owners and/or operators 
with 24-hour advance notice before inspections, except
    (1) If the Director or Executive Assistant Director determines that 
an inspection without such notice is warranted by exigent circumstances 
and approves such inspection; or
    (2) If any delay in conducting an inspection might be seriously 
detrimental to security, and the Associate Director for Chemical 
Security determines that an inspection without notice is warranted, and 
approves an inspector to conduct such inspection.
    (d) Inspectors. Inspections and audits are conducted by personnel 
duly authorized and designated for that purpose as ``inspectors'' by the 
Secretary or the Secretary's designee.
    (1) An inspector will, on request, present his or her credentials 
for examination, but the credentials may not be reproduced by the 
facility.
    (2) An inspector may administer oaths and receive affirmations, with 
the consent of any witness, in any matter.
    (3) An inspector may gather information by reasonable means 
including, but not limited to, interviews, statements, photocopying, 
photography, and video- and audio-recording. All documents, objects, and 
electronically stored information collected by each inspector during the 
performance of that inspector's duties shall be maintained for a 
reasonable period of time in the files of the Department of Homeland 
Security maintained for that facility or matter.
    (4) An inspector may request forthwith access to all records 
required to

[[Page 239]]

be kept pursuant to Sec.  27.255. An inspector shall be provided with 
the immediate use of any photocopier or other equipment necessary to 
copy any such record. If copies can not be provided immediately upon 
request, the inspector shall be permitted immediately to take the 
original records for duplication and prompt return.
    (e) Confidentiality. In addition to the protections provided under 
Chemical-terrorism Vulnerability Information in Sec.  27.400, 
information received in an audit or inspection under this section, 
including the identity of the persons involved in the inspection or who 
provide information during the inspection, shall remain confidential 
under the investigatory file exception, or other appropriate exception, 
to the public disclosure requirements of 5 U.S.C. 552.
    (f) Guidance. The Executive Assistant Director shall issue guidance 
identifying appropriate processes for such inspections, and specifying 
the type and nature of documentation that must be made available for 
review during inspections and audits.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41892, Aug. 4, 2021]



Sec.  27.255  Recordkeeping requirements.

    (a) Except as provided in Sec.  27.255(b), the covered facility must 
keep records of the activities as set out below for at least three years 
and make them available to the Department upon request. A covered 
facility must keep the following records:
    (1) Training. For training, the date and location of each session, 
time of day and duration of session, a description of the training, the 
name and qualifications of the instructor, a clear, legible list of 
attendees to include the attendee signature, at least one other unique 
identifier of each attendee receiving the training, and the results of 
any evaluation or testing;
    (2) Drills and exercises. For each drill or exercise, the date held, 
a description of the drill or exercise, a list of participants, a list 
of equipment (other than personal equipment) tested or employed in the 
exercise, the name(s) and qualifications of the exercise director, and 
any best practices or lessons learned, which may improve the Site 
Security Plan;
    (3) Incidents and breaches of security. Date and time of occurrence, 
location within the facility, a description of the incident or breach, 
the identity of the individual to whom it was reported, and a 
description of the response;
    (4) Maintenance, calibration, and testing of security equipment. The 
date and time, name and qualifications of the technician(s) doing the 
work, and the specific security equipment involved for each occurrence 
of maintenance, calibration, and testing;
    (5) Security threats. Date and time of occurrence, how the threat 
was communicated, who received or identified the threat, a description 
of the threat, to whom it was reported, and a description of the 
response;
    (6) Audits. For each audit of a covered facility's Site Security 
Plan (including each audit required under Sec.  27.225(e)) or Security 
Vulnerability Assessment, a record of the audit, including the date of 
the audit, results of the audit, name(s) of the person(s) who conducted 
the audit, and a letter certified by the covered facility stating the 
date the audit was conducted; and
    (7) Letters of Authorization and Approval. All Letters of 
Authorization and Approval from the Department, and documentation 
identifying the results of audits and inspections conducted pursuant to 
Sec.  27.250.
    (b) A covered facility must retain records of submitted Top-Screens, 
Security Vulnerability Assessments, Site Security Plans, and all related 
correspondence with the Department for at least six years and make them 
available to the Department upon request.
    (c) To the extent necessary for security purposes, the Department 
may request that a covered facility make available records kept pursuant 
to other Federal programs or regulations.
    (d) Records required by this section may be kept in electronic 
format. If kept in an electronic format, they must be protected against 
unauthorized access, deletion, destruction, amendment, and disclosure.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41892, Aug. 4, 2021]

[[Page 240]]



                   Subpart C_Orders and Adjudications



Sec.  27.300  Orders.

    (a) Orders generally. When the Executive Assistant Director 
determines that a facility is in violation of any of the requirements of 
this part, the Executive Assistant Director may take appropriate action 
including the issuance of an appropriate Order.
    (b) Orders Assessing Civil Penalty and Orders to Cease Operations. 
(1) Where the Executive Assistant Director determines that a facility is 
in violation of an Order issued pursuant to paragraph (a) of this 
section, the Executive Assistant Director may enter an Order Assessing 
Civil Penalty, Order to Cease Operations, or both.
    (2) Following the issuance of an Order by the Executive Assistant 
Director pursuant to paragraph (b)(1) of this section, the facility may 
enter further consultations with the Department.
    (3) Where the Executive Assistant Director determines that a 
facility is in violation of an Order issued pursuant to paragraph (a) of 
this section and issues an Order Assessing Civil Penalty pursuant to 
paragraph (b)(1) of this section, a chemical facility is liable to the 
United States for a civil penalty of not more than $25,000 for each day 
during which the violation continues, if the violation of the Order 
occurred on or before November 2, 2015, or $41,093 for each day during 
which the violation of the Order continues, if the violation occurred 
after November 2, 2015.
    (c) Procedures for Orders. (1) At a minimum, an Order shall be 
signed by the Executive Assistant Director, shall be dated, and shall 
include:
    (i) The name and address of the facility in question;
    (ii) A listing of the provision(s) that the facility is alleged to 
have violated;
    (iii) A statement of facts upon which the alleged instances of 
noncompliance are based;
    (iv) A clear explanation of deficiencies in the facility's chemical 
security program, including, if applicable, any deficiencies in the 
facility's Security Vulnerability Assessment, Site Security Plan, or 
both;
    (v) A statement indicating what action(s) the facility must take to 
remedy the instance(s) of noncompliance; and
    (vi) The date by which the facility must comply with the terms of 
the Order.
    (2) The Executive Assistant Director may establish procedures for 
the issuance of Orders.
    (d) A facility must comply with the terms of the Order by the date 
specified in the Order unless the facility has filed a timely Notice of 
Application for Review under Sec.  27.310.
    (e) Where a facility or other person contests the determination of 
the Executive Assistant Director to issue an Order, a chemical facility 
may seek an adjudication pursuant to Sec.  27.310.
    (f) An Order issued under this section becomes final agency action 
when the time to file a Notice of Application for Review under Sec.  
27.310 has passed without such a filing or upon the conclusion of 
adjudication or appeal proceedings under this subpart.

[72 FR 17729, Apr. 9, 2007, as amended at 81 FR 43001, July 1, 2016; 82 
FR 8579, Jan. 27, 2017; 83 FR 13834, Apr. 2, 2018; 84 FR 13508, Apr. 5, 
2019; 85 FR 36478, June 17, 2020; 86 FR 41892, Aug. 4, 2021; 86 FR 
57539, Oct. 18, 2021; 87 FR 1326, Jan. 11, 2022; 88 FR 2182, Jan. 13, 
2023]



Sec.  27.305  Neutral adjudications.

    (a) Any facility or other person who has received a Finding pursuant 
to Sec.  27.230(a)(12)(iv), a Determination pursuant to Sec.  27.245(b), 
or an Order pursuant to Sec.  27.300 is entitled to an adjudication, by 
a neutral adjudications officer, of any issue of material fact relevant 
to any administrative action that deprives that person of a cognizable 
interest in liberty or property.
    (b) A neutral adjudications officer appointed pursuant to Sec.  
27.315 shall issue an Initial Decision on any material factual issue 
related to a Finding pursuant to Sec.  27.230(a)(12)(iv), a 
Determination pursuant to Sec.  27.245, or an Order pursuant to Sec.  
27.300 before any such administrative action is reviewed on appeal 
pursuant to Sec.  27.345.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41892, Aug. 4, 2021]

[[Page 241]]



Sec.  27.310  Commencement of adjudication proceedings.

    (a) Proceedings instituted by facilities or other persons. A 
facility or other person may institute proceedings to review a 
determination by the Executive Assistant Director:
    (1) Finding, pursuant to the Sec.  27.230(a)(12)(iv), that an 
individual is a potential security threat;
    (2) Disapproving a Site Security Plan pursuant to Sec.  27.245(b); 
or
    (3) Issuing an Order pursuant to Sec.  27.300(a) or (b).
    (b) Procedure for applications by facilities or other persons. A 
facility or other person may institute Proceedings by filing a Notice of 
Application for Review specifying that the facility or other person 
requests a Proceeding to review a determination specified in paragraph 
(a) of this section.
    (1) An Applicant institutes a Proceeding by filing a Notice of 
Application for Review.
    (2) An Applicant must file a Notice of Application for Review within 
seven calendar days of notification to the facility or other person of 
the Executive Assistant Director's Finding, Determination, or Order.
    (3) The Applicant shall file and simultaneously serve each Notice of 
Application for Review and all subsequent filings on the Executive 
Assistant Director and the Office of the Chief Counsel.
    (4) An Order is stayed from the timely filing of a Notice of 
Application for Review until the Presiding Officer issues an Initial 
Decision, unless the Secretary has lifted the stay due to exigent 
circumstances pursuant to paragraph (d) of this section.
    (5) The Applicant shall file and serve an Application for Review 
within 14 calendar days of the notification to the facility or other 
person of the Executive Assistant Director's Finding, Determination, or 
Order.
    (6) Each Application for Review shall be accompanied by all legal 
memoranda, other documents, declarations, affidavits, and other evidence 
supporting the position asserted by the Applicant.
    (c) Response. The Executive Assistant Director, through the Office 
of the Chief Counsel, shall file and serve a Response, accompanied by 
all legal memoranda, other documents, declarations, affidavits, and 
other evidence supporting the position asserted by the Executive 
Assistant Director within 14 calendar days of the filing and service of 
the Application for Review and all supporting papers.
    (d) Procedural modifications. The Secretary may, in exigent 
circumstances (as determined in his or her sole discretion):
    (1) Lift any stay applicable to any Order under Sec.  27.300;
    (2) Modify the time for a response;
    (3) Rule on the sufficiency of Applications for Review; or
    (4) Otherwise modify these procedures with respect to particular 
matters.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41892, Aug. 4, 2021]



Sec.  27.315  Presiding officers for proceedings.

    (a) Immediately upon the filing of any Application for Review, the 
Secretary shall appoint an attorney, who is employed by the Department 
and who has not performed any investigative or prosecutorial function 
with respect to the matter, to act as a neutral adjudications officer or 
Presiding Officer for the compilation of a factual record and the 
recommendation of an Initial Decision for each Proceeding.
    (b) Notwithstanding paragraph (a) of this section, the Secretary may 
appoint one or more attorneys who are employed by the Department and who 
do not perform any investigative or prosecutorial function with respect 
to this subpart, to serve, generally, in the capacity as Presiding 
Officer(s) for such matters pursuant to such procedures as the Secretary 
may hereafter establish.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41892, Aug. 4, 2021]



Sec.  27.320  Prohibition on ex parte communications during proceedings.

    (a) At no time after the designation of a Presiding Officer for a 
Proceeding and prior to the issuance of a Final Decision pursuant to 
Sec.  27.345 with respect to a facility or other person, shall the 
appointed Presiding Officer, or any person who will advise that official 
in the

[[Page 242]]

decision on the matter, discuss ex parte the merits of the proceeding 
with any interested person outside the Department, with any Department 
official who performs a prosecutorial or investigative function in such 
proceeding or a factually related proceeding, or with any representative 
of such person.
    (b) If, after appointment of a Presiding Officer and prior to the 
issuance of a Final Decision pursuant to Sec.  27.345 with respect to a 
facility or other person, the appointed Presiding Officer, or any person 
who will advise that official in the decision on the matter, receives 
from or on behalf of any party, by means of an ex parte communication, 
information that is relevant to the decision of the matter and to which 
other parties have not had an opportunity to respond, a summary of such 
information shall be served on all other parties, who shall have an 
opportunity to reply to the ex parte communication within a time set by 
the Presiding Officer.
    (c) The consideration of classified information or CVI pursuant to 
an in camera procedure does not constitute a prohibited ex parte 
communication for purposes of this subpart.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41892, Aug. 4, 2021]



Sec.  27.325  Burden of proof.

    The Executive Assistant Director bears the initial burden of proving 
the facts necessary to support the challenged administrative action at 
every proceeding instituted under this subpart.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41892, Aug. 4, 2021]



Sec.  27.330  Summary decision procedures.

    (a) The Presiding Officer appointed for each Proceeding shall 
immediately consider whether the summary adjudication of the Application 
for Review is appropriate based on the Application for Review, the 
Response, and all the supporting filings of the parties pursuant to 
Sec. Sec.  27.310(b)(5) and 27.310(c).
    (1) The Presiding Officer shall promptly issue any necessary 
scheduling order for any additional briefing of the issue of summary 
adjudication on the Application for Review and Response.
    (2) The Presiding Officer may conduct scheduling conferences and 
other proceedings that the Presiding Officer determines to be 
appropriate.
    (b) If the Presiding Officer determines that there is no genuine 
issue of material fact and that one party or the other is entitled to a 
decision as a matter of law, then the record shall be closed and the 
Presiding Officer shall issue an Initial Decision on the Application for 
Review pursuant to Sec.  27.340.
    (c) If a Presiding Officer determines that any factual issues 
require the cross-examination of one or more witnesses or other 
proceedings at a hearing, the Presiding Officer, in consultation with 
the parties, shall promptly schedule a hearing to be conducted pursuant 
to Sec.  27.335.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41892, Aug. 4, 2021]



Sec.  27.335  Hearing procedures.

    (a) Any hearing shall be held as expeditiously as possible at the 
location most conducive to a prompt presentation of any necessary 
testimony or other proceedings.
    (1) Videoconferencing and teleconferencing may be used where 
appropriate at the discretion of the Presiding Officer.
    (2) Each party offering the affirmative testimony of a witness shall 
present that testimony by declaration, affidavit, or other sworn 
statement submitted in advance as ordered by the Presiding Officer.
    (3) Any witness presented for further examination shall be asked to 
testify under an oath or affirmation.
    (4) The hearing shall be recorded verbatim.
    (b)(1) A facility or other person may appear and be heard on his or 
her own behalf or through any counsel of his or her choice who is 
qualified to possess CVI.
    (2) A facility or other person individually, or through counsel, may 
offer relevant and material information including written direct 
testimony, which he or she believes should be considered in opposition 
to the administrative action, or which may bear on the sanction being 
sought.

[[Page 243]]

    (3) The facility or other person individually, or through counsel, 
may conduct such cross-examination as may be specifically allowed by the 
Presiding Officer for a full determination of the facts.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41892, Aug. 4, 2021]



Sec.  27.340  Completion of adjudication proceedings.

    (a) The Presiding Officer shall close and certify the record of the 
adjudication promptly upon the completion of:
    (1) Summary judgment proceedings,
    (2) A hearing, if necessary,
    (3) The submission of post hearing briefs, if any are ordered by the 
Presiding Officer, and
    (4) The conclusion of oral arguments, if any are permitted by the 
Presiding Officer.
    (b) The Presiding Officer shall issue an Initial Decision based on 
the certified record, and the decision shall be subject to appeal 
pursuant to Sec.  27.345.
    (c) An Initial Decision shall become a final agency action on the 
expiration of the time for an Appeal pursuant to Sec.  27.345.



Sec.  27.345  Appeals.

    (a) Right to appeal. A facility or any person who has received an 
Initial Decision under Sec.  27.340(b) has the right to appeal to the 
Director acting as a neutral appeals officer.
    (b) Procedure for appeals. (1) The Executive Assistant Director, a 
facility or other person, or a representative on behalf of a facility or 
person, may institute an Appeal by filing a Notice of Appeal with the 
office of the Department hereinafter designated by the Secretary.
    (2) The Executive Assistant Director, a facility, or other person 
must file a Notice of Appeal within seven calendar days of the service 
of the Presiding Officer's Initial Decision.
    (3) The Appellant shall file with the designated office and 
simultaneously serve each Notice of Appeal and all subsequent filings on 
the Office of the Chief Counsel.
    (4) An Initial Decision is stayed from the timely filing of a Notice 
of Appeal until the Director issues a Final Decision, unless the 
Secretary lifts the stay due to exigent circumstances pursuant to Sec.  
27.310(d).
    (5) The Appellant shall file and serve a Brief within 28 calendar 
days of the notification of the service of the Presiding Officer's 
Initial Decision.
    (6) The Appellee shall file and serve its Opposition Brief within 28 
calendar days of the service of the Appellant's Brief.
    (c) The Director may provide for an expedited appeal for appropriate 
matters.
    (d) Ex parte communications. (1) At no time after the filing of a 
Notice of Appeal pursuant to paragraph (b)(1) of this section and prior 
to the issuance of a Final Decision on an Appeal pursuant to paragraph 
(f) of this section with respect to a facility or other person shall the 
Director, his or her designee, or any person who will advise that 
official in the decision on the matter, discuss ex parte the merits of 
the proceeding with any interested person outside the Department, with 
any Department official who performs a prosecutorial or investigative 
function in such proceeding or a factually related proceeding, or with 
any representative of such person.
    (2) If, after the filing of a Notice of Appeal pursuant to paragraph 
(b)(1) of this section and prior to the issuance of a Final Decision on 
an Appeal pursuant to paragraph (f) of this section with respect to a 
facility or other person, the Director, his or her designee, or any 
person who will advise that official in the decision on the matter, 
receives from or on behalf of any party, by means of an ex parte 
communication, information that is relevant to the decision of the 
matter and to which other parties have not had an opportunity to 
respond, a summary of such information shall be served on all other 
parties, who shall have an opportunity to reply to the ex parte 
communication within a time set by the Director or his or her designee.
    (3) The consideration of classified information or CVI pursuant to 
an in camera procedure does not constitute a prohibited ex parte 
communication for purposes of this subpart.
    (e) A facility or other person may elect to have the Director 
participate in any mediation or other resolution

[[Page 244]]

process by expressly waiving, in writing, any argument that such 
participation has compromised the Appeal process.
    (f) The Director shall issue a Final Decision and serve it upon the 
parties. A Final Decision made by the Director constitutes final agency 
action.
    (g) The Secretary may establish procedures for the conduct of 
Appeals pursuant to this section.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41893, Aug. 4, 2021]



                             Subpart D_Other



Sec.  27.400  Chemical-terrorism vulnerability information.

    (a) Applicability. This section governs the maintenance, 
safeguarding, and disclosure of information and records that constitute 
Chemical-terrorism Vulnerability Information (CVI), as defined in Sec.  
27.400(b). The Secretary shall administer this section consistent with 6 
U.S.C. 621 et seq., including appropriate sharing with Federal, State, 
and local officials.
    (b) Chemical-terrorism vulnerability information. In accordance with 
6 U.S.C. 623, the following information, whether transmitted verbally, 
electronically, or in written form, shall constitute CVI:
    (1) Security Vulnerability Assessments under Sec.  27.215;
    (2) Site Security Plans under Sec.  27.225;
    (3) Documents relating to the Department's review and approval of 
Security Vulnerability Assessments and Site Security Plans, including 
Letters of Authorization, Letters of Approval, and responses thereto; 
written notices; and other documents developed pursuant to Sec.  27.240 
or Sec.  27.245;
    (4) Alternative Security Programs under Sec.  27.235;
    (5) Documents relating to inspection or audits under Sec.  27.250;
    (6) Any records required to be created or retained under Sec.  
27.255;
    (7) Sensitive portions of orders, notices, or letters under Sec.  
27.300;
    (8) Information developed pursuant to Sec. Sec.  27.200 and 27.205; 
and
    (9) Other information developed for chemical facility security 
purposes that the Secretary, in his or her discretion, determines is 
similar to the information protected in Sec.  27.400(b)(1) through (8) 
and thus warrants protection as CVI.
    (c) Covered persons. Persons subject to the requirements of this 
section are:
    (1) Each person who has a need to know CVI, as specified in Sec.  
27.400(e); and
    (2) Each person who otherwise receives or gains access to what they 
know or should reasonably know constitutes CVI.
    (d) Duty to protect information. A covered person must:
    (1) Take reasonable steps to safeguard CVI in that person's 
possession or control, including electronic data, from unauthorized 
disclosure. When a person is not in physical possession of CVI, the 
person must store it in a secure container, such as a safe, that limits 
access only to covered persons with a need to know;
    (2) Disclose, or otherwise provide access to, CVI only to persons 
who have a need to know;
    (3) Refer requests for CVI by persons without a need to know to the 
Executive Assistant Director;
    (4) Mark CVI as specified in Sec.  27.400(f);
    (5) Dispose of CVI as specified in Sec.  27.400(k);
    (6) If a covered person receives a record or verbal transmission 
containing CVI that is not marked as specified in Sec.  27.400(f), the 
covered person must:
    (i) Mark the record as specified in Sec.  27.400(f) of this section; 
and
    (ii) Inform the sender of the record that the record must be marked 
as specified in Sec.  27.400(f); or
    (iii) If received verbally, make reasonable efforts to memorialize 
such information and mark the memorialized record as specified in Sec.  
27.400(f) of this section, and inform the speaker of any determination 
that such information warrants CVI protection.
    (7) When a covered person becomes aware that CVI has been released 
to persons without a need to know (including a covered person under 
Sec.  27.400(c)(2)), the covered person must promptly inform the 
Executive Assistant Director; and
    (8) In the case of information that is CVI and also has been 
designated as Protected Critical Infrastructure Information under 6 
U.S.C. 133, any covered

[[Page 245]]

person in possession of such information must comply with the disclosure 
restrictions and other requirements applicable to such information under 
6 U.S.C. 133 and any implementing regulations.
    (e) Need to know. (1) A person, including a State or local official, 
has a need to know CVI in each of the following circumstances:
    (i) When the person requires access to specific CVI to carry out 
chemical facility security activities approved, accepted, funded, 
recommended, or directed by the Department.
    (ii) When the person needs the information to receive training to 
carry out chemical facility security activities approved, accepted, 
funded, recommended, or directed by the Department.
    (iii) When the information is necessary for the person to supervise 
or otherwise manage individuals carrying out chemical facility security 
activities approved, accepted, funded, recommended, or directed by the 
Department.
    (iv) When the person needs the information to provide technical or 
legal advice to a covered person, who has a need to know the 
information, regarding chemical facility security requirements of 
Federal law.
    (v) When the Department determines that access is required under 
Sec.  27.400(h) or Sec.  27.400(i) in the course of a judicial or 
administrative proceeding.
    (2) Federal employees, contractors, and grantees. (i) A Federal 
employee has a need to know CVI if access to the information is 
necessary for performance of the employee's official duties.
    (ii) A person acting in the performance of a contract with or grant 
from the Department has a need to know CVI if access to the information 
is necessary to performance of the contract or grant. Contractors or 
grantees may not further disclose CVI without the consent of the 
Executive Assistant Director.
    (iii) The Department may require that non-Federal persons seeking 
access to CVI complete a non-disclosure agreement before such access is 
granted.
    (3) Background check. The Department may make an individual's access 
to the CVI contingent upon satisfactory completion of a security 
background check or other procedures and requirements for safeguarding 
CVI that are satisfactory to the Department.
    (4) Need to know further limited by the Department. For some 
specific CVI, the Department may make a finding that only specific 
persons or classes of persons have a need to know.
    (5) Nothing in Sec.  27.400(e) shall prevent the Department from 
determining, in its discretion, that a person not otherwise listed in 
Sec.  27.400(e) has a need to know CVI in a particular circumstance.
    (f) Marking of paper records. (1) In the case of paper records 
containing CVI, a covered person must mark the record by placing the 
protective marking conspicuously on the top, and the distribution 
limitation statement on the bottom, of:
    (i) The outside of any front and back cover, including a binder 
cover or folder, if the document has a front and back cover;
    (ii) Any title page; and
    (iii) Each page of the document.
    (2) Protective markings. The protective marking is: CHEMICAL-
TERRORISM VULNERABILITY INFORMATION.
    (3) Distribution limitation statement. The distribution limitation 
statement is: WARNING: This record contains Chemical-terrorism 
Vulnerability Information controlled by 6 CFR 27.400. Do not disclose to 
persons without a ``need to know'' in accordance with 6 CFR 27.400(e). 
Unauthorized release may result in civil penalties or other action. In 
any administrative or judicial proceeding, this information shall be 
treated as classified information in accordance with 6 CFR 27.400(h) and 
(i).
    (4) Other types of records. In the case of non-paper records that 
contain CVI, including motion picture films, videotape recordings, audio 
recordings, and electronic and magnetic records, a covered person must 
clearly and conspicuously mark the records with the protective marking 
and the distribution limitation statement such that the viewer or 
listener is reasonably likely to see or hear them when obtaining access 
to the contents of the record.

[[Page 246]]

    (g) Disclosure by the Department--(1) In general. Except as 
otherwise provided in this section, and notwithstanding the Freedom of 
Information Act (5 U.S.C. 552), the Privacy Act (5 U.S.C. 552a), and 
other laws, records containing CVI are not available for public 
inspection or copying, nor does the Department release such records to 
persons without a need to know.
    (2) Disclosure of Segregable Information under the Freedom of 
Information Act and the Privacy Act. If a record is marked to signify 
both CVI and information that is not CVI, the Department, on a proper 
Freedom of Information Act or Privacy Act request, may disclose the 
record with the CVI redacted, provided the record is not otherwise 
exempt from disclosure under the Freedom of Information Act or Privacy 
Act.
    (h) Disclosure in administrative enforcement proceedings. (1) The 
Department may provide CVI to a person governed by 6 U.S.C. 621 et seq., 
and his or her counsel, in the context of an administrative enforcement 
proceeding of 6 U.S.C. 621 et seq. when, in the sole discretion of the 
Department, as appropriate, access to the CVI is necessary for the 
person to prepare a response to allegations contained in a legal 
enforcement action document issued by the Department.
    (2) Security background check. Prior to providing CVI to a person 
under Sec.  27.400(h)(1), the Department may require the individual or, 
in the case of an entity, the individuals representing the entity, and 
their counsel, to undergo and satisfy, in the judgment of the 
Department, a security background check.
    (i) Disclosure in judicial proceedings. (1) In any judicial 
enforcement proceeding of 6 U.S.C. 621 et seq., the Secretary, in his or 
her sole discretion, may, subject to Sec.  27.400(i)(1)(i), authorize 
access to CVI for persons necessary for the conduct of such proceedings, 
including such persons' counsel, provided that no other persons not so 
authorized shall have access to or be present for the disclosure of such 
information.
    (i) Security background check. Prior to providing CVI to a person 
under Sec.  27.400(i)(1), the Department may require the individual to 
undergo and satisfy, in the judgment of the Department, a security 
background check.
    (ii) [Reserved]
    (2) In any judicial enforcement proceeding under 6 U.S.C. 621 et 
seq. where a person seeks to disclose CVI to a person not authorized to 
receive it under paragraph (i)(1) of this section, or where a person not 
authorized to receive CVI under paragraph (i)(1) of this section seeks 
to compel its disclosure through discovery, the United States may make 
an ex parte application in writing to the court seeking authorization 
to:
    (i) Redact specified items of CVI from documents to be introduced 
into evidence or made available to the defendant through discovery under 
the Federal Rules of Civil Procedure;
    (ii) Substitute a summary of the information for such CVI; or
    (iii) Substitute a statement admitting relevant facts that the CVI 
would tend to prove.
    (3) The court shall grant a request under paragraph (i)(2) of this 
section if, after in camera review, the court finds that the redacted 
item, stipulation, or summary is sufficient to allow the defendant to 
prepare a defense.
    (4) If the court enters an order granting a request under paragraph 
(i)(2) of this section, the entire text of the documents to which the 
request relates shall be sealed and preserved in the records of the 
court to be made available to the appellate court in the event of an 
appeal.
    (5) If the court enters an order denying a request of the United 
States under paragraph (i)(2) of this section, the United States may 
take an immediate, interlocutory appeal of the court's order in 
accordance with 18 U.S.C. 2339B(f)(4), (5). For purposes of such an 
appeal, the entire text of the documents to which the request relates, 
together with any transcripts of arguments made ex parte to the court in 
connection therewith, shall be maintained under seal and delivered to 
the appellate court.
    (6) Except as provided otherwise at the sole discretion of the 
Secretary, access to CVI shall not be available in any civil or criminal 
litigation unrelated to the enforcement under 6 U.S.C. 621 et seq..

[[Page 247]]

    (7) Taking of trial testimony--(i) Objection. During the examination 
of a witness in any judicial proceeding, the United States may object to 
any question or line of inquiry that may require the witness to disclose 
CVI not previously found to be admissible.
    (ii) Action by court. In determining whether a response is 
admissible, the court shall take precautions to guard against the 
compromise of any CVI, including--
    (A) Permitting the United States to provide the court, ex parte, 
with a proffer of the witness's response to the question or line of 
inquiry; and
    (B) Requiring the defendant to provide the court with a proffer of 
the nature of the information that the defendant seeks to elicit.
    (iii) Obligation of defendant. In any judicial enforcement 
proceeding, it shall be the defendant's obligation to establish the 
relevance and materiality of any CVI sought to be introduced.
    (8) Construction. Nothing in this subsection shall prevent the 
United States from seeking protective orders or asserting privileges 
ordinarily available to the United States to protect against the 
disclosure of classified information, including the invocation of the 
military and State secrets privilege.
    (j) Consequences of violation. Violation of this section is grounds 
for a civil penalty and other enforcement or corrective action by the 
Department, and appropriate personnel actions for Federal employees. 
Corrective action may include issuance of an order requiring retrieval 
of CVI to remedy unauthorized disclosure or an order to cease future 
unauthorized disclosure.
    (k) Destruction of CVI. (1) The Department of Homeland Security. 
Subject to the requirements of the Federal Records Act (codified at 44 
U.S.C. 3101 et seq. and 3301 et seq.), including the duty to preserve 
records containing documentation of a Federal agency's policies, 
decisions, and essential transactions, the Department destroys CVI when 
no longer needed to carry out the agency's function.
    (2) Other covered persons--(i) In general. A covered person must 
destroy CVI completely to preclude recognition or reconstruction of the 
information when the covered person no longer needs the CVI to carry out 
security measures under paragraph (e) of this section.
    (ii) Exception. Section 27.400(k)(2) does not require a State or 
local government agency to destroy information that the agency is 
required to preserve under State or local law.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41893, Aug. 4, 2021]



Sec.  27.405  Review and preemption of State laws and regulations.

    (a) As per current law, no law, regulation, or administrative action 
of a State or political subdivision thereof, or any decision or order 
rendered by a court under State law, shall have any effect if such law, 
regulation, or decision conflicts with, hinders, poses an obstacle to, 
or frustrates the purposes of this regulation or of any approval, 
disapproval, or order issued there under.
    (1) Nothing in this part is intended to displace other federal 
requirements administered by the Environmental Protection Agency, U.S. 
Department of Justice, U.S. Department of Labor, U.S. Department of 
Transportation, or other federal agencies.
    (2) [Reserved]
    (b) State law, regulation, or administrative action defined. For 
purposes of this section, the phrase ``State law, regulation, or 
administrative action'' means any enacted law, promulgated regulation, 
ordinance, administrative action, order, decision, or common law 
standard of a State or any of its political subdivisions.
    (c) Submission for review. Any chemical facility covered by these 
regulations and any State may petition the Department by submitting a 
copy of a State law, regulation, administrative action, decision, or 
order of a court for review under this section.
    (d) Review and opinion--(1) Review. The Department may review State 
laws, administrative actions, opinions, or orders of a court under State 
law and regulations submitted under this section, and may offer an 
opinion whether the application or enforcement of the State law or 
regulation would conflict with, hinder, pose an obstacle to, or 
frustrate the purposes of this part.

[[Page 248]]

    (2) Opinion. The Department may issue a written opinion on any 
question regarding preemption. If the question was submitted under 
subsection (c) of this part, the Executive Assistant Director will 
notify the affected chemical facility and the Attorney General of the 
subject State of any opinion under this section.
    (3) Consultation with States. In conducting a review under this 
section, the Department will seek the views of the State or local 
jurisdiction whose laws may be affected by the Department's review.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41893, Aug. 4, 2021]



Sec.  27.410  Third-party actions.

    (a) Nothing in this part shall confer upon any person except the 
Secretary a right of action, in law or equity, for any remedy including, 
but not limited to, injunctions or damages to enforce any provision of 
this part.
    (b) An owner or operator of a chemical facility may petition the 
Executive Assistant Director to provide the Department's view in any 
litigation involving any issues or matters regarding this part.

[72 FR 17729, Apr. 9, 2007, as amended at 86 FR 41894, Aug. 4, 2021]



[[Page 249]]



          Sec. Appendix A to Part 27--DHS Chemicals of Interest
[GRAPHIC] [TIFF OMITTED] TR20NO07.008


[[Page 250]]


[GRAPHIC] [TIFF OMITTED] TR20NO07.009


[[Page 251]]


[GRAPHIC] [TIFF OMITTED] TR20NO07.010


[[Page 252]]


[GRAPHIC] [TIFF OMITTED] TR20NO07.011


[[Page 253]]


[GRAPHIC] [TIFF OMITTED] TR20NO07.012


[[Page 254]]


[GRAPHIC] [TIFF OMITTED] TR20NO07.013


[[Page 255]]


[GRAPHIC] [TIFF OMITTED] TR20NO07.014


[[Page 256]]


[GRAPHIC] [TIFF OMITTED] TR20NO07.015


[[Page 257]]


[GRAPHIC] [TIFF OMITTED] TR20NO07.016


[[Page 258]]


[GRAPHIC] [TIFF OMITTED] TR20NO07.017


[[Page 259]]


[GRAPHIC] [TIFF OMITTED] TR20NO07.018


[[Page 260]]


[GRAPHIC] [TIFF OMITTED] TR20NO07.019


[[Page 261]]


[GRAPHIC] [TIFF OMITTED] TR20NO07.020


[[Page 262]]


[GRAPHIC] [TIFF OMITTED] TR20NO07.021


[72 FR 65420, Nov. 20, 2007]

[[Page 263]]



PART 29_PROTECTED CRITICAL INFRASTRUCTURE INFORMATION--Table of Contents



Sec.
29.1 Purpose and scope.
29.2 Definitions.
29.3 FOIA exemptions and restrictions on use of PCII.
29.4 PCII program administration.
29.5 Requirements for protection.
29.6 Acknowledgement of receipt, validation, and marking.
29.7 Safeguarding of PCII.
29.8 Disclosure of PCII.
29.9 Investigation and reporting of violation of PCII procedures.

    Authority: 6 U.S.C. 671-674; Section 2222-2225 of the Homeland 
Security Act of 2002, Pub. L. 107-296, 116 Stat. 2135, as amended by 
Subtitle B of the Cybersecurity and Infrastructure Security Act of 2018, 
Pub. L. 115-278, 132 Stat. 4184. 5 U.S.C. 301.

    Source: 71 FR 52271, Sept. 1, 2006, as amended at 87 FR 77972, Dec. 
21, 2022, unless otherwise noted.



Sec.  29.1  Purpose and scope.

    (a) Purpose of this part. This part implements the Critical 
Infrastructure Information Act of 2002 (CII Act) by establishing uniform 
procedures for the receipt, care, and storage of Critical Infrastructure 
Information voluntarily submitted to the Department of Homeland Security 
through CISA. Consistent with the statutory mission of DHS to prevent 
terrorist attacks within the United States and reduce the vulnerability 
of the United States to terrorism, CISA will encourage the voluntary 
submission of CII by safeguarding and protecting that information from 
unauthorized disclosure and by ensuring that such information is, as 
necessary, securely shared with State and Local governments pursuant to 
the CII Act. As required by the CII Act, this part establishes 
procedures regarding:
    (1) The acknowledgment of receipt by CISA of voluntarily submitted 
CII;
    (2) The receipt, validation, handling, storage, proper marking, and 
use of information as PCII;
    (3) The safeguarding and maintenance of the confidentiality of such 
information and appropriate sharing of such information with State and 
Local governments or government agencies pursuant to 6 U.S.C. 
673(a)(1)(E); and
    (4) The issuance of advisories, notices, and warnings related to the 
protection of critical infrastructure or protected systems in such a 
manner to protect, as appropriate, from unauthorized disclosure the 
source of critical infrastructure information that forms the basis of 
the warning, and any information that is proprietary or business 
sensitive, might be used to identify the submitting person or entity, or 
is otherwise not appropriately in the public domain.
    (b) Scope. This part applies to all persons and entities that are 
authorized to handle, use, store, or otherwise accept receipt of PCII.



Sec.  29.2  Definitions.

    For purposes of this part:
    Critical Infrastructure has the same meaning stated in 6 U.S.C. 
101(4) (which cross references the term used in 42 U.S.C. 5195c(e)) and 
means systems and assets, whether physical or virtual, so vital to the 
United States that the incapacity or destruction of such systems and 
assets would have a debilitating impact on security, national economic 
security, national public health or safety, or any combination of those 
matters.
    Critical Infrastructure Information or CII has the same meaning 
stated in 6 U.S.C. 671(1) and means information not customarily in the 
public domain and related to the security of critical infrastructure or 
protected systems, including documents, records or other information 
concerning:
    (1) Actual, potential, or threatened interference with, attack on, 
compromise of, or incapacitation of critical infrastructure or protected 
systems by either physical or computer-based attack or other similar 
conduct (including the misuse of or unauthorized access to all types of 
communications and data transmission systems) that violates Federal, 
State, or Local law, harms interstate commerce of the United States, or 
threatens public health or safety;
    (2) The ability of any critical infrastructure or protected system 
to resist such interference, compromise, or incapacitation, including 
any planned or

[[Page 264]]

past assessment, projection, or estimate of the vulnerability of 
critical infrastructure or a protected system, including security 
testing, risk evaluation thereto, risk-management planning, or risk 
audit; or
    (3) Any planned or past operational problem or solution regarding 
critical infrastructure or protected systems, including repair, 
recovery, reconstruction, insurance, or continuity, to the extent it is 
related to such interference, compromise, or incapacitation.
    CII Act means the Critical Infrastructure Information Act of 2002 in 
6 U.S.C. 671-674; Sections 2222-2225 of the Homeland Security Act of 
2002, Public Law 107-296, 116 Stat. 2135, as amended by Subtitle B of 
the Cybersecurity and Infrastructure Security Act of 2018, Public Law 
115-278, 132 Stat. 4168.
    CISA means the Cybersecurity and Infrastructure Security Agency.
    Department or DHS means the Department of Homeland Security.
    Director means the Director of the CISA, any successors to that 
position within the Department, or any designee.
    Executive Assistant Director means the Executive Assistant Director 
for the Infrastructure Security Division of the CISA, any successors to 
that position within the Department, or any designee.
    Information Sharing and Analysis Organization or ISAO has the same 
meaning stated in 6 U.S.C. 671(5) and means any formal or informal 
entity or collaboration created or employed by public or private sector 
organizations for purposes of:
    (1) Gathering and analyzing CII, including information related to 
cybersecurity risks and incidents, in order to better understand 
security problems and interdependencies related to critical 
infrastructure and protected systems, so as to ensure the availability, 
integrity, and reliability thereof;
    (2) Communicating or disclosing CII, including cybersecurity risks 
and incidents, to help prevent, detect, mitigate, or recover from the 
effects of an interference, compromise, or an incapacitation problem 
related to critical infrastructure or protected systems; and
    (3) Voluntarily disseminating CII, including cybersecurity risks and 
incidents, to its members, Federal, State, and Local governments, or any 
other entities that may be of assistance in carrying out the purposes 
specified in paragraphs (h)(1) and (2) of this section.
    In the public domain means information lawfully, properly, and 
regularly disclosed generally or broadly to the public. Information 
regarding system, facility, or operational security is not ``in the 
public domain.'' Information submitted with CII that is proprietary or 
business sensitive, or which might be used to identify a submitting 
person or entity will not be considered ``in the public domain.'' 
Information may be ``business sensitive'' for this purpose whether or 
not it is commercial in nature, and even if its release could not 
demonstrably cause substantial harm to the competitive position of the 
submitting person or entity.
    Local government has the same meaning stated in 6 U.S.C. 101(13) and 
means:
    (1) A county, municipality, city, town, township, local public 
authority, school district, special district, intrastate district, 
council of governments (regardless of whether the council of governments 
is incorporated as a nonprofit corporation under State law), regional or 
interstate government entity, or agency or instrumentality of a Local 
government;
    (2) An Indian tribe or authorized tribal organization, or in Alaska, 
a Native village or Alaska Regional Native Corporation; and
    (3) A rural community, unincorporated town or village, or other 
public entity.
    Protected Critical Infrastructure Information or PCII means 
validated CII, including information covered by Sec.  29.6(b) and (h), 
including the identity of the submitting person or entity and any person 
or entity on whose behalf the submitting person or entity submits the 
CII, that is voluntarily submitted, directly or indirectly, to CISA, for 
its use regarding the security of critical infrastructure and protected 
systems, analysis, warning, interdependency study, recovery, 
reconstitution, or other appropriate purpose. PCII also includes any 
information, statements,

[[Page 265]]

compilations or other materials reasonably necessary to explain the CII, 
put the CII in context, or describe the importance or use of the CII 
when accompanied by an express statement as described in Sec.  29.5.
    PCII Program Manager means the federal employee within the 
Infrastructure Security Division of CISA appointed as responsible for 
the administration of the PCII Program pursuant to this part, any 
successors to that position within the Department, or any designee.
    PCII Program Manager's Designee means a federal employee outside of 
the PCII Program Office, whether employed by CISA or another federal 
agency, to whom certain functions of the PCII Program Office are 
delegated by the PCII Program Manager, as determined on a case-by-case 
basis.
    Protected Critical Infrastructure Information Program Office or PCII 
Program Office means the personnel organized within the Infrastructure 
Security Division of CISA who carry out the operational and 
administrative functions of the PCII Program pursuant to the direction 
of the PCII Program Manager.
    PCII Program Officer means a Federal, State, or Local government 
employee appointed by their respective agency or entity and, upon 
approval of the PCII Program Manager, carries out the responsibilities 
described in 6 CFR 29.4(d) to ensure the proper use, storage, and 
handling of PCII within their respective agency or entity.
    Protected Critical Infrastructure Information Program or PCII 
Program means the program implementing the CII Act within the 
Infrastructure Security Division of the CISA, including the maintenance, 
management, and review of the information provided in furtherance of the 
protections provided by the CII Act.
    Protected Critical Infrastructure Information Management System or 
PCIIMS means the electronic database and platform used to record the 
receipt, acknowledgement, validation, storage, dissemination, and 
destruction of PCII. PCIIMS also enables CISA to manage and train 
individuals authorized to view, handle, and access PCII.
    Protected system has the same meaning stated in 6 U.S.C. 671(6) and 
means any service, physical or computer-based system, process, or 
procedure that directly or indirectly affects the viability of a 
facility of critical infrastructure; and includes any physical or 
computer-based system, including a computer, computer system, computer 
or communications network, or any component hardware or element thereof, 
software program, processing instructions, or information or data in 
transmission or storage therein, irrespective of the medium of 
transmission or storage.
    Purposes of the CII Act has the meaning set forth in the CII Act and 
includes the security of critical infrastructure and protected systems, 
analysis, warning, interdependency study, recovery, reconstitution, or 
other informational purposes.
    Regulatory proceeding, as used in 6 U.S.C. 671(7) and this part, 
means administrative proceedings in which DHS is the adjudicating 
entity, and does not include any form or type of regulatory proceeding 
or other matter outside of DHS.
    State has the same meaning stated in 6 U.S.C. 101(17) and means any 
State of the United States, the District of Columbia, the Commonwealth 
of Puerto Rico, the Virgin Islands, Guam, American Samoa, the 
Commonwealth of the Northern Mariana Islands, and any possession of the 
United States.
    Submission as referenced in these procedures means any transmittal, 
either directly or indirectly, of CII to the CISA PCII Program Office or 
the PCII Program Manager's Designee, as set forth herein.
    Submitted in good faith means any submission of information that 
could reasonably be defined as CII or PCII under this section. Upon 
validation of a submission as PCII, CISA has conclusively established 
the good faith of the submission. Any information qualifying as PCII by 
virtue of a categorical inclusion identified by the PCII Program Manager 
pursuant to this part is submitted in good faith.
    Voluntary or voluntarily, when used in reference to any submission 
of CII, means the submittal thereof in the absence of an exercise of 
legal authority by DHS to compel access to or submission of such 
information. Voluntary

[[Page 266]]

submission of CII may be accomplished by (i.e., come from) a single 
State or Local governmental entity; private entity or person; or by an 
ISAO acting on behalf of its members or otherwise. There are two 
exclusions from this definition:
    (1) In the case of any action brought under the securities laws--as 
is defined in 15 U.S.C. 78c(a)(47)--the term ``voluntary'' or 
``voluntarily'' does not include:
    (i) Information or statements contained in any documents or 
materials filed pursuant to 15 U.S.C. 78l(i) with the U.S. Securities 
and Exchange Commission or with federal banking regulators; or
    (ii) A writing that accompanied the solicitation of an offer or a 
sale of securities; and
    (2) Information or statements previously submitted to DHS in the 
course of a regulatory proceeding or a licensing or permitting 
determination are not ``voluntarily submitted.'' In addition, the 
submission of information to DHS for purposes of seeking a federal 
preference or benefit, including CII submitted to support an application 
for a DHS grant to secure critical infrastructure will be considered a 
voluntary submission of information. Applications for Support Anti-
terrorism by Fostering Effective Technologies Act of 2002 filed pursuant 
to 6 U.S.C. 441 et seq., or SAFETY Act Designation or Certification 
under 6 CFR part 25, will also be considered a voluntary submission.
    Used directly by such agency, any other Federal, State, or Local 
authority, or any third party, in any civil action arising under Federal 
or State law in 6 U.S.C. 673(a)(1)(C) means any use in any proceeding 
other than a criminal prosecution before any court of the United States 
or of a State or otherwise, of any PCII, or any drafts or copies of PCII 
retained by the submitter, including the opinions, evaluations, analyses 
and conclusions prepared and submitted as CII, as evidence at trial or 
in any pretrial or other discovery, notwithstanding whether the United 
States, its agencies, officers, or employees is or are a party to such 
proceeding.



Sec.  29.3  FOIA exemptions and restrictions on use of PCII.

    (a) Freedom of Information Act disclosure exemptions. Information 
that is separately exempt from public disclosure under the Freedom of 
Information Act (5 U.S.C. 552) or applicable State, or Local law does 
not lose its separate exemption from public disclosure due to the 
applicability of these procedures or any failure to follow them.
    (b) Restriction on use of PCII by regulatory agencies and other 
Federal, State, and Local agencies. A Federal, State, or Local 
government agency that receives PCII may utilize the PCII only for 
purposes appropriate under the CII Act, including securing critical 
infrastructure or protected systems. Such PCII may not be utilized for 
any other collateral regulatory purposes without the written consent of 
the PCII Program Manager and of the submitting person or entity. The 
PCII Program Manager or the PCII Program Manager's Designee will not 
share PCII with Federal, State, or Local government agencies without 
instituting appropriate measures to ensure that PCII is used only for 
appropriate purposes.



Sec.  29.4  PCII Program administration.

    (a) Cybersecurity and Infrastructure Security Agency. The Secretary 
of the Department of Homeland Security hereby designates the Director as 
the senior DHS official responsible for the direction and administration 
of the PCII Program. The Director administers this program through the 
Executive Assistant Director.
    (b) Appointment of a PCII Program Manager. The Director will:
    (1) Appoint a PCII Program Manager serving under the Executive 
Assistant Director who is responsible for the administration of the PCII 
Program;
    (2) Commit resources necessary for the effective implementation of 
the PCII Program;
    (3) Ensure that sufficient personnel, including detailees or 
assignees from other federal national security, homeland security, or 
law enforcement entities, as the Director deems appropriate, are 
assigned to the PCII Program to facilitate secure information sharing 
with appropriate authorities; and

[[Page 267]]

    (4) Promulgate implementing directives and prepare training 
materials, as appropriate, for the proper treatment of PCII.
    (c) Appointment of PCII Program Officers. The PCII Program Manager 
will establish procedures to ensure that each DHS component and each 
Federal, State, or Local agency or entity that works with PCII appoints 
one or more employees to serve as a PCII Program Officer in order to 
carry out the responsibilities stated in paragraph (d) of this section. 
Persons appointed to serve as PCII Program Officers must be fully 
familiar with these procedures.
    (d) Responsibilities of PCII Program Officers. PCII Program 
Officers:
    (1) Oversee the handling, use, and storage of PCII;
    (2) Ensure the secure sharing of PCII with appropriate authorities 
and individuals, as set forth in Sec.  29.1(a), and paragraph (b)(3) of 
this section;
    (3) Establish and maintain an ongoing self-inspection program 
including periodic review and assessment of compliance with handling, 
use, and storage of PCII;
    (4) Establish additional procedures, measures, and penalties, as 
necessary, to prevent unauthorized access to PCII; and
    (5) Ensure prompt and appropriate coordination with the PCII Program 
Manager regarding any request, challenge, or complaint arising out of 
the implementation of these regulations.
    (e) Protected Critical Infrastructure Information Management System 
or PCIIMS. The PCII Program Manager will develop, for use by the PCII 
Program Office and the PCII Manager's Designees, an electronic database 
to be known as PCIIMS to record the receipt, acknowledgement, 
validation, storage, dissemination, and destruction of PCII. This 
compilation of PCII must be safeguarded and protected in accordance with 
the provisions of the CII Act. The PCII Program Manager may require the 
completion of appropriate background investigations of an individual 
before granting that individual access to any PCII.



Sec.  29.5  Requirements for protection.

    (a) CII receives the protections of the CII Act when:
    (1) Such information is voluntarily submitted, directly or 
indirectly, to the PCII Program Office or a PCII Program Manager's 
Designee;
    (2) The information is submitted for protected use regarding the 
security of critical infrastructure or protected systems, analysis, 
warning, interdependency study, recovery, reconstitution, or other 
appropriate purposes including, without limitation, for the 
identification, analysis, prevention, preemption, disruption, defense 
against and/or mitigation of terrorist threats to the homeland;
    (3) The information is labeled with an express statement as follows:
    (i) Documentary submissions. In the case of documentary submissions, 
a written marking on the information or records substantially similar to 
the following: ``This information is voluntarily submitted to the 
federal government in expectation of protection from disclosure as 
provided by the provisions of the Critical Infrastructure Information 
Act of 2002, as amended by the Cybersecurity and Infrastructure Security 
Act of 2018'';
    (ii) Oral submissions. In the case of oral submissions:
    (A) Through an oral statement, made at the time of the oral 
submission or within a reasonable period of time thereafter, indicating 
an expectation of protection from disclosure as provided by the 
provisions of the CII Act; and
    (B) Through a written statement substantially similar to the one 
specified above in paragraph (a)(3)(i) of this section accompanied by a 
document that memorializes the nature of the oral submission initially 
provided to the PCII Program Office or the PCII Program Manager's 
Designee within a reasonable period of time after making the oral 
submission; or
    (iii) Electronic submissions. In the case of electronic submissions:
    (A) Through an electronically submitted statement made within a 
reasonable period of time after making the electronic submission, 
indicating an expectation of protection from disclosure as provided by 
the provisions of the CII Act; or
    (B) Through a non-electronically submitted written statement 
substantially

[[Page 268]]

similar to the one specified in paragraph (a)(3)(i) of this section 
accompanied by a document that memorializes the nature of the electronic 
submission initially provided to the PCII Program Office or the PCII 
Program Manager's Designee within a reasonable period after making the 
electronic submission; and
    (4) The documentary, electronic, or oral submission is accompanied 
by a statement, signed by the submitting person or an authorized person 
on behalf of an entity identifying the submitting person or entity, 
containing such contact information as is considered necessary by the 
PCII Program Office, and certifying that the information being submitted 
is not customarily in the public domain.
    (b) Information that is not submitted to the PCII Program Office or 
the PCII Program Manager's Designees will not qualify for protection 
under the CII Act. Only the PCII Program Office or a PCII Program 
Manager's Designee are authorized to acknowledge receipt of information 
submitted for consideration of protection under the CII Act.
    (c) All Federal, State, and Local government entities must protect 
and maintain information as required by this part and by the provisions 
of the CII Act when that information is provided to the entity by the 
PCII Program Manager or a PCII Program Manager's Designee and is marked 
as required in Sec.  29.6(c).
    (d) All submissions seeking PCII status are presumed to have been 
submitted in good faith until validation or a determination not to 
validate is made pursuant to this part.



Sec.  29.6  Acknowledgment of receipt, validation, and marking.

    (a) Authorized officials. Only the PCII Program Manager is 
authorized to validate and mark information submitted for protection 
outside of a categorical inclusion as PCII. The PCII Program Manager or 
a Program Manager's Designee may mark information qualifying for 
protection under categorical inclusions pursuant to paragraph (f) of 
this section as PCII.
    (b) Presumption of protection. All information submitted in 
accordance with the procedures set forth in Sec.  29.5 of this part will 
be presumed to be and will be treated as PCII, enjoying the protections 
of the CII Act, from the time the information is received by the PCII 
Program Office or a PCII Program Manager's Designee. The information 
must remain protected unless and until the PCII Program Office renders a 
final decision that the information is not PCII. The PCII Program Office 
will, with respect to information that is not properly submitted, inform 
the submitting person or entity within thirty calendar days of receipt, 
by a means of communication to be prescribed by the PCII Program 
Manager, that the submittal was procedurally defective. The submitter 
will then have an additional thirty calendar days to remedy the 
deficiency from the date of receipt of such notification by the PCII 
Program Office. If the submitting person or entity does not cure the 
deficiency within thirty calendar days after the date of receipt of the 
notification provided by the PCII Program Office in this paragraph, the 
PCII Program Office may determine that the presumption of protection is 
terminated. Under such circumstances, the PCII Program Office may cure 
the deficiency by labeling the submission with the information required 
in Sec.  29.5 or may notify the applicant that the submission does not 
qualify as PCII. No CII submission will lose its presumptive status as 
PCII except as provided in paragraph (g) of this section.
    (c) Marking of information. All PCII must be clearly identified 
through markings made by the PCII Program Office. The PCII Program 
Office will mark PCII materials as follows: ``This document contains 
PCII. In accordance with the provisions of 6 CFR part 29, this document 
is exempt from release under the Freedom of Information Act (5 U.S.C. 
552(b)(3)) and similar laws requiring public disclosure. Unauthorized 
release may result in criminal and administrative penalties. This 
document is to be safeguarded and disseminated in accordance with the 
CII Act and PCII Program requirements.'' When distributing PCII, the 
distributing person must ensure that the distributed information 
contains this marking.
    (d) Acknowledgement of receipt of information. The PCII Program 
Office or a

[[Page 269]]

PCII Program Manager's Designee will acknowledge receipt of information 
submitted as CII and accompanied by an express statement, and in so 
doing will:
    (1) Contact the submitting person or entity, within thirty calendar 
days of receipt of the submission of CII, by the means of delivery 
prescribed in procedures developed by the PCII Program Manager. In the 
case of oral submissions, receipt will be acknowledged in writing within 
thirty calendar days after receipt by the PCII Program Office or a PCII 
Program Manager's Designee of a written statement, certification, and 
documents that memorialize the oral submission, as referenced in Sec.  
29.5(a)(3)(ii);
    (2) Enter the appropriate data into the PCIIMS as required in Sec.  
29.4(e); and
    (3) Provide the submitting person or entity with a unique tracking 
number that will accompany the information from the time it is received 
by the PCII Program Office or a PCII Program Manager's Designee.
    (e) Validation of information. (1) The PCII Program Manager is 
responsible for reviewing all submissions that request protection under 
the CII Act. The PCII Program Manager will review the submitted 
information as soon as practicable. If a final determination is made 
that the submitted information meets the requirements for protection, 
the PCII Program Manager must ensure that the information has been 
marked as required in paragraph (c) of this section, notify the 
submitting person or entity of the determination, and disclose it only 
pursuant to Sec.  29.8.
    (2) If the PCII Program Office makes an initial determination that 
the information submitted does not meet the requirements for protection 
under the CII Act, the PCII Program Office will:
    (i) Notify the submitting person or entity of the initial 
determination that the information is not considered to be PCII. This 
notification also will, as necessary:
    (A) Request that the submitting person or entity complete the 
requirements of Sec.  29.5(a) or further explain the nature of the 
information and the submitting person or entity's basis for believing 
the information qualifies for protection under the CII Act;
    (B) Advise the submitting person or entity that the PCII Program 
Office will review any further information provided before rendering a 
final determination;
    (C) Advise the submitting person or entity that the submission can 
be withdrawn at any time before a final determination is made;
    (D) Notify the submitting person or entity that until a final 
determination is made the submission will be treated as PCII;
    (E) Notify the submitting person or entity that any response to the 
notification must be received by the PCII Program Office no later than 
thirty calendar days after the date of the notification; and
    (F) Request the submitting person or entity to state whether, in the 
event the PCII Program Office makes a final determination that any such 
information is not PCII, the submitting person or entity prefers that 
the information be maintained without the protections of the CII Act, 
returned to the submitting person or entity, or destroyed. If a request 
for return is made, all such information will be returned to the 
submitting person or entity.
    (ii) If the information submitted has not been withdrawn by the 
submitting person or entity, the PCII Program Office will return the 
information to the submitter in accordance with the submitting person or 
entity's written preference and the procedures set forth in paragraph 
(e)(2)(i) of this section within thirty calendar days of making a final 
determination that the information submitted is not eligible for 
protections under the CII Act. If the submitting person or entity cannot 
be notified or the submitting person or entity's response is not 
received within thirty calendar days of the date of the notification as 
provided in paragraph (e)(2)(i) of this section, the PCII Program Office 
will make the initial determination final and return the information to 
the submitter. If return to the submitter is impractical, the PCII 
Program Office will destroy the information within thirty calendar days. 
This process is consistent with the appropriate National Archives and 
Records Administration-approved records disposition schedule.

[[Page 270]]

    (f) Categorical Inclusions of Certain Types of CII as PCII. The PCII 
Program Manager has discretion to declare certain subject matter or 
types of information categorically protected as PCII and to set 
procedures for receipt and processing of such information. Information 
within a categorical inclusion will be considered validated upon receipt 
by the PCII Program Manager or any of the PCII Program Manager's 
Designees without further review, provided that the submitter provides 
the express statement required by Sec.  29.5(a)(3). The PCII Program 
Manager's designees will provide to the PCII Program Office information 
submitted under a categorical inclusion.
    (g) Changing the status of PCII to non-PCII. Once information is 
validated, only the PCII Program Manager may change the status of PCII 
to that of non-PCII and remove its PCII markings. Status changes may 
only take place when the submitting person or entity requests in writing 
that the information no longer be protected under the CII Act; or when 
the PCII Program Office determines that the information was, at the time 
of the submission, customarily in the public domain. Upon making an 
initial determination that a change in status may be warranted, but 
prior to a final determination, the PCII Program Office, using the 
procedures in paragraph (e)(2) of this section, will inform the 
submitting person or entity of the initial determination of a change in 
status. Notice of the final change in status of PCII will be provided to 
all recipients of PCII received under Sec.  29.8.



Sec.  29.7  Safeguarding of PCII.

    (a) Safeguarding. All persons granted access to PCII are responsible 
for safeguarding such information in their possession or control. PCII 
must be protected at all times by appropriate storage and handling. Each 
person who works with PCII is personally responsible for taking proper 
precautions to ensure that unauthorized persons do not gain access to 
it.
    (b) Background checks on persons with access to PCII. For those who 
require access to PCII, CISA will, to the extent practicable and 
consistent with the purposes of the CII Act, undertake appropriate 
background checks to ensure that individuals with access to PCII do not 
pose a threat to national security. These checks may also be waived in 
exigent circumstances.
    (c) Use and storage. When PCII is in the physical possession of a 
person, reasonable steps must be taken, in accordance with procedures 
prescribed by the PCII Program Manager, to minimize the risk of access 
to PCII by unauthorized persons. When PCII is not in the physical 
possession of a person, it must be stored in a secure environment.
    (d) Reproduction. Pursuant to procedures prescribed by the PCII 
Program Manager, a document or other material containing PCII may be 
reproduced to the extent necessary and consistent with the need to carry 
out official duties, provided that the reproduced documents or material 
are marked and protected in the same manner as the original documents or 
material.
    (e) Disposal of information. Documents and material containing PCII 
may be disposed of by any method that prevents unauthorized retrieval, 
such as shredding or incineration.
    (f) Transmission of information. PCII will be transmitted only by 
secure means of delivery as determined by the PCII Program Manager, and 
in conformance with appropriate federal standards.
    (g) Automated Information Systems. The PCII Program Manager will 
establish security requirements designed to protect information to the 
maximum extent practicable, and consistent with the CII Act, for 
Automated Information Systems that contain PCII. Such security 
requirements will be in conformance with the information technology 
security requirements in the Federal Information Security Management Act 
and the Office of Management and Budget's implementing policies.



Sec.  29.8  Disclosure of PCII.

    (a) Authorization of access. The Director, the Executive Assistant 
Director, or either's designee may choose to provide or authorize access 
to PCII under one or more of the paragraphs in this section when it is 
determined that access supports a lawful and authorized

[[Page 271]]

government purpose as enumerated in the CII Act or other law, 
regulation, or legal authority.
    (b) Federal, State, and Local government sharing. The PCII Program 
Office or a PCII Program Manager's Designee may provide PCII to an 
employee of the federal government, provided, subject to paragraph (f) 
of this section, that such information is shared for purposes of 
securing the critical infrastructure or protected systems, analysis, 
warning, interdependency study, recovery, reconstitution, or for another 
appropriate purpose including, without limitation, the identification, 
analysis, prevention, preemption, and/or disruption of terrorist threats 
to the homeland. PCII may not be used, directly or indirectly, for any 
collateral regulatory purpose. PCII may be provided to a State or Local 
government entity for the purpose of protecting critical infrastructure 
or protected systems, or in furtherance of the investigation or 
prosecution of a criminal act. The provision of PCII to a State or Local 
government entity will normally be made only pursuant to an arrangement 
with the PCII Program Manager providing for compliance with the 
requirements of paragraph (d) of this section and acknowledging the 
understanding and responsibilities of the recipient. State and Local 
governments receiving such information will acknowledge in such 
arrangements the primacy of PCII protections under the CII Act; agree to 
assert all available legal defenses to disclosure of PCII under State or 
Local public disclosure laws, statutes, or ordinances; and will agree to 
treat breaches of the agreements by their employees or contractors as 
matters subject to the applicable criminal code or employee code of 
conduct for the jurisdiction.
    (c) Disclosure of information to Federal, State, and Local 
government contractors. Disclosure of PCII to Federal, State, and Local 
government contractors may be made when necessary for an appropriate 
purpose under the CII Act, and only after the PCII Program Manager or a 
PCII Program Officer certifies that the contractor is performing 
services in support of the purposes of the CII Act. The contractor's 
employees who will be handling PCII must sign individual nondisclosure 
agreements in a form prescribed by the PCII Program Manager, and the 
contractor must agree by contract, whenever and to whatever extent 
possible, to comply with all relevant requirements of the PCII Program. 
The contractor must safeguard PCII in accordance with these procedures 
and may not remove any ``PCII'' markings. An employee of the contractor 
may, in the performance of services in support of the purposes of the 
CII Act and when authorized to do so by the PCII Program Manager or a 
PCII Program Manager's Designee, communicate with a submitting person or 
an authorized person of a submitting entity about a submittal of 
information by that person or entity. Contractors will not further 
disclose PCII to any other party not already authorized to receive such 
information by the PCII Program Manager or a PCII Program Manager's 
Designee, without the prior written approval of the PCII Program Manager 
or a PCII Program Manager's Designee.
    (d) Further use or disclosure of information by State and Local 
governments. (1) State and Local governments receiving information 
marked ``Protected Critical Infrastructure Information'' will not share 
that information with any other party not already authorized to receive 
such information by the PCII Program Manager or a PCII Program Manager's 
Designee, with the exception of their contractors after complying with 
the requirements of paragraph (c) of this section, or remove any PCII 
markings, without first obtaining authorization from the PCII Program 
Manager or a PCII Program Manager's Designee, who is responsible for 
requesting and obtaining written consent from the submitter of the 
information.
    (2) State and Local governments may use PCII only for the purpose of 
protecting critical infrastructure or protected systems, or as set forth 
elsewhere in these rules.
    (e) Disclosure of information to appropriate entities or to the 
general public. PCII may be used to prepare advisories, alerts, and 
warnings to relevant companies, targeted sectors, governmental entities, 
ISAOs, or the general public regarding potential threats and

[[Page 272]]

vulnerabilities to critical infrastructure as appropriate pursuant to 
the CII Act. Unless exigent circumstances require otherwise, any such 
warnings to the general public will be authorized by the Secretary of 
the Department of Homeland Security, the Director, the Executive 
Assistant Director for Infrastructure Security of CISA, or the Executive 
Assistant Director for Cybersecurity of CISA. Such exigent circumstances 
exist only when approval of the Secretary, the Director, the Executive 
Assistant Director for Infrastructure Security for CISA, or the 
Executive Assistant Director for Cybersecurity for CISA cannot be 
obtained within a reasonable time necessary to issue an effective 
advisory, alert, or warning. In issuing advisories, alerts, and 
warnings, DHS will consider the exigency of the situation, the extent of 
possible harm to the public or to critical infrastructure, and the 
necessary scope of the advisory, alert, or warning; and take appropriate 
actions to protect from disclosure any information that is proprietary, 
business sensitive, relates specifically to or might be used to identify 
the submitting person or entity or any persons or entities on whose 
behalf the CII was submitted, or is not otherwise appropriately in the 
public domain. Depending on the exigency of the circumstances, DHS may 
consult or cooperate with the submitter in making such advisories, 
alerts, or warnings.
    (f) Disclosure for law enforcement purposes and communication with 
submitters; access by Congress, the Comptroller General, and the 
Inspector General; and whistleblower protection.
    (1) Exceptions for disclosure.
    (i) PCII will not, without the written consent of the person or 
entity submitting such information, be used or disclosed for purposes 
other than the purposes of the CII Act, except:
    (A) In furtherance of the investigation or prosecution of a criminal 
act by the federal government, or by a State, Local, or foreign 
government, when such disclosure is coordinated by a federal law 
enforcement official;
    (B) To communicate with a submitting person or an authorized person 
on behalf of a submitting entity, about a submittal of information by 
that person or entity when authorized to do so by the PCII Program 
Manager or a PCII Program Manager's Designee; or
    (C) When disclosure of the information is made by any officer or 
employee of the United States;
    (1) To either House of Congress, or to the extent of matter within 
its jurisdiction, any committee or subcommittee thereof, any joint 
committee thereof or subcommittee of any such joint committee; or
    (2) To the Comptroller General, or any authorized representative of 
the Comptroller General, in the course of the performance of the duties 
of the Government Accountability Office.
    (ii) If any officer or employee of the United States makes any 
disclosure pursuant to these exceptions, contemporaneous written 
notification must be provided to CISA through the PCII Program Manager.
    (2) Consistent with the authority to disclose information for any of 
the purposes of the CII Act, disclosure of PCII may be made, without the 
written consent of the person or entity submitting such information, to 
the DHS Office of Inspector General.
    (g) Responding to requests made under the Freedom of Information Act 
or State and Local government information access laws. PCII will be 
treated as exempt from disclosure under the Freedom of Information Act 
and any State or Local government law requiring disclosure of records or 
information. Any Federal, State, or Local government agency with 
questions regarding the protection of PCII from public disclosure must 
contact the PCII Program Office, who will in turn consult with the CISA 
Office of the Chief Counsel.
    (h) Ex parte communications with decision-making officials. Pursuant 
to 6 U.S.C. 673(a)(1)(B), PCII is not subject to any agency rules or 
judicial doctrine regarding ex parte communications with a decision-
making official.
    (i) Restriction on use of PCII in civil actions. Pursuant to 6 
U.S.C. 673(a)(1)(C), PCII will not, without the written consent of the 
person or entity submitting such information, be used directly by any 
Federal, State, or Local authority, or by any third party, in any civil 
action arising under Federal, State, or Local law.

[[Page 273]]



Sec.  29.9  Investigation and reporting of violation of PCII procedures.

    (a) Reporting of possible violations. Persons authorized to have 
access to PCII must report any suspected violation of security 
procedures, the loss or misplacement of PCII, and any suspected 
unauthorized disclosure of PCII immediately to the PCII Program Manager 
or a PCII Program Manager's Designee. Suspected violations may also be 
reported to the DHS Office of Inspector General. The PCII Program 
Manager or a PCII Program Manager's Designee will in turn report the 
incident to the appropriate security officer and to the DHS Office of 
Inspector General.
    (b) Review and investigation of written report. The PCII Program 
Manager, or the appropriate security officer must notify the DHS Office 
of Inspector General of their intent to investigate any alleged 
violation of procedures, loss of information, and/or unauthorized 
disclosure, prior to initiating any such investigation. Evidence of 
wrongdoing resulting from any such investigations by agencies other than 
the DHS Inspector General must be reported to the United States 
Department of Justice, Criminal Division, through the CISA Office of the 
Chief Counsel. The DHS Office of Inspector General also has authority to 
conduct such investigations and will report any evidence of wrongdoing 
to the United States Department of Justice, Criminal Division, for 
consideration of prosecution.
    (c) Notification to originator of PCII. If the PCII Program Manager 
or the appropriate security officer determines that a loss of 
information or an unauthorized disclosure of PCII has occurred, the PCII 
Program Manager or a PCII Program Manager's Designee must notify the 
person or entity that submitted the PCII, unless providing such 
notification could reasonably be expected to hamper the relevant 
investigation or adversely affect any other law enforcement, national 
security, or homeland security interest.
    (d) Criminal and administrative penalties. (1) As established in 6 
U.S.C. 673(f), whoever, being an officer or employee of the United 
States or of any department or agency thereof, knowingly publishes, 
divulges, discloses, or makes known in any manner or to any extent not 
authorized by law, any information protected from disclosure by the CII 
Act coming to the officer or employee in the course of his or her 
employment or official duties or by reason of any examination or 
investigation made by, or return, report, or record made to or filed 
with, such department or agency or officer or employee thereof, shall be 
fined under title 18 of the United States Code, imprisoned not more than 
one year, or both, and shall be removed from office or employment.
    (2) In addition to the penalties set forth in paragraph (d)(1) of 
this section, if the PCII Program Manager determines that an entity or 
person who has received PCII has violated the provisions of this part or 
used PCII for an inappropriate purpose, the PCII Program Manager may 
disqualify that entity or person from future receipt of any PCII or 
future receipt of any sensitive homeland security information under 6 
U.S.C. 482, provided, however, that any such decision by the PCII 
Program Manager may be appealed to the Director.



PART 37_REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS-
-Table of Contents



                            Subpart A_General

Sec.
37.1 Applicability.
37.3 Definitions.
37.4 Incorporation by reference.
37.5 Validity periods and deadlines for REAL ID driver's licenses and 
          identification cards.

    Subpart B_Minimum Documentation, Verification, and Card Issuance 
                              Requirements

37.11 Application and documents the applicant must provide.
37.13 Document verification requirements.
37.15 Physical security features for the driver's license or 
          identification card.
37.17 Requirements for the surface of the driver's license or 
          identification card.
37.19 Machine readable technology on the driver's license or 
          identification card.
37.21 Temporary or limited-term driver's licenses and identification 
          cards.
37.23 Reissued REAL ID driver's licenses and identification cards.

[[Page 274]]

37.25 Renewal of REAL ID driver's licenses and identification cards.
37.27 Driver's licenses and identification cards issued during the age-
          based enrollment period.
37.29 Prohibition against holding more than one REAL ID card or more 
          than one driver's license.

                      Subpart C_Other Requirements

37.31 Source document retention.
37.33 DMV databases.

Subpart D_Security at DMVs and Driver's License and Identification Card 
                          Production Facilities

37.41 Security plan.
37.43 Physical security of DMV production facilities.
37.45 Background checks for covered employees.

          Subpart E_Procedures for Determining State Compliance

37.51 Compliance--general requirements.
37.55 State certification documentation.
37.59 DHS reviews of State compliance.
37.61 Results of compliance determination.
37.63 Extension of deadline.
37.65 Effect of failure to comply with this part.

   Subpart F_Driver's Licenses and Identification Cards Issued Under 
                  section 202(d)(11) of the REAL ID Act

37.71 Driver's licenses and identification cards issued under section 
          202(d)(11) of the REAL ID Act.

    Authority: 49 U.S.C. 30301 note; 6 U.S.C. 111, 112.

    Source: 73 FR 5331, Jan. 29, 2008, unless otherwise noted.



                            Subpart A_General



Sec.  37.1  Applicability.

    (a) Subparts A through E of this part apply to States and U.S. 
territories that choose to issue driver's licenses and identification 
cards that can be accepted by Federal agencies for official purposes.
    (b) Subpart F establishes certain standards for State-issued 
driver's licenses and identification cards issued by States that 
participate in REAL ID, but that are not intended to be accepted by 
Federal agencies for official purpose under section 202(d)(11) of the 
REAL ID Act.



Sec.  37.3  Definitions.

    For purposes of this part:
    Birth certificate means the record related to a birth that is 
permanently stored either electronically or physically at the State 
Office of Vital Statistics or equivalent agency in a registrant's State 
of birth.
    Card means either a driver's license or identification card issued 
by the State Department of Motor Vehicles (DMV) or equivalent State 
office.
    Certification means an assertion by the State to the Department of 
Homeland Security that the State has met the requirements of this part.
    Certified copy of a birth certificate means a copy of the whole or 
part of a birth certificate registered with the State that the State 
considers to be the same as the original birth certificate on file with 
the State Office of Vital Statistics or equivalent agency in a 
registrant's State of birth.
    Covered employees means Department of Motor Vehicles employees or 
contractors who are involved in the manufacture or production of REAL ID 
driver's licenses and identification cards, or who have the ability to 
affect the identity information that appears on the driver's license or 
identification card.
    Data verification means checking the validity of data contained in 
source documents presented under this regulation.
    DHS means the U.S. Department of Homeland Security.
    DMV means the Department of Motor Vehicles or any State Government 
entity that issues driver's licenses and identification cards, or an 
office with equivalent function for issuing driver's licenses and 
identification cards.
    Determination means a decision by the Department of Homeland 
Security that a State has or has not met the requirements of this part 
and that Federal agencies may or may not accept the driver's licenses 
and identification cards issued by the State for official purposes.
    Digital photograph means a digital image of the face of the holder 
of the driver's license or identification card.

[[Page 275]]

    Document authentication means determining that the source document 
presented under these regulations is genuine and has not been altered.
    Domestic violence and dating violence have the meanings given the 
terms in section 3, Universal definitions and grant provisions, of the 
Violence Against Women and Department of Justice Reauthorization Act of 
2005 (Pub. L. 109-162, 119 Stat. 2960, 2964, Jan. 5, 2006); codified at 
section 40002, Definitions and grant provisions, 42 U.S.C. 13925, or 
State laws addressing domestic and dating violence.
    Driver's license means a motor vehicle operator's license, as 
defined in 49 U.S.C. 30301.
    Duplicate means a driver's license or identification card issued 
subsequent to the original document that bears the same information and 
expiration date as the original document and that is reissued at the 
request of the holder when the original is lost, stolen, or damaged and 
there has been no material change in information since prior issuance.
    Federal agency means all executive agencies including Executive 
departments, a Government corporation, and an independent establishment 
as defined in 5 U.S.C. 105.
    Federally-regulated commercial aircraft means a commercial aircraft 
regulated by the Transportation Security Administration (TSA).
    Full compliance means that the Secretary or his designate(s) has 
determined that a State has met all the requirements of Subparts A 
through E.
    Full legal name means an individual's first name, middle name(s), 
and last name or surname, without use of initials or nicknames.
    IAFIS means the Integrated Automated Fingerprint Identification 
System, a national fingerprint and criminal history system maintained by 
the Federal Bureau of Investigation (FBI) that provides automated 
fingerprint search capabilities.
    Identification card means a document made or issued by or under the 
authority of a State Department of Motor Vehicles or State office with 
equivalent function which, when completed with information concerning a 
particular individual, is of a type intended or commonly accepted for 
the purpose of identification of individuals.
    INS means the former-Immigration and Naturalization Service of the 
U.S. Department of Justice.
    Lawful status: A person in lawful status is a citizen or national of 
the United States; or an alien: lawfully admitted for permanent or 
temporary residence in the United States; with conditional permanent 
resident status in the United States; who has an approved application 
for asylum in the United States or has entered into the United States in 
refugee status; who has a valid nonimmigrant status in the United 
States; who has a pending application for asylum in the United States; 
who has a pending or approved application for temporary protected status 
(TPS) in the United States; who has approved deferred action status; or 
who has a pending application for lawful permanent residence (LPR) or 
conditional permanent resident status. This definition does not affect 
other definitions or requirements that may be contained in the 
Immigration and Nationality Act or other laws.
    Material change means any change to the personally identifiable 
information of an individual as defined under this part. Notwithstanding 
the definition of personally identifiable information below, a change of 
address of principal residence does not constitute a material change.
    Material compliance means a determination by DHS that a State has 
met the benchmarks contained in the Material Compliance Checklist.
    NCIC means the National Crime Information Center, a computerized 
index of criminal justice information maintained by the Federal Bureau 
of Investigation (FBI) that is available to Federal, State, and local 
law enforcement and other criminal justice agencies.
    Official purpose means accessing Federal facilities, boarding 
Federally-regulated commercial aircraft, and entering nuclear power 
plants.
    Passport means a passport booklet or card issued by the U.S. 
Department of State that can be used as a travel document to gain entry 
into the United States and that denotes identity and

[[Page 276]]

citizenship as determined by the U.S. Department of State.
    Personally identifiable information means any information which can 
be used to distinguish or trace an individual's identity, such as their 
name; driver's license or identification card number; social security 
number; biometric record, including a digital photograph or signature; 
alone, or when combined with other personal or identifying information, 
which is linked or linkable to a specific individual, such as a date and 
place of birth or address, whether it is stored in a database, on a 
driver's license or identification card, or in the machine readable 
technology on a license or identification card.
    Principal residence means the location where a person currently 
resides (i.e., presently resides even if at a temporary address) in 
conformance with the residency requirements of the State issuing the 
driver's license or identification card, if such requirements exist.
    REAL ID Driver's License or Identification Card means a driver's 
license or identification card that has been issued by a State that has 
been certified by DHS to be in compliance with the requirements of the 
REAL ID Act and which meets the standards of subparts A through D of 
this part, including temporary or limited-term driver's licenses or 
identification cards issued under Sec.  37.21.
    Reissued card means a card that a State DMV issues to replace a card 
that has been lost, stolen or damaged, or to replace a card that 
includes outdated information. A card may not be reissued remotely when 
there is a material change to the personally identifiable information as 
defined by the Rule.
    Renewed card means a driver's license or identification card that a 
State DMV issues to replace a renewable driver's license or 
identification card.
    SAVE means the DHS Systematic Alien Verification for Entitlements 
system, or such successor or alternate verification system at the 
Secretary's discretion.
    Secretary means the Secretary of Homeland Security.
    Sexual assault and stalking have the meanings given the terms in 
section 3, universal definitions and grant provisions, of the Violence 
Against Women and Department of Justice Reauthorization Act of 2005 
(Pub. L. 109-162, 119 Stat. 2960, 2964, Jan. 5, 2006); codified at 
section 40002, Definitions and grant provisions, 42 U.S.C. 13925, or 
State laws addressing sexual assault and stalking.
    Source document(s) means original or certified copies (where 
applicable) of documents presented by an applicant as required under 
these regulations to the Department of Motor Vehicles to apply for a 
driver's license or identification card.
    State means a State of the United States, the District of Columbia, 
Puerto Rico, the Virgin Islands, Guam, American Samoa, and the 
Commonwealth of the Northern Mariana Islands.
    State address confidentiality program means any State-authorized or 
State-administered program that--
    (1) Allows victims of domestic violence, dating violence, sexual 
assault, stalking, or a severe form of trafficking to keep, obtain, and 
use alternative addresses; or
    (2) Provides confidential record-keeping regarding the addresses of 
such victims or other categories of persons.
    Temporary lawful status: A person in temporary lawful status is a 
person who: Has a valid nonimmigrant status in the United States (other 
than a person admitted as a nonimmigrant under the Compacts of Free 
Association between the United States and the Republic of the Marshall 
Islands, the Federated States of Micronesia, or the Republic of Palau); 
has a pending application for asylum in the United States; has a pending 
or approved application for temporary protected status (TPS) in the 
United States; has approved deferred action status; or has a pending 
application for LPR or conditional permanent resident status.
    Verify means procedures to ensure that:
    (1) The source document is genuine and has not been altered (i.e., 
``document authentication''); and

[[Page 277]]

    (2) The identity data contained on the document is valid (``data 
verification'').

[73 FR 5331, Jan. 29, 2008, as amended at 84 FR 46426, Sept. 4, 2019]



Sec.  37.4  Incorporation by reference.

    Certain material is incorporated by reference into this part with 
the approval of the Director of the Federal Register under 5 U.S.C. 
552(a) and 1 CFR part 51. All approved incorporation by reference (IBR) 
material is available for inspection at the Department of Homeland 
Security (DHS) and at the National Archives and Records Administration 
(NARA). For information on the availability of this material at DHS 
Headquarters in Washington DC, please email 
[email protected]. For information on the availability 
of this material at NARA, visit www.archives.gov/federal-register/cfr/
ibr-locations.html or email [email protected]. The material may be 
obtained from the following sources:
    (a) American Association of Motor Vehicle Administrators (AAMVA) 
4301 Wilson Boulevard, Suite 400, Arlington, VA 22203; website: 
www.aamva.org.
    (1) 2005 AAMVA Driver's License/Identification Card Design 
Specifications, Annex A, section A.7.7.2., March 2005 (AAMVA 
Specifications); IBR approved for Sec.  37.17.
    (2) [Reserved]
    (b) International Civil Aviation Organization (ICAO), I CAO, 
Document Sales Unit, 999 University Street, Montreal, Quebec, Canada H3C 
5H7; email: [email protected].
    (1) ICAO 9303, ``Machine Readable Travel Documents,'' Volume 1, part 
1, Sixth Edition, 2006; IBR approved for Sec.  37.17.
    (2) [Reserved]
    (c) International Organization for Standardization, Chemin de 
Blandonnet 8, CP 401, 1214 Vernier, Geneva, Switzerland; phone: +41 22 
749 01 11; email: [email protected]; website: www.iso.org/contact-
iso.html. (Also available by contacting ANSI at ANSI, 25 West 43rd 
Street, 4th Floor, New York, New York 10036 website: www.ansi.org.)
    (1) ISO/IEC 19794-5:2005(E) Information technology--Biometric Data 
Interchange Formats--Part 5: Face Image Data, dated June 2005; IBR 
approved for Sec.  37.17.
    (2) ISO/IEC 15438:2006(E) Information Technology--Automatic 
identification and data capture techniques--PDF417 symbology 
specification, dated June 2006; IBR approved for Sec.  37.19.

[88 FR 44192, July 12, 2023]



Sec.  37.5  Validity periods and deadlines for REAL ID driver's
licenses and identification cards.

    (a) Driver's licenses and identification cards issued under this 
part, that are not temporary or limited-term driver's licenses and 
identification cards, are valid for a period not to exceed eight years. 
A card may be valid for a shorter period based on other State or Federal 
requirements.
    (b) On or after May 7, 2025, Federal agencies shall not accept a 
driver's license or identification card for official purposes from any 
individual unless such license or card is a REAL ID-compliant driver's 
license or identification card issued by a State that has been 
determined by DHS to be in full compliance as defined under this 
subpart.
    (c) Through the end of May 6, 2025, Federal agencies may accept for 
official purposes a driver's license or identification card issued under 
Sec.  37.71. On or after May 7, 2025, Federal agencies shall not accept 
for official purposes a driver's license or identification card issued 
under Sec.  37.71.

[73 FR 5331, Jan. 29, 2008, as amended at 79 FR 77838, Dec. 29, 2014; 84 
FR 55019, Oct. 15, 2019; 85 FR 23208, Apr. 27, 2020; 86 FR 23240, May 3, 
2021; 88 FR 14476, Mar. 9, 2023]



    Subpart B_Minimum Documentation, Verification, and Card Issuance 
                              Requirements



Sec.  37.11  Application and documents the applicant must provide.

    (a) The State must subject each person applying for a REAL ID 
driver's license or identification card to a mandatory facial image 
capture, and shall maintain photographs of individuals

[[Page 278]]

even if no card is issued. The photographs must be stored in a format in 
accordance with Sec.  37.31 as follows:
    (1) If no card is issued, for a minimum period of five years.
    (2) If a card is issued, for a period of at least two years beyond 
the expiration date of the card.
    (b) Declaration. Each applicant must sign a declaration under 
penalty of perjury that the information presented on the application is 
true and correct, and the State must retain this declaration. An 
applicant must sign a new declaration when presenting new source 
documents to the DMV on subsequent visits.
    (c) Identity. (1) To establish identity, the applicant must present 
at least one of the following source documents:
    (i) Valid, unexpired U.S. passport.
    (ii) Certified copy of a birth certificate filed with a State Office 
of Vital Statistics or equivalent agency in the individual's State of 
birth.
    (iii) Consular Report of Birth Abroad (CRBA) issued by the U.S. 
Department of State, Form FS-240, DS-1350 or FS-545.
    (iv) Valid, unexpired Permanent Resident Card (Form I-551) issued by 
DHS or INS.
    (v) Unexpired employment authorization document (EAD) issued by DHS, 
Form I-766 or Form I-688B.
    (vi) Unexpired foreign passport with a valid, unexpired U.S. visa 
affixed accompanied by the approved I-94 form documenting the 
applicant's most recent admittance into the United States.
    (vii) Certificate of Naturalization issued by DHS, Form N-550 or 
Form N-570.
    (viii) Certificate of Citizenship, Form N-560 or Form N-561, issued 
by DHS.
    (ix) REAL ID driver's license or identification card issued in 
compliance with the standards established by this part.
    (x) Such other documents as DHS may designate by notice published in 
the Federal Register.
    (2) Where a State permits an applicant to establish a name other 
than the name that appears on a source document (for example, through 
marriage, adoption, court order, or other mechanism permitted by State 
law or regulation), the State shall require evidence of the name change 
through the presentation of documents issued by a court, governmental 
body or other entity as determined by the State. The State shall 
maintain copies of the documentation presented pursuant to Sec.  37.31, 
and maintain a record of both the recorded name and the name on the 
source documents in a manner to be determined by the State and in 
conformity with Sec.  37.31.
    (d) Date of birth. To establish date of birth, an individual must 
present at least one document included in paragraph (c) of this section.
    (e) Social security number (SSN). (1) Except as provided in 
paragraph (e)(3) of this section, individuals presenting the identity 
documents listed in Sec.  37.11(c)(1) and (2) must present his or her 
Social Security Administration account number card; or, if a Social 
Security Administration account card is not available, the person may 
present any of the following documents bearing the applicant's SSN:
    (i) A W-2 form,
    (ii) A SSA-1099 form,
    (iii) A non-SSA-1099 form, or
    (iv) A pay stub with the applicant's name and SSN on it.
    (2) The State DMV must verify the SSN pursuant to Sec.  37.13(b)(2) 
of this subpart.
    (3) Individuals presenting the identity document listed in Sec.  
37.11(c)(1)(vi) must present an SSN or demonstrate non-work authorized 
status.
    (f) Documents demonstrating address of principal residence. To 
document the address of principal residence, a person must present at 
least two documents of the State's choice that include the individual's 
name and principal residence. A street address is required except as 
provided in Sec.  37.17(f) of this part.
    (g) Evidence of lawful status in the United States. A DMV may issue 
a REAL ID driver's license or identification card only to a person who 
has presented satisfactory evidence of lawful status.
    (1) If the applicant presents one of the documents listed under 
paragraphs (c)(1)(i), (c)(1)(ii), (c)(1)(iii), (c)(1)(iv), (c)(1)(vii) 
or (c)(1)(viii) of this section, the issuing State's verification of the

[[Page 279]]

applicant's identity in the manner prescribed in Sec.  37.13 will also 
provide satisfactory evidence of lawful status.
    (2) If the applicant presents one of the identity documents listed 
under paragraphs (c)(1)(v) or (c)(1)(vi), or (c)(1)(ix) of this section, 
the issuing State's verification of the identity document(s) does not 
provide satisfactory evidence of lawful status. The applicant must also 
present a second document from Sec.  37.11(g)(1) or documentation issued 
by DHS or other Federal agencies demonstrating lawful status as 
determined by USCIS. All documents shall be verified in the manner 
prescribed in Sec.  37.13.
    (h) Exceptions Process. A State DMV may choose to establish a 
written, defined exceptions process for persons who, for reasons beyond 
their control, are unable to present all necessary documents and must 
rely on alternate documents to establish identity or date of birth. 
Alternative documents to demonstrate lawful status will only be allowed 
to demonstrate U.S. citizenship.
    (1) Each State establishing an exceptions process must make 
reasonable efforts to establish the authenticity of alternate documents 
each time they are presented and indicate that an exceptions process was 
used in the applicant's record.
    (2) The State shall retain copies or images of the alternate 
documents accepted pursuant to Sec.  37.31 of this part.
    (3) The State shall conduct a review of the use of the exceptions 
process, and pursuant to subpart E of this part, prepare and submit a 
report with a copy of the exceptions process as part of the 
certification documentation detailed in Sec.  37.55.
    (i) States are not required to comply with these requirements when 
issuing REAL ID driver's licenses or identification cards in support of 
Federal, State, or local criminal justice agencies or other programs 
that require special licensing or identification to safeguard persons or 
in support of their other official duties. As directed by appropriate 
officials of these Federal, State, or local agencies, States should take 
sufficient steps to safeguard the identities of such persons. Driver's 
licenses and identification cards issued in support of Federal, State, 
or local criminal justice agencies or programs that require special 
licensing or identification to safeguard persons or in support of their 
other official duties shall not be distinguishable from other REAL ID 
licenses or identification cards issued by the State.



Sec.  37.13  Document verification requirements.

    (a) States shall make reasonable efforts to ensure that the 
applicant does not have more than one driver's license or identification 
card already issued by that State under a different identity. In States 
where an individual is permitted to hold both a driver's license and 
identification card, the State shall ensure that the individual has not 
been issued identification documents in multiple or different names. 
States shall also comply with the provisions of Sec.  37.29 before 
issuing a driver's license or identification card.
    (b) States must verify the documents and information required under 
Sec.  37.11 with the issuer of the document. States shall use systems 
for electronic validation of document and identity data as they become 
available or use alternative methods approved by DHS.
    (1) States shall verify any document described in Sec.  37.11(c) or 
(g) and issued by DHS (including, but not limited to, the I-94 form 
described in Sec.  37.11(c)(vi)) through the Systematic Alien 
Verification for Entitlements (SAVE) system or alternate methods 
approved by DHS, except that if two DHS-issued documents are presented, 
a SAVE verification of one document that confirms lawful status does not 
need to be repeated for the second document. In the event of a non-
match, the DMV must not issue a REAL ID driver's license or 
identification card to an applicant, and must refer the individual to 
U.S. Citizenship and Immigration Services for resolution.
    (2) States must verify SSNs with the Social Security Administration 
(SSA) or through another method approved by DHS. In the event of a non-
match with SSA, a State may use existing procedures to resolve non-
matches. If the State is unable to resolve the non-match, and the use of 
an exceptions process is not warranted in the situation, the DMV must 
not issue a REAL

[[Page 280]]

ID driver's license or identification card to an applicant until the 
information verifies with SSA.
    (3) States must verify birth certificates presented by applicants. 
States should use the Electronic Verification of Vital Events (EVVE) 
system or other electronic systems whenever the records are available. 
If the document does not appear authentic upon inspection or the data 
does not match and the use of an exceptions process is not warranted in 
the situation, the State must not issue a REAL ID driver's license or 
identification card to the applicant until the information verifies, and 
should refer the individual to the issuing office for resolution.
    (4) States shall verify documents issued by the Department of State 
with the Department of State or through methods approved by DHS.
    (5) States must verify REAL ID driver's licenses and identification 
cards with the State of issuance.
    (6) Nothing in this section precludes a State from issuing an 
interim license or a license issued under Sec.  37.71 that will not be 
accepted for official purposes to allow the individual to resolve any 
non-match.



Sec.  37.15  Physical security features for the driver's license or 
identification card.

    (a) General. States must include document security features on REAL 
ID driver's licenses and identification cards designed to deter forgery 
and counterfeiting, promote an adequate level of confidence in the 
authenticity of cards, and facilitate detection of fraudulent cards in 
accordance with this section.
    (1) These features must not be capable of being reproduced using 
technologies that are commonly used and made available to the general 
public.
    (2) The proposed card solution must contain a well-designed, 
balanced set of features that are effectively combined and provide 
multiple layers of security. States must describe these document 
security features in their security plans pursuant to Sec.  37.41.
    (b) Integrated security features. REAL ID driver's licenses and 
identification cards must contain at least three levels of integrated 
security features that provide the maximum resistance to persons' 
efforts to--
    (1) Counterfeit, alter, simulate, or reproduce a genuine document;
    (2) Alter, delete, modify, mask, or tamper with data concerning the 
original or lawful card holder;
    (3) Substitute or alter the original or lawful card holder's 
photograph and/or signature by any means; and
    (4) Create a fraudulent document using components from legitimate 
driver's licenses or identification cards.
    (c) Security features to detect false cards. States must employ 
security features to detect false cards for each of the following three 
levels:
    (1) Level 1. Cursory examination, without tools or aids involving 
easily identifiable visual or tactile features, for rapid inspection at 
point of usage.
    (2) Level 2. Examination by trained inspectors with simple 
equipment.
    (3) Level 3. Inspection by forensic specialists.
    (d) Document security and integrity. States must conduct a review of 
their card design and submit a report to DHS with their certification 
that indicates the ability of the design to resist compromise and 
document fraud attempts. The report required by this paragraph is SSI 
and must be handled and protected in accordance with 49 CFR part 1520. 
Reports must be updated and submitted to DHS whenever a security feature 
is modified, added, or deleted. After reviewing the report, DHS may 
require a State to provide DHS with examination results from a 
recognized independent laboratory experienced with adversarial analysis 
of identification documents concerning one or more areas relating to the 
card's security.



Sec.  37.17  Requirements for the surface of the driver's license or
identification card.

    To be accepted by a Federal agency for official purposes, REAL ID 
driver's licenses and identification cards must include on the front of 
the card (unless otherwise specified below) the following information:
    (a) Full legal name. Except as permitted in Sec.  37.11(c)(2), the 
name on the face of the license or card must be the

[[Page 281]]

same as the name on the source document presented by the applicant to 
establish identity. Where the individual has only one name, that name 
should be entered in the last name or family name field, and the first 
and middle name fields should be left blank. Place holders such as NFN, 
NMN, and NA should not be used.
    (b) Date of birth.
    (c) Gender, as determined by the State.
    (d) Unique Driver's license or identification card number. This 
cannot be the individual's SSN, and must be unique across driver's 
license or identification cards within the State.
    (e) Full facial digital photograph. A full facial photograph must be 
taken pursuant to the standards set forth below:
    (1) States shall follow specifically ISO/IEC 19794-5:2005(E) 
(incorporated by reference; see Sec.  37.4).
    (2) Photographs may be in black and white or color.
    (f) Address of principal residence, except an alternative address 
may be displayed for:
    (1) Individuals for whom a State law, regulation, or DMV procedure 
permits display of an alternative address, or
    (2) Individuals who satisfy any of the following:
    (i) If the individual is enrolled in a State address confidentiality 
program which allows victims of domestic violence, dating violence, 
sexual assault, stalking, or a severe form of trafficking, to keep, 
obtain, and use alternative addresses; and provides that the addresses 
of such persons must be kept confidential, or other similar program;
    (ii) If the individual's address is entitled to be suppressed under 
State or Federal law or suppressed by a court order including an 
administrative order issued by a State or Federal court; or
    (iii) If the individual is protected from disclosure of information 
pursuant to section 384 of the Illegal Immigration Reform and Immigrant 
Responsibility Act of 1996.
    (3) In areas where a number and street name has not been assigned 
for U.S. mail delivery, an address convention used by the U.S. Postal 
Service is acceptable.
    (g) Signature. (1) The card must include the signature of the card 
holder. The signature must meet the requirements of the AAMVA 
Specifications (incorporated by reference; see Sec.  37.4). This 
standard includes requirements for size, scaling, cropping, color, 
borders, and resolution.
    (2) The State shall establish alternative procedures for individuals 
unable to sign their name.
    (h) Physical security features, pursuant to Sec.  37.15 of this 
subpart.
    (i) Machine-readable technology on the back of the card, pursuant to 
Sec.  37.19 of this subpart.
    (j) Date of transaction.
    (k) Expiration date.
    (l) State or territory of issuance.
    (m) Printed information. The name, date of birth, gender, card 
number, issue date, expiration date, and address on the face of the card 
must be in Latin alpha-numeric characters. The name must contain a field 
of no less than a total of 39 characters, and longer names shall be 
truncated following the standard established by ICAO 9303 (incorporated 
by reference; see Sec.  37.4).
    (n) The card shall bear a DHS-approved security marking on each 
driver's license or identification card that is issued reflecting the 
card's level of compliance as set forth in Sec.  37.51 of this Rule.

[73 FR 5331, Jan. 29, 2008, as amended at 88 FR 44192, July 12, 2023]



Sec.  37.19  Machine readable technology on the driver's license or
identification card.

    For the machine readable portion of the REAL ID driver's license or 
identification card, States must use ISO/IEC 15438:2006(E) (incorporated 
by reference; see Sec.  37.4). The PDF417 bar code standard must have 
the following defined minimum data elements:
    (a) Expiration date.
    (b) Full legal name, unless the State permits an applicant to 
establish a name other than the name that appears on a source document, 
pursuant to Sec.  37.11(c)(2).
    (c) Date of transaction.
    (d) Date of birth.
    (e) Gender.

[[Page 282]]

    (f) Address as listed on the card pursuant to Sec.  37.17(f).
    (g) Unique driver's license or identification card number.
    (h) Card design revision date, indicating the most recent change or 
modification to the visible format of the driver's license or 
identification card.
    (i) Inventory control number of the physical document.
    (j) State or territory of issuance.

[73 FR 5331, Jan. 29, 2008, as amended at 88 FR 44192, July 12, 2023]



Sec.  37.21  Temporary or limited-term driver's licenses and 
identification cards.

    States may only issue a temporary or limited-term REAL ID driver's 
license or identification card to an individual who has temporary lawful 
status in the United States.
    (a) States must require, before issuing a temporary or limited-term 
driver's license or identification card to a person, valid documentary 
evidence, verifiable through SAVE or other DHS-approved means, that the 
person has lawful status in the United States.
    (b) States shall not issue a temporary or limited-term driver's 
license or identification card pursuant to this section:
    (1) For a time period longer than the expiration of the applicant's 
authorized stay in the United States, or, if there is no expiration 
date, for a period longer than one year; and
    (2) For longer than the State's maximum driver's license or 
identification card term.
    (c) States shall renew a temporary or limited-term driver's license 
or identification card pursuant to this section and Sec.  37.25(b)(2), 
only if:
    (1) the individual presents valid documentary evidence that the 
status by which the applicant qualified for the temporary or limited-
term driver's license or identification card is still in effect, or
    (2) the individual presents valid documentary evidence that he or 
she continues to qualify for lawful status under paragraph (a) of this 
section.
    (d) States must verify the information presented to establish lawful 
status through SAVE, or another method approved by DHS.
    (e) Temporary or limited-term driver's licenses and identification 
cards must clearly indicate on the face of the license and in the 
machine readable zone that the license or card is a temporary or 
limited-term driver's license or identification card.



Sec.  37.23  Reissued REAL ID driver's licenses and identification cards.

    (a) State procedure. States must establish an effective procedure to 
confirm or verify an applicant's identity each time a REAL ID driver's 
license or identification card is reissued, to ensure that the 
individual receiving the reissued REAL ID driver's license or 
identification card is the same individual to whom the driver's license 
or identification card was originally issued.
    (b) Remote/Non-in-person reissuance. Except as provided in paragraph 
(c) of this section a State may conduct a non-in-person (remote) 
reissuance if State procedures permit the reissuance to be conducted 
remotely. Except for the reissuance of duplicate driver's licenses and 
identification cards as defined in this rule, the State must reverify 
pursuant to Sec.  37.13, the applicant's SSN and lawful status prior to 
reissuing the driver's license or identification card.
    (c) In-person reissuance. The State may not remotely reissue a 
driver's license or identification card where there has been a material 
change in any personally identifiable information since prior issuance. 
All material changes must be established through an applicant's 
presentation of an original source document as provided in this subpart, 
and must be verified as specified in Sec.  37.13.



Sec.  37.25  Renewal of REAL ID driver's licenses and identification
cards.

    (a) In-person renewals. States must require holders of REAL ID 
driver's licenses and identification cards to renew their driver's 
licenses and identification cards with the State DMV in person, no less 
frequently than every sixteen years.
    (1) The State DMV shall take an updated photograph of the applicant, 
no

[[Page 283]]

less frequently than every sixteen years.
    (2) The State must reverify the renewal applicant's SSN and lawful 
status through SSOLV and SAVE, respectively (or other DHS-approved 
means) as applicable prior to renewing the driver's license or 
identification card. The State must also verify electronically 
information that it was not able to verify at a previous issuance or 
renewal if the systems or processes exist to do so.
    (3) Holders of temporary or limited-term REAL ID driver's licenses 
and identification cards must present evidence of continued lawful 
status via SAVE or other method approved by DHS when renewing their 
driver's license or identification card.
    (b) Remote/Non-in-person renewal. Except as provided in (b)(2) a 
State may conduct a non-in-person (remote) renewal if State procedures 
permit the renewal to be conducted remotely.
    (1) The State must reverify the applicant's SSN and lawful status 
pursuant to Sec.  37.13 prior to renewing the driver's license or 
identification card.
    (2) The State may not remotely renew a REAL ID driver's license or 
identification card where there has been a material change in any 
personally identifiable information since prior issuance. All material 
changes must be established through the applicant's presentation of an 
original source document as provided in Subpart B, and must be verified 
as specified in Sec.  37.13.



Sec.  37.27  Driver's licenses and identification cards issued during
the age-based enrollment period.

    Driver's licenses and identification cards issued to individuals 
prior to a DHS determination that the State is materially compliant may 
be renewed or reissued pursuant to current State practices, and will be 
accepted for official purposes until the validity dates described in 
Sec.  37.5.

[73 FR 5331, Jan. 29, 2008, as amended at 79 FR 77838, Dec. 29, 2014]



Sec.  37.29  Prohibition against holding more than one REAL ID card or
more than one driver's license.

    (a) An individual may hold only one REAL ID card. An individual 
cannot hold a REAL ID driver's license and a REAL ID identification card 
simultaneously. Nothing shall preclude an individual from holding a REAL 
ID card and a non-REAL ID card unless prohibited by his or her State.
    (b) Prior to issuing a REAL ID driver's license,
    (1) A State must check with all other States to determine if the 
applicant currently holds a driver's license or REAL ID identification 
card in another State.
    (2) If the State receives confirmation that the individual holds a 
driver's license in another State, or possesses a REAL ID identification 
card in another State, the receiving State must take measures to confirm 
that the person has terminated or is terminating the driver's license or 
REAL ID identification card issued by the prior State pursuant to State 
law, regulation or procedure.
    (c) Prior to issuing a REAL ID identification card,
    (1) A State must check with all other States to determine if the 
applicant currently holds a REAL ID driver's license or identification 
card in another State.
    (2) If the State receives confirmation that the individual holds a 
REAL ID card in another State the receiving State must take measures to 
confirm that the person has terminated or is terminating the REAL ID 
driver's license or identification card issued by the prior State 
pursuant to State law, regulation or procedure.



                      Subpart C_Other Requirements



Sec.  37.31  Source document retention.

    (a) States must retain copies of the application, declaration and 
source documents presented under Sec.  37.11 of this part, including 
documents used to establish all names recorded by the DMV under Sec.  
37.11(c)(2). States shall take measures to protect any personally 
identifiable information collected

[[Page 284]]

pursuant to the REAL ID Act as described in their security plan under 
Sec.  37.41(b)(2).
    (1) States that choose to keep paper copies of source documents must 
retain the copies for a minimum of seven years.
    (2) States that choose to transfer information from paper copies to 
microfiche must retain the microfiche for a minimum of ten years.
    (3) States that choose to keep digital images of source documents 
must retain the images for a minimum of ten years.
    (4) States are not required to retain the declaration with 
application and source documents, but must retain the declaration 
consistent with applicable State document retention requirements and 
retention periods.
    (b) States using digital imaging to retain source documents must 
store the images as follows:
    (1) Photo images must be stored in the Joint Photographic Experts 
Group (JPEG) 2000 standard for image compression, or a standard that is 
interoperable with the JPEG standard. Images must be stored in an open 
(consensus) format, without proprietary wrappers, to ensure States can 
effectively use the image captures of other States as needed.
    (2) Document and signature images must be stored in a compressed 
Tagged Image Format (TIF), or a standard that is interoperable with the 
TIF standard.
    (3) All images must be retrievable by the DMV if properly requested 
by law enforcement.
    (c) Upon request by an applicant, a State shall record and retain 
the applicant's name, date of birth, certificate numbers, date filed, 
and issuing agency in lieu of an image or copy of the applicant's birth 
certificate, where such procedures are required by State law.



Sec.  37.33  DMV databases.

    (a) States must maintain a State motor vehicle database that 
contains, at a minimum--
    (1) All data fields printed on driver's licenses and identification 
cards issued by the State, individual serial numbers of the card, and 
SSN;
    (2) A record of the full legal name and recorded name established 
under Sec.  37.11(c)(2) as applicable, without truncation;
    (3) All additional data fields included in the MRZ but not printed 
on the driver's license or identification card; and
    (4) Motor vehicle driver's histories, including motor vehicle 
violations, suspensions, and points on driver's licenses.
    (b) States must protect the security of personally identifiable 
information, collected pursuant to the REAL ID Act, in accordance with 
Sec.  37.41(b)(2) of this part.



Subpart D_Security at DMVs and Driver's License and Identification Card 
                          Production Facilities



Sec.  37.41  Security plan.

    (a) In General. States must have a security plan that addresses the 
provisions in paragraph (b) of this section and must submit the security 
plan as part of its REAL ID certification under Sec.  37.55.
    (b) Security plan contents. At a minimum, the security plan must 
address--
    (1) Physical security for the following:
    (i) Facilities used to produce driver's licenses and identification 
cards.
    (ii) Storage areas for card stock and other materials used in card 
production.
    (2) Security of personally identifiable information maintained at 
DMV locations involved in the enrollment, issuance, manufacture and/or 
production of cards issued under the REAL ID Act, including, but not 
limited to, providing the following protections:
    (i) Reasonable administrative, technical, and physical safeguards to 
protect the security, confidentiality, and integrity of the personally 
identifiable information collected, stored, and maintained in DMV 
records and information systems for purposes of complying with the REAL 
ID Act. These safeguards must include procedures to prevent unauthorized 
access, use, or dissemination of applicant information

[[Page 285]]

and images of source documents retained pursuant to the Act and 
standards and procedures for document retention and destruction.
    (ii) A privacy policy regarding the personally identifiable 
information collected and maintained by the DMV pursuant to the REAL ID 
Act.
    (iii) Any release or use of personal information collected and 
maintained by the DMV pursuant to the REAL ID Act must comply with the 
requirements of the Driver's Privacy Protection Act, 18 U.S.C. 2721 et 
seq. State plans may go beyond these minimum privacy requirements to 
provide greater protection, and such protections are not subject to 
review by DHS for purposes of determining compliance with this part.
    (3) Document and physical security features for the card, consistent 
with the requirements of Sec.  37.15, including a description of the 
State's use of biometrics, and the technical standard utilized, if any;
    (4) Access control, including the following:
    (i) Employee identification and credentialing, including access 
badges.
    (ii) Employee background checks, in accordance with Sec.  37.45 of 
this part.
    (iii) Controlled access systems.
    (5) Periodic training requirements in--
    (i) Fraudulent document recognition training for all covered 
employees handling source documents or engaged in the issuance of 
driver's licenses and identification cards. The fraudulent document 
training program approved by AAMVA or other DHS approved method 
satisfies the requirement of this subsection.
    (ii) Security awareness training, including threat identification 
and handling of SSI as necessary.
    (6) Emergency/incident response plan;
    (7) Internal audit controls;
    (8) An affirmation that the State possesses both the authority and 
the means to produce, revise, expunge, and protect the confidentiality 
of REAL ID driver's licenses or identification cards issued in support 
of Federal, State, or local criminal justice agencies or similar 
programs that require special licensing or identification to safeguard 
persons or support their official duties. These procedures must be 
designed in coordination with the key requesting authorities to ensure 
that the procedures are effective and to prevent conflicting or 
inconsistent requests. In order to safeguard the identities of 
individuals, these procedures should not be discussed in the plan and 
States should make every effort to prevent disclosure to those without a 
need to know about either this confidential procedure or any substantive 
information that may compromise the confidentiality of these operations. 
The appropriate law enforcement official and United States Attorney 
should be notified of any action seeking information that could 
compromise Federal law enforcement interests.
    (c) Handling of Security Plan. The Security Plan required by this 
section contains Sensitive Security Information (SSI) and must be 
handled and protected in accordance with 49 CFR part 1520.



Sec.  37.43  Physical security of DMV production facilities.

    (a) States must ensure the physical security of facilities where 
driver's licenses and identification cards are produced, and the 
security of document materials and papers from which driver's licenses 
and identification cards are produced or manufactured.
    (b) States must describe the security of DMV facilities as part of 
their security plan, in accordance with Sec.  37.41.



Sec.  37.45  Background checks for covered employees.

    (a) Scope. States are required to subject persons who are involved 
in the manufacture or production of REAL ID driver's licenses and 
identification cards, or who have the ability to affect the identity 
information that appears on the driver's license or identification card, 
or current employees who will be assigned to such positions (``covered 
employees'' or ``covered positions''), to a background check. The 
background check must include, at a minimum, the validation of 
references from prior employment, a name-based and fingerprint-based 
criminal history records check, and employment eligibility verification 
otherwise required by law. States shall describe their background check 
process as part of their security

[[Page 286]]

plan, in accordance with Sec.  37.41(b)(4)(ii). This section also 
applies to contractors utilized in covered positions.
    (b) Background checks. States must ensure that any covered employee 
under paragraph (a) of this section is provided notice that he or she 
must undergo a background check and the contents of that check.
    (1) Criminal history records check. States must conduct a name-based 
and fingerprint-based criminal history records check (CHRC) using, at a 
minimum, the FBI's National Crime Information Center (NCIC) and the 
Integrated Automated Fingerprint Identification (IAFIS) database and 
State repository records on each covered employee identified in 
paragraph (a) of this section, and determine if the covered employee has 
been convicted of any of the following disqualifying crimes:
    (i) Permanent disqualifying criminal offenses. A covered employee 
has a permanent disqualifying offense if convicted, or found not guilty 
by reason of insanity, in a civilian or military jurisdiction, of any of 
the felonies set forth in 49 CFR 1572.103(a).
    (ii) Interim disqualifying criminal offenses. The criminal offenses 
referenced in 49 CFR 1572.103(b) are disqualifying if the covered 
employee was either convicted of those offenses in a civilian or 
military jurisdiction, or admits having committed acts which constitute 
the essential elements of any of those criminal offenses within the 
seven years preceding the date of employment in the covered position; or 
the covered employee was released from incarceration for the crime 
within the five years preceding the date of employment in the covered 
position.
    (iii) Under want or warrant. A covered employee who is wanted or 
under indictment in any civilian or military jurisdiction for a felony 
referenced in this section is disqualified until the want or warrant is 
released.
    (iv) Determination of arrest status. When a fingerprint-based check 
discloses an arrest for a disqualifying crime referenced in this section 
without indicating a disposition, the State must determine the 
disposition of the arrest.
    (v) Waiver. The State may establish procedures to allow for a waiver 
of the requirements of paragraphs (b)(1)(ii) or (b)(1)(iv) of this 
section under circumstances determined by the State. These procedures 
can cover circumstances where the covered employee has been arrested, 
but no final disposition of the matter has been reached.
    (2) Employment eligibility status verification. The State shall 
ensure it is fully in compliance with the requirements of section 274A 
of the Immigration and Nationality Act (8 U.S.C. 1324a) and its 
implementing regulations (8 CFR part 274A) with respect to each covered 
employee. The State is encouraged to participate in the USCIS E-Verify 
program (or any successor program) for employment eligibility 
verification.
    (3) Reference check. Reference checks from prior employers are not 
required if the individual has been employed by the DMV for at least two 
consecutive years since May 11, 2006.
    (4) Disqualification. If results of the State's CHRC reveal a 
permanent disqualifying criminal offense under paragraph (b)(1)(i) or an 
interim disqualifying criminal offense under paragraph (b)(1)(ii), the 
covered employee may not be employed in a position described in 
paragraph (a) of this section. An employee whose employment eligibility 
has not been verified as required by section 274A of the Immigration and 
Nationality Act (8 U.S.C. 1324a) and its implementing regulations (8 CFR 
part 274A) may not be employed in any position.
    (c) Appeal. If a State determines that the results from the CHRC do 
not meet the standards of such check the State must so inform the 
employee of the determination to allow the individual an opportunity to 
appeal to the State or Federal government, as applicable.
    (d) Background checks substantially similar to the requirements of 
this section that were conducted on existing employees on or after May 
11, 2006 need not be re-conducted.

[[Page 287]]



          Subpart E_Procedures for Determining State Compliance



Sec.  37.51  Compliance--general requirements.

    (a) Full compliance. To be in full compliance with the REAL ID Act 
of 2005, 49 U.S.C. 30301 note, States must meet the standards of 
subparts A through D or have a REAL ID program that DHS has determined 
to be comparable to the standards of subparts A through D. States 
certifying compliance with the REAL ID Act must follow the certification 
requirements described in Sec.  37.55. States must be fully compliant 
with Subparts A through D on or before January 15, 2013. States must 
file the documentation required under Sec.  37.55 at least 90 days prior 
to the effective date of full compliance.
    (b) Material compliance. States must be in material compliance by 
January 1, 2010 to receive an additional extension until no later than 
May 10, 2011 as described in Sec.  37.63. Benchmarks for material 
compliance are detailed in the Material Compliance Checklist found in 
DHS' Web site at http://www.dhs.gov.

[73 FR 5331, Jan. 29, 2008, as amended at 76 FR 12271, Mar. 7, 2011]

    Effective Date Note: At 74 FR 68478, Dec. 28, 2009, in Sec.  37.51, 
paragraph (b) was stayed from Jan. 1, 2010, until further notice.



Sec.  37.55  State certification documentation.

    (a) States seeking DHS's determination that its program for issuing 
REAL ID driver's licenses and identification cards is meeting the 
requirements of this part (full compliance), must provide DHS with the 
following documents:
    (1) A certification by the highest level Executive official in the 
State overseeing the DMV reading as follows:

    ``I, [name and title (name of certifying official), (position title) 
of the State (Commonwealth))] of ______, do hereby certify that the 
State (Commonwealth) has implemented a program for issuing driver's 
licenses and identification cards in compliance with the requirements of 
the REAL ID Act of 2005, as further defined in 6 CFR par_t 37, and 
intends to remain in compliance with these regulations.''

    (2) A letter from the Attorney General of the State confirming that 
the State has the legal authority to impose requirements necessary to 
meet the standards established by this part.
    (3) A description of the State's exceptions process under Sec.  
37.11(h), and the State's waiver processes under Sec.  37.45(b)(1)(v).
    (4) The State's Security Plan under Sec.  37.41.
    (b) After DHS's final compliance determination, States shall 
recertify compliance with this part every three years on a rolling basis 
as determined by DHS.



Sec.  37.59  DHS reviews of State compliance.

    State REAL ID programs will be subject to DHS review to determine 
whether the State meets the requirements for compliance with this part.
    (a) General inspection authority. States must cooperate with DHS's 
review of the State's compliance at any time. In addition, the State 
must:
    (1) Provide any reasonable information pertinent to determining 
compliance with this part as requested by DHS;
    (2) Permit DHS to conduct inspections of any and all sites 
associated with the enrollment of applicants and the production, 
manufacture, personalization and issuance of driver's licenses or 
identification cards; and
    (3) Allow DHS to conduct interviews of the State's employees and 
contractors who are involved in the application and verification 
process, or the manufacture and production of driver's licenses or 
identification cards. DHS shall provide written notice to the State in 
advance of an inspection visit.
    (b) Preliminary DHS determination. DHS shall review forms, conduct 
audits of States as necessary, and make a preliminary determination on 
whether the State has satisfied the requirements of this part within 45 
days of receipt of the Material Compliance Checklist or State 
certification documentation of full compliance pursuant to Sec.  37.55.
    (1) If DHS determines that the State meets the benchmarks of the 
Material Compliance Checklist, DHS may grant the State an additional 
extension until no later than May 10, 2011.
    (2) If DHS determines that the State meets the full requirements of 
subparts

[[Page 288]]

A through E, the Secretary shall make a final determination that the 
State is in compliance with the REAL ID Act.
    (c) State reply. The State will have up to 30 calendar days to 
respond to the preliminary determination. The State's reply must explain 
what corrective action it either has implemented, or intends to 
implement, to correct any deficiencies cited in the preliminary 
determination or, alternatively, detail why the DHS preliminary 
determination is incorrect. Upon request by the State, an informal 
conference will be scheduled during this time.
    (d) Final DHS determination. DHS will notify States of its final 
determination of State compliance with this part, within 45 days of 
receipt of a State reply.
    (e) State's right to judicial review. Any State aggrieved by an 
adverse decision under this section may seek judicial review under 5 
U.S.C. Chapter 7.



Sec.  37.61  Results of compliance determination.

    (a) A State shall be deemed in compliance with this part when DHS 
issues a determination that the State meets the requirements of this 
part.
    (b) The Secretary will determine that a State is not in compliance 
with this part when it--
    (1) Fails to submit a timely certification or request an extension 
as prescribed in this subpart; or
    (2) Does not meet one or more of the standards of this part, as 
established in a determination by DHS under Sec.  37.59.



Sec.  37.63  Extension of deadline.

    (a) A State may request an initial extension by filing a request 
with the Secretary no later than March 31, 2008. In the absence of 
extraordinary circumstances, such an extension request will be deemed 
justified for a period lasting until, but not beyond, December 31, 2009. 
DHS shall notify a State of its acceptance of the State's request for 
initial extension within 45 days of receipt.
    (b) States granted an initial extension may file a request for an 
additional extension until no later than May 10, 2011, by submitting a 
Material Compliance Checklist demonstrating material compliance, per 
Sec.  37.51(b) with certain elements of subparts A through E as defined 
by DHS. Such additional extension request must be filed by December 1, 
2009. DHS shall notify a State whether an additional extension has been 
granted within 45 days of receipt of the request and documents described 
above.
    (c) Subsequent extensions, if any, will be at the discretion of the 
Secretary.

[73 FR 5331, Jan. 29, 2008, as amended at 74 FR 49309, Sept. 28, 2009]



Sec.  37.65  Effect of failure to comply with this part.

    (a) Any driver's license or identification card issued by a State 
that DHS determines is not in compliance with this part is not 
acceptable as identification by Federal agencies for official purposes.
    (b) Driver's licenses and identification cards issued by a State 
that has obtained an extension of the compliance date from DHS per Sec.  
37.51 are acceptable for official purposes until the end of the 
applicable enrollment period under Sec.  37.5; or the State subsequently 
is found by DHS under this Subpart to not be in compliance.
    (c) Driver's licenses and identification cards issued by a State 
that has been determined by DHS to be in material compliance and that 
are marked to identify that the licenses and cards are materially 
compliant will continue to be accepted by Federal agencies after the 
expiration of the enrollment period under Sec.  37.5, until the 
expiration date on the face of the document.



   Subpart F_Driver's Licenses and Identification Cards Issued Under 
                  section 202(d)(11) of the REAL ID Act



Sec.  37.71  Driver's licenses and identification cards issued under
section 202(d)(11) of the REAL ID Act.

    (a) Except as authorized in Sec.  37.27, States that DHS determines 
are compliant with the REAL ID Act that choose to also issue driver's 
licenses and identification cards that are not acceptable by Federal 
agencies for official purposes must ensure that such

[[Page 289]]

driver's licenses and identification cards--
    (1) Clearly state on their face and in the machine readable zone 
that the card is not acceptable for official purposes; and
    (2) Have a unique design or color indicator that clearly 
distinguishes them from driver's licenses and identification cards that 
meet the standards of this part.
    (b) DHS reserves the right to approve such designations, as 
necessary, during certification of compliance.



PART 46_PROTECTION OF HUMAN SUBJECTS--Table of Contents



Sec.
46.101 To what does this policy apply?
46.102 Definitions for purposes of this policy.
46.103 Assuring compliance with this policy--research conducted or 
          supported by any Federal department or agency.
46.104 Exempt research.
46.105-46.106 [Reserved]
46.107 IRB membership.
46.108 IRB functions and operations.
46.109 IRB review of research.
46.110 Expedited review procedures for certain kinds of research 
          involving no more than minimal risk, and for minor changes in 
          approved research.
46.111 Criteria for IRB approval of research.
46.112 Review by institution.
46.113 Suspension or termination of IRB approval of research.
46.114 Cooperative research.
46.115 IRB records.
46.116 General requirements for informed consent.
46.117 Documentation of informed consent.
46.118 Applications and proposals lacking definite plans for involvement 
          of human subjects.
46.119 Research undertaken without the intention of involving human 
          subjects.
46.120 Evaluation and disposition of applications and proposals for 
          research to be conducted or supported by a Federal department 
          or agency.
46.121 [Reserved]
46.122 Use of Federal funds.
46.123 Early termination of research support: Evaluation of applications 
          and proposals.
46.124 Conditions.

    Authority: 5 U.S.C. 301; Pub. L. 107-296, sec. 102, 306(c); Pub. L. 
108-458, sec. 8306.

    Source: 82 FR 7269, Jan. 19, 2017, unless otherwise noted.



Sec.  46.101  To what does this policy apply?

    (a) Except as detailed in Sec.  46.104, this policy applies to all 
research involving human subjects conducted, supported, or otherwise 
subject to regulation by any Federal department or agency that takes 
appropriate administrative action to make the policy applicable to such 
research. This includes research conducted by Federal civilian employees 
or military personnel, except that each department or agency head may 
adopt such procedural modifications as may be appropriate from an 
administrative standpoint. It also includes research conducted, 
supported, or otherwise subject to regulation by the Federal Government 
outside the United States. Institutions that are engaged in research 
described in this paragraph and institutional review boards (IRBs) 
reviewing research that is subject to this policy must comply with this 
policy.
    (b) [Reserved]
    (c) Department or agency heads retain final judgment as to whether a 
particular activity is covered by this policy and this judgment shall be 
exercised consistent with the ethical principles of the Belmont 
Report.\62\
---------------------------------------------------------------------------

    \62\ The National Commission for the Protection of Human Subjects of 
Biomedical and Behavioral Research.- Belmont Report. Washington, DC: 
U.S. Department of Health and Human Services. 1979.
---------------------------------------------------------------------------

    (d) Department or agency heads may require that specific research 
activities or classes of research activities conducted, supported, or 
otherwise subject to regulation by the Federal department or agency but 
not otherwise covered by this policy comply with some or all of the 
requirements of this policy.
    (e) Compliance with this policy requires compliance with pertinent 
federal laws or regulations that provide additional protections for 
human subjects.
    (f) This policy does not affect any state or local laws or 
regulations (including tribal law passed by the official governing body 
of an American Indian or Alaska Native tribe) that may otherwise be 
applicable and that provide

[[Page 290]]

additional protections for human subjects.
    (g) This policy does not affect any foreign laws or regulations that 
may otherwise be applicable and that provide additional protections to 
human subjects of research.
    (h) When research covered by this policy takes place in foreign 
countries, procedures normally followed in the foreign countries to 
protect human subjects may differ from those set forth in this policy. 
In these circumstances, if a department or agency head determines that 
the procedures prescribed by the institution afford protections that are 
at least equivalent to those provided in this policy, the department or 
agency head may approve the substitution of the foreign procedures in 
lieu of the procedural requirements provided in this policy. Except when 
otherwise required by statute, Executive Order, or the department or 
agency head, notices of these actions as they occur will be published in 
the Federal Register or will be otherwise published as provided in 
department or agency procedures.
    (i) Unless otherwise required by law, department or agency heads may 
waive the applicability of some or all of the provisions of this policy 
to specific research activities or classes of research activities 
otherwise covered by this policy, provided the alternative procedures to 
be followed are consistent with the principles of the Belmont 
Report.\63\ Except when otherwise required by statute or Executive 
Order, the department or agency head shall forward advance notices of 
these actions to the Office for Human Research Protections, Department 
of Health and Human Services (HHS), or any successor office, or to the 
equivalent office within the appropriate Federal department or agency, 
and shall also publish them in the Federal Register or in such other 
manner as provided in department or agency procedures. The waiver notice 
must include a statement that identifies the conditions under which the 
waiver will be applied and a justification as to why the waiver is 
appropriate for the research, including how the decision is consistent 
with the principles of the Belmont Report.
---------------------------------------------------------------------------

    \63\ Id.
---------------------------------------------------------------------------

    (j) Federal guidance on the requirements of this policy shall be 
issued only after consultation, for the purpose of harmonization (to the 
extent appropriate), with other Federal departments and agencies that 
have adopted this policy, unless such consultation is not feasible.
    (k) [Reserved]
    (l) Compliance dates and transition provisions:
    (1) Pre-2018 Requirements. For purposes of this section, the pre-
2018 Requirements means this subpart as published in the 2016 edition of 
the Code of Federal Regulations.
    (2) 2018 Requirements. For purposes of this section, the 2018 
Requirements means the Federal Policy for the Protection of Human 
Subjects requirements contained in this part. The general compliance 
date for the 2018 Requirements is January 21, 2019. The compliance date 
for Sec.  46.114(b) (cooperative research) of the 2018 Requirements is 
January 20, 2020.
    (3) Research subject to pre-2018 requirements. The pre-2018 
Requirements shall apply to the following research, unless the research 
is transitioning to comply with the 2018 Requirements in accordance with 
paragraph (l)(4) of this section:
    (i) Research initially approved by an IRB under the pre-2018 
Requirements before January 21, 2019;
    (ii) Research for which IRB review was waived pursuant to Sec.  
46.101(i) of the pre-2018 Requirements) before January 21, 2019; and
    (iii) Research for which a determination was made that the research 
was exempt under Sec.  46.101(b) of the pre-2018 Requirements before 
January 21, 2019.
    (4) Transitioning research. If, on or after July 19, 2018, an 
institution planning or engaged in research otherwise covered by 
paragraph (l)(3) of this section determines that such research instead 
will transition to comply with the 2018 Requirements, the institution or 
an IRB must document and date such determination.
    (i) If the determination to transition is documented between July 
19, 2018, and January 20, 2019, the research shall:

[[Page 291]]

    (A) Beginning on the date of such documentation through January 20, 
2019, comply with the pre-2018 Requirements, except that the research 
shall comply with the following:
    (1) Section 46.102(l) of the 2018 Requirements (definition of 
research) (instead of Sec.  46.102(d) of the pre-2018 Requirements);
    (2) Section 46.103(d) of the 2018 Requirements (revised 
certification requirement that eliminates IRB review of application or 
proposal) (instead of Sec.  46.103(f) of the pre-2018 Requirements); and
    (3) Section 46.109(f)(1)(i) and (iii) of the 2018 Requirements 
(exceptions to mandated continuing review) (instead of Sec.  46.103(b), 
as related to the requirement for continuing review, and in addition to 
Sec.  46.109, of the pre-2018 Requirements); and
    (B) Beginning on January 21, 2019, comply with the 2018 
Requirements.
    (ii) If the determination to transition is documented on or after 
January 21, 2019, the research shall, beginning on the date of such 
documentation, comply with the 2018 Requirements.
    (5) Research subject to 2018 Requirements. The 2018 Requirements 
shall apply to the following research:
    (i) Research initially approved by an IRB on or after January 21, 
2019;
    (ii) Research for which IRB review is waived pursuant to paragraph 
(i) of this section on or after January 21, 2019; and
    (iii) Research for which a determination is made that the research 
is exempt on or after January 21, 2019.
    (m) Severability: Any provision of this part held to be invalid or 
unenforceable by its terms, or as applied to any person or circumstance, 
shall be construed so as to continue to give maximum effect to the 
provision permitted by law, unless such holding shall be one of utter 
invalidity or unenforceability, in which event the provision shall be 
severable from this part and shall not affect the remainder thereof or 
the application of the provision to other persons not similarly situated 
or to other dissimilar circumstances.

[82 FR 7269, Jan. 19, 2017, as amended at 83 FR 2890, Jan. 22, 2018; 83 
FR 28510, June 19, 2018]



Sec.  46.102  Definitions for purposes of this policy.

    (a) Certification means the official notification by the institution 
to the supporting Federal department or agency component, in accordance 
with the requirements of this policy, that a research project or 
activity involving human subjects has been reviewed and approved by an 
IRB in accordance with an approved assurance.
    (b) Clinical trial means a research study in which one or more human 
subjects are prospectively assigned to one or more interventions (which 
may include placebo or other control) to evaluate the effects of the 
interventions on biomedical or behavioral health-related outcomes.
    (c) Department or agency head means the head of any Federal 
department or agency, for example, the Secretary of HHS, and any other 
officer or employee of any Federal department or agency to whom the 
authority provided by these regulations to the department or agency head 
has been delegated.
    (d) Federal department or agency refers to a federal department or 
agency (the department or agency itself rather than its bureaus, offices 
or divisions) that takes appropriate administrative action to make this 
policy applicable to the research involving human subjects it conducts, 
supports, or otherwise regulates (e.g., the U.S. Department of Health 
and Human Services, the U.S. Department of Defense, or the Central 
Intelligence Agency).
    (e)(1) Human subject means a living individual about whom an 
investigator (whether professional or student) conducting research:
    (i) Obtains information or biospecimens through intervention or 
interaction with the individual, and uses, studies, or analyzes the 
information or biospecimens; or (ii) Obtains, uses, studies, analyzes, 
or generates identifiable private information or identifiable 
biospecimens.
    (2) Intervention includes both physical procedures by which 
information or biospecimens are gathered (e.g., venipuncture) and 
manipulations of the subject or the subject's environment that are 
performed for research purposes.

[[Page 292]]

    (3) Interaction includes communication or interpersonal contact 
between investigator and subject.
    (4) Private information includes information about behavior that 
occurs in a context in which an individual can reasonably expect that no 
observation or recording is taking place, and information that has been 
provided for specific purposes by an individual and that the individual 
can reasonably expect will not be made public (e.g., a medical record).
    (5) Identifiable private information is private information for 
which the identity of the subject is or may readily be ascertained by 
the investigator or associated with the information.
    (6) An identifiable biospecimen is a biospecimen for which the 
identity of the subject is or may readily be ascertained by the 
investigator or associated with the biospecimen.
    (7) Federal departments or agencies implementing this policy shall:
    (i) Upon consultation with appropriate experts (including experts in 
data matching and re-identification), reexamine the meaning of 
``identifiable private information,'' as defined in paragraph (e)(5) of 
this section, and ``identifiable biospecimen,'' as defined in paragraph 
(e)(6) of this section. This reexamination shall take place within 1 
year and regularly thereafter (at least every 4 years). This process 
will be conducted by collaboration among the Federal departments and 
agencies implementing this policy. If appropriate and permitted by law, 
such Federal departments and agencies may alter the interpretation of 
these terms, including through the use of guidance.
    (ii) Upon consultation with appropriate experts, assess whether 
there are analytic technologies or techniques that should be considered 
by investigators to generate ``identifiable private information,'' as 
defined in paragraph (e)(5) of this section, or an ``identifiable 
biospecimen,'' as defined in paragraph (e)(6) of this section. This 
assessment shall take place within 1 year and regularly thereafter (at 
least every 4 years). This process will be conducted by collaboration 
among the Federal departments and agencies implementing this policy. Any 
such technologies or techniques will be included on a list of 
technologies or techniques that produce identifiable private information 
or identifiable biospecimens. This list will be published in the Federal 
Register after notice and an opportunity for public comment. The 
Secretary, HHS, shall maintain the list on a publicly accessible Web 
site.
    (f) Institution means any public or private entity, or department or 
agency (including federal, state, and other agencies).
    (g) IRB means an institutional review board established in accord 
with and for the purposes expressed in this policy.
    (h) IRB approval means the determination of the IRB that the 
research has been reviewed and may be conducted at an institution within 
the constraints set forth by the IRB and by other institutional and 
federal requirements.
    (i) Legally authorized representative means an individual or 
judicial or other body authorized under applicable law to consent on 
behalf of a prospective subject to the subject's participation in the 
procedure(s) involved in the research. If there is no applicable law 
addressing this issue, legally authorized representative means an 
individual recognized by institutional policy as acceptable for 
providing consent in the nonresearch context on behalf of the 
prospective subject to the subject's participation in the procedure(s) 
involved in the research.
    (j) Minimal risk means that the probability and magnitude of harm or 
discomfort anticipated in the research are not greater in and of 
themselves than those ordinarily encountered in daily life or during the 
performance of routine physical or psychological examinations or tests.
    (k) Public health authority means an agency or authority of the 
United States, a state, a territory, a political subdivision of a state 
or territory, an Indian tribe, or a foreign government, or a person or 
entity acting under a grant of authority from or contract with such 
public agency, including the employees or agents of such public agency 
or its contractors or persons or entities to whom it has granted 
authority, that is responsible for public

[[Page 293]]

health matters as part of its official mandate.
    (l) Research means a systematic investigation, including research 
development, testing, and evaluation, designed to develop or contribute 
to generalizable knowledge. Activities that meet this definition 
constitute research for purposes of this policy, whether or not they are 
conducted or supported under a program that is considered research for 
other purposes. For example, some demonstration and service programs may 
include research activities. For purposes of this part, the following 
activities are deemed not to be research:
    (1) Scholarly and journalistic activities (e.g., oral history, 
journalism, biography, literary criticism, legal research, and 
historical scholarship), including the collection and use of 
information, that focus directly on the specific individuals about whom 
the information is collected.
    (2) Public health surveillance activities, including the collection 
and testing of information or biospecimens, conducted, supported, 
requested, ordered, required, or authorized by a public health 
authority. Such activities are limited to those necessary to allow a 
public health authority to identify, monitor, assess, or investigate 
potential public health signals, onsets of disease outbreaks, or 
conditions of public health importance (including trends, signals, risk 
factors, patterns in diseases, or increases in injuries from using 
consumer products). Such activities include those associated with 
providing timely situational awareness and priority setting during the 
course of an event or crisis that threatens public health (including 
natural or man-made disasters).
    (3) Collection and analysis of information, biospecimens, or records 
by or for a criminal justice agency for activities authorized by law or 
court order solely for criminal justice or criminal investigative 
purposes.
    (4) Authorized operational activities (as determined by each agency) 
in support of intelligence, homeland security, defense, or other 
national security missions.
    (m) Written, or in writing, for purposes of this part, refers to 
writing on a tangible medium (e.g., paper) or in an electronic format.



Sec.  46.103  Assuring compliance with this policy--research conducted
or supported by any Federal department or agency.

    (a) Each institution engaged in research that is covered by this 
policy, with the exception of research eligible for exemption under 
Sec.  46.104, and that is conducted or supported by a Federal department 
or agency, shall provide written assurance satisfactory to the 
department or agency head that it will comply with the requirements of 
this policy. In lieu of requiring submission of an assurance, individual 
department or agency heads shall accept the existence of a current 
assurance, appropriate for the research in question, on file with the 
Office for Human Research Protections, HHS, or any successor office, and 
approved for Federal-wide use by that office. When the existence of an 
HHS-approved assurance is accepted in lieu of requiring submission of an 
assurance, reports (except certification) required by this policy to be 
made to department and agency heads shall also be made to the Office for 
Human Research Protections, HHS, or any successor office. Federal 
departments and agencies will conduct or support research covered by 
this policy only if the institution has provided an assurance that it 
will comply with the requirements of this policy, as provided in this 
section, and only if the institution has certified to the department or 
agency head that the research has been reviewed and approved by an IRB 
(if such certification is required by Sec.  46.103(d)).
    (b) The assurance shall be executed by an individual authorized to 
act for the institution and to assume on behalf of the institution the 
obligations imposed by this policy and shall be filed in such form and 
manner as the department or agency head prescribes.
    (c) The department or agency head may limit the period during which 
any assurance shall remain effective or otherwise condition or restrict 
the assurance.
    (d) Certification is required when the research is supported by a 
Federal department or agency and not otherwise

[[Page 294]]

waived under Sec.  46.101(i) or exempted under Sec.  46.104. For such 
research, institutions shall certify that each proposed research study 
covered by the assurance and this section has been reviewed and approved 
by the IRB. Such certification must be submitted as prescribed by the 
Federal department or agency component supporting the research. Under no 
condition shall research covered by this section be initiated prior to 
receipt of the certification that the research has been reviewed and 
approved by the IRB.
    (e) For nonexempt research involving human subjects covered by this 
policy (or exempt research for which limited IRB review takes place 
pursuant to Sec.  46.104(d)(2)(iii), (d)(3)(i)(C), or (d)(7) or (8)) 
that takes place at an institution in which IRB oversight is conducted 
by an IRB that is not operated by the institution, the institution and 
the organization operating the IRB shall document the institution's 
reliance on the IRB for oversight of the research and the 
responsibilities that each entity will undertake to ensure compliance 
with the requirements of this policy (e.g., in a written agreement 
between the institution and the IRB, by implementation of an 
institution-wide policy directive providing the allocation of 
responsibilities between the institution and an IRB that is not 
affiliated with the institution, or as set forth in a research 
protocol).

(Approved by the Office of Management and Budget under Control Number 
0990-0260)



Sec.  46.104  Exempt research.

    (a) Unless otherwise required by law or by department or agency 
heads, research activities in which the only involvement of human 
subjects will be in one or more of the categories in paragraph (d) of 
this section are exempt from the requirements of this policy, except 
that such activities must comply with the requirements of this section 
and as specified in each category.
    (b) Use of the exemption categories for research subject to the 
requirements of subparts B, C, and D: Application of the exemption 
categories to research subject to the requirements of 45 CFR part 46, 
subparts B, C, and D, is as follows:
    (1) Subpart B. Each of the exemptions at this section may be applied 
to research subject to subpart B if the conditions of the exemption are 
met.
    (2) Subpart C. The exemptions at this section do not apply to 
research subject to subpart C, except for research aimed at involving a 
broader subject population that only incidentally includes prisoners.
    (3) Subpart D. The exemptions at paragraphs (d)(1), (4), (5), (6), 
(7), and (8) of this section may be applied to research subject to 
subpart D if the conditions of the exemption are met. Paragraphs 
(d)(2)(i) and (ii) of this section only may apply to research subject to 
subpart D involving educational tests or the observation of public 
behavior when the investigator(s) do not participate in the activities 
being observed. Paragraph (d)(2)(iii) of this section may not be applied 
to research subject to subpart D.
    (c) [Reserved]
    (d) Except as described in paragraph (a) of this section, the 
following categories of human subjects research are exempt from this 
policy:
    (1) Research, conducted in established or commonly accepted 
educational settings, that specifically involves normal educational 
practices that are not likely to adversely impact students' opportunity 
to learn required educational content or the assessment of educators who 
provide instruction. This includes most research on regular and special 
education instructional strategies, and research on the effectiveness of 
or the comparison among instructional techniques, curricula, or 
classroom management methods.
    (2) Research that only includes interactions involving educational 
tests (cognitive, diagnostic, aptitude, achievement), survey procedures, 
interview procedures, or observation of public behavior (including 
visual or auditory recording) if at least one of the following criteria 
is met:
    (i) The information obtained is recorded by the investigator in such 
a manner that the identity of the human subjects cannot readily be 
ascertained, directly or through identifiers linked to the subjects;
    (ii) Any disclosure of the human subjects' responses outside the 
research

[[Page 295]]

would not reasonably place the subjects at risk of criminal or civil 
liability or be damaging to the subjects' financial standing, 
employability, educational advancement, or reputation; or
    (iii) The information obtained is recorded by the investigator in 
such a manner that the identity of the human subjects can readily be 
ascertained, directly or through identifiers linked to the subjects, and 
an IRB conducts a limited IRB review to make the determination required 
by Sec.  46.111(a)(7).
    (3)(i) Research involving benign behavioral interventions in 
conjunction with the collection of information from an adult subject 
through verbal or written responses (including data entry) or 
audiovisual recording if the subject prospectively agrees to the 
intervention and information collection and at least one of the 
following criteria is met:
    (A) The information obtained is recorded by the investigator in such 
a manner that the identity of the human subjects cannot readily be 
ascertained, directly or through identifiers linked to the subjects;
    (B) Any disclosure of the human subjects' responses outside the 
research would not reasonably place the subjects at risk of criminal or 
civil liability or be damaging to the subjects' financial standing, 
employability, educational advancement, or reputation; or
    (C) The information obtained is recorded by the investigator in such 
a manner that the identity of the human subjects can readily be 
ascertained, directly or through identifiers linked to the subjects, and 
an IRB conducts a limited IRB review to make the determination required 
by Sec.  46.111(a)(7).
    (ii) For the purpose of this provision, benign behavioral 
interventions are brief in duration, harmless, painless, not physically 
invasive, not likely to have a significant adverse lasting impact on the 
subjects, and the investigator has no reason to think the subjects will 
find the interventions offensive or embarrassing. Provided all such 
criteria are met, examples of such benign behavioral interventions would 
include having the subjects play an online game, having them solve 
puzzles under various noise conditions, or having them decide how to 
allocate a nominal amount of received cash between themselves and 
someone else.
    (iii) If the research involves deceiving the subjects regarding the 
nature or purposes of the research, this exemption is not applicable 
unless the subject authorizes the deception through a prospective 
agreement to participate in research in circumstances in which the 
subject is informed that he or she will be unaware of or misled 
regarding the nature or purposes of the research.
    (4) Secondary research for which consent is not required: Secondary 
research uses of identifiable private information or identifiable 
biospecimens, if at least one of the following criteria is met:
    (i) The identifiable private information or identifiable 
biospecimens are publicly available;
    (ii) Information, which may include information about biospecimens, 
is recorded by the investigator in such a manner that the identity of 
the human subjects cannot readily be ascertained directly or through 
identifiers linked to the subjects, the investigator does not contact 
the subjects, and the investigator will not re-identify subjects;
    (iii) The research involves only information collection and analysis 
involving the investigator's use of identifiable health information when 
that use is regulated under 45 CFR parts 160 and 164, subparts A and E, 
for the purposes of ``health care operations'' or ``research'' as those 
terms are defined at 45 CFR 164.501 or for ``public health activities 
and purposes'' as described under 45 CFR 164.512(b); or
    (iv) The research is conducted by, or on behalf of, a Federal 
department or agency using government-generated or government-collected 
information obtained for nonresearch activities, if the research 
generates identifiable private information that is or will be maintained 
on information technology that is subject to and in compliance with 
section 208(b) of the E-Government Act of 2002, 44 U.S.C. 3501 note, if 
all of the identifiable private information collected, used, or 
generated as part of the activity will be maintained in systems of 
records subject to the Privacy Act of

[[Page 296]]

1974, 5 U.S.C. 552a, and, if applicable, the information used in the 
research was collected subject to the Paperwork Reduction Act of 1995, 
44 U.S.C. 3501 et seq.
    (5) Research and demonstration projects that are conducted or 
supported by a Federal department or agency, or otherwise subject to the 
approval of department or agency heads (or the approval of the heads of 
bureaus or other subordinate agencies that have been delegated authority 
to conduct the research and demonstration projects), and that are 
designed to study, evaluate, improve, or otherwise examine public 
benefit or service programs, including procedures for obtaining benefits 
or services under those programs, possible changes in or alternatives to 
those programs or procedures, or possible changes in methods or levels 
of payment for benefits or services under those programs. Such projects 
include, but are not limited to, internal studies by Federal employees, 
and studies under contracts or consulting arrangements, cooperative 
agreements, or grants. Exempt projects also include waivers of otherwise 
mandatory requirements using authorities such as sections 1115 and 1115A 
of the Social Security Act, as amended.
    (i) Each Federal department or agency conducting or supporting the 
research and demonstration projects must establish, on a publicly 
accessible Federal Web site or in such other manner as the department or 
agency head may determine, a list of the research and demonstration 
projects that the Federal department or agency conducts or supports 
under this provision. The research or demonstration project must be 
published on this list prior to commencing the research involving human 
subjects.
    (ii) [Reserved]
    (6) Taste and food quality evaluation and consumer acceptance 
studies:
    (i) If wholesome foods without additives are consumed, or
    (ii) If a food is consumed that contains a food ingredient at or 
below the level and for a use found to be safe, or agricultural chemical 
or environmental contaminant at or below the level found to be safe, by 
the Food and Drug Administration or approved by the Environmental 
Protection Agency or the Food Safety and Inspection Service of the U.S. 
Department of Agriculture.
    (7) Storage or maintenance for secondary research for which broad 
consent is required: Storage or maintenance of identifiable private 
information or identifiable biospecimens for potential secondary 
research use if an IRB conducts a limited IRB review and makes the 
determinations required by Sec.  46.111(a)(8).
    (8) Secondary research for which broad consent is required: Research 
involving the use of identifiable private information or identifiable 
biospecimens for secondary research use, if the following criteria are 
met:
    (i) Broad consent for the storage, maintenance, and secondary 
research use of the identifiable private information or identifiable 
biospecimens was obtained in accordance with Sec.  46.116(a)(1) through 
(4), (a)(6), and (d);
    (ii) Documentation of informed consent or waiver of documentation of 
consent was obtained in accordance with Sec.  46.117;
    (iii) An IRB conducts a limited IRB review and makes the 
determination required by Sec.  46.111(a)(7) and makes the determination 
that the research to be conducted is within the scope of the broad 
consent referenced in paragraph (d)(8)(i) of this section; and (iv) The 
investigator does not include returning individual research results to 
subjects as part of the study plan. This provision does not prevent an 
investigator from abiding by any legal requirements to return individual 
research results.

(Approved by the Office of Management and Budget under Control Number 
0990-0260)



Sec. Sec.  46.105-46.106  [Reserved]



Sec.  46.107  IRB membership.

    (a) Each IRB shall have at least five members, with varying 
backgrounds to promote complete and adequate review of research 
activities commonly conducted by the institution. The IRB shall be 
sufficiently qualified through the experience and expertise of its 
members (professional competence), and the diversity of its members, 
including race, gender, and cultural backgrounds and sensitivity to such

[[Page 297]]

issues as community attitudes, to promote respect for its advice and 
counsel in safeguarding the rights and welfare of human subjects. The 
IRB shall be able to ascertain the acceptability of proposed research in 
terms of institutional commitments (including policies and resources) 
and regulations, applicable law, and standards of professional conduct 
and practice. The IRB shall therefore include persons knowledgeable in 
these areas. If an IRB regularly reviews research that involves a 
category of subjects that is vulnerable to coercion or undue influence, 
such as children, prisoners, individuals with impaired decision-making 
capacity, or economically or educationally disadvantaged persons, 
consideration shall be given to the inclusion of one or more individuals 
who are knowledgeable about and experienced in working with these 
categories of subjects.
    (b) Each IRB shall include at least one member whose primary 
concerns are in scientific areas and at least one member whose primary 
concerns are in nonscientific areas.
    (c) Each IRB shall include at least one member who is not otherwise 
affiliated with the institution and who is not part of the immediate 
family of a person who is affiliated with the institution.
    (d) No IRB may have a member participate in the IRB's initial or 
continuing review of any project in which the member has a conflicting 
interest, except to provide information requested by the IRB.
    (e) An IRB may, in its discretion, invite individuals with 
competence in special areas to assist in the review of issues that 
require expertise beyond or in addition to that available on the IRB. 
These individuals may not vote with the IRB.



Sec.  46.108  IRB functions and operations.

    (a) In order to fulfill the requirements of this policy each IRB 
shall:
    (1) Have access to meeting space and sufficient staff to support the 
IRB's review and recordkeeping duties;
    (2) Prepare and maintain a current list of the IRB members 
identified by name; earned degrees; representative capacity; indications 
of experience such as board certifications or licenses sufficient to 
describe each member's chief anticipated contributions to IRB 
deliberations; and any employment or other relationship between each 
member and the institution, for example, full-time employee, part-time 
employee, member of governing panel or board, stockholder, paid or 
unpaid consultant;
    (3) Establish and follow written procedures for:
    (i) Conducting its initial and continuing review of research and for 
reporting its findings and actions to the investigator and the 
institution;
    (ii) Determining which projects require review more often than 
annually and which projects need verification from sources other than 
the investigators that no material changes have occurred since previous 
IRB review; and
    (iii) Ensuring prompt reporting to the IRB of proposed changes in a 
research activity, and for ensuring that investigators will conduct the 
research activity in accordance with the terms of the IRB approval until 
any proposed changes have been reviewed and approved by the IRB, except 
when necessary to eliminate apparent immediate hazards to the subject.
    (4) Establish and follow written procedures for ensuring prompt 
reporting to the IRB; appropriate institutional officials; the 
department or agency head; and the Office for Human Research 
Protections, HHS, or any successor office, or the equivalent office 
within the appropriate Federal department or agency of
    (i) Any unanticipated problems involving risks to subjects or others 
or any serious or continuing noncompliance with this policy or the 
requirements or determinations of the IRB; and
    (ii) Any suspension or termination of IRB approval.
    (b) Except when an expedited review procedure is used (as described 
in Sec.  46.110), an IRB must review proposed research at convened 
meetings at which a majority of the members of the IRB are present, 
including at least one member whose primary concerns are in 
nonscientific areas. In order for the research to be approved, it shall 
receive

[[Page 298]]

the approval of a majority of those members present at the meeting.

(Approved by the Office of Management and Budget under Control Number 
0990-0260)



Sec.  46.109  IRB review of research.

    (a) An IRB shall review and have authority to approve, require 
modifications in (to secure approval), or disapprove all research 
activities covered by this policy, including exempt research activities 
under Sec.  46.104 for which limited IRB review is a condition of 
exemption (under Sec.  46.104(d)(2)(iii), (d)(3)(i)(C), and (d)(7), and 
(8)).
    (b) An IRB shall require that information given to subjects (or 
legally authorized representatives, when appropriate) as part of 
informed consent is in accordance with Sec.  46.116. The IRB may require 
that information, in addition to that specifically mentioned in Sec.  
46.116, be given to the subjects when in the IRB's judgment the 
information would meaningfully add to the protection of the rights and 
welfare of subjects.
    (c) An IRB shall require documentation of informed consent or may 
waive documentation in accordance with Sec.  46.117.
    (d) An IRB shall notify investigators and the institution in writing 
of its decision to approve or disapprove the proposed research activity, 
or of modifications required to secure IRB approval of the research 
activity. If the IRB decides to disapprove a research activity, it shall 
include in its written notification a statement of the reasons for its 
decision and give the investigator an opportunity to respond in person 
or in writing.
    (e) An IRB shall conduct continuing review of research requiring 
review by the convened IRB at intervals appropriate to the degree of 
risk, not less than once per year, except as described in Sec.  
46.109(f).
    (f)(1) Unless an IRB determines otherwise, continuing review of 
research is not required in the following circumstances:
    (i) Research eligible for expedited review in accordance with Sec.  
46.110;
    (ii) Research reviewed by the IRB in accordance with the limited IRB 
review described in Sec.  46.104(d)(2)(iii), (d)(3)(i)(C), or (d)(7) or 
(8);
    (iii) Research that has progressed to the point that it involves 
only one or both of the following, which are part of the IRB-approved 
study:
    (A) Data analysis, including analysis of identifiable private 
information or identifiable biospecimens, or
    (B) Accessing follow-up clinical data from procedures that subjects 
would undergo as part of clinical care.
    (2) [Reserved]
    (g) An IRB shall have authority to observe or have a third party 
observe the consent process and the research.

(Approved by the Office of Management and Budget under Control Number 
0990-0260)



Sec.  46.110  Expedited review procedures for certain kinds of research
involving no more than minimal risk, and for minor changes in approved 
research.

    (a) The Secretary of HHS has established, and published as a Notice 
in the Federal Register, a list of categories of research that may be 
reviewed by the IRB through an expedited review procedure. The Secretary 
will evaluate the list at least every 8 years and amend it, as 
appropriate, after consultation with other federal departments and 
agencies and after publication in the Federal Register for public 
comment. A copy of the list is available from the Office for Human 
Research Protections, HHS, or any successor office.
    (b)(1) An IRB may use the expedited review procedure to review the 
following:
    (i) Some or all of the research appearing on the list described in 
paragraph (a) of this section, unless the reviewer determines that the 
study involves more than minimal risk;
    (ii) Minor changes in previously approved research during the period 
for which approval is authorized; or
    (iii) Research for which limited IRB review is a condition of 
exemption under Sec.  46.104(d)(2)(iii), (d)(3)(i)(C), and (d)(7) and 
(8).
    (2) Under an expedited review procedure, the review may be carried 
out by the IRB chairperson or by one or more experienced reviewers 
designated by the chairperson from among members

[[Page 299]]

of the IRB. In reviewing the research, the reviewers may exercise all of 
the authorities of the IRB except that the reviewers may not disapprove 
the research. A research activity may be disapproved only after review 
in accordance with the nonexpedited procedure set forth in Sec.  
46.108(b).
    (c) Each IRB that uses an expedited review procedure shall adopt a 
method for keeping all members advised of research proposals that have 
been approved under the procedure.
    (d) The department or agency head may restrict, suspend, terminate, 
or choose not to authorize an institution's or IRB's use of the 
expedited review procedure.



Sec.  46.111  Criteria for IRB approval of research.

    (a) In order to approve research covered by this policy the IRB 
shall determine that all of the following requirements are satisfied:
    (1) Risks to subjects are minimized:
    (i) By using procedures that are consistent with sound research 
design and that do not unnecessarily expose subjects to risk, and
    (ii) Whenever appropriate, by using procedures already being 
performed on the subjects for diagnostic or treatment purposes.
    (2) Risks to subjects are reasonable in relation to anticipated 
benefits, if any, to subjects, and the importance of the knowledge that 
may reasonably be expected to result. In evaluating risks and benefits, 
the IRB should consider only those risks and benefits that may result 
from the research (as distinguished from risks and benefits of therapies 
subjects would receive even if not participating in the research). The 
IRB should not consider possible long-range effects of applying 
knowledge gained in the research (e.g., the possible effects of the 
research on public policy) as among those research risks that fall 
within the purview of its responsibility.
    (3) Selection of subjects is equitable. In making this assessment 
the IRB should take into account the purposes of the research and the 
setting in which the research will be conducted. The IRB should be 
particularly cognizant of the special problems of research that involves 
a category of subjects who are vulnerable to coercion or undue 
influence, such as children, prisoners, individuals with impaired 
decision-making capacity, or economically or educationally disadvantaged 
persons.
    (4) Informed consent will be sought from each prospective subject or 
the subject's legally authorized representative, in accordance with, and 
to the extent required by, Sec.  46.116.
    (5) Informed consent will be appropriately documented or 
appropriately waived in accordance with Sec.  46.117.
    (6) When appropriate, the research plan makes adequate provision for 
monitoring the data collected to ensure the safety of subjects.
    (7) When appropriate, there are adequate provisions to protect the 
privacy of subjects and to maintain the confidentiality of data.
    (i) The Secretary of HHS will, after consultation with the Office of 
Management and Budget's privacy office and other Federal departments and 
agencies that have adopted this policy, issue guidance to assist IRBs in 
assessing what provisions are adequate to protect the privacy of 
subjects and to maintain the confidentiality of data.
    (ii) [Reserved]
    (8) For purposes of conducting the limited IRB review required by 
Sec.  46.104(d)(7)), the IRB need not make the determinations at 
paragraphs (a)(1) through (7) of this section, and shall make the 
following determinations:
    (i) Broad consent for storage, maintenance, and secondary research 
use of identifiable private information or identifiable biospecimens is 
obtained in accordance with the requirements of Sec.  46.116(a)(1)-(4), 
(a)(6), and (d);
    (ii) Broad consent is appropriately documented or waiver of 
documentation is appropriate, in accordance with Sec.  46.117; and
    (iii) If there is a change made for research purposes in the way the 
identifiable private information or identifiable biospecimens are stored 
or maintained, there are adequate provisions to protect the privacy of 
subjects and to maintain the confidentiality of data.
    (b) When some or all of the subjects are likely to be vulnerable to 
coercion or undue influence, such as children,

[[Page 300]]

prisoners, individuals with impaired decision-making capacity, or 
economically or educationally disadvantaged persons, additional 
safeguards have been included in the study to protect the rights and 
welfare of these subjects.



Sec.  46.112  Review by institution

    Research covered by this policy that has been approved by an IRB may 
be subject to further appropriate review and approval or disapproval by 
officials of the institution. However, those officials may not approve 
the research if it has not been approved by an IRB.



Sec.  46.113  Suspension or termination of IRB approval of research.

    An IRB shall have authority to suspend or terminate approval of 
research that is not being conducted in accordance with the IRB's 
requirements or that has been associated with unexpected serious harm to 
subjects. Any suspension or termination of approval shall include a 
statement of the reasons for the IRB's action and shall be reported 
promptly to the investigator, appropriate institutional officials, and 
the department or agency head.

(Approved by the Office of Management and Budget under Control Number 
0990-0260)



Sec.  46.114  Cooperative research.

    (a) Cooperative research projects are those projects covered by this 
policy that involve more than one institution. In the conduct of 
cooperative research projects, each institution is responsible for 
safeguarding the rights and welfare of human subjects and for complying 
with this policy.
    (b)(1) Any institution located in the United States that is engaged 
in cooperative research must rely upon approval by a single IRB for that 
portion of the research that is conducted in the United States. The 
reviewing IRB will be identified by the Federal department or agency 
supporting or conducting the research or proposed by the lead 
institution subject to the acceptance of the Federal department or 
agency supporting the research.
    (2) The following research is not subject to this provision:
    (i) Cooperative research for which more than single IRB review is 
required by law (including tribal law passed by the official governing 
body of an American Indian or Alaska Native tribe); or
    (ii) Research for which any Federal department or agency supporting 
or conducting the research determines and documents that the use of a 
single IRB is not appropriate for the particular context.
    (c) For research not subject to paragraph (b) of this section, an 
institution participating in a cooperative project may enter into a 
joint review arrangement, rely on the review of another IRB, or make 
similar arrangements for avoiding duplication of effort.



Sec.  46.115  IRB records.

    (a) An institution, or when appropriate an IRB, shall prepare and 
maintain adequate documentation of IRB activities, including the 
following:
    (1) Copies of all research proposals reviewed, scientific 
evaluations, if any, that accompany the proposals, approved sample 
consent forms, progress reports submitted by investigators, and reports 
of injuries to subjects.
    (2) Minutes of IRB meetings, which shall be in sufficient detail to 
show attendance at the meetings; actions taken by the IRB; the vote on 
these actions including the number of members voting for, against, and 
abstaining; the basis for requiring changes in or disapproving research; 
and a written summary of the discussion of controverted issues and their 
resolution.
    (3) Records of continuing review activities, including the rationale 
for conducting continuing review of research that otherwise would not 
require continuing review as described in Sec.  46.109(f)(1).
    (4) Copies of all correspondence between the IRB and the 
investigators.
    (5) A list of IRB members in the same detail as described in Sec.  
46.108(a)(2).
    (6) Written procedures for the IRB in the same detail as described 
in Sec.  46.108(a)(3) and (4).
    (7) Statements of significant new findings provided to subjects, as 
required by Sec.  46.116(c)(5).
    (8) The rationale for an expedited reviewer's determination under 
Sec.  46.110(b)(1)(i) that research appearing

[[Page 301]]

on the expedited review list described in Sec.  46.110(a) is more than 
minimal risk.
    (9) Documentation specifying the responsibilities that an 
institution and an organization operating an IRB each will undertake to 
ensure compliance with the requirements of this policy, as described in 
Sec.  46.103(e).
    (b) The records required by this policy shall be retained for at 
least 3 years, and records relating to research that is conducted shall 
be retained for at least 3 years after completion of the research. The 
institution or IRB may maintain the records in printed form, or 
electronically. All records shall be accessible for inspection and 
copying by authorized representatives of the Federal department or 
agency at reasonable times and in a reasonable manner.

(Approved by the Office of Management and Budget under Control Number 
0990-0260)



Sec.  46.116  General requirements for informed consent.

    (a) General. General requirements for informed consent, whether 
written or oral, are set forth in this paragraph and apply to consent 
obtained in accordance with the requirements set forth in paragraphs (b) 
through (d) of this section. Broad consent may be obtained in lieu of 
informed consent obtained in accordance with paragraphs (b) and (c) of 
this section only with respect to the storage, maintenance, and 
secondary research uses of identifiable private information and 
identifiable biospecimens. Waiver or alteration of consent in research 
involving public benefit and service programs conducted by or subject to 
the approval of state or local officials is described in paragraph (e) 
of this section. General waiver or alteration of informed consent is 
described in paragraph (f) of this section. Except as provided elsewhere 
in this policy:
    (1) Before involving a human subject in research covered by this 
policy, an investigator shall obtain the legally effective informed 
consent of the subject or the subject's legally authorized 
representative.
    (2) An investigator shall seek informed consent only under 
circumstances that provide the prospective subject or the legally 
authorized representative sufficient opportunity to discuss and consider 
whether or not to participate and that minimize the possibility of 
coercion or undue influence.
    (3) The information that is given to the subject or the legally 
authorized representative shall be in language understandable to the 
subject or the legally authorized representative.
    (4) The prospective subject or the legally authorized representative 
must be provided with the information that a reasonable person would 
want to have in order to make an informed decision about whether to 
participate, and an opportunity to discuss that information.
    (5) Except for broad consent obtained in accordance with paragraph 
(d) of this section:
    (i) Informed consent must begin with a concise and focused 
presentation of the key information that is most likely to assist a 
prospective subject or legally authorized representative in 
understanding the reasons why one might or might not want to participate 
in the research. This part of the informed consent must be organized and 
presented in a way that facilitates comprehension.
    (ii) Informed consent as a whole must present information in 
sufficient detail relating to the research, and must be organized and 
presented in a way that does not merely provide lists of isolated facts, 
but rather facilitates the prospective subject's or legally authorized 
representative's understanding of the reasons why one might or might not 
want to participate.
    (6) No informed consent may include any exculpatory language through 
which the subject or the legally authorized representative is made to 
waive or appear to waive any of the subject's legal rights, or releases 
or appears to release the investigator, the sponsor, the institution, or 
its agents from liability for negligence.
    (b) Basic elements of informed consent. Except as provided in 
paragraph (d), (e), or (f) of this section, in seeking informed consent 
the following information shall be provided to each subject or the 
legally authorized representative:

[[Page 302]]

    (1) A statement that the study involves research, an explanation of 
the purposes of the research and the expected duration of the subject's 
participation, a description of the procedures to be followed, and 
identification of any procedures that are experimental;
    (2) A description of any reasonably foreseeable risks or discomforts 
to the subject;
    (3) A description of any benefits to the subject or to others that 
may reasonably be expected from the research;
    (4) A disclosure of appropriate alternative procedures or courses of 
treatment, if any, that might be advantageous to the subject;
    (5) A statement describing the extent, if any, to which 
confidentiality of records identifying the subject will be maintained;
    (6) For research involving more than minimal risk, an explanation as 
to whether any compensation and an explanation as to whether any medical 
treatments are available if injury occurs and, if so, what they consist 
of, or where further information may be obtained;
    (7) An explanation of whom to contact for answers to pertinent 
questions about the research and research subjects' rights, and whom to 
contact in the event of a research-related injury to the subject;
    (8) A statement that participation is voluntary, refusal to 
participate will involve no penalty or loss of benefits to which the 
subject is otherwise entitled, and the subject may discontinue 
participation at any time without penalty or loss of benefits to which 
the subject is otherwise entitled; and
    (9) One of the following statements about any research that involves 
the collection of identifiable private information or identifiable 
biospecimens:
    (i) A statement that identifiers might be removed from the 
identifiable private information or identifiable biospecimens and that, 
after such removal, the information or biospecimens could be used for 
future research studies or distributed to another investigator for 
future research studies without additional informed consent from the 
subject or the legally authorized representative, if this might be a 
possibility; or
    (ii) A statement that the subject's information or biospecimens 
collected as part of the research, even if identifiers are removed, will 
not be used or distributed for future research studies.
    (c) Additional elements of informed consent. Except as provided in 
paragraph (d), (e), or (f) of this section, one or more of the following 
elements of information, when appropriate, shall also be provided to 
each subject or the legally authorized representative:
    (1) A statement that the particular treatment or procedure may 
involve risks to the subject (or to the embryo or fetus, if the subject 
is or may become pregnant) that are currently unforeseeable;
    (2) Anticipated circumstances under which the subject's 
participation may be terminated by the investigator without regard to 
the subject's or the legally authorized representative's consent;
    (3) Any additional costs to the subject that may result from 
participation in the research;
    (4) The consequences of a subject's decision to withdraw from the 
research and procedures for orderly termination of participation by the 
subject;
    (5) A statement that significant new findings developed during the 
course of the research that may relate to the subject's willingness to 
continue participation will be provided to the subject;
    (6) The approximate number of subjects involved in the study;
    (7) A statement that the subject's biospecimens (even if identifiers 
are removed) may be used for commercial profit and whether the subject 
will or will not share in this commercial profit;
    (8) A statement regarding whether clinically relevant research 
results, including individual research results, will be disclosed to 
subjects, and if so, under what conditions; and
    (9) For research involving biospecimens, whether the research will 
(if known) or might include whole genome sequencing (i.e., sequencing of 
a human germline or somatic specimen with the intent to generate the 
genome or exome sequence of that specimen).

[[Page 303]]

    (d) Elements of broad consent for the storage, maintenance, and 
secondary research use of identifiable private information or 
identifiable biospecimens. Broad consent for the storage, maintenance, 
and secondary research use of identifiable private information or 
identifiable biospecimens (collected for either research studies other 
than the proposed research or nonresearch purposes) is permitted as an 
alternative to the informed consent requirements in paragraphs (b) and 
(c) of this section. If the subject or the legally authorized 
representative is asked to provide broad consent, the following shall be 
provided to each subject or the subject's legally authorized 
representative:
    (1) The information required in paragraphs (b)(2), (b)(3), (b)(5), 
and (b)(8) and, when appropriate, (c)(7) and (9) of this section;
    (2) A general description of the types of research that may be 
conducted with the identifiable private information or identifiable 
biospecimens. This description must include sufficient information such 
that a reasonable person would expect that the broad consent would 
permit the types of research conducted;
    (3) A description of the identifiable private information or 
identifiable biospecimens that might be used in research, whether 
sharing of identifiable private information or identifiable biospecimens 
might occur, and the types of institutions or researchers that might 
conduct research with the identifiable private information or 
identifiable biospecimens;
    (4) A description of the period of time that the identifiable 
private information or identifiable biospecimens may be stored and 
maintained (which period of time could be indefinite), and a description 
of the period of time that the identifiable private information or 
identifiable biospecimens may be used for research purposes (which 
period of time could be indefinite);
    (5) Unless the subject or legally authorized representative will be 
provided details about specific research studies, a statement that they 
will not be informed of the details of any specific research studies 
that might be conducted using the subject's identifiable private 
information or identifiable biospecimens, including the purposes of the 
research, and that they might have chosen not to consent to some of 
those specific research studies;
    (6) Unless it is known that clinically relevant research results, 
including individual research results, will be disclosed to the subject 
in all circumstances, a statement that such results may not be disclosed 
to the subject; and
    (7) An explanation of whom to contact for answers to questions about 
the subject's rights and about storage and use of the subject's 
identifiable private information or identifiable biospecimens, and whom 
to contact in the event of a research-related harm.
    (e) Waiver or alteration of consent in research involving public 
benefit and service programs conducted by or subject to the approval of 
state or local officials--(1) Waiver. An IRB may waive the requirement 
to obtain informed consent for research under paragraphs (a) through (c) 
of this section, provided the IRB satisfies the requirements of 
paragraph (e)(3) of this section. If an individual was asked to provide 
broad consent for the storage, maintenance, and secondary research use 
of identifiable private information or identifiable biospecimens in 
accordance with the requirements at paragraph (d) of this section, and 
refused to consent, an IRB cannot waive consent for the storage, 
maintenance, or secondary research use of the identifiable private 
information or identifiable biospecimens.
    (2) Alteration. An IRB may approve a consent procedure that omits 
some, or alters some or all, of the elements of informed consent set 
forth in paragraphs (b) and (c) of this section provided the IRB 
satisfies the requirements of paragraph (e)(3) of this section. An IRB 
may not omit or alter any of the requirements described in paragraph (a) 
of this section. If a broad consent procedure is used, an IRB may not 
omit or alter any of the elements required under paragraph (d) of this 
section.
    (3) Requirements for waiver and alteration. In order for an IRB to 
waive or alter consent as described in this subsection, the IRB must 
find and document that:

[[Page 304]]

    (i) The research or demonstration project is to be conducted by or 
subject to the approval of state or local government officials and is 
designed to study, evaluate, or otherwise examine:
    (A) Public benefit or service programs;
    (B) Procedures for obtaining benefits or services under those 
programs;
    (C) Possible changes in or alternatives to those programs or 
procedures; or
    (D) Possible changes in methods or levels of payment for benefits or 
services under those programs; and
    (ii) The research could not practicably be carried out without the 
waiver or alteration.
    (f) General waiver or alteration of consent--(1) Waiver. An IRB may 
waive the requirement to obtain informed consent for research under 
paragraphs (a) through (c) of this section, provided the IRB satisfies 
the requirements of paragraph (f)(3) of this section. If an individual 
was asked to provide broad consent for the storage, maintenance, and 
secondary research use of identifiable private information or 
identifiable biospecimens in accordance with the requirements at 
paragraph (d) of this section, and refused to consent, an IRB cannot 
waive consent for the storage, maintenance, or secondary research use of 
the identifiable private information or identifiable biospecimens.
    (2) Alteration. An IRB may approve a consent procedure that omits 
some, or alters some or all, of the elements of informed consent set 
forth in paragraphs (b) and (c) of this section provided the IRB 
satisfies the requirements of paragraph (f)(3) of this section. An IRB 
may not omit or alter any of the requirements described in paragraph (a) 
of this section. If a broad consent procedure is used, an IRB may not 
omit or alter any of the elements required under paragraph (d) of this 
section.
    (3) Requirements for waiver and alteration. In order for an IRB to 
waive or alter consent as described in this subsection, the IRB must 
find and document that:
    (i) The research involves no more than minimal risk to the subjects;
    (ii) The research could not practicably be carried out without the 
requested waiver or alteration;
    (iii) If the research involves using identifiable private 
information or identifiable biospecimens, the research could not 
practicably be carried out without using such information or 
biospecimens in an identifiable format;
    (iv) The waiver or alteration will not adversely affect the rights 
and welfare of the subjects; and
    (v) Whenever appropriate, the subjects or legally authorized 
representatives will be provided with additional pertinent information 
after participation.
    (g) Screening, recruiting, or determining eligibility. An IRB may 
approve a research proposal in which an investigator will obtain 
information or biospecimens for the purpose of screening, recruiting, or 
determining the eligibility of prospective subjects without the informed 
consent of the prospective subject or the subject's legally authorized 
representative, if either of the following conditions are met:
    (1) The investigator will obtain information through oral or written 
communication with the prospective subject or legally authorized 
representative, or
    (2) The investigator will obtain identifiable private information or 
identifiable biospecimens by accessing records or stored identifiable 
biospecimens.
    (h) Posting of clinical trial consent form. (1) For each clinical 
trial conducted or supported by a Federal department or agency, one IRB-
approved informed consent form used to enroll subjects must be posted by 
the awardee or the Federal department or agency component conducting the 
trial on a publicly available Federal Web site that will be established 
as a repository for such informed consent forms.
    (2) If the Federal department or agency supporting or conducting the 
clinical trial determines that certain information should not be made 
publicly available on a Federal Web site (e.g. confidential commercial 
information), such Federal department or agency may permit or require 
redactions to the information posted.
    (3) The informed consent form must be posted on the Federal Web site 
after

[[Page 305]]

the clinical trial is closed to recruitment, and no later than 60 days 
after the last study visit by any subject, as required by the protocol.
    (i) Preemption. The informed consent requirements in this policy are 
not intended to preempt any applicable Federal, state, or local laws 
(including tribal laws passed by the official governing body of an 
American Indian or Alaska Native tribe) that require additional 
information to be disclosed in order for informed consent to be legally 
effective.
    (j) Emergency medical care. Nothing in this policy is intended to 
limit the authority of a physician to provide emergency medical care, to 
the extent the physician is permitted to do so under applicable Federal, 
state, or local law (including tribal law passed by the official 
governing body of an American Indian or Alaska Native tribe).

(Approved by the Office of Management and Budget under Control Number 
0990-0260)



Sec.  46.117  Documentation of informed consent.

    (a) Except as provided in paragraph (c) of this section, informed 
consent shall be documented by the use of a written informed consent 
form approved by the IRB and signed (including in an electronic format) 
by the subject or the subject's legally authorized representative. A 
written copy shall be given to the person signing the informed consent 
form.
    (b) Except as provided in paragraph (c) of this section, the 
informed consent form may be either of the following:
    (1) A written informed consent form that meets the requirements of 
Sec.  46.116. The investigator shall give either the subject or the 
subject's legally authorized representative adequate opportunity to read 
the informed consent form before it is signed; alternatively, this form 
may be read to the subject or the subject's legally authorized 
representative.
    (2) A short form written informed consent form stating that the 
elements of informed consent required by Sec.  46.116 have been 
presented orally to the subject or the subject's legally authorized 
representative, and that the key information required by Sec.  
46.116(a)(5)(i) was presented first to the subject, before other 
information, if any, was provided. The IRB shall approve a written 
summary of what is to be said to the subject or the legally authorized 
representative. When this method is used, there shall be a witness to 
the oral presentation. Only the short form itself is to be signed by the 
subject or the subject's legally authorized representative. However, the 
witness shall sign both the short form and a copy of the summary, and 
the person actually obtaining consent shall sign a copy of the summary. 
A copy of the summary shall be given to the subject or the subject's 
legally authorized representative, in addition to a copy of the short 
form.
    (c)(1) An IRB may waive the requirement for the investigator to 
obtain a signed informed consent form for some or all subjects if it 
finds any of the following:
    (i) That the only record linking the subject and the research would 
be the informed consent form and the principal risk would be potential 
harm resulting from a breach of confidentiality. Each subject (or 
legally authorized representative) will be asked whether the subject 
wants documentation linking the subject with the research, and the 
subject's wishes will govern;
    (ii) That the research presents no more than minimal risk of harm to 
subjects and involves no procedures for which written consent is 
normally required outside of the research context; or
    (iii) If the subjects or legally authorized representatives are 
members of a distinct cultural group or community in which signing forms 
is not the norm, that the research presents no more than minimal risk of 
harm to subjects and provided there is an appropriate alternative 
mechanism for documenting that informed consent was obtained.
    (2) In cases in which the documentation requirement is waived, the 
IRB may require the investigator to provide subjects or legally 
authorized representatives with a written statement regarding the 
research.

(Approved by the Office of Management and Budget under Control Number 
0990-0260)

[[Page 306]]



Sec.  46.118  Applications and proposals lacking definite plans for
involvement of human subjects.

    Certain types of applications for grants, cooperative agreements, or 
contracts are submitted to Federal departments or agencies with the 
knowledge that subjects may be involved within the period of support, 
but definite plans would not normally be set forth in the application or 
proposal. These include activities such as institutional type grants 
when selection of specific projects is the institution's responsibility; 
research training grants in which the activities involving subjects 
remain to be selected; and projects in which human subjects' involvement 
will depend upon completion of instruments, prior animal studies, or 
purification of compounds. Except for research waived under Sec.  
46.101(i) or exempted under Sec.  46.104, no human subjects may be 
involved in any project supported by these awards until the project has 
been reviewed and approved by the IRB, as provided in this policy, and 
certification submitted, by the institution, to the Federal department 
or agency component supporting the research.



Sec.  46.119  Research undertaken without the intention of involving
human subjects.

    Except for research waived under Sec.  46.101(i) or exempted under 
Sec.  46.104, in the event research is undertaken without the intention 
of involving human subjects, but it is later proposed to involve human 
subjects in the research, the research shall first be reviewed and 
approved by an IRB, as provided in this policy, a certification 
submitted by the institution to the Federal department or agency 
component supporting the research, and final approval given to the 
proposed change by the Federal department or agency component.



Sec.  46.120  Evaluation and disposition of applications and proposals
for research to be conducted or supported by a Federal department or
agency.

    (a) The department or agency head will evaluate all applications and 
proposals involving human subjects submitted to the Federal department 
or agency through such officers and employees of the Federal department 
or agency and such experts and consultants as the department or agency 
head determines to be appropriate. This evaluation will take into 
consideration the risks to the subjects, the adequacy of protection 
against these risks, the potential benefits of the research to the 
subjects and others, and the importance of the knowledge gained or to be 
gained.
    (b) On the basis of this evaluation, the department or agency head 
may approve or disapprove the application or proposal, or enter into 
negotiations to develop an approvable one.



Sec.  46.121  [Reserved]



Sec.  46.122  Use of Federal funds.

    Federal funds administered by a Federal department or agency may not 
be expended for research involving human subjects unless the 
requirements of this policy have been satisfied.



Sec.  46.123  Early termination of research support: Evaluation of
applications and proposals.

    (a) The department or agency head may require that Federal 
department or agency support for any project be terminated or suspended 
in the manner prescribed in applicable program requirements, when the 
department or agency head finds an institution has materially failed to 
comply with the terms of this policy.
    (b) In making decisions about supporting or approving applications 
or proposals covered by this policy the department or agency head may 
take into account, in addition to all other eligibility requirements and 
program criteria, factors such as whether the applicant has been subject 
to a termination or suspension under paragraph (a) of this section and 
whether the applicant or the person or persons who would direct or has/
have directed the scientific and technical aspects of an activity has/
have, in the judgment of the department or agency head, materially 
failed to discharge responsibility for the protection of the rights and 
welfare of human subjects (whether or not the research was subject to 
federal regulation).

[[Page 307]]



Sec.  46.124  Conditions.

    With respect to any research project or any class of research 
projects the department or agency head of either the conducting or the 
supporting Federal department or agency may impose additional conditions 
prior to or at the time of approval when in the judgment of the 
department or agency head additional conditions are necessary for the 
protection of human subjects.



PART 115_SEXUAL ABUSE AND ASSAULT PREVENTION STANDARDS--Table of Contents



Sec.
115.5 General definitions.
115.6 Definitions related to sexual abuse and assault.

        Subpart A_Standards for Immigration Detention Facilities

                                Coverage

115.10 Coverage of DHS immigration detention facilities.

                           Prevention Planning

115.11 Zero tolerance of sexual abuse; Prevention of Sexual Assault 
          Coordinator.
115.12 Contracting with non-DHS entities for the confinement of 
          detainees.
115.13 Detainee supervision and monitoring.
115.14 Juvenile and family detainees.
115.15 Limits to cross-gender viewing and searches.
115.16 Accommodating detainees with disabilities and detainees who are 
          limited English proficient.
115.17 Hiring and promotion decisions.
115.18 Upgrades to facilities and technologies.

                           Responsive Planning

115.21 Evidence protocols and forensic medical examinations.
115.22 Policies to ensure investigation of allegations and appropriate 
          agency oversight.

                         Training and Education

115.31 Staff training.
115.32 Other training.
115.33 Detainee education.
115.34 Specialized training: Investigations.
115.35 Specialized training: Medical and mental health care.

       Assessment for Risk of Sexual Victimization and Abusiveness

115.41 Assessment for risk of victimization and abusiveness.
115.42 Use of assessment information.
115.43 Protective custody.

                                Reporting

115.51 Detainee reporting.
115.52 Grievances.
115.53 Detainee access to outside confidential support services.
115.54 Third-party reporting.

              Official Response Following a Detainee Report

115.61 Staff reporting duties.
115.62 Protection duties.
115.63 Reporting to other confinement facilities.
115.64 Responder duties.
115.65 Coordinated response.
115.66 Protection of detainees from contact with alleged abusers.
115.67 Agency protection against retaliation.
115.68 Post-allegation protective custody.

                             Investigations

115.71 Criminal and administrative investigations.
115.72 Evidentiary standard for administrative investigations.
115.73 Reporting to detainees.

                               Discipline

115.76 Disciplinary sanctions for staff.
115.77 Corrective action for contractors and volunteers.
115.78 Disciplinary sanctions for detainees.

                         Medical and Mental Care

115.81 Medical and mental health assessments; history of sexual abuse.
115.82 Access to emergency medical and mental health services.
115.83 Ongoing medical and mental health care for sexual abuse victims 
          and abusers.

                       Data Collection and Review

115.86 Sexual abuse incident reviews.
115.87 Data collection.
115.88 Data review for corrective action.
115.89 Data storage, publication, and destruction.

                          Audits and Compliance

115.93 Audits of standards.

                Additional Provisions in Agency Policies

115.95 Additional provisions in agency policies.

             Subpart B_Standards for DHS Holding Facilities

                                Coverage

115.110 Coverage of DHS holding facilities.

[[Page 308]]

                           Prevention Planning

115.111 Zero tolerance of sexual abuse; Prevention of Sexual Assault 
          Coordinator.
115.112 Contracting with non-DHS entities for the confinement of 
          detainees.
115.113 Detainee supervision and monitoring.
115.114 Juvenile and family detainees.
115.115 Limits to cross-gender viewing and searches.
115.116 Accommodating detainees with disabilities and detainees who are 
          limited English proficient.
115.117 Hiring and promotion decisions.
115.118 Upgrades to facilities and technologies.

                           Responsive Planning

115.121 Evidence protocols and forensic medical examinations.
115.122 Policies to ensure investigation of allegations and appropriate 
          agency oversight.

                         Training and Education

115.131 Employee, contractor, and volunteer training.
115.132 Notification to detainees of the agency's zero-tolerance policy.
115.133 [Reserved]
115.134 Specialized training: Investigations.

       Assessment for Risk of Sexual Victimization and Abusiveness

115.141 Assessment for risk of victimization and abusiveness.

                                Reporting

115.151 Detainee reporting.
115.152-115.153 [Reserved]
115.154 Third-party reporting.

              Official Response Following a Detainee Report

115.161 Staff reporting duties.
115.162 Agency protection duties.
115.163 Reporting to other confinement facilities.
115.164 Responder duties.
115.165 Coordinated response.
115.166 Protection of detainees from contact with alleged abusers.
115.167 Agency protection against retaliation.

                             Investigations

115.171 Criminal and administrative investigations.
115.172 Evidentiary standard for administrative investigations.

                               Discipline

115.176 Disciplinary sanctions for staff.
115.177 Corrective action for contractors and volunteers.

                         Medical and Mental Care

115.181 [Reserved]
115.182 Access to emergency medical services.

                       Data Collection and Review

115.186 Sexual abuse incident reviews.
115.187 Data collection.
115.188 Data review for corrective action.
115.189 Data storage, publication, and destruction.

                          Audits and Compliance

115.193 Audits of standards.

                Additional Provisions in Agency Policies

115.195 Additional provisions in agency policies.

            Subpart C_External Auditing and Corrective Action

115.201 Scope of audits.
115.202 Auditor qualifications.
115.203 Audit contents and findings.
115.204 Audit corrective action plan.
115.205 Audit appeals.

    Authority: 5 U.S.C. 301, 552, 552a; 8 U.S.C. 1103, 1182, 1223, 1224, 
1225, 1226, 1227, 1228, 1231, 1251, 1253, 1255, 1330, 1362; 18 U.S.C. 
4002, 4013(c)(4); Pub. L. 107-296, 116 Stat. 2135 (6 U.S.C. 101, et 
seq.); 8 CFR part 2.

    Source: 79 FR 13165, Mar. 7, 2014, unless otherwise noted.



Sec.  115.5  General definitions.

    For purposes of this part, the term--
    Agency means the unit or component of DHS responsible for operating 
or supervising any facility, or part of a facility, that confines 
detainees.
    Agency head means the principal official of an agency.
    Contractor means a person who or entity that provides services on a 
recurring basis pursuant to a contractual agreement with the agency or 
facility.
    Detainee means any person detained in an immigration detention 
facility or holding facility.
    Employee means a person who works directly for the agency.
    Exigent circumstances means any set of temporary and unforeseen 
circumstances that require immediate action in order to combat a threat 
to the security or institutional order of a facility or a threat to the 
safety or security of any person.

[[Page 309]]

    Facility means a place, building (or part thereof), set of 
buildings, structure, or area (whether or not enclosing a building or 
set of buildings) that was built or retrofitted for the purpose of 
detaining individuals and is routinely used by the agency to detain 
individuals in its custody. References to requirements placed on 
facilities extend to the entity responsible for the direct operation of 
the facility.
    Facility head means the principal official responsible for a 
facility.
    Family unit means a group of detainees that includes one or more 
non-United States citizen juvenile(s) accompanied by his/her/their 
parent(s) or legal guardian(s), whom the agency will evaluate for safety 
purposes to protect juveniles from sexual abuse and violence.
    Gender nonconforming means having an appearance or manner that does 
not conform to traditional societal gender expectations.
    Holding facility means a facility that contains holding cells, cell 
blocks, or other secure enclosures that are:
    (1) Under the control of the agency; and
    (2) Primarily used for the short-term confinement of individuals who 
have recently been detained, or are being transferred to or from a 
court, jail, prison, other agency, or other unit of the facility or 
agency.
    Immigration detention facility means a confinement facility operated 
by or pursuant to contract with U.S. Immigration and Customs Enforcement 
(ICE) that routinely holds persons for over 24 hours pending resolution 
or completion of immigration removal operations or processes, including 
facilities that are operated by ICE, facilities that provide detention 
services under a contract awarded by ICE, and facilities used by ICE 
pursuant to an Intergovernmental Service Agreement.
    Intersex means having sexual or reproductive anatomy or chromosomal 
pattern that does not seem to fit typical definitions of male or female. 
Intersex medical conditions are sometimes referred to as disorders of 
sex development.
    Juvenile means any person under the age of 18.
    Law enforcement staff means officers or agents of the agency or 
facility that are responsible for the supervision and control of 
detainees in a holding facility.
    Medical practitioner means a health professional who, by virtue of 
education, credentials, and experience, is permitted by law to evaluate 
and care for patients within the scope of his or her professional 
practice. A ``qualified medical practitioner'' refers to such a 
professional who has also successfully completed specialized training 
for treating sexual abuse victims.
    Mental health practitioner means a mental health professional who, 
by virtue of education, credentials, and experience, is permitted by law 
to evaluate and care for patients within the scope of his or her 
professional practice. A ``qualified mental health practitioner'' refers 
to such a professional who has also successfully completed specialized 
training for treating sexual abuse victims.
    Pat-down search means a sliding or patting of the hands over the 
clothed body of a detainee by staff to determine whether the individual 
possesses contraband.
    Security staff means employees primarily responsible for the 
supervision and control of detainees in housing units, recreational 
areas, dining areas, and other program areas of an immigration detention 
facility.
    Staff means employees or contractors of the agency or facility, 
including any entity that operates within the facility.
    Strip search means a search that requires a person to remove or 
arrange some or all clothing so as to permit a visual inspection of the 
person's breasts, buttocks, or genitalia.
    Substantiated allegation means an allegation that was investigated 
and determined to have occurred.
    Transgender means a person whose gender identity (i.e., internal 
sense of feeling male or female) is different from the person's assigned 
sex at birth.
    Unfounded allegation means an allegation that was investigated and 
determined not to have occurred.
    Unsubstantiated allegation means an allegation that was investigated 
and the investigation produced insufficient

[[Page 310]]

evidence to make a final determination as to whether or not the event 
occurred.
    Volunteer means an individual who donates time and effort on a 
recurring basis to enhance the activities and programs of the agency or 
facility.



Sec.  115.6  Definitions related to sexual abuse and assault.

    For purposes of this part, the term--
    Sexual abuse includes--
    (1) Sexual abuse and assault of a detainee by another detainee; and
    (2) Sexual abuse and assault of a detainee by a staff member, 
contractor, or volunteer.
    Sexual abuse of a detainee by another detainee includes any of the 
following acts by one or more detainees, prisoners, inmates, or 
residents of the facility in which the detainee is housed who, by force, 
coercion, or intimidation, or if the victim did not consent or was 
unable to consent or refuse, engages in or attempts to engage in:
    (1) Contact between the penis and the vulva or anus and, for 
purposes of this paragraph (1), contact involving the penis upon 
penetration, however slight;
    (2) Contact between the mouth and the penis, vulva, or anus;
    (3) Penetration, however slight, of the anal or genital opening of 
another person by a hand or finger or by any object;
    (4) Touching of the genitalia, anus, groin, breast, inner thighs or 
buttocks, either directly or through the clothing, with an intent to 
abuse, humiliate, harass, degrade or arouse or gratify the sexual desire 
of any person; or
    (5) Threats, intimidation, or other actions or communications by one 
or more detainees aimed at coercing or pressuring another detainee to 
engage in a sexual act.
    Sexual abuse of a detainee by a staff member, contractor, or 
volunteer includes any of the following acts, if engaged in by one or 
more staff members, volunteers, or contract personnel who, with or 
without the consent of the detainee, engages in or attempts to engage 
in:
    (1) Contact between the penis and the vulva or anus and, for 
purposes of this paragraph (1), contact involving the penis upon 
penetration, however slight;
    (2) Contact between the mouth and the penis, vulva, or anus;
    (3) Penetration, however slight, of the anal or genital opening of 
another person by a hand or finger or by any object that is unrelated to 
official duties or where the staff member, contractor, or volunteer has 
the intent to abuse, arouse, or gratify sexual desire;
    (4) Intentional touching of the genitalia, anus, groin, breast, 
inner thighs or buttocks, either directly or through the clothing, that 
is unrelated to official duties or where the staff member, contractor, 
or volunteer has the intent to abuse, arouse, or gratify sexual desire;
    (5) Threats, intimidation, harassment, indecent, profane or abusive 
language, or other actions or communications, aimed at coercing or 
pressuring a detainee to engage in a sexual act;
    (6) Repeated verbal statements or comments of a sexual nature to a 
detainee;
    (7) Any display of his or her uncovered genitalia, buttocks, or 
breast in the presence of an inmate, detainee, or resident, or
    (8) Voyeurism, which is defined as the inappropriate visual 
surveillance of a detainee for reasons unrelated to official duties. 
Where not conducted for reasons relating to official duties, the 
following are examples of voyeurism: staring at a detainee who is using 
a toilet in his or her cell to perform bodily functions; requiring an 
inmate detainee to expose his or her buttocks, genitals, or breasts; or 
taking images of all or part of a detainee's naked body or of a detainee 
performing bodily functions.



        Subpart A_Standards for Immigration Detention Facilities

                                Coverage



Sec.  115.10  Coverage of DHS immigration detention facilities.

    This subpart covers ICE immigration detention facilities. Standards 
set forth in this subpart A are not applicable to Department of Homeland 
Security (DHS) holding facilities.

[[Page 311]]

                           Prevention Planning



Sec.  115.11  Zero tolerance of sexual abuse; Prevention of Sexual 
Assault Coordinator.

    (a) The agency shall have a written policy mandating zero tolerance 
toward all forms of sexual abuse and outlining the agency's approach to 
preventing, detecting, and responding to such conduct.
    (b) The agency shall employ or designate an upper-level, agency-wide 
Prevention of Sexual Assault Coordinator (PSA Coordinator) with 
sufficient time and authority to develop, implement, and oversee agency 
efforts to comply with these standards in all of its immigration 
detention facilities.
    (c) Each facility shall have a written policy mandating zero 
tolerance toward all forms of sexual abuse and outlining the facility's 
approach to preventing, detecting, and responding to such conduct. The 
agency shall review and approve each facility's written policy.
    (d) Each facility shall employ or designate a Prevention of Sexual 
Assault Compliance Manager (PSA Compliance Manager) who shall serve as 
the facility point of contact for the agency PSA Coordinator and who has 
sufficient time and authority to oversee facility efforts to comply with 
facility sexual abuse prevention and intervention policies and 
procedures.



Sec.  115.12  Contracting with non-DHS entities for the confinement of
detainees.

    (a) When contracting for the confinement of detainees in immigration 
detention facilities operated by non-DHS private or public agencies or 
other entities, including other government agencies, the agency shall 
include in any new contracts, contract renewals, or substantive contract 
modifications the entity's obligation to adopt and comply with these 
standards.
    (b) Any new contracts, contract renewals, or substantive contract 
modifications shall provide for agency contract monitoring to ensure 
that the contractor is complying with these standards.



Sec.  115.13  Detainee supervision and monitoring.

    (a) Each facility shall ensure that it maintains sufficient 
supervision of detainees, including through appropriate staffing levels 
and, where applicable, video monitoring, to protect detainees against 
sexual abuse.
    (b) Each facility shall develop and document comprehensive detainee 
supervision guidelines to determine and meet the facility's detainee 
supervision needs, and shall review those guidelines at least annually.
    (c) In determining adequate levels of detainee supervision and 
determining the need for video monitoring, the facility shall take into 
consideration generally accepted detention and correctional practices, 
any judicial findings of inadequacy, the physical layout of each 
facility, the composition of the detainee population, the prevalence of 
substantiated and unsubstantiated incidents of sexual abuse, the 
findings and recommendations of sexual abuse incident review reports, 
and any other relevant factors, including but not limited to the length 
of time detainees spend in agency custody.
    (d) Each facility shall conduct frequent unannounced security 
inspections to identify and deter sexual abuse of detainees. Such 
inspections shall be implemented for night as well as day shifts. Each 
facility shall prohibit staff from alerting others that these security 
inspections are occurring, unless such announcement is related to the 
legitimate operational functions of the facility.



Sec.  115.14  Juvenile and family detainees.

    (a) Juveniles shall be detained in the least restrictive setting 
appropriate to the juvenile's age and special needs, provided that such 
setting is consistent with the need to protect the juvenile's well-being 
and that of others, as well as with any other laws, regulations, or 
legal requirements.
    (b) The facility shall hold juveniles apart from adult detainees, 
minimizing sight, sound, and physical contact, unless the juvenile is in 
the presence of an adult member of the family unit, and provided there 
are no safety or security concerns with the arrangement.

[[Page 312]]

    (c) In determining the existence of a family unit for detention 
purposes, the agency shall seek to obtain reliable evidence of a family 
relationship.
    (d) The agency and facility shall provide priority attention to 
unaccompanied alien children as defined by 6 U.S.C. 279(g)(2), including 
transfer to a Department of Health and Human Services Office of Refugee 
Resettlement facility within 72 hours, except in exceptional 
circumstances, in accordance with 8 U.S.C. 1232(b)(3).
    (e) If a juvenile who is an unaccompanied alien child has been 
convicted as an adult of a crime related to sexual abuse, the agency 
shall provide the facility and the Department of Health and Human 
Services Office of Refugee Resettlement with the releasable information 
regarding the conviction(s) to ensure the appropriate placement of the 
alien in a Department of Health and Human Services Office of Refugee 
Resettlement facility.



Sec.  115.15  Limits to cross-gender viewing and searches.

    (a) Searches may be necessary to ensure the safety of officers, 
civilians and detainees; to detect and secure evidence of criminal 
activity; and to promote security, safety, and related interests at 
immigration detention facilities.
    (b) Cross-gender pat-down searches of male detainees shall not be 
conducted unless, after reasonable diligence, staff of the same gender 
is not available at the time the pat-down search is required or in 
exigent circumstances.
    (c) Cross-gender pat-down searches of female detainees shall not be 
conducted unless in exigent circumstances.
    (d) All cross-gender pat-down searches shall be documented.
    (e) Cross-gender strip searches or cross-gender visual body cavity 
searches shall not be conducted except in exigent circumstances, 
including consideration of officer safety, or when performed by medical 
practitioners. Facility staff shall not conduct visual body cavity 
searches of juveniles and, instead, shall refer all such body cavity 
searches of juveniles to a medical practitioner.
    (f) All strip searches and visual body cavity searches shall be 
documented.
    (g) Each facility shall implement policies and procedures that 
enable detainees to shower, perform bodily functions, and change 
clothing without being viewed by staff of the opposite gender, except in 
exigent circumstances or when such viewing is incidental to routine cell 
checks or is otherwise appropriate in connection with a medical 
examination or monitored bowel movement. Such policies and procedures 
shall require staff of the opposite gender to announce their presence 
when entering an area where detainees are likely to be showering, 
performing bodily functions, or changing clothing.
    (h) The facility shall permit detainees in Family Residential 
Facilities to shower, perform bodily functions, and change clothing 
without being viewed by staff, except in exigent circumstances or when 
such viewing is incidental to routine cell checks or is otherwise 
appropriate in connection with a medical examination or monitored bowel 
movement.
    (i) The facility shall not search or physically examine a detainee 
for the sole purpose of determining the detainee's genital 
characteristics. If the detainee's gender is unknown, it may be 
determined during conversations with the detainee, by reviewing medical 
records, or, if necessary, learning that information as part of a 
standard medical examination that all detainees must undergo as part of 
intake or other processing procedure conducted in private, by a medical 
practitioner.
    (j) The agency shall train security staff in proper procedures for 
conducting pat-down searches, including cross-gender pat-down searches 
and searches of transgender and intersex detainees. All pat-down 
searches shall be conducted in a professional and respectful manner, and 
in the least intrusive manner possible, consistent with security needs 
and agency policy, including consideration of officer safety.



Sec.  115.16  Accommodating detainees with disabilities and detainees
who are limited English proficient.

    (a) The agency and each facility shall take appropriate steps to 
ensure that

[[Page 313]]

detainees with disabilities (including, for example, detainees who are 
deaf or hard of hearing, those who are blind or have low vision, or 
those who have intellectual, psychiatric, or speech disabilities) have 
an equal opportunity to participate in or benefit from all aspects of 
the agency's and facility's efforts to prevent, detect, and respond to 
sexual abuse. Such steps shall include, when necessary to ensure 
effective communication with detainees who are deaf or hard of hearing, 
providing access to in-person, telephonic, or video interpretive 
services that enable effective, accurate, and impartial interpretation, 
both receptively and expressively, using any necessary specialized 
vocabulary. In addition, the agency and facility shall ensure that any 
written materials related to sexual abuse are provided in formats or 
through methods that ensure effective communication with detainees with 
disabilities, including detainees who have intellectual disabilities, 
limited reading skills, or who are blind or have low vision. An agency 
or facility is not required to take actions that it can demonstrate 
would result in a fundamental alteration in the nature of a service, 
program, or activity, or in undue financial and administrative burdens, 
as those terms are used in regulations promulgated under title II of the 
Americans with Disabilities Act, 28 CFR 35.164.
    (b) The agency and each facility shall take steps to ensure 
meaningful access to all aspects of the agency's and facility's efforts 
to prevent, detect, and respond to sexual abuse to detainees who are 
limited English proficient, including steps to provide in-person or 
telephonic interpretive services that enable effective, accurate, and 
impartial interpretation, both receptively and expressively, using any 
necessary specialized vocabulary.
    (c) In matters relating to allegations of sexual abuse, the agency 
and each facility shall provide in-person or telephonic interpretation 
services that enable effective, accurate, and impartial interpretation, 
by someone other than another detainee, unless the detainee expresses a 
preference for another detainee to provide interpretation and the agency 
determines that such interpretation is appropriate and consistent with 
DHS policy. The provision of interpreter services by minors, alleged 
abusers, detainees who witnessed the alleged abuse, and detainees who 
have a significant relationship with the alleged abuser is not 
appropriate in matters relating to allegations of sexual abuse.



Sec.  115.17  Hiring and promotion decisions.

    (a) An agency or facility shall not hire or promote anyone who may 
have contact with detainees, and shall not enlist the services of any 
contractor or volunteer who may have contact with detainees, who has 
engaged in sexual abuse in a prison, jail, holding facility, community 
confinement facility, juvenile facility, or other institution (as 
defined in 42 U.S.C. 1997); who has been convicted of engaging or 
attempting to engage in sexual activity facilitated by force, overt or 
implied threats of force, or coercion, or if the victim did not consent 
or was unable to consent or refuse; or who has been civilly or 
administratively adjudicated to have engaged in such activity.
    (b) An agency or facility considering hiring or promoting staff 
shall ask all applicants who may have contact with detainees directly 
about previous misconduct described in paragraph (a) of this section, in 
written applications or interviews for hiring or promotions and in any 
interviews or written self-evaluations conducted as part of reviews of 
current employees. Agencies and facilities shall also impose upon 
employees a continuing affirmative duty to disclose any such misconduct. 
The agency, consistent with law, shall make its best efforts to contact 
all prior institutional employers of an applicant for employment, to 
obtain information on substantiated allegations of sexual abuse or any 
resignation during a pending investigation of alleged sexual abuse.
    (c) Before hiring new staff who may have contact with detainees, the 
agency or facility shall conduct a background investigation to determine 
whether the candidate for hire is suitable for employment with the 
facility or agency, including a criminal background records check. Upon 
request by the agency, the facility shall submit

[[Page 314]]

for the agency's approval written documentation showing the detailed 
elements of the facility's background check for each staff member and 
the facility's conclusions. The agency shall conduct an updated 
background investigation every five years for agency employees who may 
have contact with detainees. The facility shall require an updated 
background investigation every five years for those facility staff who 
may have contact with detainees and who work in immigration-only 
detention facilities.
    (d) The agency or facility shall also perform a background 
investigation before enlisting the services of any contractor who may 
have contact with detainees. Upon request by the agency, the facility 
shall submit for the agency's approval written documentation showing the 
detailed elements of the facility's background check for each contractor 
and the facility's conclusions.
    (e) Material omissions regarding such misconduct, or the provision 
of materially false information, shall be grounds for termination or 
withdrawal of an offer of employment, as appropriate.
    (f) Unless prohibited by law, the agency shall provide information 
on substantiated allegations of sexual abuse involving a former employee 
upon receiving a request from an institutional employer for whom such 
employee has applied to work.
    (g) In the event the agency contracts with a facility for the 
confinement of detainees, the requirements of this section otherwise 
applicable to the agency also apply to the facility and its staff.



Sec.  115.18  Upgrades to facilities and technologies.

    (a) When designing or acquiring any new facility and in planning any 
substantial expansion or modification of existing facilities, the 
facility or agency, as appropriate, shall consider the effect of the 
design, acquisition, expansion, or modification upon their ability to 
protect detainees from sexual abuse.
    (b) When installing or updating a video monitoring system, 
electronic surveillance system, or other monitoring technology in an 
immigration detention facility, the facility or agency, as appropriate, 
shall consider how such technology may enhance their ability to protect 
detainees from sexual abuse.

                           Responsive Planning



Sec.  115.21  Evidence protocols and forensic medical examinations.

    (a) To the extent that the agency or facility is responsible for 
investigating allegations of sexual abuse involving detainees, it shall 
follow a uniform evidence protocol that maximizes the potential for 
obtaining usable physical evidence for administrative proceedings and 
criminal prosecutions. The protocol shall be developed in coordination 
with DHS and shall be developmentally appropriate for juveniles, where 
applicable.
    (b) The agency and each facility developing an evidence protocol 
referred to in paragraph (a) of this section, shall consider how best to 
utilize available community resources and services to provide valuable 
expertise and support in the areas of crisis intervention and counseling 
to most appropriately address victims' needs. Each facility shall 
establish procedures to make available, to the full extent possible, 
outside victim services following incidents of sexual abuse; the 
facility shall attempt to make available to the victim a victim advocate 
from a rape crisis center. If a rape crisis center is not available to 
provide victim advocate services, the agency shall provide these 
services by making available a qualified staff member from a community-
based organization, or a qualified agency staff member. A qualified 
agency staff member or a qualified community-based staff member means an 
individual who has received education concerning sexual assault and 
forensic examination issues in general. The outside or internal victim 
advocate shall provide emotional support, crisis intervention, 
information, and referrals.
    (c) Where evidentiarily or medically appropriate, at no cost to the 
detainee, and only with the detainee's consent, the facility shall 
arrange for an alleged victim detainee to undergo a forensic medical 
examination by qualified health care personnel, including a Sexual 
Assault Forensic Examiner (SAFE) or Sexual Assault Nurse Examiner

[[Page 315]]

(SANE) where practicable. If SAFEs or SANEs cannot be made available, 
the examination can be performed by other qualified health care 
personnel.
    (d) As requested by a victim, the presence of his or her outside or 
internal victim advocate, including any available victim advocacy 
services offered by a hospital conducting a forensic exam, shall be 
allowed for support during a forensic exam and investigatory interviews.
    (e) To the extent that the agency is not responsible for 
investigating allegations of sexual abuse, the agency or the facility 
shall request that the investigating agency follow the requirements of 
paragraphs (a) through (d) of this section.



Sec.  115.22  Policies to ensure investigation of allegations and
appropriate agency oversight.

    (a) The agency shall establish an agency protocol, and shall require 
each facility to establish a facility protocol, to ensure that each 
allegation of sexual abuse is investigated by the agency or facility, or 
referred to an appropriate investigative authority. The agency shall 
ensure that an administrative or criminal investigation is completed for 
all allegations of sexual abuse.
    (b) The agency shall ensure that the agency and facility protocols 
required by paragraph (a) of this section, include a description of 
responsibilities of the agency, the facility, and any other 
investigating entities; and require the documentation and maintenance, 
for at least five years, of all reports and referrals of allegations of 
sexual abuse.
    (c) The agency shall post its protocols on its Web site; each 
facility shall also post its protocols on its Web site, if it has one, 
or otherwise make the protocol available to the public.
    (d) Each facility protocol shall ensure that all allegations are 
promptly reported to the agency as described in paragraphs (e) and (f) 
of this section, and, unless the allegation does not involve potentially 
criminal behavior, are promptly referred for investigation to an 
appropriate law enforcement agency with the legal authority to conduct 
criminal investigations. A facility may separately, and in addition to 
the above reports and referrals, conduct its own investigation.
    (e) When a detainee, prisoner, inmate, or resident of the facility 
in which an alleged detainee victim is housed is alleged to be the 
perpetrator of detainee sexual abuse, the facility shall ensure that the 
incident is promptly reported to the Joint Intake Center, the ICE Office 
of Professional Responsibility or the DHS Office of Inspector General, 
as well as the appropriate ICE Field Office Director, and, if it is 
potentially criminal, referred to an appropriate law enforcement agency 
having jurisdiction for investigation.
    (f) When a staff member, contractor, or volunteer is alleged to be 
the perpetrator of detainee sexual abuse, the facility shall ensure that 
the incident is promptly reported to the Joint Intake Center, the ICE 
Office of Professional Responsibility or the DHS Office of Inspector 
General, as well as to the appropriate ICE Field Office Director, and to 
the local government entity or contractor that owns or operates the 
facility. If the incident is potentially criminal, the facility shall 
ensure that it is promptly referred to an appropriate law enforcement 
agency having jurisdiction for investigation.
    (g) The agency shall ensure that all allegations of detainee sexual 
abuse are promptly reported to the PSA Coordinator and to the 
appropriate offices within the agency and within DHS to ensure 
appropriate oversight of the investigation.
    (h) The agency shall ensure that any alleged detainee victim of 
sexual abuse that is criminal in nature is provided timely access to U 
nonimmigrant status information.

                         Training and Education



Sec.  115.31  Staff training.

    (a) The agency shall train, or require the training of, all 
employees who may have contact with immigration detainees, and all 
facility staff, to be able to fulfill their responsibilities under this 
part, including training on:
    (1) The agency's and the facility's zero-tolerance policies for all 
forms of sexual abuse;

[[Page 316]]

    (2) The right of detainees and staff to be free from sexual abuse, 
and from retaliation for reporting sexual abuse;
    (3) Definitions and examples of prohibited and illegal sexual 
behavior;
    (4) Recognition of situations where sexual abuse may occur;
    (5) Recognition of physical, behavioral, and emotional signs of 
sexual abuse, and methods of preventing and responding to such 
occurrences;
    (6) How to avoid inappropriate relationships with detainees;
    (7) How to communicate effectively and professionally with 
detainees, including lesbian, gay, bisexual, transgender, intersex, or 
gender nonconforming detainees;
    (8) Procedures for reporting knowledge or suspicion of sexual abuse; 
and
    (9) The requirement to limit reporting of sexual abuse to personnel 
with a need-to-know in order to make decisions concerning the victim's 
welfare and for law enforcement or investigative purposes.
    (b) All current facility staff, and all agency employees who may 
have contact with immigration detention facility detainees, shall be 
trained within one year of May 6, 2014, and the agency or facility shall 
provide refresher information every two years.
    (c) The agency and each facility shall document that staff that may 
have contact with immigration facility detainees have completed the 
training.



Sec.  115.32  Other training.

    (a) The facility shall ensure that all volunteers and other 
contractors (as defined in paragraph (d) of this section) who have 
contact with detainees have been trained on their responsibilities under 
the agency's and the facility's sexual abuse prevention, detection, 
intervention and response policies and procedures.
    (b) The level and type of training provided to volunteers and other 
contractors shall be based on the services they provide and level of 
contact they have with detainees, but all volunteers and other 
contractors who have contact with detainees shall be notified of the 
agency's and the facility's zero-tolerance policies regarding sexual 
abuse and informed how to report such incidents.
    (c) Each facility shall receive and maintain written confirmation 
that volunteers and other contractors who have contact with immigration 
facility detainees have completed the training.
    (d) In this section, the term other contractor means a person who 
provides services on a non-recurring basis to the facility pursuant to a 
contractual agreement with the agency or facility.



Sec.  115.33  Detainee education.

    (a) During the intake process, each facility shall ensure that the 
detainee orientation program notifies and informs detainees about the 
agency's and the facility's zero-tolerance policies for all forms of 
sexual abuse and includes (at a minimum) instruction on:
    (1) Prevention and intervention strategies;
    (2) Definitions and examples of detainee-on-detainee sexual abuse, 
staff-on-detainee sexual abuse and coercive sexual activity;
    (3) Explanation of methods for reporting sexual abuse, including to 
any staff member, including a staff member other than an immediate 
point-of-contact line officer (e.g., the compliance manager or a mental 
health specialist), the DHS Office of Inspector General, and the Joint 
Intake Center;
    (4) Information about self-protection and indicators of sexual 
abuse;
    (5) Prohibition against retaliation, including an explanation that 
reporting sexual abuse shall not negatively impact the detainee's 
immigration proceedings; and
    (6) The right of a detainee who has been subjected to sexual abuse 
to receive treatment and counseling.
    (b) Each facility shall provide the detainee notification, 
orientation, and instruction in formats accessible to all detainees, 
including those who are limited English proficient, deaf, visually 
impaired or otherwise disabled, as well as to detainees who have limited 
reading skills.
    (c) The facility shall maintain documentation of detainee 
participation in the intake process orientation.
    (d) Each facility shall post on all housing unit bulletin boards the 
following notices:
    (1) The DHS-prescribed sexual assault awareness notice;

[[Page 317]]

    (2) The name of the Prevention of Sexual Abuse Compliance Manager; 
and
    (3) The name of local organizations that can assist detainees who 
have been victims of sexual abuse.
    (e) The facility shall make available and distribute the DHS-
prescribed ``Sexual Assault Awareness Information'' pamphlet.
    (f) Information about reporting sexual abuse shall be included in 
the agency Detainee Handbook made available to all immigration detention 
facility detainees.



Sec.  115.34  Specialized training: Investigations.

    (a) In addition to the general training provided to all facility 
staff and employees pursuant to Sec.  115.31, the agency or facility 
shall provide specialized training on sexual abuse and effective cross-
agency coordination to agency or facility investigators, respectively, 
who conduct investigations into allegations of sexual abuse at 
immigration detention facilities. All investigations into alleged sexual 
abuse must be conducted by qualified investigators.
    (b) The agency and facility must maintain written documentation 
verifying specialized training provided to investigators pursuant to 
this section.



Sec.  115.35  Specialized training: Medical and mental health care.

    (a) The agency shall provide specialized training to DHS or agency 
employees who serve as full- and part-time medical practitioners or 
full- and part-time mental health practitioners in immigration detention 
facilities where medical and mental health care is provided.
    (b) The training required by this section shall cover, at a minimum, 
the following topics:
    (1) How to detect and assess signs of sexual abuse;
    (2) How to respond effectively and professionally to victims of 
sexual abuse,
    (3) How and to whom to report allegations or suspicions of sexual 
abuse, and
    (4) How to preserve physical evidence of sexual abuse. If medical 
staff employed by the agency conduct forensic examinations, such medical 
staff shall receive the appropriate training to conduct such 
examinations.
    (c) The agency shall review and approve the facility's policy and 
procedures to ensure that facility medical staff is trained in 
procedures for examining and treating victims of sexual abuse, in 
facilities where medical staff may be assigned these activities.

       Assessment for Risk of Sexual Victimization and Abusiveness



Sec.  115.41  Assessment for risk of victimization and abusiveness.

    (a) The facility shall assess all detainees on intake to identify 
those likely to be sexual aggressors or sexual abuse victims and shall 
house detainees to prevent sexual abuse, taking necessary steps to 
mitigate any such danger. Each new arrival shall be kept separate from 
the general population until he/she is classified and may be housed 
accordingly.
    (b) The initial classification process and initial housing 
assignment should be completed within twelve hours of admission to the 
facility.
    (c) The facility shall also consider, to the extent that the 
information is available, the following criteria to assess detainees for 
risk of sexual victimization:
    (1) Whether the detainee has a mental, physical, or developmental 
disability;
    (2) The age of the detainee;
    (3) The physical build and appearance of the detainee;
    (4) Whether the detainee has previously been incarcerated or 
detained;
    (5) The nature of the detainee's criminal history;
    (6) Whether the detainee has any convictions for sex offenses 
against an adult or child;
    (7) Whether the detainee has self-identified as gay, lesbian, 
bisexual, transgender, intersex, or gender nonconforming;
    (8) Whether the detainee has self-identified as having previously 
experienced sexual victimization; and
    (9) The detainee's own concerns about his or her physical safety.
    (d) The initial screening shall consider prior acts of sexual abuse, 
prior

[[Page 318]]

convictions for violent offenses, and history of prior institutional 
violence or sexual abuse, as known to the facility, in assessing 
detainees for risk of being sexually abusive.
    (e) The facility shall reassess each detainee's risk of 
victimization or abusiveness between 60 and 90 days from the date of 
initial assessment, and at any other time when warranted based upon the 
receipt of additional, relevant information or following an incident of 
abuse or victimization.
    (f) Detainees shall not be disciplined for refusing to answer, or 
for not disclosing complete information in response to, questions asked 
pursuant to paragraphs (c)(1), (c)(7), (c)(8), or (c)(9) of this 
section.
    (g) The facility shall implement appropriate controls on the 
dissemination within the facility of responses to questions asked 
pursuant to this standard in order to ensure that sensitive information 
is not exploited to the detainee's detriment by staff or other detainees 
or inmates.



Sec.  115.42  Use of assessment information.

    (a) The facility shall use the information from the risk assessment 
under Sec.  115.41 of this part to inform assignment of detainees to 
housing, recreation and other activities, and voluntary work. The agency 
shall make individualized determinations about how to ensure the safety 
of each detainee.
    (b) When making assessment and housing decisions for a transgender 
or intersex detainee, the facility shall consider the detainee's gender 
self-identification and an assessment of the effects of placement on the 
detainee's health and safety. The facility shall consult a medical or 
mental health professional as soon as practicable on this assessment. 
The facility should not base placement decisions of transgender or 
intersex detainees solely on the identity documents or physical anatomy 
of the detainee; a detainee's self-identification of his/her gender and 
self-assessment of safety needs shall always be taken into consideration 
as well. The facility's placement of a transgender or intersex detainee 
shall be consistent with the safety and security considerations of the 
facility, and placement and programming assignments for each transgender 
or intersex detainee shall be reassessed at least twice each year to 
review any threats to safety experienced by the detainee.
    (c) When operationally feasible, transgender and intersex detainees 
shall be given the opportunity to shower separately from other 
detainees.



Sec.  115.43  Protective custody.

    (a) The facility shall develop and follow written procedures 
consistent with the standards in this subpart for each facility 
governing the management of its administrative segregation unit. These 
procedures, which should be developed in consultation with the ICE 
Enforcement and Removal Operations Field Office Director having 
jurisdiction for the facility, must document detailed reasons for 
placement of an individual in administrative segregation on the basis of 
a vulnerability to sexual abuse or assault.
    (b) Use of administrative segregation by facilities to protect 
detainees vulnerable to sexual abuse or assault shall be restricted to 
those instances where reasonable efforts have been made to provide 
appropriate housing and shall be made for the least amount of time 
practicable, and when no other viable housing options exist, as a last 
resort. The facility should assign detainees vulnerable to sexual abuse 
or assault to administrative segregation for their protection until an 
alternative means of separation from likely abusers can be arranged, and 
such an assignment shall not ordinarily exceed a period of 30 days.
    (c) Facilities that place vulnerable detainees in administrative 
segregation for protective custody shall provide those detainees access 
to programs, visitation, counsel and other services available to the 
general population to the maximum extent practicable.
    (d) Facilities shall implement written procedures for the regular 
review of all vulnerable detainees placed in administrative segregation 
for their protection, as follows:
    (1) A supervisory staff member shall conduct a review within 72 
hours of the

[[Page 319]]

detainee's placement in administrative segregation to determine whether 
segregation is still warranted; and
    (2) A supervisory staff member shall conduct, at a minimum, an 
identical review after the detainee has spent seven days in 
administrative segregation, and every week thereafter for the first 30 
days, and every 10 days thereafter.
    (e) Facilities shall notify the appropriate ICE Field Office 
Director no later than 72 hours after the initial placement into 
segregation, whenever a detainee has been placed in administrative 
segregation on the basis of a vulnerability to sexual abuse or assault.
    (f) Upon receiving notification pursuant to paragraph (e) of this 
section, the ICE Field Office Director shall review the placement and 
consider:
    (1) Whether continued placement in administrative segregation is 
warranted;
    (2) Whether any alternatives are available and appropriate, such as 
placing the detainee in a less restrictive housing option at another 
facility or other appropriate custodial options; and
    (3) Whether the placement is only as a last resort and when no other 
viable housing options exist.

                                Reporting



Sec.  115.51  Detainee reporting.

    (a) The agency and each facility shall develop policies and 
procedures to ensure that detainees have multiple ways to privately 
report sexual abuse, retaliation for reporting sexual abuse, or staff 
neglect or violations of responsibilities that may have contributed to 
such incidents. The agency and each facility shall also provide 
instructions on how detainees may contact their consular official, the 
DHS Office of the Inspector General or, as appropriate, another 
designated office, to confidentially and, if desired, anonymously, 
report these incidents.
    (b) The agency shall also provide, and the facility shall inform the 
detainees of, at least one way for detainees to report sexual abuse to a 
public or private entity or office that is not part of the agency, and 
that is able to receive and immediately forward detainee reports of 
sexual abuse to agency officials, allowing the detainee to remain 
anonymous upon request.
    (c) Facility policies and procedures shall include provisions for 
staff to accept reports made verbally, in writing, anonymously, and from 
third parties and to promptly document any verbal reports.



Sec.  115.52  Grievances.

    (a) The facility shall permit a detainee to file a formal grievance 
related to sexual abuse at any time during, after, or in lieu of lodging 
an informal grievance or complaint.
    (b) The facility shall not impose a time limit on when a detainee 
may submit a grievance regarding an allegation of sexual abuse.
    (c) The facility shall implement written procedures for identifying 
and handling time-sensitive grievances that involve an immediate threat 
to detainee health, safety, or welfare related to sexual abuse.
    (d) Facility staff shall bring medical emergencies to the immediate 
attention of proper medical personnel for further assessment.
    (e) The facility shall issue a decision on the grievance within five 
days of receipt and shall respond to an appeal of the grievance decision 
within 30 days. Facilities shall send all grievances related to sexual 
abuse and the facility's decisions with respect to such grievances to 
the appropriate ICE Field Office Director at the end of the grievance 
process.
    (f) To prepare a grievance, a detainee may obtain assistance from 
another detainee, the housing officer or other facility staff, family 
members, or legal representatives. Staff shall take reasonable steps to 
expedite requests for assistance from these other parties.



Sec.  115.53  Detainee access to outside confidential support services.

    (a) Each facility shall utilize available community resources and 
services to provide valuable expertise and support in the areas of 
crisis intervention, counseling, investigation and the prosecution of 
sexual abuse perpetrators to most appropriately address victims' needs. 
The facility shall maintain or

[[Page 320]]

attempt to enter into memoranda of understanding or other agreements 
with community service providers or, if local providers are not 
available, with national organizations that provide legal advocacy and 
confidential emotional support services for immigrant victims of crime.
    (b) Each facility's written policies shall establish procedures to 
include outside agencies in the facility's sexual abuse prevention and 
intervention protocols, if such resources are available.
    (c) Each facility shall make available to detainees information 
about local organizations that can assist detainees who have been 
victims of sexual abuse, including mailing addresses and telephone 
numbers (including toll-free hotline numbers where available). If no 
such local organizations exist, the facility shall make available the 
same information about national organizations. The facility shall enable 
reasonable communication between detainees and these organizations and 
agencies, in as confidential a manner as possible.
    (d) Each facility shall inform detainees, prior to giving them 
access to outside resources, of the extent to which such communications 
will be monitored and the extent to which reports of abuse will be 
forwarded to authorities in accordance with mandatory reporting laws.



Sec.  115.54  Third-party reporting.

    Each facility shall establish a method to receive third-party 
reports of sexual abuse in its immigration detention facilities and 
shall make available to the public information on how to report sexual 
abuse on behalf of a detainee.

              Official Response Following a Detainee Report



Sec.  115.61  Staff reporting duties.

    (a) The agency and each facility shall require all staff to report 
immediately and according to agency policy any knowledge, suspicion, or 
information regarding an incident of sexual abuse that occurred in a 
facility; retaliation against detainees or staff who reported or 
participated in an investigation about such an incident; and any staff 
neglect or violation of responsibilities that may have contributed to an 
incident or retaliation. The agency shall review and approve facility 
policies and procedures and shall ensure that the facility specifies 
appropriate reporting procedures, including a method by which staff can 
report outside of the chain of command.
    (b) Staff members who become aware of alleged sexual abuse shall 
immediately follow the reporting requirements set forth in the agency's 
and facility's written policies and procedures.
    (c) Apart from such reporting, staff shall not reveal any 
information related to a sexual abuse report to anyone other than to the 
extent necessary to help protect the safety of the victim or prevent 
further victimization of other detainees or staff in the facility, or to 
make medical treatment, investigation, law enforcement, or other 
security and management decisions.
    (d) If the alleged victim is under the age of 18 or considered a 
vulnerable adult under a State or local vulnerable persons statute, the 
agency shall report the allegation to the designated State or local 
services agency under applicable mandatory reporting laws.



Sec.  115.62  Protection duties.

    If an agency employee or facility staff member has a reasonable 
belief that a detainee is subject to a substantial risk of imminent 
sexual abuse, he or she shall take immediate action to protect the 
detainee.



Sec.  115.63  Reporting to other confinement facilities.

    (a) Upon receiving an allegation that a detainee was sexually abused 
while confined at another facility, the agency or facility whose staff 
received the allegation shall notify the appropriate office of the 
agency or the administrator of the facility where the alleged abuse 
occurred.
    (b) The notification provided in paragraph (a) of this section shall 
be provided as soon as possible, but no later than 72 hours after 
receiving the allegation.
    (c) The agency or facility shall document that it has provided such 
notification.

[[Page 321]]

    (d) The agency or facility office that receives such notification, 
to the extent the facility is covered by this subpart, shall ensure that 
the allegation is referred for investigation in accordance with these 
standards and reported to the appropriate ICE Field Office Director.



Sec.  115.64  Responder duties.

    (a) Upon learning of an allegation that a detainee was sexually 
abused, the first security staff member to respond to the report, or his 
or her supervisor, shall be required to:
    (1) Separate the alleged victim and abuser;
    (2) Preserve and protect, to the greatest extent possible, any crime 
scene until appropriate steps can be taken to collect any evidence;
    (3) If the abuse occurred within a time period that still allows for 
the collection of physical evidence, request the alleged victim not to 
take any actions that could destroy physical evidence, including, as 
appropriate, washing, brushing teeth, changing clothes, urinating, 
defecating, smoking, drinking, or eating; and
    (4) If the sexual abuse occurred within a time period that still 
allows for the collection of physical evidence, ensure that the alleged 
abuser does not take any actions that could destroy physical evidence, 
including, as appropriate, washing, brushing teeth, changing clothes, 
urinating, defecating, smoking, drinking, or eating.
    (b) If the first staff responder is not a security staff member, the 
responder shall be required to request that the alleged victim not take 
any actions that could destroy physical evidence and then notify 
security staff.



Sec.  115.65  Coordinated response.

    (a) Each facility shall develop a written institutional plan to 
coordinate actions taken by staff first responders, medical and mental 
health practitioners, investigators, and facility leadership in response 
to an incident of sexual abuse.
    (b) Each facility shall use a coordinated, multidisciplinary team 
approach to responding to sexual abuse.
    (c) If a victim of sexual abuse is transferred between facilities 
covered by subpart A or B of this part, the sending facility shall, as 
permitted by law, inform the receiving facility of the incident and the 
victim's potential need for medical or social services.
    (d) If a victim is transferred from a DHS immigration detention 
facility to a facility not covered by paragraph (c) of this section, the 
sending facility shall, as permitted by law, inform the receiving 
facility of the incident and the victim's potential need for medical or 
social services, unless the victim requests otherwise.



Sec.  115.66  Protection of detainees from contact with alleged abusers.

    Staff, contractors, and volunteers suspected of perpetrating sexual 
abuse shall be removed from all duties requiring detainee contact 
pending the outcome of an investigation.



Sec.  115.67  Agency protection against retaliation.

    (a) Staff, contractors, and volunteers, and immigration detention 
facility detainees, shall not retaliate against any person, including a 
detainee, who reports, complains about, or participates in an 
investigation into an allegation of sexual abuse, or for participating 
in sexual activity as a result of force, coercion, threats, or fear of 
force.
    (b) The agency shall employ multiple protection measures, such as 
housing changes, removal of alleged staff or detainee abusers from 
contact with victims, and emotional support services for detainees or 
staff who fear retaliation for reporting sexual abuse or for cooperating 
with investigations.
    (c) For at least 90 days following a report of sexual abuse, the 
agency and facility shall monitor to see if there are facts that may 
suggest possible retaliation by detainees or staff, and shall act 
promptly to remedy any such retaliation. Items the agency should monitor 
include any detainee disciplinary reports, housing or program changes, 
or negative performance reviews or reassignments of staff. DHS shall 
continue such monitoring beyond 90 days if the initial monitoring 
indicates a continuing need.

[[Page 322]]



Sec.  115.68  Post-allegation protective custody.

    (a) The facility shall take care to place detainee victims of sexual 
abuse in a supportive environment that represents the least restrictive 
housing option possible (e.g., protective custody), subject to the 
requirements of Sec.  115.43.
    (b) Detainee victims shall not be held for longer than five days in 
any type of administrative segregation, except in highly unusual 
circumstances or at the request of the detainee.
    (c) A detainee victim who is in protective custody after having been 
subjected to sexual abuse shall not be returned to the general 
population until completion of a proper re-assessment, taking into 
consideration any increased vulnerability of the detainee as a result of 
the sexual abuse.
    (d) Facilities shall notify the appropriate ICE Field Office 
Director whenever a detainee victim has been held in administrative 
segregation for 72 hours.
    (e) Upon receiving notification that a detainee victim has been held 
in administrative segregation, the ICE Field Office Director shall 
review the placement and consider:
    (1) Whether the placement is only as a last resort and when no other 
viable housing options exist; and
    (2) In cases where the detainee has been held in administrative 
segregation for longer than 5 days, whether the placement is justified 
by highly unusual circumstances or at the detainee's request.

                             Investigations



Sec.  115.71  Criminal and administrative investigations.

    (a) If the facility has responsibility for investigating allegations 
of sexual abuse, all investigations into alleged sexual abuse must be 
prompt, thorough, objective, and conducted by specially trained, 
qualified investigators.
    (b) Upon conclusion of a criminal investigation where the allegation 
was substantiated, an administrative investigation shall be conducted. 
Upon conclusion of a criminal investigation where the allegation was 
unsubstantiated, the facility shall review any available completed 
criminal investigation reports to determine whether an administrative 
investigation is necessary or appropriate. Administrative investigations 
shall be conducted after consultation with the appropriate investigative 
office within DHS, and the assigned criminal investigative entity.
    (c)(1) The facility shall develop written procedures for 
administrative investigations, including provisions requiring:
    (i) Preservation of direct and circumstantial evidence, including 
any available physical and DNA evidence and any available electronic 
monitoring data;
    (ii) Interviewing alleged victims, suspected perpetrators, and 
witnesses;
    (iii) Reviewing prior complaints and reports of sexual abuse 
involving the suspected perpetrator;
    (iv) Assessment of the credibility of an alleged victim, suspect, or 
witness, without regard to the individual's status as detainee, staff, 
or employee, and without requiring any detainee who alleges sexual abuse 
to submit to a polygraph;
    (v) An effort to determine whether actions or failures to act at the 
facility contributed to the abuse; and
    (vi) Documentation of each investigation by written report, which 
shall include a description of the physical and testimonial evidence, 
the reasoning behind credibility assessments, and investigative facts 
and findings; and
    (vii) Retention of such reports for as long as the alleged abuser is 
detained or employed by the agency or facility, plus five years.
    (2) Such procedures shall govern the coordination and sequencing of 
the two types of investigations, in accordance with paragraph (b) of 
this section, to ensure that the criminal investigation is not 
compromised by an internal administrative investigation.
    (d) The agency shall review and approve the facility policy and 
procedures for coordination and conduct of internal administrative 
investigations with the assigned criminal investigative entity to ensure 
non-interference with criminal investigations.
    (e) The departure of the alleged abuser or victim from the 
employment

[[Page 323]]

or control of the facility or agency shall not provide a basis for 
terminating an investigation.
    (f) When outside agencies investigate sexual abuse, the facility 
shall cooperate with outside investigators and shall endeavor to remain 
informed about the progress of the investigation.



Sec.  115.72  Evidentiary standard for administrative investigations.

    When an administrative investigation is undertaken, the agency shall 
impose no standard higher than a preponderance of the evidence in 
determining whether allegations of sexual abuse are substantiated.



Sec.  115.73  Reporting to detainees.

    The agency shall, when the detainee is still in immigration 
detention, or where otherwise feasible, following an investigation into 
a detainee's allegation of sexual abuse, notify the detainee as to the 
result of the investigation and any responsive action taken.

                               Discipline



Sec.  115.76  Disciplinary sanctions for staff.

    (a) Staff shall be subject to disciplinary or adverse action up to 
and including removal from their position and the Federal service for 
substantiated allegations of sexual abuse or for violating agency or 
facility sexual abuse policies.
    (b) The agency shall review and approve facility policies and 
procedures regarding disciplinary or adverse actions for staff and shall 
ensure that the facility policy and procedures specify disciplinary or 
adverse actions for staff, up to and including removal from their 
position and from the Federal service, when there is a substantiated 
allegation of sexual abuse, or when there has been a violation of agency 
sexual abuse rules, policies, or standards. Removal from their position 
and from the Federal service is the presumptive disciplinary sanction 
for staff who have engaged in or attempted or threatened to engage in 
sexual abuse, as defined under the definition of sexual abuse of a 
detainee by a staff member, contractor, or volunteer, paragraphs (1)-(4) 
and (7)-(8) of the definition of ``sexual abuse of a detainee by a staff 
member, contractor, or volunteer'' in Sec.  115.6.
    (c) Each facility shall report all removals or resignations in lieu 
of removal for violations of agency or facility sexual abuse policies to 
appropriate law enforcement agencies, unless the activity was clearly 
not criminal.
    (d) Each facility shall make reasonable efforts to report removals 
or resignations in lieu of removal for violations of agency or facility 
sexual abuse policies to any relevant licensing bodies, to the extent 
known.



Sec.  115.77  Corrective action for contractors and volunteers.

    (a) Any contractor or volunteer who has engaged in sexual abuse 
shall be prohibited from contact with detainees. Each facility shall 
make reasonable efforts to report to any relevant licensing body, to the 
extent known, incidents of substantiated sexual abuse by a contractor or 
volunteer. Such incidents shall also be reported to law enforcement 
agencies, unless the activity was clearly not criminal.
    (b) Contractors and volunteers suspected of perpetrating sexual 
abuse shall be removed from all duties requiring detainee contact 
pending the outcome of an investigation.
    (c) The facility shall take appropriate remedial measures, and shall 
consider whether to prohibit further contact with detainees by 
contractors or volunteers who have not engaged in sexual abuse, but have 
violated other provisions within these standards.



Sec.  115.78  Disciplinary sanctions for detainees.

    (a) Each facility shall subject a detainee to disciplinary sanctions 
pursuant to a formal disciplinary process following an administrative or 
criminal finding that the detainee engaged in sexual abuse.
    (b) At all steps in the disciplinary process provided in paragraph 
(a), any sanctions imposed shall be commensurate with the severity of 
the committed prohibited act and intended to encourage the detainee to 
conform with rules and regulations in the future.

[[Page 324]]

    (c) Each facility holding detainees in custody shall have a detainee 
disciplinary system with progressive levels of reviews, appeals, 
procedures, and documentation procedure.
    (d) The disciplinary process shall consider whether a detainee's 
mental disabilities or mental illness contributed to his or her behavior 
when determining what type of sanction, if any, should be imposed.
    (e) The facility shall not discipline a detainee for sexual contact 
with staff unless there is a finding that the staff member did not 
consent to such contact.
    (f) For the purpose of disciplinary action, a report of sexual abuse 
made in good faith based upon a reasonable belief that the alleged 
conduct occurred shall not constitute falsely reporting an incident or 
lying, even if an investigation does not establish evidence sufficient 
to substantiate the allegation.

                         Medical and Mental Care



Sec.  115.81  Medical and mental health assessments; history of
sexual abuse.

    (a) If the assessment pursuant to Sec.  115.41 indicates that a 
detainee has experienced prior sexual victimization or perpetrated 
sexual abuse, staff shall, as appropriate, ensure that the detainee is 
immediately referred to a qualified medical or mental health 
practitioner for medical and/or mental health follow-up as appropriate.
    (b) When a referral for medical follow-up is initiated, the detainee 
shall receive a health evaluation no later than two working days from 
the date of assessment.
    (c) When a referral for mental health follow-up is initiated, the 
detainee shall receive a mental health evaluation no later than 72 hours 
after the referral.



Sec.  115.82  Access to emergency medical and mental health services.

    (a) Detainee victims of sexual abuse shall have timely, unimpeded 
access to emergency medical treatment and crisis intervention services, 
including emergency contraception and sexually transmitted infections 
prophylaxis, in accordance with professionally accepted standards of 
care.
    (b) Emergency medical treatment services provided to the victim 
shall be without financial cost and regardless of whether the victim 
names the abuser or cooperates with any investigation arising out of the 
incident.



Sec.  115.83  Ongoing medical and mental health care for sexual abuse
victims and abusers.

    (a) Each facility shall offer medical and mental health evaluation 
and, as appropriate, treatment to all detainees who have been victimized 
by sexual abuse while in immigration detention.
    (b) The evaluation and treatment of such victims shall include, as 
appropriate, follow-up services, treatment plans, and, when necessary, 
referrals for continued care following their transfer to, or placement 
in, other facilities, or their release from custody.
    (c) The facility shall provide such victims with medical and mental 
health services consistent with the community level of care.
    (d) Detainee victims of sexually abusive vaginal penetration by a 
male abuser while incarcerated shall be offered pregnancy tests. If 
pregnancy results from an instance of sexual abuse, the victim shall 
receive timely and comprehensive information about lawful pregnancy-
related medical services and timely access to all lawful pregnancy-
related medical services.
    (e) Detainee victims of sexual abuse while detained shall be offered 
tests for sexually transmitted infections as medically appropriate.
    (f) Treatment services shall be provided to the victim without 
financial cost and regardless of whether the victim names the abuser or 
cooperates with any investigation arising out of the incident.
    (g) The facility shall attempt to conduct a mental health evaluation 
of all known detainee-on-detainee abusers within 60 days of learning of 
such abuse history and offer treatment when deemed appropriate by mental 
health practitioners.

[[Page 325]]

                       Data Collection and Review



Sec.  115.86  Sexual abuse incident reviews.

    (a) Each facility shall conduct a sexual abuse incident review at 
the conclusion of every investigation of sexual abuse and, where the 
allegation was not determined to be unfounded, prepare a written report 
within 30 days of the conclusion of the investigation recommending 
whether the allegation or investigation indicates that a change in 
policy or practice could better prevent, detect, or respond to sexual 
abuse. The facility shall implement the recommendations for improvement, 
or shall document its reasons for not doing so in a written response. 
Both the report and response shall be forwarded to the agency PSA 
Coordinator.
    (b) The review team shall consider whether the incident or 
allegation was motivated by race; ethnicity; gender identity; lesbian, 
gay, bisexual, transgender, or intersex identification, status, or 
perceived status; or gang affiliation; or was motivated or otherwise 
caused by other group dynamics at the facility.
    (c) Each facility shall conduct an annual review of all sexual abuse 
investigations and resulting incident reviews to assess and improve 
sexual abuse intervention, prevention and response efforts. If the 
facility has not had any reports of sexual abuse during the annual 
reporting period, then the facility shall prepare a negative report. The 
results and findings of the annual review shall be provided to the 
facility administrator, Field Office Director or his or her designee, 
and the agency PSA Coordinator.



Sec.  115.87  Data collection.

    (a) Each facility shall maintain in a secure area all case records 
associated with claims of sexual abuse, including incident reports, 
investigative reports, offender information, case disposition, medical 
and counseling evaluation findings, and recommendations for post-release 
treatment, if necessary, and/or counseling in accordance with these 
standards and applicable agency policies, and in accordance with 
established schedules. The DHS Office of Inspector General shall 
maintain the official investigative file related to claims of sexual 
abuse investigated by the DHS Office of Inspector General.
    (b) On an ongoing basis, the PSA Coordinator shall work with 
relevant facility PSA Compliance Managers and DHS entities to share data 
regarding effective agency response methods to sexual abuse.
    (c) On a regular basis, the PSA Coordinator shall prepare a report 
for ICE leadership compiling information received about all incidents or 
allegations of sexual abuse of detainees in immigration detention during 
the period covered by the report, as well as ongoing investigations and 
other pending cases.
    (d) On an annual basis, the PSA Coordinator shall aggregate, in a 
manner that will facilitate the agency's ability to detect possible 
patterns and help prevent future incidents, the incident-based sexual 
abuse data, including the number of reported sexual abuse allegations 
determined to be substantiated, unsubstantiated, or unfounded, or for 
which investigation is ongoing, and for each incident found to be 
substantiated, information concerning:
    (1) The date, time, location, and nature of the incident;
    (2) The demographic background of the victim and perpetrator 
(including citizenship, age, gender, and whether either has self-
identified as gay, lesbian, bisexual, transgender, intersex, or gender 
nonconforming);
    (3) The reporting timeline for the incident (including the name of 
individual who reported the incident, and the date and time the report 
was received);
    (4) Any injuries sustained by the victim;
    (5) Post-report follow up responses and action taken by the facility 
(e.g., housing placement/custody classification, medical examination, 
mental health counseling, etc.); and
    (6) Any sanctions imposed on the perpetrator.
    (e) Upon request, the agency shall provide all data described in 
this section from the previous calendar year to the Office for Civil 
Rights and Civil Liberties no later than June 30.

[[Page 326]]



Sec.  115.88  Data review for corrective action.

    (a) The agency shall review data collected and aggregated pursuant 
to Sec.  115.87 of this part in order to assess and improve the 
effectiveness of its sexual abuse prevention, detection, and response 
policies, practices, and training, including by:
    (1) Identifying problem areas;
    (2) Taking corrective action on an ongoing basis; and
    (3) Preparing an annual report of its findings and corrective 
actions for each immigration detention facility, as well as the agency 
as a whole.
    (b) Such report shall include a comparison of the current year's 
data and corrective actions with those from prior years and shall 
provide an assessment of the agency's progress in preventing, detecting, 
and responding to sexual abuse.
    (c) The agency's report shall be approved by the agency head and 
made readily available to the public through its Web site.
    (d) The agency may redact specific material from the reports, when 
appropriate for safety or security, but must indicate the nature of the 
material redacted.



Sec.  115.89  Data storage, publication, and destruction.

    (a) The agency shall ensure that data collected pursuant to Sec.  
115.87 are securely retained in accordance with agency record retention 
policies and the agency protocol regarding investigation of allegations.
    (b) The agency shall make all aggregated sexual abuse data from 
immigration detention facilities under its direct control and from any 
private agencies with which it contracts available to the public at 
least annually on its Web site consistent with existing agency 
information disclosure policies and processes.
    (c) Before making aggregated sexual abuse data publicly available, 
the agency shall remove all personal identifiers.
    (d) The agency shall maintain sexual abuse data collected pursuant 
to Sec.  115.87 for at least 10 years after the date of the initial 
collection unless Federal, State, or local law requires otherwise.

                          Audits and Compliance



Sec.  115.93  Audits of standards.

    (a) During the three-year period starting on July 6. 2015, and 
during each three-year period thereafter, the agency shall ensure that 
each immigration detention facility that has adopted these standards is 
audited at least once.
    (b) The agency may require an expedited audit if the agency has 
reason to believe that a particular facility may be experiencing 
problems relating to sexual abuse. The agency may also include referrals 
to resources that may assist the facility with PREA-related issues.
    (c) Audits under this section shall be conducted pursuant to 
Sec. Sec.  115.201 through 115.205.
    (d) Audits under this section shall be coordinated by the agency 
with the DHS Office for Civil Rights and Civil Liberties, which may 
request an expedited audit if it has reason to believe that an expedited 
audit is appropriate.

                Additional Provisions in Agency Policies



Sec.  115.95  Additional provisions in agency policies.

    The regulations in this subpart A establish minimum requirements for 
agencies and facilities. Agency and facility policies may include 
additional requirements.



             Subpart B_Standards for DHS Holding Facilities

                                Coverage



Sec.  115.110  Coverage of DHS holding facilities.

    This subpart B covers all DHS holding facilities. Standards found in 
subpart A of this part are not applicable to DHS facilities except ICE 
immigration detention facilities.

[[Page 327]]

                           Prevention Planning



Sec.  115.111  Zero tolerance of sexual abuse; Prevention of Sexual
Assault Coordinator.

    (a) The agency shall have a written policy mandating zero tolerance 
toward all forms of sexual abuse and outlining the agency's approach to 
preventing, detecting, and responding to such conduct.
    (b) The agency shall employ or designate an upper-level, agency-wide 
PSA Coordinator with sufficient time and authority to develop, 
implement, and oversee agency efforts to comply with these standards in 
all of its holding facilities.



Sec.  115.112  Contracting with non-DHS entities for the confinement
of detainees.

    (a) An agency that contracts for the confinement of detainees in 
holding facilities operated by non-DHS private or public agencies or 
other entities, including other government agencies, shall include in 
any new contracts, contract renewals, or substantive contract 
modifications the entity's obligation to adopt and comply with these 
standards.
    (b) Any new contracts, contract renewals, or substantive contract 
modifications shall provide for agency contract monitoring to ensure 
that the contractor is complying with these standards.
    (c) To the extent an agency contracts for confinement of holding 
facility detainees, all rules in this subpart that apply to the agency 
shall apply to the contractor, and all rules that apply to staff or 
employees shall apply to contractor staff.



Sec.  115.113  Detainee supervision and monitoring.

    (a) The agency shall ensure that each facility maintains sufficient 
supervision of detainees, including through appropriate staffing levels 
and, where applicable, video monitoring, to protect detainees against 
sexual abuse.
    (b) The agency shall develop and document comprehensive detainee 
supervision guidelines to determine and meet each facility's detainee 
supervision needs, and shall review those supervision guidelines and 
their application at each facility at least annually.
    (c) In determining adequate levels of detainee supervision and 
determining the need for video monitoring, agencies shall take into 
consideration the physical layout of each holding facility, the 
composition of the detainee population, the prevalence of substantiated 
and unsubstantiated incidents of sexual abuse, the findings and 
recommendations of sexual abuse incident review reports, and any other 
relevant factors, including but not limited to the length of time 
detainees spend in agency custody.



Sec.  115.114  Juvenile and family detainees.

    (a) Juveniles shall be detained in the least restrictive setting 
appropriate to the juvenile's age and special needs, provided that such 
setting is consistent with the need to protect the juvenile's well-being 
and that of others, as well as with any other laws, regulations, or 
legal requirements.
    (b) Unaccompanied juveniles shall generally be held separately from 
adult detainees. The juvenile may temporarily remain with a non-parental 
adult family member where:
    (1) The family relationship has been vetted to the extent feasible, 
and
    (2) The agency determines that remaining with the non-parental adult 
family member is appropriate, under the totality of the circumstances.



Sec.  115.115  Limits to cross-gender viewing and searches.

    (a) Searches may be necessary to ensure the safety of officers, 
civilians and detainees; to detect and secure evidence of criminal 
activity; and to promote security, safety, and related interests at DHS 
holding facilities.
    (b) Cross-gender strip searches or cross-gender visual body cavity 
searches shall not be conducted except in exigent circumstances, 
including consideration of officer safety, or when performed by medical 
practitioners. An agency shall not conduct visual body cavity searches 
of juveniles and, instead, shall refer all such body cavity searches of 
juveniles to a medical practitioner.

[[Page 328]]

    (c) All strip searches and visual body cavity searches shall be 
documented.
    (d) The agency shall implement policies and procedures that enable 
detainees to shower (where showers are available), perform bodily 
functions, and change clothing without being viewed by staff of the 
opposite gender, except in exigent circumstances or when such viewing is 
incidental to routine cell checks or is otherwise appropriate in 
connection with a medical examination or monitored bowel movement under 
medical supervision. Such policies and procedures shall require staff of 
the opposite gender to announce their presence when entering an area 
where detainees are likely to be showering, performing bodily functions, 
or changing clothing.
    (e) The agency and facility shall not search or physically examine a 
detainee for the sole purpose of determining the detainee's gender. If 
the detainee's gender is unknown, it may be determined during 
conversations with the detainee, by reviewing medical records (if 
available), or, if necessary, learning that information as part of a 
broader medical examination conducted in private, by a medical 
practitioner.
    (f) The agency shall train law enforcement staff in proper 
procedures for conducting pat-down searches, including cross-gender pat-
down searches and searches of transgender and intersex detainees. All 
pat-down searches shall be conducted in a professional and respectful 
manner, and in the least intrusive manner possible, consistent with 
security needs and agency policy, including consideration of officer 
safety.



Sec.  115.116  Accommodating detainees with disabilities and detainees 
who are limited English proficient.

    (a) The agency shall take appropriate steps to ensure that detainees 
with disabilities (including, for example, detainees who are deaf or 
hard of hearing, those who are blind or have low vision, or those who 
have intellectual, psychiatric, or speech disabilities), have an equal 
opportunity to participate in or benefit from all aspects of the 
agency's efforts to prevent, detect, and respond to sexual abuse. Such 
steps shall include, when necessary to ensure effective communication 
with detainees who are deaf or hard of hearing, providing access to in-
person, telephonic, or video interpretive services that enable 
effective, accurate, and impartial interpretation, both receptively and 
expressively, using any necessary specialized vocabulary. In addition, 
the agency shall ensure that any written materials related to sexual 
abuse are provided in formats or through methods that ensure effective 
communication with detainees with disabilities, including detainees who 
have intellectual disabilities, limited reading skills, or who are blind 
or have low vision. An agency is not required to take actions that it 
can demonstrate would result in a fundamental alteration in the nature 
of a service, program, or activity, or in undue financial and 
administrative burdens, as those terms are used in regulations 
promulgated under title II of the Americans with Disabilities Act, 28 
CFR 35.164.
    (b) The agency shall take reasonable steps to ensure meaningful 
access to all aspects of the agency's efforts to prevent, detect, and 
respond to sexual abuse to detainees who are limited English proficient, 
including steps to provide in-person or telephonic interpretive services 
that enable effective, accurate, and impartial interpretation, both 
receptively and expressively, using any necessary specialized 
vocabulary.
    (c) In matters relating to allegations of sexual abuse, the agency 
shall provide in-person or telephonic interpretation services that 
enable effective, accurate, and impartial interpretation, by someone 
other than another detainee, unless the detainee expresses a preference 
for another detainee to provide interpretation, and the agency 
determines that such interpretation is appropriate and consistent with 
DHS policy. The provision of interpreter services by minors, alleged 
abusers, detainees who witnessed the alleged abuse, and detainees who 
have a significant relationship with the alleged abuser is not 
appropriate in matters relating to allegations of sexual abuse is not 
appropriate in matters relating to allegations of sexual abuse.

[[Page 329]]



Sec.  115.117  Hiring and promotion decisions.

    (a) The agency shall not hire or promote anyone who may have contact 
with detainees, and shall not enlist the services of any contractor or 
volunteer who may have contact with detainees, who has engaged in sexual 
abuse in a prison, jail, holding facility, community confinement 
facility, juvenile facility, or other institution (as defined in 42 
U.S.C. 1997); who has been convicted of engaging or attempting to engage 
in sexual activity facilitated by force, overt or implied threats of 
force, or coercion, or if the victim did not consent or was unable to 
consent or refuse; or who has been civilly or administratively 
adjudicated to have engaged in such activity.
    (b) When the agency is considering hiring or promoting staff, it 
shall ask all applicants who may have contact with detainees directly 
about previous misconduct described in paragraph (a) of this section, in 
written applications or interviews for hiring or promotions and in any 
interviews or written self-evaluations conducted as part of reviews of 
current employees. The agency shall also impose upon employees a 
continuing affirmative duty to disclose any such misconduct.
    (c) Before hiring new employees who may have contact with detainees, 
the agency shall require a background investigation to determine whether 
the candidate for hire is suitable for employment with the agency. The 
agency shall conduct an updated background investigation for agency 
employees every five years.
    (d) The agency shall also perform a background investigation before 
enlisting the services of any contractor who may have contact with 
detainees.
    (e) Material omissions regarding such misconduct, or the provision 
of materially false information, shall be grounds for termination or 
withdrawal of an offer of employment, as appropriate.
    (f) Unless prohibited by law, the agency shall provide information 
on substantiated allegations of sexual abuse involving a former employee 
upon receiving a request from an institutional employer for whom such 
employee has applied to work.
    (g) In the event the agency contracts with a facility for the 
confinement of detainees, the requirements of this section otherwise 
applicable to the agency also apply to the facility.



Sec.  115.118  Upgrades to facilities and technologies.

    (a) When designing or acquiring any new holding facility and in 
planning any substantial expansion or modification of existing holding 
facilities, the agency shall consider the effect of the design, 
acquisition, expansion, or modification upon the agency's ability to 
protect detainees from sexual abuse.
    (b) When installing or updating a video monitoring system, 
electronic surveillance system, or other monitoring technology in a 
holding facility, the agency shall consider how such technology may 
enhance the agency's ability to protect detainees from sexual abuse.

                           Responsive Planning



Sec.  115.121  Evidence protocols and forensic medical examinations.

    (a) To the extent that the agency is responsible for investigating 
allegations of sexual abuse in its holding facilities, the agency shall 
follow a uniform evidence protocol that maximizes the potential for 
obtaining usable physical evidence for administrative proceedings and 
criminal prosecutions. The protocol shall be developed in coordination 
with DHS and shall be developmentally appropriate for juveniles, where 
applicable.
    (b) In developing the protocol referred to in paragraph (a) of this 
section, the agency shall consider how best to utilize available 
community resources and services to provide valuable expertise and 
support in the areas of crisis intervention and counseling to most 
appropriately address victims' needs.
    (c) Where evidentiarily or medically appropriate, at no cost to the 
detainee, and only with the detainee's consent, the agency shall arrange 
for or refer the alleged victim detainee to a medical facility to 
undergo a forensic medical examination, including a Sexual Assault 
Forensic Examiner (SAFE) or Sexual Assault Nurse Examiner

[[Page 330]]

(SANE) where practicable. If SAFEs or SANEs cannot be made available, 
the examination can be performed by other qualified health care 
personnel.
    (d) If, in connection with an allegation of sexual abuse, the 
detainee is transported for a forensic examination to an outside 
hospital that offers victim advocacy services, the detainee shall be 
permitted to use such services to the extent available, consistent with 
security needs.
    (e) To the extent that the agency is not responsible for 
investigating allegations of sexual abuse, the agency shall request that 
the investigating agency follow the requirements of paragraphs (a) 
through (d) of this section.



Sec.  115.122  Policies to ensure investigation of allegations and 
appropriate agency oversight.

    (a) The agency shall establish a protocol to ensure that each 
allegation of sexual abuse is investigated by the agency, or referred to 
an appropriate investigative authority.
    (b) The agency protocol shall be developed in coordination with DHS 
investigative entities; shall include a description of the 
responsibilities of both the agency and the investigative entities; and 
shall require the documentation and maintenance, for at least five 
years, of all reports and referrals of allegations of sexual abuse. The 
agency shall post its protocol on its Web site, redacted if appropriate.
    (c) The agency protocol shall ensure that each allegation is 
promptly reported to the Joint Intake Center and, unless the allegation 
does not involve potentially criminal behavior, promptly referred for 
investigation to an appropriate law enforcement agency with the legal 
authority to conduct criminal investigations. The agency may separately, 
and in addition to the above reports and referrals, conduct its own 
investigation.
    (d) The agency shall ensure that all allegations of detainee sexual 
abuse are promptly reported to the PSA Coordinator and to the 
appropriate offices within the agency and within DHS to ensure 
appropriate oversight of the investigation.
    (e) The agency shall ensure that any alleged detainee victim of 
sexual abuse that is criminal in nature is provided timely access to U 
nonimmigrant status information.

                         Training and Education



Sec.  115.131  Employee, contractor, and volunteer training.

    (a) The agency shall train, or require the training of all 
employees, contractors, and volunteers who may have contact with holding 
facility detainees, to be able to fulfill their responsibilities under 
these standards, including training on:
    (1) The agency's zero-tolerance policies for all forms of sexual 
abuse;
    (2) The right of detainees and employees to be free from sexual 
abuse, and from retaliation for reporting sexual abuse;
    (3) Definitions and examples of prohibited and illegal sexual 
behavior;
    (4) Recognition of situations where sexual abuse may occur;
    (5) Recognition of physical, behavioral, and emotional signs of 
sexual abuse, and methods of preventing such occurrences;
    (6) Procedures for reporting knowledge or suspicion of sexual abuse;
    (7) How to communicate effectively and professionally with 
detainees, including lesbian, gay, bisexual, transgender, intersex, or 
gender nonconforming detainees; and
    (8) The requirement to limit reporting of sexual abuse to personnel 
with a need-to-know in order to make decisions concerning the victim's 
welfare and for law enforcement or investigative purposes.
    (b) All current employees, contractors and volunteers who may have 
contact with holding facility detainees shall be trained within two 
years of the effective date of these standards, and the agency shall 
provide refresher information, as appropriate.
    (c) The agency shall document those employees who may have contact 
with detainees have completed the training and receive and maintain for 
at least five years confirmation that contractors and volunteers have 
completed the training.

[[Page 331]]



Sec.  115.132  Notification to detainees of the agency's zero-tolerance
policy.

    The agency shall make public its zero-tolerance policy regarding 
sexual abuse and ensure that key information regarding the agency's 
zero-tolerance policy is visible or continuously and readily available 
to detainees, for example, through posters, detainee handbooks, or other 
written formats.



Sec.  115.133  [Reserved]



Sec.  115.134  Specialized training: Investigations.

    (a) In addition to the training provided to employees, DHS agencies 
with responsibility for holding facilities shall provide specialized 
training on sexual abuse and effective cross-agency coordination to 
agency investigators who conduct investigations into allegations of 
sexual abuse at holding facilities. All investigations into alleged 
sexual abuse must be conducted by qualified investigators.
    (b) The agency must maintain written documentation verifying 
specialized training provided to agency investigators pursuant to this 
section.

       Assessment for Risk of Sexual Victimization and Abusiveness



Sec.  115.141  Assessment for risk of victimization and abusiveness.

    (a) Before placing any detainees together in a holding facility, 
agency staff shall consider whether, based on the information before 
them, a detainee may be at a high risk of being sexually abused and, 
when appropriate, shall take necessary steps to mitigate any such danger 
to the detainee.
    (b) All detainees who may be held overnight with other detainees 
shall be assessed to determine their risk of being sexually abused by 
other detainees or sexually abusive toward other detainees; staff shall 
ask each such detainee about his or her own concerns about his or her 
physical safety.
    (c) The agency shall also consider, to the extent that the 
information is available, the following criteria to assess detainees for 
risk of sexual victimization:
    (1) Whether the detainee has a mental, physical, or developmental 
disability;
    (2) The age of the detainee;
    (3) The physical build and appearance of the detainee;
    (4) Whether the detainee has previously been incarcerated or 
detained;
    (5) The nature of the detainee's criminal history; and
    (6) Whether the detainee has any convictions for sex offenses 
against an adult or child;
    (7) Whether the detainee has self-identified as gay, lesbian, 
bisexual, transgender, intersex, or gender nonconforming;
    (8) Whether the detainee has self-identified as having previously 
experienced sexual victimization; and
    (9) The detainee's own concerns about his or her physical safety.
    (d) If detainees are identified pursuant to the assessment under 
this section to be at high risk of victimization, staff shall provide 
such detainees with heightened protection, to include continuous direct 
sight and sound supervision, single-cell housing, or placement in a cell 
actively monitored on video by a staff member sufficiently proximate to 
intervene, unless no such option is determined to be feasible.
    (e) The facility shall implement appropriate controls on the 
dissemination of sensitive information provided by detainees under this 
section.

                                Reporting



Sec.  115.151  Detainee reporting.

    (a) The agency shall develop policies and procedures to ensure that 
the detainees have multiple ways to privately report sexual abuse, 
retaliation for reporting sexual abuse, or staff neglect or violations 
of responsibilities that may have contributed to such incidents, and 
shall provide instructions on how detainees may contact the DHS Office 
of the Inspector General or, as appropriate, another designated office, 
to confidentially and, if desired, anonymously, report these incidents.
    (b) The agency shall also provide, and shall inform the detainees 
of, at least one way for detainees to report sexual abuse to a public or 
private entity or office that is not part of the agency,

[[Page 332]]

and that is able to receive and immediately forward detainee reports of 
sexual abuse to agency officials, allowing the detainee to remain 
anonymous upon request.
    (c) Agency policies and procedures shall include provisions for 
staff to accept reports made verbally, in writing, anonymously, and from 
third parties and to promptly document any verbal reports.



Sec. Sec.  115.152-115.153  [Reserved]



Sec.  115.154  Third-party reporting.

    The agency shall establish a method to receive third-party reports 
of sexual abuse in its holding facilities. The agency shall make 
available to the public information on how to report sexual abuse on 
behalf of a detainee.

              Official Response Following a Detainee Report



Sec.  115.161  Staff reporting duties.

    (a) The agency shall require all staff to report immediately and 
according to agency policy any knowledge, suspicion, or information 
regarding an incident of sexual abuse that occurred to any detainee; 
retaliation against detainees or staff who reported or participated in 
an investigation about such an incident; and any staff neglect or 
violation of responsibilities that may have contributed to an incident 
or retaliation. Agency policy shall include methods by which staff can 
report misconduct outside of their chain of command.
    (b) Staff members who become aware of alleged sexual abuse shall 
immediately follow the reporting requirements set forth in the agency's 
written policies and procedures.
    (c) Apart from such reporting, the agency and staff shall not reveal 
any information related to a sexual abuse report to anyone other than to 
the extent necessary to help protect the safety of the victim or prevent 
further victimization of other detainees or staff in the facility, or to 
make medical treatment, investigation, law enforcement, or other 
security and management decisions.
    (d) If the alleged victim is under the age of 18 or considered a 
vulnerable adult under a State or local vulnerable persons statute, the 
agency shall report the allegation to the designated State or local 
services agency under applicable mandatory reporting laws.



Sec.  115.162  Agency protection duties.

    When an agency employee has a reasonable belief that a detainee is 
subject to a substantial risk of imminent sexual abuse, he or she shall 
take immediate action to protect the detainee.



Sec.  115.163  Reporting to other confinement facilities.

    (a) Upon receiving an allegation that a detainee was sexually abused 
while confined at another facility, the agency that received the 
allegation shall notify the appropriate office of the agency or the 
administrator of the facility where the alleged abuse occurred.
    (b) The notification provided in paragraph (a) of this section shall 
be provided as soon as possible, but no later than 72 hours after 
receiving the allegation.
    (c) The agency shall document that it has provided such 
notification.
    (d) The agency office that receives such notification, to the extent 
the facility is covered by this subpart, shall ensure that the 
allegation is referred for investigation in accordance with these 
standards.



Sec.  115.164  Responder duties.

    (a) Upon learning of an allegation that a detainee was sexually 
abused, the first law enforcement staff member to respond to the report, 
or his or her supervisor, shall be required to:
    (1) Separate the alleged victim and abuser;
    (2) Preserve and protect, to the greatest extent possible, any crime 
scene until appropriate steps can be taken to collect any evidence;
    (3) If the sexual abuse occurred within a time period that still 
allows for the collection of physical evidence, request the alleged 
victim not to take any actions that could destroy physical evidence, 
including, as appropriate, washing, brushing teeth, changing clothes, 
urinating, defecating, smoking, drinking, or eating; and

[[Page 333]]

    (4) If the abuse occurred within a time period that still allows for 
the collection of physical evidence, ensure that the alleged abuser does 
not take any actions that could destroy physical evidence, including, as 
appropriate, washing, brushing teeth, changing clothes, urinating, 
defecating, smoking, drinking, or eating.
    (b) If the first staff responder is not a law enforcement staff 
member, the responder shall be required to request that the alleged 
victim not take any actions that could destroy physical evidence and 
then notify law enforcement staff.



Sec.  115.165  Coordinated response.

    (a) The agency shall develop a written institutional plan and use a 
coordinated, multidisciplinary team approach to responding to sexual 
abuse.
    (b) If a victim of sexual abuse is transferred between facilities 
covered by subpart A or B of this part, the agency shall, as permitted 
by law, inform the receiving facility of the incident and the victim's 
potential need for medical or social services.
    (c) If a victim is transferred from a DHS holding facility to a 
facility not covered by paragraph (b) of this section, the agency shall, 
as permitted by law, inform the receiving facility of the incident and 
the victim's potential need for medical or social services, unless the 
victim requests otherwise.



Sec.  115.166  Protection of detainees from contact with alleged abusers.

    Agency management shall consider whether any staff, contractor, or 
volunteer alleged to have perpetrated sexual abuse should be removed 
from duties requiring detainee contact pending the outcome of an 
investigation, and shall do so if the seriousness and plausibility of 
the allegation make removal appropriate.



Sec.  115.167  Agency protection against retaliation.

    Agency employees shall not retaliate against any person, including a 
detainee, who reports, complains about, or participates in an 
investigation into an allegation of sexual abuse, or for participating 
in sexual activity as a result of force, coercion, threats, or fear of 
force.

                             Investigations



Sec.  115.171  Criminal and administrative investigations.

    (a) If the agency has responsibility for investigating allegations 
of sexual abuse, all investigations into alleged sexual abuse must be 
prompt, thorough, objective, and conducted by specially trained, 
qualified investigators.
    (b) Upon conclusion of a criminal investigation where the allegation 
was substantiated, an administrative investigation shall be conducted. 
Upon conclusion of a criminal investigation where the allegation was 
unsubstantiated, the agency shall review any available completed 
criminal investigation reports to determine whether an administrative 
investigation is necessary or appropriate. Administrative investigations 
shall be conducted after consultation with the appropriate investigative 
office within DHS and the assigned criminal investigative entity.
    (c) The agency shall develop written procedures for administrative 
investigations, including provisions requiring:
    (1) Preservation of direct and circumstantial evidence, including 
any available physical and DNA evidence and any available electronic 
monitoring data;
    (2) Interviewing alleged victims, suspected perpetrators, and 
witnesses;
    (3) Reviewing prior complaints and reports of sexual abuse involving 
the suspected perpetrator;
    (4) Assessment of the credibility of an alleged victim, suspect, or 
witness, without regard to the individual's status as detainee, staff, 
or employee, and without requiring any detainee who alleges sexual abuse 
to submit to a polygraph;
    (5) Documentation of each investigation by written report, which 
shall include a description of the physical and testimonial evidence, 
the reasoning behind credibility assessments, and investigative facts 
and findings; and
    (6) Retention of such reports for as long as the alleged abuser is 
detained or employed by the agency, plus five years. Such procedures 
shall establish

[[Page 334]]

the coordination and sequencing of the two types of investigations, in 
accordance with paragraph (b) of this section, to ensure that the 
criminal investigation is not compromised by an internal administrative 
investigation.
    (d) The departure of the alleged abuser or victim from the 
employment or control of the agency shall not provide a basis for 
terminating an investigation.
    (e) When outside agencies investigate sexual abuse, the agency shall 
cooperate with outside investigators and shall endeavor to remain 
informed about the progress of the investigation.



Sec.  115.172  Evidentiary standard for administrative investigations.

    When an administrative investigation is undertaken, the agency shall 
impose no standard higher than a preponderance of the evidence in 
determining whether allegations of sexual abuse are substantiated.

                               Discipline



Sec.  115.176  Disciplinary sanctions for staff.

    (a) Staff shall be subject to disciplinary or adverse action up to 
and including removal from their position and the Federal service for 
substantiated allegations of sexual abuse or violating agency sexual 
abuse policies.
    (b) The agency shall review and approve policy and procedures 
regarding disciplinary or adverse action for staff and shall ensure that 
the policy and procedures specify disciplinary or adverse actions for 
staff, up to and including removal from their position and from the 
Federal service, when there is a substantiated allegation of sexual 
abuse, or when there has been a violation of agency sexual abuse rules, 
policies, or standards. Removal from their position and from the Federal 
service is the presumptive disciplinary sanction for staff who have 
engaged in or attempted or threatened to engage in sexual abuse, as 
defined under the definition of sexual abuse of a detainee by a staff 
member, contractor, or volunteer, paragraphs (1)-(4) and (7)-(8) of the 
definition of ``sexual abuse of a detainee by a staff member, 
contractor, or volunteer'' in Sec.  115.6.
    (c) Each facility shall report all removals or resignations in lieu 
of removal for violations of agency or facility sexual abuse policies to 
appropriate law enforcement agencies, unless the activity was clearly 
not criminal.
    (d) Each agency shall make reasonable efforts to report removals or 
resignations in lieu of removal for violations of agency or facility 
sexual abuse policies to any relevant licensing bodies, to the extent 
known.



Sec.  115.177  Corrective action for contractors and volunteers.

    (a) Any contractor or volunteer suspected of perpetrating sexual 
abuse shall be prohibited from contact with detainees. The agency shall 
also consider whether to prohibit further contact with detainees by 
contractors or volunteers who have not engaged in sexual abuse, but have 
violated other provisions within these standards. The agency shall be 
responsible for promptly reporting sexual abuse allegations and 
incidents involving alleged contractor or volunteer perpetrators to an 
appropriate law enforcement agency as well as to the Joint Intake Center 
or another appropriate DHS investigative office in accordance with DHS 
policies and procedures. The agency shall make reasonable efforts to 
report to any relevant licensing body, to the extent known, incidents of 
substantiated sexual abuse by a contractor or volunteer.
    (b) Contractors and volunteers suspected of perpetrating sexual 
abuse may be removed from all duties requiring detainee contact pending 
the outcome of an investigation, as appropriate.

                         Medical and Mental Care



Sec.  115.181  [Reserved]



Sec.  115.182  Access to emergency medical services.

    (a) Detainee victims of sexual abuse shall have timely, unimpeded 
access to emergency medical treatment and crisis intervention services, 
including emergency contraception and sexually transmitted infections 
prophylaxis, in accordance with professionally accepted standards of 
care.
    (b) Emergency medical treatment services provided to the victim 
shall be

[[Page 335]]

without financial cost and regardless of whether the victim names the 
abuser or cooperates with any investigation arising out of the incident.

                       Data Collection and Review



Sec.  115.186  Sexual abuse incident reviews.

    (a) The agency shall conduct a sexual abuse incident review at the 
conclusion of every investigation of sexual abuse and, where the 
allegation was not determined to be unfounded, prepare a written report 
recommending whether the allegation or investigation indicates that a 
change in policy or practice could better prevent, detect, or respond to 
sexual abuse. Such review shall ordinarily occur within 30 days of the 
agency receiving the investigation results from the investigative 
authority. The agency shall implement the recommendations for 
improvement, or shall document its reasons for not doing so in a written 
response. Both the report and response shall be forwarded to the agency 
PSA Coordinator.
    (b) The agency shall conduct an annual review of all sexual abuse 
investigations and resulting incident reviews to assess and improve 
sexual abuse intervention, prevention and response efforts.



Sec.  115.187  Data collection.

    (a) The agency shall maintain in a secure area all agency case 
records associated with claims of sexual abuse, in accordance with these 
standards and applicable agency policies, and in accordance with 
established schedules. The DHS Office of Inspector General shall 
maintain the official investigative file related to claims of sexual 
abuse investigated by the DHS Office of Inspector General.
    (b) On an annual basis, the PSA Coordinator shall aggregate, in a 
manner that will facilitate the agency's ability to detect possible 
patterns and help prevent future incidents, the incident-based sexual 
abuse data available, including the number of reported sexual abuse 
allegations determined to be substantiated, unsubstantiated, or 
unfounded, or for which investigation is ongoing, and for each incident 
found to be substantiated, such information as is available to the PSA 
Coordinator concerning:
    (1) The date, time, location, and nature of the incident;
    (2) The demographic background of the victim and perpetrator 
(including citizenship, age, gender, and whether either has self-
identified as gay, lesbian, bisexual, transgender, intersex, or gender 
nonconforming);
    (3) The reporting timeline for the incident (including the name of 
individual who reported the incident, and the date and time the report 
was received);
    (4) Any injuries sustained by the victim;
    (5) Post-report follow up responses and action taken by the agency 
(e.g., supervision, referral for medical or mental health services, 
etc.); and
    (6) Any sanctions imposed on the perpetrator.
    (c) The agency shall maintain, review, and collect data as needed 
from all available agency records.
    (d) Upon request, the agency shall provide all such data from the 
previous calendar year to the Office for Civil Rights and Civil 
Liberties no later than June 30.



Sec.  115.188  Data review for corrective action.

    (a) The agency shall review data collected and aggregated pursuant 
to Sec.  115.187 in order to assess and improve the effectiveness of its 
sexual abuse prevention, detection, and response policies, practices, 
and training, including by:
    (1) Identifying problem areas;
    (2) Taking corrective action on an ongoing basis; and
    (3) Preparing an annual report of its findings and corrective 
actions for the agency as a whole.
    (b) Such report shall include a comparison of the current year's 
data and corrective actions with those from prior years and shall 
provide an assessment of the agency's progress in preventing, detecting, 
and responding to sexual abuse.
    (c) The agency's report shall be approved by the agency head and 
made readily available to the public through its Web site.

[[Page 336]]

    (d) The agency may redact specific material from the reports, when 
appropriate for safety or security, but must indicate the nature of the 
material redacted.



Sec.  115.189  Data storage, publication, and destruction.

    (a) The agency shall ensure that data collected pursuant to Sec.  
115.187 are securely retained in accordance with agency record retention 
policies and the agency protocol regarding investigation of allegations.
    (b) The agency shall make all aggregated sexual abuse data from 
holding facilities under its direct control and from any private 
agencies with which it contracts available to the public at least 
annually on its Web site consistent with agency information disclosure 
policies and processes.
    (c) Before making aggregated sexual abuse data publicly available, 
the agency shall remove all personal identifiers.
    (d) The agency shall maintain sexual abuse data collected pursuant 
to Sec.  115.187 for at least 10 years after the date of the initial 
collection unless Federal, State, or local law requires otherwise.

                          Audits and Compliance



Sec.  115.193  Audits of standards.

    (a) Within three years of July 6, 2015, the agency shall ensure that 
each of its immigration holding facilities that houses detainees 
overnight and has adopted these standards is audited. For any such 
holding facility established after July 6, 2015, the agency shall ensure 
that the facility is audited within three years. Audits of new holding 
facilities as well as holding facilities that have previously failed to 
meet the standards shall occur as soon as practicable within the three-
year cycle; however, where it is necessary to prioritize, priority shall 
be given to facilities that have previously failed to meet the 
standards.
    (1) Audits required under this paragraph (a) shall:
    (i) Include a determination whether the holding facility is low-risk 
based on its physical characteristics and whether it passes the audit 
conducted pursuant to paragraph (a)(1)(ii) of this section,
    (ii) Be conducted pursuant to Sec. Sec.  115.201 through 115.205, 
and
    (iii) Be coordinated by the agency with the DHS Office for Civil 
Rights and Civil Liberties, which may request an expedited audit if it 
has reason to believe that an expedited audit is appropriate.
    (2) [Reserved]
    (b) Following an audit, the agency shall ensure that any immigration 
holding facility that houses detainees overnight and is determined to be 
low-risk, based on its physical characteristics and passing its most 
recent audit, is audited at least once every five years.
    (1) Audits required under this paragraph (b) shall:
    (i) Include a determination whether the holding facility is low-risk 
based on its physical characteristics and whether it passes the audit 
conducted pursuant to paragraph (b)(1)(ii) of this section,
    (ii) Be conducted pursuant to Sec. Sec.  115.201 through 115.205, 
and
    (iii) Be coordinated by the agency with the DHS Office for Civil 
Rights and Civil Liberties, which may request an expedited audit if it 
has reason to believe that an expedited audit is appropriate.
    (2) [Reserved]
    (c) Following an audit, the agency shall ensure that any immigration 
holding facility that houses detainees overnight and is determined to 
not be low-risk, based on its physical characteristics or not passing 
its most recent audit, is audited at least once every three years.
    (1) Audits required under this paragraph (c) shall:
    (i) Include a determination whether the holding facility is low-risk 
based on its physical characteristics and whether it passes the audit 
conducted by paragraph (c)(1)(ii) of this section,
    (ii) Be conducted pursuant to Sec. Sec.  115.201 through 115.205, 
and
    (iii) Be coordinated by the agency with the DHS Office for Civil 
Rights and Civil Liberties, which may request an expedited audit if it 
has reason to believe that an expedited audit is appropriate.

[[Page 337]]

    (2) [Reserved]

                Additional Provisions in Agency Policies



Sec.  115.195  Additional provisions in agency policies.

    The regulations in this subpart B establish minimum requirements for 
agencies. Agency policies may include additional requirements.



            Subpart C_External Auditing and Corrective Action



Sec.  115.201  Scope of audits.

    (a) The agency shall develop and issue an instrument that is 
coordinated with the DHS Office for Civil Rights and Civil Liberties, 
which will provide guidance on the conduct of and contents of the audit;
    (b) The auditor shall review all relevant agency policies, 
procedures, reports, internal and external audits, and accreditations 
for each facility type.
    (c) The audits shall review, at a minimum, a sampling of relevant 
documents and other records and information for the most recent one-year 
period.
    (d) The auditor shall have access to, and shall observe, all areas 
of the audited facilities.
    (e) The agency shall provide the auditor with relevant documentation 
to complete a thorough audit of the facility.
    (f) The auditor shall retain and preserve all documentation 
(including, e.g., videotapes and interview notes) relied upon in making 
audit determinations. Such documentation shall be provided to the agency 
upon request.
    (g) The auditor shall interview a representative sample of detainees 
and of staff, and the facility shall make space available suitable for 
such interviews.
    (h) The auditor shall review a sampling of any available videotapes 
and other electronically available data that may be relevant to the 
provisions being audited.
    (i) The auditor shall be permitted to conduct private interviews 
with detainees.
    (j) Detainees shall be permitted to send confidential information or 
correspondence to the auditor.
    (k) Auditors shall attempt to solicit input from community-based or 
victim advocates who may have insight into relevant conditions in the 
facility.
    (l) All sensitive but unclassified information provided to auditors 
will include appropriate designations and limitations on further 
dissemination. Auditors will be required to follow all appropriate 
procedures for handling and safeguarding such information.



Sec.  115.202  Auditor qualifications.

    (a) An audit shall be conducted by entities or individuals outside 
of the agency and outside of DHS that have relevant audit experience.
    (b) All auditors shall be certified by the agency, in coordination 
with DHS. The agency, in coordination with DHS, shall develop and issue 
procedures regarding the certification process, which shall include 
training requirements.
    (c) No audit may be conducted by an auditor who has received 
financial compensation from the agency being audited (except for 
compensation received for conducting other audits, or other consulting 
related to detention reform) within the three years prior to the 
agency's retention of the auditor.
    (d) The agency shall not employ, contract with, or otherwise 
financially compensate the auditor for three years subsequent to the 
agency's retention of the auditor, with the exception of contracting for 
subsequent audits or other consulting related to detention reform.



Sec.  115.203  Audit contents and findings.

    (a) Each audit shall include a certification by the auditor that no 
conflict of interest exists with respect to his or her ability to 
conduct an audit of the facility under review.
    (b) Audit reports shall state whether facility policies and 
procedures comply with relevant standards.
    (c) For each of these standards, the auditor shall determine whether 
the audited facility reaches one of the following findings: Exceeds 
Standard (substantially exceeds requirement of standard); Meets Standard 
(substantial compliance; complies in all material ways with the standard 
for the relevant review period); Does Not Meet Standard (requires 
corrective action).

[[Page 338]]

The audit summary shall indicate, among other things, the number of 
provisions the facility has achieved at each grade level.
    (d) Audit reports shall describe the methodology, sampling sizes, 
and basis for the auditor's conclusions with regard to each standard 
provision for each audited facility, and shall include recommendations 
for any required corrective action.
    (e) Auditors shall redact any personally identifiable detainee or 
staff information from their reports, but shall provide such information 
to the agency upon request.
    (f) The agency shall ensure that the auditor's final report is 
published on the agency's Web site if it has one, or is otherwise made 
readily available to the public. The agency shall redact any sensitive 
but unclassified information (including law enforcement sensitive 
information) prior to providing such reports publicly.



Sec.  115.204  Audit corrective action plan.

    (a) A finding of ``Does Not Meet Standard'' with one or more 
standards shall trigger a 180-day corrective action period.
    (b) The agency and the facility shall develop a corrective action 
plan to achieve compliance.
    (c) The auditor shall take necessary and appropriate steps to verify 
implementation of the corrective action plan, such as reviewing updated 
policies and procedures or re-inspecting portions of a facility.
    (d) After the 180-day corrective action period ends, the auditor 
shall issue a final determination as to whether the facility has 
achieved compliance with those standards requiring corrective action.
    (e) If the facility does not achieve compliance with each standard, 
it may (at its discretion and cost) request a subsequent audit once it 
believes that is has achieved compliance.



Sec.  115.205  Audit appeals.

    (a) A facility may lodge an appeal with the agency regarding any 
specific audit finding that it believes to be incorrect. Such appeal 
must be lodged within 90 days of the auditor's final determination.
    (b) If the agency determines that the facility has stated good cause 
for a re-evaluation, the facility may commission a re-audit by an 
auditor mutually agreed upon by the agency and the facility. The 
facility shall bear the costs of this re-audit.
    (c) The findings of the re-audit shall be considered final.



PART 126_TRANSPORTATION SECURITY OVERSIGHT BOARD REVIEW PANEL PROCESS
AND PROCEDURES--Table of Contents



Sec.
126.1 Purpose.
126.3 Definitions.
126.5 Appointment of TSOB Review Panel and TSOB Docket Clerk.
126.7 Function of TSOB Review Panel.
126.9 Scope of review and standard of review.
126.11 Counsel.
126.13 Notice of appeal and service.
126.15 Entry of appearance.
126.17 Procedures for classified information, sensitive security 
          information (SSI), and other protected information.
126.19 Filing and supplementing the record.
126.21 Motions.
126.23 Briefs.
126.25 Oral argument.
126.27 Deliberations and action.
126.29 Effect of TSOB Review Panel action.
126.31 Administration of proceedings.

    Authority: 6 U.S.C. 112, 49 U.S.C. 115, 46111; Department of 
Homeland Security Delegation No. 7071.1.

    Source: 87 FR 48438, Aug. 9, 2022, unless otherwise noted.



Sec.  126.1  Purpose.

    This part establishes the procedures by which a Transportation 
Security Oversight Board (TSOB) Review Panel reviews and acts to resolve 
an appeal from an Administrative Law Judge (ALJ) decision regarding a 
Determination of Security Threat made by the Administrator of the 
Transportation Security Administration (TSA).



Sec.  126.3  Definitions.

    Classified information has the meaning given to that term in 
Executive Order 13526 or any successor Executive Order.
    Communication technology means telephone or a videoconferencing 
platform.
    Other protected information means other information that the 
government

[[Page 339]]

is authorized by statute, regulation, or Executive Order to withhold.
    Sensitive Security Information (SSI) means information described in 
49 CFR 1520.5.
    Transportation Security Oversight Board (TSOB) means the board 
established pursuant to 49 U.S.C. 115.
    Transportation Security Oversight Board (TSOB) Review Panel means 
the panel established pursuant to 49 U.S.C. 46111(d) to consider an 
appeal from a decision of an administrative law judge as the result of a 
hearing under 49 U.S.C. 46111(b).



Sec.  126.5  Appointment of TSOB Review Panel and TSOB Docket Clerk.

    (a) Upon request by the Chairman of the TSOB, TSOB members will 
designate at least one official who meets the criteria in paragraphs 
(a)(1) through (5) of this section to participate in a TSOB Review Panel 
pool for a period of two years. The Review Panel nominees must--
    (1) Be a member of the Senior Executive Service (SES) or a Senior 
Level (SL) employee;
    (2) Hold a security clearance commensurate with the record under 
review;
    (3) Not be employed by TSA or FAA;
    (4) To the extent practicable, have a legal background and be 
engaged in the practice of law on behalf of the United States 
Government; and
    (5) To the extent practicable, be familiar with transportation 
security issues.
    (b) Upon the expiration of each two-year period, TSOB members will 
again designate officials to participate in the TSOB Review Panel pool.
    (c) The General Counsel of the Department of Homeland Security, or 
the General Counsel's designee, will appoint an individual from within 
the Office of the General Counsel to serve as the TSOB Docket Clerk. The 
TSOB Docket Clerk will serve as the TSOB Review Panel's point of contact 
for both the public and the parties to ALJ proceedings.
    (d) When the TSOB Docket Clerk receives a properly and timely filed 
appeal from an ALJ's decision, the TSOB Chairperson selects at least 
three individuals from the TSOB Review Panel pool to serve on a Review 
Panel to review the ALJ's decision. The TSOB Chairperson has discretion 
to choose which individuals from the pool will serve on a TSOB Review 
Panel. In making selections for a TSOB Review Panel, the TSOB 
Chairperson will consider selecting at least one person with the 
qualifications set out in paragraph (a)(4) of this section to serve as a 
Panel Member, and will consider, based upon the composition of the pool 
as well as the issues raised in the appeal, appointing more than one 
person with the qualifications set out in paragraph (a)(4) to the TSOB 
Review Panel.



Sec.  126.7  Function of TSOB Review Panel.

    A TSOB Review Panel reviews an ALJ's decision regarding a 
Determination of Security Threat issued by the TSA Administrator and may 
affirm, modify, or reverse the ALJ's decision, or remand the matter to 
the ALJ with instructions to address particular issues or consider 
additional testimony or evidence.



Sec.  126.9  Scope of review and standard of review.

    (a) A TSOB Review Panel reviews an ALJ's decision to address whether 
the decision is supported by substantial evidence in the record before 
the TSOB Review Panel.
    (b) A TSOB Review Panel will not consider the constitutionality of 
any statute, regulation, Executive Order, or order issued by the TSA.



Sec.  126.11  Counsel.

    (a)(1) Parties to proceedings before a TSOB Review Panel may be 
represented by an attorney who is in good standing with the bar of any 
State, district, territory, or possession of the United States. Parties 
desiring representation must obtain such representation at their own 
expense.
    (2) TSA will designate counsel to represent TSA before a TSOB Review 
Panel. The attorney must hold a security clearance that enables access 
to all materials related to the appeal.
    (b) The General Counsel of the Department of Homeland Security, or 
the General Counsel's designee, appoints legal counsel to assist a TSOB 
Review

[[Page 340]]

Panel. Counsel appointed to assist the TSOB Review Panel facilitates 
communication between the TSOB Docket Clerk and the TSOB Review Panel, 
and assists with legal research and drafting for the Panel, as needed. 
Appointed counsel must hold a security clearance that enables access to 
all materials related to the appeal.



Sec.  126.13  Notice of appeal and service.

    (a) Notice of appeal. A party seeking review of the ALJ's decision 
must file a notice of appeal with the TSOB Docket Clerk via email at 
[email protected] or via certified U.S. mail at ATTN: TSOB Docket 
Clerk, Office of the General Counsel, Department of Homeland Security, 
Washington, DC 20528-0485. A notice of appeal must be filed within 60 
calendar days of the date of issuance of the ALJ's written decision.
    (b) Service. To file any document with a TSOB Review Panel, a party 
must send the document to the TSOB Docket Clerk via email at 
[email protected], or via certified U.S. mail at ATTN: TSOB Docket 
Clerk, Office of the General Counsel, Department of Homeland Security, 
Washington, DC 20528-0485. Parties are strongly encouraged to file all 
documents and consent to service via email. Any document filed with the 
TSOB Docket Clerk (except a notice of protected information, the 
administrative record, ex parte motions, and documents containing 
classified information, Sensitive Security Information (SSI), or other 
protected information that accompany a motion to supplement the record) 
must also be served on all other parties by certified U.S. mail or 
email.
    (c) Filing date. For purposes of all deadlines in this part, the 
date of filing of a notice of appeal or any document filed with a TSOB 
Review Panel is the date on which the document is received by the TSOB 
Docket Clerk.
    (d) Untimely appeals. A TSOB Review Panel must reject and summarily 
dismiss a notice of appeal that is filed more than 60 calendar days 
after the date of issuance of the ALJ's written decision. A TSOB Review 
Panel may, in its discretion, accept an untimely notice of appeal upon a 
showing of good cause for failure to meet the filing deadline.
    (e) Failure to perfect the appeal. A TSOB Review Panel may dismiss 
an appeal, on its own initiative or upon motion of any party, when a 
party has filed a notice of appeal but failed to perfect the appeal by 
timely filing a brief in accordance with Sec.  126.23.
    (f) Effect of dismissal of appeal. Where an appeal is dismissed in 
accordance with paragraph (d) or (e) of this section the ALJ's written 
decision becomes final.



Sec.  126.15  Entry of appearance.

    (a) All parties to a proceeding before a TSOB Review Panel must 
enter their appearances in writing with the TSOB Docket Clerk within 15 
calendar days after filing or being served with a notice of appeal. A 
party's written notice of entry of appearance must identify counsel, if 
applicable.
    (b) Counsel beginning representation of a party after that party has 
already entered an appearance must file a separate notice of entry of 
appearance within 15 calendar days of beginning representation.



Sec.  126.17  Procedures for classified information, sensitive security
information (SSI), and other protected information.

    (a) Notice of protected information. Within 30 calendar days of 
filing or being served with a notice of appeal, TSA must file a notice 
of protected information indicating whether the record of proceedings 
before the ALJ contains classified information, SSI, or other protected 
information. The notice of protected information must be filed with the 
TSOB Docket Clerk in accordance with Sec.  126.13(b). If the TSA 
presented classified information, SSI, or other protected information to 
the ALJ at an ex parte proceeding or provided such information for in 
camera review during the ALJ proceedings, then the TSOB Review Panel 
will also consider that information at an ex parte proceeding or in 
camera.
    (b) Access to protected information. A TSOB Review Panel may not 
disclose Classified Information or other protected information to any 
non-government party or counsel. A TSOB Review

[[Page 341]]

Panel may not disclose SSI to any non-government party or counsel unless 
the TSA has determined that the party had a preexisting need to know 
specific SSI as a covered person pursuant to 49 CFR 1520.7 and 1520.11.



Sec.  126.19  Filing and supplementing the record.

    (a) Filing the record. The TSA must file a complete record of 
administrative proceedings, including a certified and unredacted 
transcript of all proceedings before the ALJ (including ex parte 
proceedings) and all material filed with the ALJ (including material 
containing classified information, SSI, or other protected information 
that was reviewed by the ALJ in camera), with the TSOB Docket Clerk 
within 30 calendar days after filing or being served with a notice of 
appeal. Upon motion filed by the TSA, or on its own initiative, the TSOB 
Review Panel may extend the time to file the record. The TSOB Docket 
Clerk notifies all parties of the date when the record is filed. Within 
30 calendar days of the date the record is filed, non-government parties 
may file a motion requesting that the TSA provide them with a redacted 
copy of any part of the record (excluding ex parte proceedings and 
materials reviewed in camera) that they do not possess. The TSA redacts 
classified information or other protected information from any part of 
the record it provides to non-government parties, except to the extent 
that the TSA has determined that the party had a preexisting need to 
know specific SSI as a covered person pursuant to 49 CFR 1520.7 and 
1520.11.
    (b) Supplementing the record. (1) A party may file a motion to 
supplement the record when anything relevant to an issue on appeal 
occurs after the ALJ issued a decision, or the party can show good 
cause, as determined by the TSOB Review Panel, for failing to submit 
material for the record at an earlier stage of the administrative 
proceedings. When the TSA seeks to supplement the record with material 
that contains classified information, SSI or other protected 
information, it may file a motion to supplement the record ex parte.
    (2) A TSOB Review Panel may grant a motion to supplement the record 
when it finds that the supplemental material is relevant to an issue on 
appeal and that a condition described in paragraph (b)(1) of this 
section applies.



Sec.  126.21  Motions.

    (a) Form of motions. (1) A motion filed with a TSOB Review Panel 
must comply with the requirements set forth in Sec.  126.23(c)(1) 
through (4).
    (2) Motions must be filed with the TSOB Docket Clerk and served on 
all parties in accordance with Sec.  126.13(b). The TSOB Docket Clerk 
provides all motions to the TSOB Review Panel.
    (b) Duty to confer. Before filing any motion, a party must confer or 
make reasonable, good-faith efforts to confer with all other parties to 
resolve the issues that are the subject of the motion. The moving party 
must state in the motion, or in a certificate attached to the motion, 
the specific efforts made to comply with this duty to confer. The moving 
party must also state in the motion the other parties' positions with 
regard to the relief requested. If no party opposes the relief requested 
in a motion, the moving party includes ``Unopposed'' in the motion's 
title. TSA does not have a duty to confer before filing an ex parte 
motion, but must provide notice to all parties that it has made an ex 
parte filing.
    (c) Motion hearings. Upon request of any party, or on its own 
initiative, a TSOB Review Panel may order the parties to appear for a 
hearing on any motion that was not filed ex parte. Motion hearings may 
be conducted via communication technology unless all parties agree to 
appear in person or the TSOB Review Panel in its discretion determines 
that an in person appearance is necessary for efficient administration 
of the hearing. The Review Panel considers expense and inconvenience to 
the parties, the importance of information security, and the quality and 
reliability of available communication technology when making these 
determinations.
    (d) Disposition. A TSOB Review Panel may, consistent with the 
requirements of due process and after providing the opposing party with 
an opportunity to

[[Page 342]]

review and respond, grant or deny a motion at any time after it is 
filed.
    (e) Additional procedural requirements for motion practice. A TSOB 
Review Panel has discretion to establish via order served on the 
parties, additional procedural requirements regarding motion practice in 
response to the exigencies of a particular appeal. Such requirements may 
include, for example, time periods for filing responses and replies, a 
deadline for concluding all motion practice, and page limitations 
different from the default 35-page limit established in Sec.  
126.23(c)(3). A TSOB Review Panel may not require disclosure of 
classified information, SSI, or other protected information.



Sec.  126.23  Briefs.

    (a) Appellant brief. (1) A party appealing the ALJ's decision must 
perfect the appeal by filing an appellant brief with the TSOB Docket 
Clerk and serving that brief on all other parties in accordance with 
Sec.  126.13(b) within 60 calendar days after the date on which TSA 
files the record in accordance with Sec.  126.19(a), unless all parties 
consent to an extension of the filing deadline and provide notice of 
such agreement to the TSOB Docket Clerk or the TSOB Review Panel extends 
the filing deadline upon a motion by the appellant.
    (2) The appellant brief must enumerate the appellant's objections to 
the ALJ's decision.
    (b) Appellee brief. Within 30 calendar days after being served with 
an appellant brief, a party may file an appellee brief in response with 
the TSOB Docket Clerk. Any such brief must be served on all other 
parties in accordance with Sec.  126.13(b) at the same time it is filed 
with the TSOB Docket Clerk. The parties may consent to an extension of 
the filing deadline and provide notice of such agreement to the TSOB 
Docket Clerk or the TSOB Review Panel may extend the deadline for filing 
an appellee brief upon a motion by the appellee.
    (c) Brief requirements. A brief submitted to a TSOB Review Panel 
must adhere to the following specifications:
    (1) The brief must be typewritten in Times New Roman, 12-point font, 
double-spaced, and, if submitted as a hard copy via certified U.S. mail, 
must be printed single-sided on 81/2-by-11 inch paper;
    (2) The brief must set forth the name, address, email address, and 
telephone number of the party or attorney filing it;
    (3) The brief must contain no more than 35 pages of text (excepting 
any tables, appendices, or cover sheets) unless prior permission to file 
excess pages has been granted by the TSOB Review Panel after 
consideration of a duly filed motion showing good cause as determined by 
the TSOB Review Panel;
    (4) If submitted as a hard copy via certified U.S. mail, the brief 
must be bound in any manner that is secure, does not obscure the text, 
and permits easy reproduction; and
    (5) If oral argument is desired, the brief should contain a request 
for oral argument that explains why oral argument will contribute 
substantially to the development of an issue on appeal.



Sec.  126.25  Oral argument.

    (a) Upon receipt of a request from any party contained in a brief or 
in a motion, or on its own initiative, a TSOB Review Panel may order the 
parties to present oral argument. The Review Panel orders oral argument 
if it determines that oral argument will contribute substantially to the 
development of an issue on appeal.
    (b) A TSOB Review Panel has discretion, within the requirements of 
all relevant statutory and regulatory provisions for information 
security, to choose the method and location of oral argument. The Review 
Panel will consider expense and inconvenience to the parties, the 
importance of information security, the quality and reliability of 
available communication technology, and concern for the efficient 
administration of proceedings when establishing the method and location 
of oral argument.
    (c) A TSOB Review Panel has discretion to structure and establish 
procedural rules for oral argument via order served on the parties. Such 
rules may include time limits for argument and the order in which 
parties present argument.
    (d) Classified information, SSI, or other protected information may 
not

[[Page 343]]

be disclosed during oral argument. A TSOB Review Panel may hold ex parte 
proceedings to allow for the presentation of classified information, 
SSI, or other protected information.



Sec.  126.27  Deliberations and action.

    (a) Deliberations. TSOB Review Panel deliberations are closed 
proceedings. Any materials created by Review Panel members, the TSOB 
Docket Clerk, and the Review Panel's appointed counsel for use in 
deliberations are not part of the final administrative record.
    (b) Action. A TSOB Review Panel may affirm, modify, or reverse the 
ALJ's decision. It may also remand the matter to the ALJ with 
instructions to address particular issues or consider additional 
testimony or evidence.
    (1) A TSOB Review Panel requires a simple majority to decide an 
action.
    (2) In case of a disagreement among TSOB Review Panel members, a 
dissenting report may be served with the written explanation of the 
Review Panel's action. A dissenting report must be prepared in 
accordance with the requirements for the Review Panel's written 
explanation.
    (c) Written explanation. A TSOB Review Panel will explain its action 
in writing to the maximum extent permitted by prudent concern for the 
national security interests of the United States and applicable laws and 
regulations governing information disclosure. If necessary, the Review 
Panel may prepare its written explanation in both a protected format 
(which may contain classified information, SSI, and other protected 
information) and a non-protected format (which must not contain 
classified information, SSI, and other protected information). The 
Review Panel serves non-government parties with the non-protected 
written explanation and government parties with the protected written 
explanation. The Review Panel is prohibited from providing the protected 
written explanation to non-government parties. The protected written 
explanation is part of the final administrative record that TSA must 
submit to a U.S. Court of Appeals in the event that a party seeks 
judicial review of the Review Panel's action.
    (d) Timing. A TSOB Review Panel endeavors to resolve an appeal and 
issue a written explanation of its action to the parties no later than 
60 calendar days after the last of the following events:
    (1) Receipt of a timely filed appellant brief;
    (2) Receipt of a timely filed appellee brief; or
    (3) Oral argument.



Sec.  126.29  Effect of TSOB Review Panel action.

    (a) Any person substantially affected by a TSOB Review Panel's 
action, or the TSA Administrator when he decides that the Panel's action 
will have a significant adverse impact on carrying out 49 U.S.C. Subt. 
VII, Pt. A, may obtain judicial review in an appropriate U.S. Court of 
Appeals. The Administrators of the FAA and TSA must be made parties to 
any civil action filed in a U.S. Court of Appeals seeking review of a 
TSOB Review Panel action.
    (b) If judicial review is not obtained, the action of the TSOB 
Review Panel is final and binding on the parties for the purpose of 
resolving the particular decision under review.



Sec.  126.31  Administration of proceedings.

    (a) A TSOB Review Panel has authority to govern the conduct of its 
proceedings and internal operations by establishing any additional rules 
or procedures that are not inconsistent with this part.
    (b) If TSA withdraws its Determination of Security Threat at any 
time after a notice of appeal has been filed pursuant to Sec.  
126.13(a), the proceedings before the TSOB Review Panel are rendered 
moot and closed. TSA must file a notice of withdrawal of the 
Determination of Security Threat with the TSOB Docket Clerk within five 
calendar days of such withdrawal.
    (c) TSOB Review Panel proceedings will generally be closed to the 
public. A TSOB Review Panel may, in its discretion, open its proceedings 
to the public. Classified information, SSI, or other protected 
information shall not be disclosed during administrative proceedings, in 
accordance with Sec.  126.25(d).

[[Page 344]]



PART 158_CYBERSECURITY TALENT MANAGEMENT SYSTEM (CTMS)--Table of Contents



                      Subpart A_General Provisions

Sec.
158.101 Purpose.
158.102 Scope of authority.
158.103 Coverage.
158.104 Definitions.

                   Subpart B_DHS Cybersecurity Service

158.201 Cybersecurity mission.
158.202 Cybersecurity Service (DHS-CS).
158.203 Positions in the DHS-CS.
158.204 Employees in the DHS-CS.
158.205 Assignments in the DHS-CS.

                          Subpart C_Leadership

158.301 Administering CTMS and Managing the DHS-CS.
158.302 Cybersecurity Talent Management Board (CTMB).
158.303 Talent management principles.
158.304 Strategic talent priorities.
158.305 DHS-CS core values.

                   Subpart D_Strategic Talent Planning

158.401 Strategic talent planning process.
158.402 DHS-CS cybersecurity work and CTMS qualifications 
          identification.
158.403 Talent market analysis.
158.404 Work valuation system.
158.405 Exemption from General Schedule position classification.

                       Subpart E_Acquiring Talent

                        Talent Acquisition System

158.501 Talent acquisition system.
158.502 Exemption from other laws regarding appointment.

                         Sourcing and Recruiting

158.510 Strategic recruitment.
158.511 Outreach and sourcing.
158.512 Interview expenses.

                          Assessment and Hiring

158.520 Assessment.
158.521 Employment eligibility requirements and employment-related 
          criteria.
158.522 Selection and appointment.
158.523 Appointment types and circumstances.
158.524 Initial service period.
158.525 Hiring of former DHS-CS employees.

                      Subpart F_Compensating Talent

                           Compensation System

158.601 Compensation strategy.
158.602 Compensation system.
158.603 Employee compensation.
158.604 Aggregate compensation limit.
158.605 Exemption from other laws regarding compensation.

                                Salaries

158.610 Salary system.
158.611 Salary structure.
158.612 Local cybersecurity talent market supplement (LCTMS).
158.613 Salary range.
158.614 Salary limitations.

                          Salary Administration

158.620 Setting salaries.
158.621 Adjusting salaries.
158.622 Administering salary in accordance with relevant provisions of 
          other laws.

                               Recognition

158.630 Employee recognition.
158.631 Recognition adjustments.
158.632 Recognition payments.
158.633 Recognition time-off.
158.634 Honorary recognition.

                         Other Special Payments

158.640 Professional development and training.
158.641 Student loan repayments.
158.642 Special working conditions payment program.
158.643 Allowance in nonforeign areas.

 Other Compensation Provided in Accordance With Relevant Provisions of 
                               Other Laws

158.650 Holidays.
158.651 Leave.
158.652 Compensatory time-off for religious observance.
158.653 Other benefits.
158.654 Other payments.
158.655 Administering compensation in accordance with relevant 
          provisions of other laws.

                       Subpart G_Deploying Talent

158.701 Deployment program.
158.702 Designating qualified positions.
158.703 Designating and staffing assignments.
158.704 Official worksite.
158.705 Work scheduling.
158.706 Recordkeeping.
158.707 Details and opportunities outside DHS.
185.708 Directed assignments.
158.709 Exemption from other laws regarding deployment.

                       Subpart H_Developing Talent

158.801 Definitions.
158.802 Performance management program.

[[Page 345]]

158.803 Career development program.
158.804 Appraisal reviews.
158.805 Mission impact reviews.
158.806 Development reviews.

           Subpart I_Employee Rights, Requirements, and Input

158.901 Federal employee rights and processes.
158.902 Ethics requirements.
158.903 Employee input program.

                     Subpart J_Advisory Appointments

158.1001 Advisory appointments and advisory appointees.
158.1002 Appointment of advisory appointees.
158.1003 Compensation for advisory appointees.

    Authority: 6 U.S.C. 658. Subpart H also issued under 5 U.S.C. 
Chapters 41 and 43; 5 CFR parts 410 and 430.

    Source: 86 FR 47893, Aug. 26, 2021, unless otherwise noted.



                      Subpart A_General Provisions



Sec.  158.101  Purpose.

    (a) Cybersecurity Talent Management System. This part contains 
regulations establishing the Cybersecurity Talent Management System 
(CTMS) and the resulting DHS Cybersecurity Service (DHS-CS). CTMS is 
designed to recruit and retain individuals with the qualifications 
necessary to execute the DHS cybersecurity mission and is also designed 
to adapt to changes in cybersecurity work, the cybersecurity talent 
market, and the DHS cybersecurity mission.
    (b) DHS Cybersecurity Service. Under this part, the Secretary or 
designee establishes and manages the DHS Cybersecurity Service (DHS-CS) 
described in subpart B of this part.
    (c) Regulations & policy. The regulations in this part provide the 
policy framework for establishing and administering CTMS, and 
establishing and managing the DHS-CS. The Secretary or designee 
implements this part through CTMS policy defined in Sec.  158.104.



Sec.  158.102  Scope of authority.

    (a) Authority. This part implements the Secretary's authority in 6 
U.S.C. 658 and governs talent management involving the individuals 
described in Sec.  158.103.
    (b) Other laws superseded. Unless explicitly stated otherwise in 
this part or explicitly provided otherwise by Congress, this part 
supersedes all other provisions of law and policy relating to 
appointment, number, classification, or compensation of employees that 
the Secretary deems are incompatible with the approach to talent 
management under this part. For compensation authorized under this part, 
the Department provides all such compensation under the authority in 6 
U.S.C. 658, and also provides some types of such compensation in 
accordance with relevant provisions of other laws, including provisions 
in 5 U.S.C. and 5 CFR, to the extent compatible with the approach to 
talent management under this part.
    (c) Preservation of authority. Nothing in this part shall be deemed 
or construed to limit the Secretary's authority in 6 U.S.C. 658.



Sec.  158.103  Coverage.

    (a) Talent management. This part covers:
    (1) Establishing and administering CTMS; and
    (2) Establishing and managing the DHS-CS.
    (b) Individuals. This part applies to any individual:
    (1) Being recruited for employment under this part;
    (2) Applying for employment under this part;
    (3) Serving in a qualified position under this part;
    (4) Managing, or participating in the management of, any DHS-CS 
employee under this part, including as a supervisor or any other 
employee of the Department who has the authority to take, direct others 
to take, recommend, or approve any talent management action under this 
part; or
    (5) Serving on the Cybersecurity Talent Management Board described 
in Sec.  158.302.



Sec.  158.104  Definitions.

    As used in this part:
    Additional compensation means the compensation described in Sec.  
158.603(c).

[[Page 346]]

    Advisory appointment means an appointment to a qualified position 
under subpart J of this part.
    Annuitant has the same meaning as that term in 5 CFR 553.102.
    Anticipated mission impact means the influence the Department 
anticipates an individual will have on execution of the DHS 
cybersecurity mission based on the individual's CTMS qualifications and 
application of those qualifications to successfully and proficiently 
perform DHS-CS cybersecurity work.
    Assignment means a description of a specific subset of DHS-CS 
cybersecurity work and a specific subset of CTMS qualifications 
necessary to perform that work, the combination of which is associable 
with a qualified position.
    Break in service means the time when an employee is no longer on the 
payroll of a Federal agency.
    Continuing appointment means an appointment for an indefinite time 
period to a qualified position.
    CTMS policy means the Department's decisions implementing and 
operationalizing the regulations in this part, and includes directives, 
instructions, and operating guidance and procedures.
    CTMS qualifications means qualifications identified under Sec.  
158.402(c).
    Cybersecurity incident has the same meaning as the term ``incident'' 
in 6 U.S.C. 659.
    Cybersecurity risk has the same meaning as that term in 6 U.S.C. 
659.
    Cybersecurity Talent Management Board or CTMB means the group of 
officials described in Sec.  158.302.
    Cybersecurity Talent Management System or CTMS means the approach to 
talent management, which encompasses the definitions, processes, 
systems, and programs, established under this part.
    Cybersecurity talent market means the availability, in terms of 
supply and demand, of talent relating to cybersecurity and employment 
relating to cybersecurity, including at other Federal agencies such as 
the Department of Defense.
    Cybersecurity threat has the same meaning as that term in 6 U.S.C. 
1501(5).
    Cybersecurity work means activity involving mental or physical 
effort, or both, to achieve results relating to cybersecurity.
    Department or DHS means the Department of Homeland Security.
    DHS cybersecurity mission means the cybersecurity mission described 
in Sec.  158.201. As stated in that section, the DHS cybersecurity 
mission encompasses all responsibilities of the Department relating to 
cybersecurity.
    DHS Cybersecurity Service or DHS-CS means the qualified positions 
designated and established under this part and the employees appointed 
to those positions under this part.
    DHS-CS advisory appointee means a DHS-CS employee serving in an 
advisory appointment under this part.
    DHS-CS cybersecurity work means cybersecurity work identified under 
Sec.  158.402(b).
    DHS-CS employee means an employee serving in a qualified position 
under this part.
    Employee has the same meaning as that term in 5 U.S.C. 2105.
    Excepted service has the same meaning as that term in 5 U.S.C. 2103.
    Executive Schedule means the pay levels described in 5 U.S.C. 5311.
    Former DHS-CS employee means an individual who previously served, 
but is not currently serving, in a qualified position.
    Functions has the same meaning as that term in 6 U.S.C. 101(9).
    Mission impact means a DHS-CS employee's influence on execution of 
the DHS cybersecurity mission by applying the employee's CTMS 
qualifications to successfully and proficiently perform DHS-CS 
cybersecurity work.
    Mission-related requirements means characteristics of an 
individual's expertise or characteristics of cybersecurity work, or both 
(including cybersecurity talent market-related information), that are 
associated with successful execution of the DHS cybersecurity mission, 
and that are determined by officials with appropriate decision-making 
authority.
    Preference eligible has the same meaning as that term in 5 U.S.C. 
2108.
    Qualification means a quality of an individual that correlates with 
the successful and proficient performance of cybersecurity work, such as 
capability, experience and training, and education

[[Page 347]]

and certification. A capability is a cluster of interrelated attributes 
that is measurable or observable or both. Interrelated attributes 
include knowledge, skills, abilities, behaviors, and other 
characteristics.
    Qualified position means CTMS qualifications and DHS-CS 
cybersecurity work, the combination of which is associable with an 
employee.
    Renewable appointment means a time-limited appointment to a 
qualified position.
    Salary means an annual rate of pay under this part and is basic pay 
for purposes under 5 U.S.C. and 5 CFR. The salary for a DHS-CS employee 
is described in Sec.  158.603.
    Secretary means the Secretary of Homeland Security.
    Secretary or designee means the Secretary or an official or group of 
officials authorized to act for the Secretary in the matter concerned.
    Strategic talent priorities means the priorities for CTMS and the 
DHS-CS set under Sec.  158.304.
    Supervisor means an employee of the Department who has authority to 
hire, direct, assign, promote, reward, transfer, furlough, layoff, 
recall, suspend, discipline, or remove employees, or to effectively 
recommend such actions. A supervisor for a DHS-CS employee may be a DHS-
CS employee or may be an employee of the Department serving in a 
position outside the DHS-CS.
    Talent management means a systematic approach to linking employees 
to mission and organizational goals through intentional strategies and 
practices for hiring, compensating, and developing employees.
    Talent management action has the same meaning as the term personnel 
action in 5 U.S.C. 2302(a)(2) for applicable actions, and the terms 
talent management action and personnel action may be used 
interchangeably in this part.
    Veteran has the same meaning as that term in 5 U.S.C. 2108.
    Work level means a grouping of CTMS qualifications and DHS-CS 
cybersecurity work with sufficiently similar characteristics to warrant 
similar treatment in talent management under this part.
    Work valuation means a methodology through which an organization 
defines and evaluates the value of work and the value of individuals 
capable of performing that work.



                   Subpart B_DHS Cybersecurity Service



Sec.  158.201  Cybersecurity mission.

    Cybersecurity is a matter of homeland security and one of the core 
missions of the Department. Congress and the President charge the 
Department with responsibilities relating to cybersecurity and grant the 
Secretary and other officials authorities to carry out those 
cybersecurity responsibilities. The Department's cybersecurity mission 
is dynamic to keep pace with the evolving cybersecurity risks and 
cybersecurity threats facing the Nation and to adapt to any changes in 
the Department's cybersecurity responsibilities. The DHS cybersecurity 
mission encompasses all responsibilities of the Department relating to 
cybersecurity.



Sec.  158.202  Cybersecurity Service (DHS-CS).

    The Secretary or designee establishes and manages the DHS-CS to 
enhance the cybersecurity of the Nation through the most effective 
execution of the DHS cybersecurity mission.



Sec.  158.203  Positions in the DHS-CS.

    (a) Qualified positions. The Secretary or designee designates and 
establishes qualified positions in the excepted service as the Secretary 
or designee determines necessary for the most effective execution of the 
DHS cybersecurity mission.
    (b) Designating qualified positions. The Secretary or designee 
designates qualified positions under the deployment program, described 
in Sec.  158.701, as part of determining when the Department uses CTMS 
to recruit and retain individuals possessing CTMS qualifications.
    (c) Establishing qualified positions. The Secretary or designee 
establishes a qualified position under the talent acquisition system, 
described in Sec.  158.501 of this part, by the appointment of an 
individual to a qualified position previously designated.

[[Page 348]]



Sec.  158.204  Employees in the DHS-CS.

    (a) DHS-CS employees. DHS-CS employees serve in the excepted 
service, and the Department hires, compensates, and develops DHS-CS 
employees using CTMS.
    (b) Mission execution and assignments. DHS-CS employees execute the 
DHS cybersecurity mission by applying their CTMS qualifications to 
perform the DHS-CS cybersecurity work of their assignments.
    (c) Mission impact and recognition. Application of a DHS-CS 
employee's CTMS qualifications to successfully and proficiently perform 
DHS-CS cybersecurity work results in mission impact attributable to that 
employee. The Department reviews a DHS-CS employee's mission impact as 
described in Sec.  158.805, which may result in recognition as described 
in Sec.  158.630.
    (d) Compensation. In alignment with the compensation strategy 
described in Sec.  158.601, the Department provides compensation to a 
DHS-CS employee as described in Sec.  158.603.
    (e) Recruitment and development. The Department strategically and 
proactively recruits individuals as described in Sec.  158.510 and 
develops DHS-CS employees under the career development program, 
described in Sec.  158.803, that emphasizes continual learning.
    (f) Core values. The Department uses the core values, described in 
Sec.  158.305, to manage the DHS-CS.



Sec.  158.205  Assignments in the DHS-CS.

    (a) Assignments generally. Each DHS-CS employee has one or more 
assignments during the employee's service in the DHS-CS. The Department 
designates and staffs assignments under the deployment program, 
described in Sec.  158.701.
    (b) Initial and subsequent assignments. The Department matches an 
individual appointed to a qualified position with an initial assignment 
as described in Sec.  158.703(c). The Department may match DHS-CS 
employees with one or more subsequent assignments as described in Sec.  
158.703(d).



                          Subpart C_Leadership



Sec.  158.301  Administering CTMS and Managing the DHS-CS.

    (a) The Secretary or designee is responsible for administering CTMS 
and managing the DHS-CS, including establishing and maintaining CTMS 
policy.
    (b) The Cybersecurity Talent Management Board (CTMB) is responsible 
for assisting the Secretary or designee in administering CTMS and 
managing the DHS-CS.
    (c) The Secretary or designee, with assistance from the CTMB, 
administers CTMS and manages the DHS-CS based on:
    (1) Talent management principles described in Sec.  158.303;
    (2) Strategic talent priorities described in Sec.  158.304; and
    (3) DHS-CS core values described in Sec.  158.305.



Sec.  158.302  Cybersecurity Talent Management Board (CTMB).

    (a) Purpose. As part of assisting the Secretary or designee in 
administering CTMS and managing the DHS-CS, the CTMB periodically 
evaluates whether CTMS is recruiting and retaining individuals with the 
qualifications necessary to execute the DHS cybersecurity mission.
    (b) Composition. The CTMB comprises:
    (1) Officials representing DHS organizations involved in executing 
the DHS cybersecurity mission; and
    (2) Officials responsible for developing and administering talent 
management policy within the Department.
    (c) Membership. The Secretary or designee:
    (1) Appoints officials to serve as members of the CTMB;
    (2) Designates the Co-Chairs of the CTMB; and
    (3) Ensures CTMB membership fulfills the membership requirements in 
this section and includes appropriate representation, as determined by 
the Secretary or designee, from across the Department.
    (d) Operation. The Secretary or designee establishes the CTMB and 
minimum requirements for CTMB operation.

[[Page 349]]

    (e) External Assistance. The CTMB may periodically designate an 
independent evaluator to conduct an evaluation of CTMS.



Sec.  158.303  Talent management principles.

    (a) Merit system principles. CTMS is designed and the Secretary or 
designee, with assistance from the CTMB, administers CTMS based on the 
principles of merit and fairness embodied in the merit system principles 
in 5 U.S.C. 2301(b).
    (b) Prohibited personnel practices. Any employee of the Department 
who has the authority to take, direct others to take, recommend, or 
approve any talent management action under this part must comply with 5 
U.S.C. 2302(b) regarding talent management actions under this part.
    (c) Equal employment opportunity principles. CTMS is designed and 
the Secretary or designee, with assistance from the CTMB, administers 
CTMS and manages the DHS-CS in accordance with applicable anti-
discrimination laws and policies. Thus, talent management actions under 
this part that materially affect a term or condition of employment must 
be free from discrimination.



Sec.  158.304  Strategic talent priorities.

    The Secretary or designee, with assistance from the CTMB, 
administers CTMS and manages the DHS-CS based on strategic talent 
priorities, which the Secretary or designee sets on an ongoing basis 
using:
    (a) Information from strategic talent planning described in Sec.  
158.401(c);
    (b) The Department's financial and resources planning functions, 
including the functions described in 6 U.S.C. 342(b);
    (c) The Department's comprehensive strategic planning, including the 
plan described in 5 U.S.C. 306; and
    (d) Departmental priorities.



Sec.  158.305  DHS-CS core values.

    The Secretary or designee, with assistance from the CTMB, manages 
the DHS-CS based on the following core values:
    (a) Expertise, including enhancing individual and collective 
expertise regarding cybersecurity through continual learning;
    (b) Innovation, including pursuing new ideas and methods regarding 
cybersecurity work and cybersecurity generally; and
    (c) Adaptability, including anticipating and adjusting to emergent 
and future cybersecurity risks and cybersecurity threats.



                   Subpart D_Strategic Talent Planning



Sec.  158.401  Strategic talent planning process.

    (a) Purpose. On an ongoing basis, the Secretary or designee engages 
in a strategic talent planning process to ensure CTMS adapts to changes 
in cybersecurity work, the cybersecurity talent market, and the DHS 
cybersecurity mission.
    (b) Process. The Secretary or designee establishes and administers a 
strategic talent planning process that comprises:
    (1) Identifying DHS-CS cybersecurity work and CTMS qualifications 
based on the DHS cybersecurity mission as described in Sec.  158.402;
    (2) Analyzing the cybersecurity talent market as described in Sec.  
158.403;
    (3) Describing and valuing DHS-CS cybersecurity work under the work 
valuation system described in Sec.  158.404; and
    (4) Ensuring CTMS administration and DHS-CS management is 
continually informed by current, relevant information as described in 
paragraph (c) of this section.
    (c) Informing CTMS administration and DHS-CS management. The 
Secretary or designee aggregates information generated in the processes 
described in paragraphs (b)(1) through (3) of this section and 
information from administering CTMS, and uses that aggregated 
information to inform all other CTMS processes, systems, and programs 
under this part.



Sec.  158.402  DHS-CS cybersecurity work and CTMS qualifications
identification.

    On an ongoing basis, the Secretary or designee analyzes the DHS 
cybersecurity mission to identify:

[[Page 350]]

    (a) The functions that execute the DHS cybersecurity mission;
    (b) The cybersecurity work required to perform, manage, or supervise 
those functions; and
    (c) The set of qualifications, identified in accordance with 
applicable legal and professional guidelines, necessary to perform that 
work.



Sec.  158.403  Talent market analysis.

    On an ongoing basis, the Secretary or designee conducts an analysis 
of the cybersecurity talent market, using generally recognized 
compensation principles and practices to:
    (a) Identify and monitor trends in both employment for and 
availability of talent related to cybersecurity, including variations in 
the cost of talent in local cybersecurity talent markets, defined in 
Sec.  158.612(b)(1), or variations in the cost of living in those 
markets, or both; and
    (b) Identify leading strategies for recruiting and retaining talent 
related to cybersecurity.



Sec.  158.404  Work valuation system.

    (a) The Secretary or designee establishes and administers a person-
focused work valuation system to facilitate systematic management of the 
DHS-CS and to address internal equity among DHS-CS employees. The work 
valuation system is designed to reflect that:
    (1) The DHS cybersecurity mission is dynamic;
    (2) Cybersecurity work is constantly evolving; and
    (3) Individuals, through application of their qualifications, 
significantly influence how cybersecurity work is performed.
    (b) The work valuation system is based on:
    (1) CTMS qualifications; and
    (2) DHS-CS cybersecurity work.
    (c) The Department uses the work valuation system to establish work 
and career structures, such as work levels, titles, ranks, and 
specializations, and the Department uses these work and career 
structures for purposes of talent management under this part, such as:
    (1) Describing and categorizing DHS-CS employees, qualified 
positions, and assignments;
    (2) Assessing and selecting individuals for appointment to qualified 
positions; and
    (3) Compensating DHS-CS employees under this part, including 
establishing and administering one or more salary structures, described 
in Sec.  158.611.
    (d) The Department may also use the work and career structures 
described in paragraph (c) of this section for budget and fiscal 
purposes related to administering CTMS and managing the DHS-CS.



Sec.  158.405  Exemption from General Schedule position classification.

    The provisions of 5 U.S.C. Chapter 51 regarding classification and 5 
CFR part 511 regarding classification under the General Schedule, among 
other similar laws, do not apply under CTMS, to the DHS-CS, or to talent 
management involving the individuals described in Sec.  158.103.



                       Subpart E_Acquiring Talent

                        Talent Acquisition System



Sec.  158.501  Talent acquisition system.

    (a) The Secretary or designee establishes and administers a talent 
acquisition system, in accordance with applicable legal and professional 
guidelines governing the assessment and selection of individuals, to 
identify and hire individuals possessing CTMS qualifications.
    (b) The talent acquisition system comprises the strategies, 
programs, and processes described in this subpart and in CTMS policy for 
proactively and strategically recruiting individuals, assessing 
qualifications of individuals, and considering and selecting individuals 
for employment in the DHS-CS and appointment to qualified positions.



Sec.  158.502  Exemption from other laws regarding appointment.

    The provisions of the following laws, among other similar laws, do 
not apply under CTMS, to the DHS-CS, or to talent management involving 
the individuals described in Sec.  158.103:
    (a) The following provisions of 5 U.S.C.:

[[Page 351]]

    (1) Section 3320 regarding selection and appointment in the excepted 
service; and
    (2) Chapter 51 regarding classification; and
    (b) The following provisions of 5 CFR:
    (1) Part 211 regarding veteran preference;
    (2) Part 302 regarding employment in the excepted service (except 
Sec.  302.203 regarding disqualifying factors);
    (3) Part 352 regarding reemployment rights (except subpart C 
regarding detail and transfer of Federal employees to international 
organizations); and
    (4) Part 511 regarding classification under the General Schedule.

                         Sourcing and Recruiting



Sec.  158.510  Strategic recruitment.

    (a) On an ongoing basis, the Department develops and implements 
strategies for publicly communicating about the DHS cybersecurity 
mission and the DHS-CS and for proactively recruiting individuals likely 
to possess CTMS qualifications.
    (b) The Department develops and implements strategies described in 
paragraph (a) of this section based on:
    (1) CTMS qualifications and DHS-CS cybersecurity work; and
    (2) Strategic talent priorities.
    (c) In developing and implementing strategies described in paragraph 
(a) of this section, the Department may collaborate with:
    (1) Other Federal agencies including the Department of Defense, the 
Office of Personnel Management, and the Department of Veterans Affairs;
    (2) Institutions of higher education, as defined in 20 U.S.C. 1001, 
including historically Black colleges or universities, as described in 
20 U.S.C. 1061(2), and other minority-serving institutions, as described 
in 20 U.S.C. 1067q(a);
    (3) National organizations, including veterans service organizations 
recognized by the Department of Veterans Affairs, and professional 
associations chartered by Congress under 36 U.S.C. Part B; and
    (4) Other similar organizations and groups.
    (d) The Department considers the availability of preference 
eligibles and veterans for appointment under this part, and develops and 
implements specific strategies to proactively recruit such individuals.



Sec.  158.511  Outreach and sourcing.

    (a) The Department uses a variety of sources, including publicly 
available information, to identify individuals or groups of individuals 
for recruitment under this subpart.
    (b) CTMS policy implementing this subpart addresses:
    (1) Communication of opportunities for employment in the DHS-CS;
    (2) Communication of the application processes to individuals being 
recruited under this part or applying for employment under this part; 
and
    (3) Acceptance and treatment of applications for employment in the 
DHS-CS, including minimum application requirements established under 
this part.



Sec.  158.512  Interview expenses.

    (a) An individual being considered for employment in the DHS-CS may 
receive payment or reimbursement for travel to and from preemployment 
interviews, which may include participating in the assessment program 
described in Sec.  158.520.
    (b) The Department pays or reimburses interview expenses, described 
in paragraph (a) of this section, in accordance with 5 U.S.C. 5706b and 
the Federal Travel Regulations at 41 CFR chapters 301 through 304.

                          Assessment and Hiring



Sec.  158.520  Assessment.

    (a) The Department determines individuals' CTMS qualifications under 
the assessment program described in this section. To be considered for 
employment in the DHS-CS, an individual must participate in the 
assessment program and meet applicable rating or scoring thresholds in 
each assessment process in which that individual participates.
    (b) The Department establishes and administers an assessment 
program, with one or more assessment processes, based on CTMS 
qualifications. The assessment program is designed to efficiently and 
accurately determine individuals' CTMS qualifications.

[[Page 352]]

    (c) Each assessment process compares the qualifications of an 
individual to CTMS qualifications. The Department develops and 
administers each assessment process in accordance with applicable legal 
and professional guidelines governing the assessment and selection of 
individuals.
    (d) An assessment process may use standardized instruments and 
procedures to measure qualifications. An assessment process may also use 
demonstrations of qualifications determined appropriate by the Secretary 
or designee, such as rewards earned from the cybersecurity competition 
described in Executive Order 13870, published, peer-reviewed 
cybersecurity research, or a cybersecurity invention or discovery 
granted a patent under 35 U.S.C. Part II.
    (e) The Department makes available information to assist individuals 
in understanding the purpose of, and preparing for participation in, an 
assessment process.
    (f) To maintain the objectivity and integrity of the assessment 
program, the Department maintains control over the security and release 
of materials relating to the assessment program, including assessment 
plans, validation studies, and other content. Except as otherwise 
required by law, the Department does not release the following:
    (1) Sensitive materials relating to the design and administration of 
the assessment program;
    (2) Names or lists of individuals applying for employment in the 
DHS-CS; and
    (3) Results or relative ratings of individuals who participated in 
the assessment program.



Sec.  158.521  Employment eligibility requirements and employment-related
criteria.

    (a) Employment eligibility requirements. To be eligible for 
employment in the DHS-CS, an individual must:
    (1) Meet U.S. citizenship requirements as described in governing 
Appropriation Acts; and
    (2) Comply with Selective Service System requirements described in 5 
U.S.C. 3328.
    (b) Employment-related criteria. The Department determines criteria 
related to employment in the DHS-CS, reviews individuals applying for 
employment in the DHS-CS using such criteria, and, as part of an offer 
of appointment to a qualified position, provides written notice of 
specific, applicable employment-related criteria necessary to obtain and 
maintain, employment in the DHS-CS. Employment-related criteria include:
    (1) Fitness standards and similar factors described in Executive 
orders, 5 CFR 302.203, and policies of the Department;
    (2) Personnel security requirements related to fitness standards and 
similar factors described in paragraph (b)(1) of this section;
    (3) Geographic mobility requirements; and
    (4) Other criteria related to any aspect of appointment or 
employment, including selection, appointments, qualified positions, or 
assignments, or some or all of the foregoing.
    (c) Accepting and maintaining employment-related criteria. To be 
appointed to a qualified position, an individual must accept and satisfy 
the specific, applicable employment-related criteria associated with the 
individual's offer of appointment concurrent with the individual's 
acceptance of the offer of appointment. An individual's acceptance of an 
appointment to a qualified position constitutes acceptance of applicable 
employment-related criteria for that qualified position and the 
individual's agreement to satisfy and maintain those criteria.
    (d) Changes to employment-related criteria. Employment-related 
criteria may change, and DHS-CS employees may be required to accept and 
satisfy such changes to maintain employment in the DHS-CS.
    (e) Disqualification. The Department may disqualify an individual 
from consideration for employment in the DHS-CS or from appointment to a 
qualified position for: Providing false information to the Department, 
engaging in dishonest conduct with the Department, unauthorized 
disclosure of assessment materials for purposes of giving any applicant 
an advantage in the assessment process, or other actions related to an 
individual's character or conduct that may negatively impact

[[Page 353]]

the integrity or efficiency of the DHS-CS.



Sec.  158.522  Selection and appointment.

    (a) The Department selects an individual for employment in the DHS-
CS based on the individual's CTMS qualifications, as determined under 
the assessment program described in Sec.  158.520.
    (b) Prior to finalizing the selection of an individual for 
employment in the DHS-CS, the Department considers the availability of 
preference eligibles for appointment under this part, including those 
recruited based on specific strategies described in Sec.  158.510(d), 
who have participated in the assessment program and met applicable 
rating or scoring thresholds, as described in Sec.  158.520(a). When a 
selection is imminent and there are both preference eligibles and non-
preference eligibles undergoing final consideration, the Department 
regards status as a preference eligible as a positive factor in 
accordance with CTMS policy.
    (c) The Department appoints an individual to a qualified position 
under the authority in 6 U.S.C. 658 and this part, and all such 
appointments are in the excepted service and are one of the following 
types of appointment:
    (1) A renewable appointment under Sec.  158.523(a);
    (2) A continuing appointment under Sec.  158.523(b); or
    (3) An advisory appointment under Sec.  158.523(c).
    (d) As part of selecting an individual for employment in the DHS-CS 
and appointing an individual to a qualified position under this part, 
the Department:
    (1) Determines applicable work and career structures, including the 
individual's initial work level, using the work valuation system 
described in Sec.  158.404;
    (2) Sets the individual's initial salary using the salary system as 
described in Sec.  158.620; and
    (3) Matches the individual with an initial assignment as described 
in Sec.  158.703(c).
    (e) No qualified position may be established through the non-
competitive conversion of a current Federal employee from an appointment 
made outside the authority of this part to an appointment made under 
this part.
    (f) An individual who accepts an appointment to a qualified position 
under this part voluntarily accepts an appointment in the excepted 
service.
    (g) A DHS-CS employee serves in the same qualified position 
throughout a single continuing appointment under this part and 
throughout multiple, consecutive renewable or continuing appointments 
under this part, regardless of any changes in the employee's 
assignments, including primary DHS organization, or changes in the 
employee's official worksite.



Sec.  158.523  Appointment types and circumstances.

    (a) Renewable appointment. Appointment of an individual to a 
renewable appointment is for up to three years. The Department may renew 
a renewable appointment for any time period of up to three years, 
subject to any limitation in CTMS policy regarding the number of 
renewals. Subject to any additional limitation in CTMS policy, the 
Department may change an unexpired renewable appointment to a continuing 
appointment for a DHS-CS employee receiving a salary in the standard 
range described in Sec.  158.613(b). The following types of renewable 
appointments include special conditions:
    (1) Reemployed annuitant. Under this part, the Department may 
appoint an annuitant to a qualified position and must appoint the 
annuitant to a renewable appointment. An annuitant appointed to a 
qualified position serves at the will of the Secretary.
    (2) Uncompensated service. Under this part, the Department may 
appoint to a qualified position an individual to provide uncompensated 
service, any such service is gratuitous service, and the Department must 
appoint such an individual to a renewable appointment. The gratuitous 
nature of service must be a condition of employment of such an 
appointment. The Secretary or designee must approve the appointment of 
each individual providing uncompensated service by name, and such 
individual if not providing gratuitous service would otherwise be 
eligible to receive a salary under this part at or above the amount 
described in

[[Page 354]]

Sec.  158.614(a)(2). An individual providing uncompensated service 
serves at the will of the Secretary. An individual for appointment to a 
qualified position to provide uncompensated service need not be assessed 
under this part, and the documentation associated with that individual's 
qualified position need not include all the information listed in Sec.  
158.706(c).
    (b) Continuing appointment. Appointment of an individual to a 
continuing appointment is for an indefinite time period.
    (c) Advisory appointment. Appointment of an individual, including a 
former DHS-CS employee, to an advisory appointment is governed by 
subpart J of this part.
    (d) Former DHS-CS employee. Appointment under this part of a former 
DHS-CS employee is governed by Sec.  158.525.
    (e) Restoration to duty from uniformed service or compensable 
injury. In accordance with 5 CFR part 353, the Department restores to 
duty a DHS-CS employee who is a covered person described in 5 CFR 
353.103.
    (f) Current and former political appointees. Appointment under this 
part of a current political appointee and a former political appointee, 
both as defined by OPM, may be subject to additional requirements 
outside of this part, including coordination with OPM.



Sec.  158.524  Initial service period.

    (a) All individuals appointed under this part serve an initial 
service period that constitutes a probationary period of three years 
beginning on the date of appointment.
    (b) Except as stated in paragraph (c) of this section, service in 
the DHS-CS counts toward completion of a current initial service period 
under paragraph (a) of this section. No other service in an appointment 
made outside the authority of this part may count toward completion of 
an initial service period under paragraph (a) of this section.
    (c) Service as a DHS-CS advisory appointee, as a reemployed 
annuitant described in Sec.  158.523(a)(1), or providing uncompensated 
service described in Sec.  158.523(a)(2) does not count towards 
completion of an initial service period in a subsequent appointment to a 
qualified position.
    (d) CTMS policy implementing this section addresses computation of 
each DHS-CS employee's initial service period, including accounting for 
working schedules other than full-time schedules described in Sec.  
158.705 and for periods of absence while in pay and nonpay statuses.



Sec.  158.525  Hiring of former DHS-CS employees.

    (a) Rejoining the DHS-CS. To facilitate future service in the DHS-CS 
by former DHS-CS employees, the Department aims to:
    (1) Maintain communication with former DHS-CS employees to 
understand their interest in future service in the DHS-CS;
    (2) Provide opportunities for former DHS-CS employees to be 
considered for appointment again to qualified positions; and
    (3) Acknowledge former DHS-CS employees' enhancements to 
qualifications while outside the DHS-CS.
    (b) Rehiring. Except as provided in paragraphs (c) through (e) of 
this section, to be appointed again to a qualified position a former 
DHS-CS employee must:
    (1) Participate again in the assessment program described in Sec.  
158.520 for the Department to determine the former DHS-CS employee's 
current CTMS qualifications; and
    (2) Meet employment eligibility and accept and satisfy applicable 
employment-related criteria as described in Sec.  158.521.
    (c) Reassessment. A former DHS-CS employee whose most recent 
appointment to a qualified position was a renewable appointment or a 
continuing appointment must participate again in the assessment program 
described in Sec.  158.520 unless the Department determines otherwise 
based on factors relevant to the former DHS-CS employee, such as:
    (1) Time elapsed since the former DHS-CS employee's most recent 
appointment to a qualified position under this part;
    (2) Similarity of cybersecurity work performed by the former DHS-CS 
employee since that individual's most recent appointment to a qualified 
position under this part; or

[[Page 355]]

    (3) Similarity of the former DHS-CS employee's CTMS qualifications 
during the former employee's most recent appointment under this part to 
the CTMS qualifications of a newly identified assignment under the 
deployment program in Sec.  158.701.
    (d) Former advisory and political appointees. Appointment under this 
part of a former DHS-CS employee who previously served in an advisory 
appointment or other political appointment may be subject to additional 
requirements, including coordination with the Office of Personnel 
Management.
    (e) Prospective advisory appointees. Appointment of any former DHS-
CS employee to an advisory appointment is governed by subpart J of this 
part.



                      Subpart F_Compensating Talent

                           Compensation System



Sec.  158.601  Compensation strategy.

    To ensure the DHS-CS fulfills its purpose, as stated in Sec.  
158.202, the Secretary or designee aims to establish and administer a 
compensation system, described in Sec.  158.602, that:
    (a) Ensures the compensation for DHS-CS employees is sufficiently 
competitive to recruit and retain individuals possessing CTMS 
qualifications;
    (b) Values, encourages, and recognizes, in alignment with the DHS-CS 
core values described in Sec.  158.305:
    (1) Exceptional CTMS qualifications and mission impact,
    (2) Excellence and innovation in the performance of DHS-CS 
cybersecurity work, and
    (3) Continual learning to adapt to evolving cybersecurity risks and 
cybersecurity threats; and
    (c) Acknowledges the unpredictable nature of cybersecurity work and 
the expectation that DHS-CS employees occasionally work unusual hours 
and extended hours, as needed, to execute the DHS cybersecurity mission, 
especially in response to exigent circumstances and emergencies, 
including cybersecurity incidents; and
    (d) Reflects an understanding of the cybersecurity talent market, 
including:
    (1) Leading compensation practices and trends,
    (2) Current cybersecurity work expectations and arrangements, and
    (3) An understanding of the concepts of total compensation and total 
rewards.



Sec.  158.602  Compensation system.

    (a) The Secretary or designee establishes and administers a 
compensation system based on:
    (1) The compensation strategy in Sec.  158.601;
    (2) Information from strategic talent planning described in Sec.  
158.401(c);
    (3) Generally recognized compensation principles and practices; and
    (4) Strategic talent priorities.
    (b) The compensation system comprises:
    (1) The salary system described in Sec.  158.610; and
    (2) Additional compensation described in Sec.  158.603.



Sec.  158.603  Employee compensation.

    (a) Compensation. As compensation for service in the DHS-CS, a DHS-
CS employee receives a salary as described in paragraph (b) of this 
section. A DHS-CS employee may also receive additional compensation as 
described in paragraph (c) of this section.
    (b) Salary. Except as provided in paragraphs (b)(1) and (2) of this 
section, a DHS-CS employee receives a salary under the salary system 
described in Sec.  158.610. The Department sets a DHS-CS employee's 
salary as described in Sec.  158.620, and salary may include a local 
cybersecurity talent market supplement described in Sec.  158.612. The 
Department adjusts a DHS-CS employee's salary as described in Sec.  
158.621.
    (1) Uncompensated service. A DHS-CS employee providing uncompensated 
service described in Sec.  158.523(a)(2) does not receive a salary under 
this part.
    (2) Advisory appointees. A DHS-CS advisory appointee receives a 
salary as described under subpart J of this part.
    (c) Additional compensation. In alignment with the compensation 
strategy in Sec.  158.601 and subject to the requirements of this 
subpart F, the Department may provide the additional compensation 
described in paragraph (c)(1) of this section to DHS-CS employees, 
unless a DHS-CS employee is providing

[[Page 356]]

uncompensated service under Sec.  158.523(a)(2).
    (1) Types. Additional compensation under CTMS is:
    (i) Recognition under Sec. Sec.  158.632 through 158.634;
    (ii) Other special payments under Sec. Sec.  158.640 through 
158.643; and
    (iii) Other types of compensation, including leave and benefits, 
authorized under Sec. Sec.  158.650 through 158.654 and provided in 
accordance with relevant provisions of other laws.
    (2) Combining types. A DHS-CS employee, except such an employee 
providing uncompensated service and a DHS-CS advisory appointee, may 
receive any type of additional compensation described in paragraph 
(c)(1) of this section in combination with any other such type subject 
to the requirements of this subpart F, and subject to the limit 
described in paragraph (c)(3) of this section.
    (3) Limit. Additional compensation described in paragraph (c)(1) of 
this section is subject to, and may be limited by, the aggregate 
compensation limit described in Sec.  158.604.
    (4) Advisory appointees. A DHS-CS advisory appointee may receive 
additional compensation as described in subpart J of this part.
    (5) Department discretion. Any payment or nonpayment of additional 
compensation under this part, or the amount of any such compensation, is 
under the Department's discretion, and may be reviewable only as 
provided for under subpart I of this part.



Sec.  158.604  Aggregate compensation limit.

    (a) Limiting aggregate compensation. A DHS-CS employee may not 
receive additional compensation listed in in paragraphs (b)(1)(i) 
through (iv) of this section if such receipt would cause a DHS-CS 
employee's aggregate compensation for a calendar year to exceed the 
aggregate compensation limit applicable to that employee. A DHS-CS 
employee's applicable aggregate compensation limit is the limit amount 
assigned to the subrange of a salary structure, described in Sec.  
158.611, that contains the employee's salary. The Department assigns an 
aggregate compensation limit to each subrange in a salary structure by 
assigning the amounts referenced in 5 U.S.C. 5307(d)(1) in ascending 
order to the subranges, such that each subrange has an aggregate 
compensation limit that is greater than or equal to the salary maximum 
of that subrange.
    (b) Aggregate compensation. For purposes of this part--
    (1) A DHS-CS employee's aggregate compensation means the total of 
the employee's salary, including any local cybersecurity talent market 
supplement, and the following types of additional compensation the 
employee receives under this part:
    (i) Recognition payments;
    (ii) Payments for special working conditions;
    (iii) Payments for quarters allowances, overseas differentials and 
allowances, and remote worksite allowances, foreign currency allowances, 
and hostile fire pay; and
    (iv) Other similar payments described in CTMS policy as being 
authorized under this part and provided in accordance with other 
relevant provisions of law.
    (2) The following types of compensation a DHS-CS employee receives 
under this part are excluded from the employee's aggregate compensation:
    (i) Payments or reimbursements for professional development and 
training;
    (ii) CTMS student loan repayments;
    (iii) CTMS allowances in nonforeign areas;
    (iv) Back pay because of an unjustified or unwarranted talent 
management action;
    (v) Severance pay;
    (vi) Lump-sum payments for accumulated and accrued annual leave;
    (vii) Voluntary separation incentive payments;
    (viii) Payments for reservist differentials; and
    (ix) Monetary value of any honorary recognition, leave, or other 
benefits.
    (c) Forfeiture of compensation exceeding limit amount. Except under 
corrective action described in paragraph (d) of this section, a DHS-CS 
employee may not receive any portion of a payment for the additional 
compensation listed in paragraphs (b)(1)(i) through (iv) of this section 
that would cause

[[Page 357]]

the employee's aggregate compensation in any calendar year to exceed the 
applicable limit amount for that employee described in paragraph (a) of 
this section and the DHS-CS employee forfeits any such portion of a 
payment.
    (d) Corrective actions. The Department may make a corrective action 
if the Department underestimated or overestimated a DHS-CS employee's 
aggregate compensation in a calendar year, including if an applicable 
aggregate compensation limit amount changed, resulting in the employee 
receiving aggregate compensation in excess of the applicable limit 
amount for a DHS-CS employee or the Department limiting or prohibiting 
an employee's aggregate compensation incorrectly. Corrective actions may 
include the Secretary or designee waiving a debt to the Federal 
Government for a DHS-CS employee under 5 U.S.C. 5584, if warranted, or 
making appropriate corrective payments to a DHS-CS employee.



Sec.  158.605  Exemption from other laws regarding compensation.

    The provisions of the following laws, among other similar laws, do 
not apply under CTMS, to the DHS-CS, or to talent management involving 
the individuals described in Sec.  158.103:
    (a) The following provisions of 5 U.S.C.:
    (1) Chapter 51 regarding classification,
    (2) Chapter 53 regarding pay rates and systems (except section 5379 
regarding student loan repayments),
    (3) Chapter 55, Subchapter V regarding premium pay (except section 
5550a regarding compensatory time off for religious observances),
    (4) Chapter 61 regarding work schedules (except sections 6103-6104 
regarding holidays),
    (5) Section 4502 regarding cash awards and time-off awards,
    (6) Section 4503 regarding agency awards (except regarding honorary 
recognition),
    (7) Section 4505a regarding performance-based cash awards,
    (8) Sections 4507 and 4507a regarding presidential rank awards,
    (9) Section 5307 regarding limitation on certain payments,
    (10) Section 5384 regarding performance awards for the Senior 
Executive Service,
    (11) Section 5753 regarding recruitment and relocation bonuses,
    (12) Section 5754 regarding retention bonuses,
    (13) Section 5755 regarding supervisory differentials, and
    (14) Section 5757 regarding extended assignment incentives;
    (b) The provisions of 29 U.S.C. 206 and 207 regarding minimum wage 
payments and overtime pay under the Fair Labor Standards Act of 1938, as 
amended; and
    (c) The following provisions of 5 CFR:
    (1) Part 451 regarding awards (except regarding honorary 
recognition);
    (2) Part 511 regarding classification under the General Schedule;
    (3) Part 530 regarding pay rates and systems;
    (4) Part 531 regarding pay under the General Schedule;
    (5) Part 534 regarding pay under other systems;
    (6) Part 536 regarding grade and pay retention;
    (7) Part 550, subparts A regarding premium pay, I regarding pay for 
duty involving physical hardship or hazard, M regarding firefighter pay, 
N regarding compensatory time off for travel, and P regarding overtime 
pay for border patrol agents;
    (8) Part 551 regarding pay administration under the Fair Labor 
Standards Act;
    (9) Part 575 regarding recruitment, relocation, and retention 
incentives, supervisory differentials; and extended assignment 
incentives; and
    (10) Part 610 regarding hours of duty (except subpart B regarding 
holidays).

                                Salaries



Sec.  158.610  Salary system.

    (a) Under the compensation system, described in Sec.  158.602 of 
this part, the Department establishes and administers a salary system 
with the goals of maintaining:
    (1) Sufficiently competitive salaries for DHS-CS employees as stated 
in Sec.  158.601(a); and
    (2) Equitable salaries among DHS-CS employees.
    (b) The salary system comprises:

[[Page 358]]

    (1) At least one salary structure, described in Sec.  158.611 of 
this part, bounded by the salary range described in Sec.  158.613 and 
incorporating the salary limitations described in Sec.  158.614;
    (2) The process for providing a local cybersecurity talent market 
supplement described in Sec.  158.612; and
    (3) The salary administration framework described in Sec. Sec.  
158.620 through 158.622.



Sec.  158.611  Salary structure.

    (a) Under the salary system, described in Sec.  158.610, the 
Department establishes and administers one or more salary structures 
based on the strategy, information, principles and practices, and 
priorities listed in Sec.  158.602(a).
    (b) A salary structure:
    (1) Is bounded by the salary range described in Sec.  158.613;
    (2) Incorporates, as described in paragraph (d) of this section, the 
salary limitations described in Sec.  158.614; and
    (3) May incorporate other salary and cost control strategies, such 
as control points.
    (c) A salary structure includes subranges, within the salary range 
described in Sec.  158.613 that are associated with work levels 
established by the work valuation system, described in Sec.  158.404. 
Each such subrange is associated with at least one such work level.
    (d) The Department incorporates the salary limitations described in 
Sec.  158.614 into a salary structure by assigning each such salary 
limitation to at least one subrange of the salary structure. The 
Department assigns such salary limitations in ascending order to the 
subranges such that each subrange has a salary limitation that is 
greater than or equal to the salary maximum of that subrange.
    (e) The Department may adjust a salary structure annually, or as the 
Secretary or designee determines necessary, based on the strategy, 
information, principles and practices, and priorities listed in Sec.  
158.602(a).



Sec.  158.612  Local cybersecurity talent market supplement (LCTMS).

    (a) General. The Department may provide a DHS-CS employee a LCTMS to 
ensure the employee receives a sufficiently competitive salary, as 
described in Sec.  158.610(a). A LCTMS accounts for the difference 
between a salary as determined under a salary structure, described in 
Sec.  158.611, and the Department's determination as to what constitutes 
a sufficiently competitive salary for that local cybersecurity talent 
market. The Department determines whether a LCTMS is necessary, and 
establishes and periodically adjusts local cybersecurity talent markets 
and local cybersecurity talent market supplement percentages, based on 
the strategy, information, principles and practices, and priorities 
listed in Sec.  158.602(a).
    (b) Definitions. As used in this section:
    (1) Local cybersecurity talent market means the cybersecurity talent 
market in a geographic area that the Department defines based on the 
talent market analysis described in Sec.  158.403, and that may 
incorporate any pay locality established or modified under 5 U.S.C. 
5304.
    (2) Local cybersecurity talent market supplement percentage means a 
percentage the Department assigns to a local cybersecurity talent market 
to increase the amount of a salary provided under a salary structure.
    (c) Salary supplement. A LCTMS is considered part of salary under 
this part and for purposes of applying the aggregate compensation limit 
described in Sec.  158.604. A LCTMS is also basic pay for purposes under 
5 U.S.C. and 5 CFR, except for purposes of determining pay under 5 
U.S.C. 7511 and 7512 and 5 CFR part 752.
    (d) Eligibility and termination. (1) The Department determines 
eligibility for a LCTMS under this section and CTMS policy implementing 
this section. A DHS-CS employee is eligible for a LCTMS if the 
employee's official worksite, as determined under Sec.  158.704, is 
located in a local cybersecurity talent market with an assigned local 
cybersecurity talent market supplement percentage for the salary 
structure under which the employee's salary is provided.
    (2) The Department terminates a LCTMS a DHS-CS employee receives 
when the employee's official worksite, as determined under Sec.  
158.704, is no

[[Page 359]]

longer in a local cybersecurity talent market with an assigned local 
cybersecurity talent market supplement percentage, or the salary 
structure under which the employee's salary is provided no longer has an 
assigned local cybersecurity labor market supplement, or both.
    (3) A reduction in salary for a DHS-CS employee because of a change 
in any LCTMS for that employee is not a reduction in pay for the 
purposes of 5 U.S.C. 7512 and 5 CFR part 752.
    (e) Limitation. A DHS-CS employee may not receive, and is not 
entitled to, any portion of a LCTMS that would cause the employee's 
salary to exceed the applicable salary limitation assigned to the 
subrange of a salary structure as described in Sec.  158.611 that 
contains the employee's salary, but the employee may receive the portion 
of such a LCTMS that would not cause the employee's salary to exceed the 
applicable salary limitation. A DHS-CS employee may receive a LCTMS that 
would cause the employee's salary to be in the extended range, described 
in Sec.  158.613(c), only if the Secretary or designee invokes the 
extended range under Sec.  158.613(c)(2) for that employee.



Sec.  158.613  Salary range.

    (a) Range. The salary range provides the boundaries of the salary 
system described in Sec.  158.610. The salary range comprises a standard 
range and an extended range, and the standard range applies unless the 
Secretary or designee invokes the extended range under paragraph (c) of 
this section.
    (b) Standard range. The upper limit of the standard range is equal 
to the amount of total annual compensation payable to the Vice President 
under 3 U.S.C. 104.
    (c) Extended range. The upper limit of the extended range is 150 
percent of the annual rate of basic pay for level I of the Executive 
Schedule (150% of EX-I). Only DHS-CS employees serving in renewable 
appointments may receive a salary amount in the extended range, and only 
if the Secretary or designee invokes the extended range for those 
employees as described in this paragraph (c).
    (1) The Secretary or designee may invoke the extended range for a 
DHS-CS employee when the Secretary or designee determines, based on the 
compensation strategy in Sec.  158.601, that the employee's 
qualifications, the employee's mission impact, and mission-related 
requirements warrant adjusting the employee's salary beyond the standard 
range. The Secretary or designee must approve the salary adjustment of 
each such employee by name, and to receive a salary in the extended 
range the employee must either already be in a renewable appointment or 
accept a renewable appointment. While the employee is receiving a salary 
in an amount in the extended range, the Department may not change that 
employee's appointment to a continuing appointment.
    (2) The Secretary or designee may invoke the extended range for an 
individual selected for appointment to a qualified position when the 
Secretary or designee determines, based on the compensation strategy in 
Sec.  158.601, that the individual's qualifications, the individual's 
anticipated mission impact, and mission-related requirements warrant 
setting the individual's salary beyond the standard range. The Secretary 
or designee must approve the appointment of each such individual to a 
qualified position by name, and the individual must be appointed to a 
renewable appointment only. While that individual is receiving a salary 
under this part in an amount in the extended range, the Department may 
not change that individual's appointment to a continuing appointment at 
any time.
    (d) Maximum. No DHS-CS employee may receive a salary under this part 
in excess of 150% of EX-I.



Sec.  158.614  Salary limitations.

    (a) The salary system, described in Sec.  158.610, has the following 
limitations on maximum rates of salary that apply within the CTMS salary 
range described in Sec.  158.613 of this part:
    (1) The annual rate of basic pay for GS-15, step 10 under the 
General Schedule (excluding locality pay or any other additional pay as 
defined in 5 CFR chapter 1);
    (2) The annual rate of basic pay for level IV of the Executive 
Schedule;
    (3) The annual rate of basic pay for level II of the Executive 
Schedule;

[[Page 360]]

    (4) The annual rate of basic pay for level I of the Executive 
Schedule; and
    (5) The total annual compensation payable to the Vice President 
under 3 U.S.C. 104.
    (b) The Department may establish additional limitations on maximum 
rates of salary for the salary system.
    (c) The salary system incorporates each limitation on maximum rates 
of salary described in this section into each salary structure 
established under Sec.  158.611.

                          Salary Administration



Sec.  158.620  Setting salaries.

    (a) The Department sets the salary for an individual accepting an 
appointment to a qualified position as part of selection and appointment 
of the individual, described in Sec.  158.522. The Department sets the 
individual's salary within a subrange of a salary structure described in 
Sec.  158.611 based on consideration of:
    (1) The individual's CTMS qualifications, determined under the 
assessment program described in Sec.  158.520;
    (2) Applicable work and career structures, including the 
individual's initial work level, determined as part of selection and 
appointment under Sec.  158.522;
    (3) The individual's anticipated mission impact;
    (4) Mission-related requirements; and
    (5) Strategic talent priorities.
    (b) In setting the salary for an individual appointed to a qualified 
position under this part, the Department may set the individual's salary 
without regard to any prior salary of the individual, including any 
salary or basic pay while serving in a previous appointment under this 
part or in another previous Federal appointment made outside the 
authority of this part.
    (c) In setting the salary for an individual appointed to a qualified 
position under this part, the Department may provide a local 
cybersecurity talent market supplement described in Sec.  158.612.



Sec.  158.621  Adjusting salaries.

    (a) The Department adjusts a DHS-CS employee's salary, or the 
salaries of a group of DHS-CS employees, by paying a recognition 
adjustment under Sec.  158.631, or paying a local cybersecurity talent 
market supplement under Sec.  158.612, or both.
    (b) The Department does not provide DHS-CS employees with any 
automatic salary increase or any salary increase based on length of 
service in the DHS-CS or in any position outside the DHS-CS.
    (c) If the Department adjusts a salary structure under Sec.  
158.611(e) that results in an increase to the salary minimum for one or 
more subranges of the salary structure, for any DHS-CS employee 
receiving a salary in an affected subrange at the affected salary 
minimum, DHS adjusts the employee's salary to reflect the adjustment to 
the salary structure and the new salary minimum for the affected 
subrange. Such a salary adjustment is not considered a recognition 
adjustment under Sec.  158.631.



Sec.  158.622  Administering salary in accordance with relevant provisions
of other laws.

    (a) Except as stated in paragraph (b) of this section, the 
Department administers salary under this part in accordance with the 
provisions of 5 CFR part 550 regarding pay administration generally.
    (b) The following provisions of 5 CFR part 550 do not apply to 
administering salary under this part and do not apply under CTMS, to the 
DHS-CS, or to talent management involving the individuals described in 
Sec.  158.103 of this part:
    (1) Subpart A regarding premium pay;
    (2) Subpart I regarding pay for duty involving physical hardship or 
hazard;
    (3) Subpart M regarding firefighter pay;
    (4) Subpart N compensatory time-off for travel; and
    (5) Subpart P regarding overtime for board patrol agents.
    (c) The Department also administers salary under this part in 
accordance with the provisions of the following:
    (1) 5 U.S.C. 5520, 42 U.S.C. 659 and 5 CFR parts 581 and 582, 
regarding garnishment;
    (2) 31 U.S.C. 3702 and 5 CFR part 178 regarding claims settlement;

[[Page 361]]

    (3) 31 U.S.C. 3711 and 3716 and 31 CFR chapter IX parts 900 through 
904 regarding debt collection;
    (4) 5 U.S.C. Chapter 55 Subchapter VII regarding payments to missing 
employees; and
    (5) Other relevant provisions of other laws specifically adopted in 
CTMS policy.
    (d) For purposes of salary administration under this section, the 
Department administers salary based on consideration of a DHS-CS 
employee's work schedule under the work scheduling system, described in 
Sec.  158.705, and may convert the employee's salary into an hourly 
rate, biweekly rate, or other rate.

                               Recognition



Sec.  158.630  Employee recognition.

    (a) DHS-CS employees. In alignment with the compensation strategy in 
Sec.  158.601 and the performance management program described in Sec.  
158.802 of this part, the Department may provide recognition under 
Sec. Sec.  158.631 through 158.634, on a periodic or ad hoc basis, to a 
DHS-CS employee based on the employee's mission impact. In providing 
such recognition, the Department may also consider mission-related 
requirements and strategic talent priorities.
    (b) Prospective employees. In alignment with the compensation 
strategy in Sec.  158.601, the Department may offer, and provide upon 
appointment, recognition payments under Sec.  158.632(b) and recognition 
time-off under Sec.  158.633(b), on a periodic or ad hoc basis, to an 
individual selected for employment in the DHS-CS based on:
    (1) The individual's CTMS qualifications determined under the 
assessment program described in Sec.  158.520;
    (2) The individual's anticipated mission impact;
    (3) Mission-related requirements; and
    (4) Strategic talent priorities.
    (c) Eligibility. The Department determines eligibility for 
recognition under this section, Sec. Sec.  158.631 through 158.634, and 
CTMS policy implementing this section. The Department may defer 
providing recognition to a DHS-CS employee under this part if the 
Department is in the process of determining whether the employee's 
performance is unacceptable, as defined in 5 U.S.C. 4301(3), or whether 
the employee has engaged in misconduct. If the Department determines a 
DHS-CS employee's performance is unacceptable, as defined in 5 U.S.C. 
4301(3), or the employee receives an unacceptable rating of record under 
Sec.  158.804, or the Department determines the employee has engaged in 
misconduct, the employee is ineligible to receive recognition under this 
part.
    (d) Policy. CTMS policy implementing this section addresses:
    (1) Eligibility criteria;
    (2) Requirements for documenting the reason and basis for 
recognition provided to a DHS-CS employee;
    (3) Appropriate levels of review and approval for providing 
recognition;
    (4) Any limitations on the total number, frequency, or amount of 
recognition a DHS-CS employee may receive within any specific time 
period;
    (5) Any service agreement requirements; and
    (6) Processes for evaluating the effectiveness of recognition in 
supporting the purpose of CTMS described in Sec.  158.101, the purpose 
of the DHS-CS described in Sec.  158.202, and the operationalization of 
the compensation strategy described in Sec.  158.601.
    (e) Advisory appointees. Recognition under this part for a DHS-CS 
advisory appointee is subject to additional requirements and 
restrictions in subpart J of this part.



Sec.  158.631  Recognition adjustments.

    (a) Under this section and Sec.  158.630, the Department may provide 
a recognition adjustment to a DHS-CS employee for the reasons and bases 
stated in Sec.  158.630(a). A recognition adjustment is an adjustment to 
the DHS-CS employee's salary provided under a salary structure described 
in Sec.  158.611. A recognition adjustment does not alter any local 
cybersecurity talent market supplement for that employee.
    (b) No DHS-CS employee may receive a recognition adjustment that 
would cause the employee's salary to exceed the salary range maximum 
described in Sec.  158.613(d) or the applicable salary limitation 
assigned to the subrange of a salary structure as described in

[[Page 362]]

Sec.  158.611(d) that contains the employee's salary. A DHS-CS employee 
may not receive a recognition adjustment that would cause the employee's 
salary amount to be in the extended range, described in Sec.  
158.613(c), unless the Secretary or designee invokes the extended range 
for that employee under Sec.  158.613(c)(1).
    (c) A recognition adjustment under this section is not a promotion 
for any purpose under Title 5 U.S.C. or 5 CFR.
    (d) A recognition adjustment under this section for a DHS-CS 
advisory appointee is subject to additional requirements and 
restrictions in subpart J of this part.



Sec.  158.632  Recognition payments.

    (a) Under this section and Sec.  158.630, and for the reasons and 
bases stated in Sec.  158.630(a), the Department may provide a 
recognition payment to a DHS-CS employee in an amount of up to 20 
percent, or up to 50 percent with approval of the Secretary or designee, 
of the receiving DHS-CS employee's salary. The Department may require a 
service agreement of not less than six months and not more than three 
years as part of providing a recognition payment to a DHS-CS employee.
    (b) Under this section and Sec.  158.630, and for the reasons and 
bases stated in Sec.  158.630(b) and as part of an offer of employment 
in the DHS-CS, the Department may offer a recognition payment to an 
individual selected for employment in the DHS-CS in an amount of up to 
20 percent of the receiving individual's initial salary in the DHS-CS. 
The Department requires a service agreement of not less than six months 
and not more than three years as part of providing, upon appointment, a 
recognition payment to an individual selected for employment in the DHS-
CS.
    (c) The Department may provide a recognition payment as a lump sum 
payment, an installment payment, or a recurring payment.
    (d) The Department may provide a recognition payment under this 
section to a former DHS-CS employee or to the legal heirs or estate of a 
former DHS-CS employee in accordance with 5 U.S.C. 4505.
    (e) Acceptance of a recognition payment constitutes agreement for 
Federal Government use of any idea, method, device, or similar that is 
the basis of the payment.
    (f) A recognition payment under this section is subject to and may 
be limited by the aggregate compensation limit described in Sec.  
158.604.
    (g) A recognition payment is not salary under this part and is not 
basic pay for any purpose under 5 U.S.C. or 5 CFR.
    (h) A recognition payment under this section is based on the 
following types of awards and incentives provided under 5 U.S.C.:
    (1) Cash awards under 5 U.S.C. 4502;
    (2) Agency awards under 5 U.S.C. 4503;
    (3) Performance-based cash awards under 5 U.S.C. 4505a and 5384;
    (4) Presidential rank awards under 5 U.S.C. 4507 and 4507a; and
    (5) Recruitment, relocation, and retention incentives 5 U.S.C. 5753 
and 5754.
    (i) A recognition payment under this section is in lieu of the types 
of awards and incentives provided under 5 U.S.C. listed in paragraph (h) 
of this section, and a DHS-CS employee is ineligible to receive any such 
awards or incentives.
    (j) An individual selected for employment in the DHS-CS is 
ineligible to receive, as part of the offer of employment, any other 
offer of a monetary award or incentive, a payment in addition to salary, 
or other monetary recognition from the Department except as provided in 
this section and Sec.  158.630. An individual appointed to an advisory 
appointment is also ineligible to receive, as part of an offer of 
employment in the DHS-CS, any offer of recognition under this section.
    (k) A recognition payment under this section for a DHS-CS advisory 
appointee is subject to additional requirements and restrictions in 
subpart J of this part.



Sec.  158.633  Recognition time-off.

    (a) Under this section and Sec.  158.630, and for the reasons and 
bases stated in Sec.  158.630(a), the Department may provide recognition 
time-off to a DHS-CS employee for use within a designated timeframe not 
to exceed 26 work periods, as defined in Sec.  158.705(c). Recognition 
time-off is time-off from duty

[[Page 363]]

without charge to leave or loss of compensation.
    (b) Under this section and Sec.  158.630, and for the reasons and 
bases stated in Sec.  158.630(b) and as part of an offer of employment 
in the DHS-CS, the Department may offer up to 40 hours of recognition 
time-off to an individual selected for employment in the DHS-CS for use 
within a designated timeframe not to exceed 26 work periods, as defined 
in Sec.  158.705(b). The Department may require a service agreement as 
part of providing, upon appointment, recognition time-off to an 
individual selected for employment in the DHS-CS.
    (c) All recognition time-off provided, and the use of such time-off, 
must be recorded in a timekeeping system for purposes of salary 
administration and leave administration under this part.
    (d) Recognition time-off provided under this section may not, under 
any circumstances, be converted to a cash payment to the receiving DHS-
CS employee or any other type of time-off or leave.
    (e) Recognition time-off under this section is based on time-off 
awards provided under the provisions of 5 U.S.C. 4502(e).
    (f) Recognition time-off under this section is in lieu of the time-
off awards provided under 5 U.S.C. 4502(e), and a DHS-CS employee is 
ineligible to receive any such awards.
    (g) An individual selected for employment in the DHS-CS is 
ineligible to receive, as part of the offer of employment, any other 
offer of time-off or time-off award from the Department except as 
provided in this section and Sec. Sec.  158.630 and 158.651. An 
individual appointed to an advisory appointment is also ineligible to 
receive, as part of an offer of employment in the DHS-CS, any offer of 
recognition under this section.
    (h) A recognition time-off provided under this section to a DHS-CS 
advisory appointee is subject to additional requirements and 
restrictions in subpart J of this part.



Sec.  158.634  Honorary recognition.

    (a) Under this section and Sec.  158.630, the Department may 
establish one or more honorary recognition programs to provide honorary 
recognition to DHS-CS employees for the reasons and bases stated in 
Sec.  158.630(a). The Department may incur necessary expenses for 
honorary recognition under an honorary recognition program established 
under this section.
    (b) Honorary recognition under this section is based on honorary 
recognition provided under the provisions of 5 U.S.C. 4503, and a DHS-CS 
employee may be eligible to receive honorary recognition under 5 U.S.C. 
4503 and 5 CFR part 451 in addition to any honorary recognition under 
this section.
    (c) The Department may provide honorary recognition under this 
section to a former DHS-CS employee or to the legal heirs or estate of a 
former DHS-CS employee in accordance with 5 U.S.C. 4505.
    (d) Honorary recognition under this section for a DHS-CS advisory 
appointee is subject to additional requirements in subpart J of this 
part.

                         Other Special Payments



Sec.  158.640  Professional development and training.

    (a) In alignment with the compensation strategy described in Sec.  
158.601 and the career development program described in Sec.  158.803, 
the Department may provide professional development and training 
opportunities, payments, and reimbursements for DHS-CS employees.
    (b) CTMS policy implementing this section addresses:
    (1) Eligibility criteria;
    (2) Requirements for documenting the reason and basis for 
professional development and training opportunities, payments, and 
reimbursements provided to a DHS-CS employee;
    (3) Appropriate levels of review and approval for providing 
professional development and training opportunities, payments, and 
reimbursements;
    (4) Any limitations on the total number or frequency of professional 
development and training opportunities, and any limitations on the total 
number, frequency, or amount of professional development and training 
payments and reimbursements a DHS-CS employee may receive, within any 
specific time period;

[[Page 364]]

    (5) Any service agreement requirements;
    (6) Requirements for communicating to DHS-CS employees and their 
supervisors about professional development and training opportunities; 
and
    (7) Processes for evaluating the effectiveness of the professional 
development and training in supporting the purpose of CTMS described in 
Sec.  158.101, the purpose of the DHS-CS described in Sec.  158.202, and 
the operationalization of the compensation strategy described in Sec.  
158.601.
    (c) Any payment or reimbursement under this section is excluded from 
the aggregate compensation limit described in Sec.  158.604.
    (d) Any payment or reimbursement under this section is not salary 
under this part and is not basic pay for any purpose under 5 U.S.C. or 5 
CFR.
    (e) Professional development and training under this section is 
based on the following training and professional development 
opportunities, payments, and reimbursements provided under 5 U.S.C.:
    (1) Sabbaticals under 5 U.S.C. 3396;
    (2) Academic degree training under 5 U.S.C. 4107;
    (3) Expenses of training under 5 U.S.C. 4109;
    (4) Expenses of attendance at meetings under 5 U.S.C. 4110; and
    (5) Payment of expenses to obtain professional credentials under 5 
U.S.C. 5757.
    (f) In addition to any professional development and training under 
this section, a DHS-CS employee may be eligible to receive the training 
and professional development opportunities, payments, and reimbursements 
provided under 5 U.S.C. listed in paragraph (e) of this section.
    (g) Professional development and training under this section for a 
DHS-CS advisory appointee is subject to additional requirements and 
restrictions in subpart J of this part.



Sec.  158.641  Student loan repayments.

    (a) In alignment with the compensation strategy described in Sec.  
158.601, the Department may provide a student loan repayment to a DHS-CS 
employee under this section and in accordance with 5 U.S.C. 5379 and 5 
CFR part 537, except that:
    (1) The maximum payment amounts under 5 U.S.C. 5379 and 5 CFR part 
537 do not apply, and the Department may provide and a DHS-CS employee 
may receive a student loan repayment under this section so long as such 
repayment does not exceed $16,500 per employee per calendar year and a 
total of $90,000 per employee;
    (2) The minimum service period length of three years under 5 U.S.C. 
5379 and 5 CFR part 537 does not apply, and instead the length of a 
minimum service period for a DHS-CS employee receiving a student loan 
repayment under this section is determined under CTMS policy and based 
on the amount of the repayment received by the employee; and
    (3) Eligibility criteria related to time-limited appointments under 
5 U.S.C. 5379 and 5 CFR part 537 do not apply, and a DHS-CS employee in 
a renewable appointment may receive a student loan payment under this 
section.
    (b) In alignment with eligibility criteria under 5 U.S.C. 5379 and 5 
CFR part 537:
    (1) If the Department determines a DHS-CS employee's performance is 
unacceptable, as defined in 5 U.S.C. 4301(3), or the employee receives 
an unacceptable rating of record under Sec.  158.804, or the Department 
determines the employee has engaged in misconduct, the employee is 
ineligible to receive a student loan repayment under this section.
    (2) A DHS-CS advisory appointee is ineligible to receive a student 
loan repayment under this section.
    (c) CTMS policy implementing this section addresses:
    (1) Eligibility criteria;
    (2) Requirements for documenting the reason and basis for a student 
loan repayment provided to a DHS-CS employee;
    (3) Appropriate levels of review and approval for providing a 
student loan repayment;
    (4) Service agreement requirements, including minimum service 
periods;
    (5) Any additional limitations on student loan repayments; and

[[Page 365]]

    (6) Processes for evaluating the effectiveness of student loan 
repayments in supporting the purpose of CTMS described in Sec.  158.101, 
the purpose of the DHS-CS described in Sec.  158.202, and the 
operationalization of the compensation strategy described in Sec.  
158.601.
    (d) Any student loan repayment provided under this section is 
excluded from the aggregate compensation limit described in Sec.  
158.604.
    (e) Any student loan repayment provided under this section is not 
salary under this part and is not basic pay for any purpose under 5 
U.S.C. or 5 CFR.



Sec.  158.642  Special working conditions payment program.

    (a) In alignment with the compensation strategy described in Sec.  
158.601, the Department may establish a program to provide payments to 
DHS-CS employees to address special working conditions that are 
otherwise unaccounted for or the Department determines are accounted for 
insufficiently in DHS-CS employees' other types of additional 
compensation and salary.
    (b) Special working conditions include circumstances in which a 
supervisor or other appropriate official requires a DHS-CS employee to 
perform DHS-CS cybersecurity work that involves, as determined by the 
Department:
    (1) Unusual physical or mental hardship;
    (2) Performing work at atypical locations, at unexpected times, or 
for an uncommon duration of time exceeding the expectation described in 
Sec.  158.601(c) about working unusual hours and extended hours; or
    (3) A combination of the conditions described in paragraphs (b)(1) 
and (2) of this section.
    (c) A payment for special working conditions is a payment of up to 
25 percent of the receiving DHS-CS employee's salary as computed for a 
work period, defined in Sec.  158.705(b), or a series of work periods.
    (d) The Department determines whether to establish, adjust, or 
cancel a program under this section based on information from:
    (1) The work scheduling system described in Sec.  158.705; and
    (2) Strategic talent planning described in Sec.  158.401(c), 
including information about current compensation practices of other 
cybersecurity employers analyzed under the talent market analysis 
described in Sec.  158.403.
    (e) The Department determines eligibility for a payment for special 
working conditions under this section and CTMS policy implementing this 
section.
    (1) A DHS-CS employee who receives a payment for special working 
conditions under a program established under this section is not 
automatically eligible or entitled to receive any additional such 
payments.
    (2) A DHS-CS employee receiving a salary equal to or greater than 
EX-IV is ineligible to receive a payment under this section.
    (3) A DHS-CS advisory appointee is ineligible to receive a payment 
for special working conditions under this section.
    (f) CTMS policy implementing this section addresses:
    (1) Eligibility criteria;
    (2) Requirements for documenting the reason and basis for payments 
for special working conditions provided to a DHS-CS employee;
    (3) Appropriate levels of review and approval for providing payments 
for special working conditions;
    (4) Any limitations on payments for special working conditions;
    (5) Requirements for determining whether a payment for special 
working conditions is a lump sum payment, paid in installments, or a 
recurring payment; and
    (6) Processes for evaluating the effectiveness of any special 
working conditions payment program in supporting the purpose of CTMS 
described in Sec.  158.101, the purpose of the DHS-CS described in Sec.  
158.202, and the operationalization of the compensation strategy 
described in Sec.  158.601.
    (g) Any payment under this section is subject to and may be limited 
by the aggregate compensation limit described in Sec.  158.604.
    (h) Any payment under this section is not salary under this part and 
is not basic pay for any purpose under Title 5 U.S.C. or 5 CFR.

[[Page 366]]

    (i) A payment for special working conditions under this section is 
based on the following types of payments provided under 5 U.S.C.:
    (1) Night, standby and hazardous duty differential under 5 U.S.C. 
5545;
    (2) Pay for Sunday and holiday work under 5 U.S.C. 5546; and
    (3) Extended assignment incentives under 5 U.S.C. 5757.
    (j) A payment for special working conditions under this section is 
in lieu of the types of payment provided under 5 U.S.C. listed in 
paragraph (g) of this section, and a DHS-CS employee is ineligible to 
receive any such payments under 5 U.S.C.



Sec.  158.643  Allowance in nonforeign areas.

    (a) A DHS-CS employee is eligible for and may receive an allowance 
under 5 U.S.C. 5941 and implementing regulations in 5 CFR part 591, 
subpart B, on the same basis and to the same extent as if the employee 
is an employee covered by those authorities.
    (b) The Department provides an allowance described in paragraph (a) 
of this section to any DHS-CS employee who is eligible, as described in 
paragraph (a), for such allowance.
    (c) Any allowance provided under this section is excluded from the 
aggregate compensation limit described in Sec.  158.604.
    (d) Any allowance provided under this section is not salary under 
this part and is not basic pay for any purpose under 5 U.S.C. or 5 CFR.
    (e) Any allowance under this section for a DHS-CS advisory appointee 
is subject to additional requirements and restrictions in subpart J of 
this part.

 Other Compensation Provided in Accordance With Relevant Provisions of 
                               Other Laws



Sec.  158.650  Holidays.

    In alignment with salary administration under Sec.  158.622 and work 
scheduling under Sec.  158.705, the Department provides holidays to a 
DHS-CS employee under this section and in accordance with 5 U.S.C. 6103-
6104 and 5 CFR part 610, subpart B.



Sec.  158.651  Leave.

    (a) Leave. In alignment with salary administration under Sec.  
158.622 and work scheduling under Sec.  158.705, the Department provides 
leave to a DHS-CS employee under this section and in accordance with 5 
U.S.C. Chapter 63 and 5 CFR part 630, including:
    (1) Annual leave, as described in 5 U.S.C. Chapter 63, Subchapter I;
    (2) Sick leave, as described in 5 U.S.C. Chapter 63, Subchapter I;
    (3) Other paid leave, as described in 5 U.S.C. Chapter 63, 
Subchapter II;
    (4) Voluntary transfers of leave, as described in 5 U.S.C. Chapter 
63, Subchapter III;
    (5) Voluntary leave bank programs, as described in 5 U.S.C. Chapter 
63, Subchapter IV;
    (6) Family and medical leave, as described in 5 U.S.C. Chapter 63, 
Subchapter V; and
    (7) Leave transfer in disasters and emergencies, as described in 5 
U.S.C. Chapter 63, Subchapter VI.
    (b) Annual leave accrual. A DHS-CS employee's annual leave accrual 
amount is determined under 5 U.S.C. 6303.
    (c) Annual leave accumulation. A DHS-CS employee's annual leave 
accumulation amount is determined under 5 U.S.C. 6304, except that the 
Department may apply 5 U.S.C. 6304(f)(2)(A) to DHS-CS employees 
receiving a salary under this part that exceeds 120 percent of the 
minimum annual rate of basic pay for GS-15 under the General Schedule.
    (d) Leave credits. The annual leave and sick leave accrued to the 
credit of a current Federal employee who is appointed to a qualified 
position under this part without a break in service of more than three 
calendar days is transferred to the employee's credit in accordance with 
5 U.S.C. 6308.
    (e) Annual leave balance upon leaving the DHS-CS. When a DHS-CS 
employee moves to a position outside of the DHS-CS, any leave balance 
for the employee is addressed in accordance with 5 CFR 630.209 and 
630.501.
    (f) Leave administration. The Department administers leave under 
this section as described in this section and in Sec.  158.655, and in 
accordance with the

[[Page 367]]

relevant provisions of other laws referenced in this section and CTMS 
policy.



Sec.  158.652  Compensatory time-off for religious observance.

    In alignment with salary administration under Sec.  158.622 of this 
part and work scheduling under Sec.  158.705, the Department provides 
compensatory time-off for religious observance to a DHS-CS employee 
under this section and in accordance with 5 U.S.C. 5550a and 5 CFR 550, 
subpart J.



Sec.  158.653  Other benefits.

    (a) In alignment with salary administration under Sec.  158.622, 
leave administration under Sec.  158.651, and work scheduling under 
Sec.  158.705, the Department provides benefits, including retirement, 
health benefits, and insurance programs, to a DHS-CS employee under this 
section and in accordance with 5 U.S.C. Chapters 81-90 and 5 CFR parts 
831 and 838-894.
    (b) The Department administers the benefits of an annuitant 
appointed to a qualified position in accordance with 5 U.S.C. 8344, 5 
U.S.C. 8468, 5 CFR 553.203, or 5 CFR part 837, as applicable.
    (c) The Department provides a transportation subsidy to a DHS-CS 
employee under this section and in accordance with 5 U.S.C. 7905.



Sec.  158.654  Other payments.

    (a) The Department provides the following other types of payments to 
a DHS-CS employee under this section and in accordance with the relevant 
provisions of law referenced in this section:
    (1) Severance pay under this section, and the Department provides 
any severance pay in accordance with 5 U.S.C. 5595 and 5 CFR part 550, 
subpart G, except that separation from the DHS-CS because of a lapse or 
nonrenewal of a DHS-CS employee's appointment under this part or because 
of a DHS-CS employee's refusal to accepted a directed subsequent 
assignment, described in Sec.  158.708, is not an involuntary 
separation, and the former DHS-CS employee is not entitled to severance 
pay.
    (2) Lump-sum leave payouts under this section, and the Department 
provides any lump-sum leave payouts in accordance with 5 U.S.C. 5551 and 
5552 and 5 CFR part 550, subpart L.
    (3) Voluntary separation incentive payments under this section, and 
the Department provides any such payments in accordance with 5 U.S.C. 
3521-3525 and 5 CFR part 576.
    (4) Reservist differential under this section, and the Department 
provides any such differential in accordance with 5 U.S.C. 5538.
    (5) Quarters allowances under this section, and the Department 
provides any such allowances in accordance with 5 U.S.C. Chapter 59, 
Subchapter II, the Department of State Standardized Regulations and any 
implementing supplements issued by the Department of State, and 5 CFR 
part 591, subpart C.
    (6) Overseas differentials and allowances under this section, and 
the Department provides any such differentials and allowances in 
accordance with 5 U.S.C. Chapter 59, Subchapter III, the Department of 
State Standardized Regulations and any implementing supplements issued 
by the Department of State, and 5 CFR part 591, subpart C.
    (7) Remote worksite allowances, foreign currency allowances, and 
hostile fire pay under this section, and the Department provides any 
such allowances and pay in accordance with 5 U.S.C. Chapter 59, 
Subchapter IV.
    (8) Other similar payments described in CTMS policy as being 
authorized under this part and provided in accordance with relevant 
provisions of other laws.
    (b) A payment for any quarter allowances, overseas differentials and 
allowances, and remote worksite allowances, foreign currency allowances, 
and hostile fire pay under paragraphs (a)(5) through (7) of this section 
is subject to and may be limited by the aggregate compensation limit 
described in Sec.  158.604. A payment for any severance pay, lump-sum 
leave payout, voluntary separation inventive payment, and reservist 
differential under paragraphs (a)(1) through (4) of this section is not 
subject to the aggregate compensation limit described in Sec.  158.604. 
A payment under paragraph (a)(8) of this section may be subject to and 
limited by the aggregate compensation limit described in Sec.  158.604, 
as described in CTMS policy.

[[Page 368]]

    (c) Any payment under this section is not salary under this part and 
is not basic pay for any purpose under Title 5 U.S.C. or 5 CFR.



Sec.  158.655  Administering compensation in accordance with relevant
provisions of other laws.

    (a) For purposes of administering compensation authorized under 
Sec. Sec.  158.650 through 158.654 in accordance with relevant 
provisions of other laws:
    (1) The Department may convert a DHS-CS employee's salary into an 
hourly rate, biweekly rate, or other rate, and administer compensation 
based on consideration of the DHS-CS employee's work schedule under the 
work scheduling system described in Sec.  158.705;
    (2) A DHS-CS employee's hours of work and related computations are 
determined under the relevant provisions of law referenced in Sec. Sec.  
158.650 through 158.654 and CTMS policy implementing this section;
    (3) A DHS-CS employee on a part-time schedule described in Sec.  
158.705 is treated as if the employee is serving ``part-time career 
employment'' defined in 5 CFR 340.101; and
    (4) A DHS-CS employee on a contingent schedule described in Sec.  
158.705 is treated as if the employee is serving ``intermittent 
employment'' defined in 5 CFR 340.401.
    (b) If, in administering compensation under Sec. Sec.  158.650 
through 158.654, the Department determines it is necessary to clarify 
the relationship between those sections and the relevant provisions of 
law referenced in those sections and any other relevant provisions of 
other laws, the Department will address the issue in new or revised CTMS 
policy.



                       Subpart G_Deploying Talent



Sec.  158.701  Deployment program.

    (a) Deployment program. The Secretary or designee establishes and 
administers a deployment program to:
    (1) Guide when the Department uses CTMS to recruit and retain 
individuals possessing CTMS qualifications; and
    (2) Operationalize aspects of the work valuation system, the talent 
acquisition system and the compensation system, described in Sec. Sec.  
158.404, 158.501, and 158.602 respectively.
    (b) Under the deployment program, the Department:
    (1) Designates qualified positions as described in Sec.  158.702;
    (2) Designates and staffs assignments as described in Sec.  158.703;
    (3) Determines and documents a DHS-CS employee's official worksite 
as described in Sec.  158.704;
    (4) Administers a work scheduling system as described in Sec.  
158.705; and
    (5) Performs necessary recordkeeping as described in Sec.  158.706.



Sec.  158.702  Designating qualified positions.

    (a) When a DHS organization requires individuals possessing CTMS 
qualifications to ensure the most effective execution of the DHS 
cybersecurity mission and the recruitment and retention of such 
individuals would likely be enhanced by using CTMS, the Secretary or 
designee designates qualified positions.
    (b) CTMS policy implementing this section addresses:
    (1) Procedures for DHS organizations to request using CTMS;
    (2) Requirements for DHS organization using CTMS; and
    (3) Information necessary to designate qualified positions.
    (c) Designating qualified positions may result in:
    (1) Establishing one or more qualified positions under the talent 
acquisition system, described in Sec.  158.501; or
    (2) Designating and staffing one or more assignments as described in 
Sec.  158.703; or
    (3) Both results described in paragraphs (c)(1) and (2) of this 
section.
    (d) Designating qualified positions involves budget and fiscal 
considerations related to establishing one or more qualified positions 
under the talent acquisition system, described in Sec.  158.501.



Sec.  158.703  Designating and staffing assignments.

    (a) Designating assignments. The Department designates assignments 
by defining combinations of CTMS qualifications and DHS-CS cybersecurity

[[Page 369]]

work associable with qualified positions. CTMS policy implementing this 
section addresses procedures for DHS organizations to designate 
assignments, including as a result of designating qualified positions as 
described in Sec.  158.702.
    (b) Staffing assignments. The Department staffs assignments by:
    (1) Matching assignments with DHS-CS employees as described in 
paragraph (d) of this section;
    (2) Matching assignments with newly appointed individuals as 
described in paragraph (c) of this section; or
    (3) Seeking to recruit individuals and establish new qualified 
positions under the talent acquisition system described in Sec.  158.501 
and then matching assignments with newly appointed individuals as 
described in paragraph (c) of this section.
    (c) Initial assignment. Upon appointment of an individual to a 
qualified position, the Department matches the individual with an 
assignment based on the alignment of the individual's CTMS 
qualifications, determined under the assessment program described in 
Sec.  158.520, to the CTMS qualifications of an assignment. In matching 
an individual with an initial assignment, the Department may also 
consider:
    (1) Input from the individual;
    (2) Input from DHS organizations;
    (3) Mission-related requirements; and
    (4) Strategic talent priorities.
    (d) Subsequent assignments. The Department matches DHS-CS employees 
with assignments subsequent to employees' initial assignments, as 
necessary.
    (1) The Department matches a DHS-CS employee with a subsequent 
assignment based on the alignment of the employee's CTMS qualifications 
with the CTMS qualifications of an assignment. In matching a DHS-CS 
employee with a subsequent assignment, the Department may also consider:
    (i) Input from the employee;
    (ii) Input from DHS organizations, especially the primary DHS 
organization of the employee's current assignment;
    (iii) Information about the employee from the performance management 
program described in Sec.  158.802 and the career development program 
described in Sec.  158.803;
    (iv) Mission-related requirements; and
    (v) Strategic talent priorities.
    (2) A DHS-CS employee may have multiple assignments throughout the 
employee's service in a qualified position, but may only have one 
assignment at a time. A DHS-CS employee's subsequent assignments may 
have assignment information, described in Sec.  158.706(e), that is 
different than the assignment information of the employee's initial 
assignment, including primary DHS organization.
    (3) In alignment with the career development program described in 
Sec.  158.803 and based on information from development reviews 
described in Sec.  158.806 the Department communicates with DHS-CS 
employees on an ongoing basis about subsequent assignment opportunities;



Sec.  158.704  Official worksite.

    (a) Definition. A DHS-CS employee's official worksite is the 
geographic location where the employee regularly performs DHS-CS 
cybersecurity work or where the employee's DHS-CS cybersecurity work is 
based, as determined and documented by the Department under this 
section.
    (b) Determination. The Department determines a DHS-CS employee's 
official work site for purposes of administering compensation under this 
part, especially eligibility for any compensation described in 
Sec. Sec.  158.612 and 158.643. The Department's determination of a DHS-
CS employee's official worksite includes consideration of any of the 
following for the employee: Telework, variation in location where the 
employee performs DHS-CS cybersecurity work, and temporary situations 
affecting the location where the employee performs DHS-CS cybersecurity 
work.
    (c) Documentation. Upon appointment of an individual to a qualified 
position, the Department documents the individual's official worksite as 
part of documenting the employee's appointment to a qualified position 
and the employee's assignment, as described in

[[Page 370]]

Sec.  158.706. The Department updates documentation of a DHS-CS 
employee's official worksite, if the geographic location where the DHS-
CS employee regularly performs DHS-CS cybersecurity work changes and 
such change impacts the determination of the DHS-CS employee's official 
worksite under paragraph (a) of this section and such change is expected 
to last, or does last, for six months or more.



Sec.  158.705  Work scheduling.

    (a) Work scheduling system. The Secretary or designee establishes 
and administers a work scheduling system for DHS-CS employees to ensure:
    (1) Agility for the Department in scheduling DHS-CS cybersecurity 
work to execute the DHS cybersecurity mission;
    (2) Availability of DHS-CS employees to perform the DHS-CS 
cybersecurity work of their assignments;
    (3) Clear expectations for DHS-CS employees about when they are 
expected to perform DHS-CS cybersecurity work associated with their 
assignments;
    (4) Flexibility for DHS-CS employees in scheduling and performing 
DHS-CS cybersecurity work associated with their assignments; and
    (5) Recording of, accounting for, and monitoring of hours worked by 
DHS-CS employees.
    (b) Definitions. For purposes of this section--
    (1) Work period means a two-week period of 14 consecutive days that 
begins on a Sunday and ends on a Saturday, and is the equivalent of a 
biweekly pay period defined in 5 U.S.C. 5504 and 5 CFR part 550, subpart 
F.
    (2) Minimum hours of work means the minimum number of hours that a 
DHS-CS employee is required to work, or account for with time-off, 
during a work period, and is the equivalent to the term basic work 
requirement defined in 5 U.S.C. 6121.
    (3) Time-off means leave under Sec.  158.651, time-off under Sec.  
158.652, and recognition time-off under Sec.  158.633, or other time-off 
of duty available for DHS-CS employees.
    (4) Full-time schedule means 80 hours per work period.
    (5) Part-time schedule means a specified number of hours less than 
80 hours per work period. When DHS-CS cybersecurity work associated with 
a DHS-CS employee's assignment regularly requires the DHS-CS employee to 
exceed that employee's specified number of hours per work period, the 
Department considers, with input from the employee and the employee's 
supervisor, whether to change the employee's work schedule from part-
time to full-time to ensure appropriate compensation under this part, 
including accrual of leave under Sec.  158.651 and the DHS-CS employee's 
share of health benefits premiums provided under Sec.  158.653.
    (6) Contingent schedule means an irregular number of hours up to 80 
hours per work period. A contingent schedule is appropriate only when 
the DHS-CS cybersecurity work associated with a DHS-CS employee's 
assignment is sporadic and cannot be regularly scheduled in advance. 
When DHS-CS cybersecurity work associated with a DHS-CS employee's 
assignment is able to be scheduled in advance on a regular basis, the 
Department changes the employee's work schedule from contingent to part-
time or full-time, as appropriate, to ensure appropriate compensation 
under this part, including accrual of leave under Sec.  158.651 and the 
DHS-CS employee's share of health benefits premiums provided under Sec.  
158.653.
    (c) Employee work schedules. (1) A DHS-CS employee's work schedule, 
and any minimum hours of work associated with the employee's schedule, 
is determined at the time of appointment and recorded as part of 
documenting the employee's appointment to a qualified position under 
Sec.  158.706. A DHS-CS employee on a contingent schedule does not have 
a minimum number of hours of work but has a maximum number of total 
hours for the employee's appointment that is determined at the time of 
appointment and recorded as part of documenting the employee's 
appointment to a qualified position under Sec.  158.706.
    (2) A DHS-CS employee's work schedule, and any minimum hours of 
work, may change during the employee's service in a qualified position 
and the

[[Page 371]]

Department records any such changes in the documentation associated with 
the employee's qualified position under Sec.  158.706.
    (d) Work schedule requirements. (1) DHS-CS employees are expected to 
perform DHS-CS cybersecurity work associated with their assignments to 
execute the DHS cybersecurity mission, especially in response to exigent 
circumstances and emergencies, including cybersecurity incidents defined 
in 6 U.S.C. 659, without entitlement to more compensation than the 
employee's salary described in Sec.  158.603. Hours worked by a DHS-CS 
employee that exceed the employee's minimum hours of work do not affect 
the employee's salary or result in any automatic compensation, including 
a type of additional compensation.
    (2) A DHS-CS employee on a full-time schedule is expected to work at 
least 80 hours per work period.
    (3) A DHS-CS employee on a part-time schedule is expected to work at 
least the employee's specified number of hours of work per work period.
    (4) A DHS-CS employee on a contingent schedule is expected to work 
as necessary to perform the DHS-CS cybersecurity work associated with 
the employee's assignment, not to exceed the maximum number of total 
hours for the employee's appointment.
    (5) DHS-CS employees must report hours worked by the employee. The 
Department monitors such hours for purposes of managing the DHS-CS, 
including considering any changes to DHS-CS employees' schedules, and 
administering compensation, including assisting in consideration of any 
additional compensation for DHS-CS employees under Sec.  158.642.
    (6) A DHS-CS employee on a full-time schedule or a part-time 
schedule must account for minimum hours of work by the conclusion of the 
last day of the work period. If the hours worked by the employee are 
less than the employee's minimum hours of work, the employee must use 
time-off approved by the employee's supervisor, or must be placed in an 
appropriate non-pay status for the purposes described in paragraphs 
(a)(1) and (2) of this section, to account for the difference between 
hours actually worked by the employee and the employee's minimum hours 
of work.
    (7) A DHS-CS employee on a full-time schedule or a part-time 
schedule, in coordination with the employee's supervisor, may adjust 
when work hours are completed in a given work period, to ensure time-off 
for religious observance, while also completing minimum hours of work. A 
DHS-CS employee on a contingent schedule, in coordination with the 
employee's supervisor, may adjust when work hours are completed to 
ensure time-off for religious observance.
    (e) Hours worked and compensation. The Department uses the work 
scheduling system described in this section in administering 
compensation under this part, especially salary administration described 
in Sec.  158.622 and the compensation described in Sec. Sec.  158.642, 
158.650, 158.651, and 158.652. In alignment with the compensation 
strategy, described in Sec.  158.601, the work scheduling system:
    (1) Acknowledges the unpredictable nature of cybersecurity work and 
the expectation described in Sec.  158.601(c) about working unusual 
hours and extended hours as needed; and
    (2) Reflects an understanding of the cybersecurity talent market, 
especially current work expectations and arrangements.
    (f) Policy. CTMS policy implementing this section addresses:
    (1) Procedures for determining, recording, and updating as 
necessary, DHS-CS employees' work schedules;
    (2) Procedures for selecting and communicating anticipated work 
hours in advance and communicating variances from those work hours;
    (3) Requirements regarding reporting and monitoring hours worked;
    (4) Procedures for accounting for minimum hours of work; and
    (5) Other work scheduling requirements for DHS-CS employees, 
including DHS-CS employees supporting specific DHS organizations. Such 
requirements may include designated days, hours, core hours, or limits 
on the number of work hours per day;



Sec.  158.706  Recordkeeping.

    (a) Generally. The Department documents an individual's appointment 
to a

[[Page 372]]

qualified position and creates records of a DHS-CS employee's employment 
in the DHS-CS in compliance with 5 U.S.C. 2951 and 5 CFR subchapter A, 
part 9, and subchapter B, parts 293 and 297.
    (b) Documenting a qualified position. The Department documents a 
qualified position established under this part by documenting an 
individual's appointment to a qualified position. Such documentation 
includes a description of the individual's:
    (1) CTMS qualifications and the DHS-CS cybersecurity work that can 
be performed through application of those qualifications;
    (2) Applicable work and career structures established under the work 
valuation system described in Sec.  158.404;
    (3) Salary under the compensation system described in Sec.  158.602;
    (3) Assignment information described in paragraph (e) of this 
section;
    (4) Official worksite described in Sec.  158.704; and
    (5) Work schedule described in Sec.  158.705.
    (c) Updating qualified position documentation. The Department 
updates the documentation associated with a DHS-CS employee's qualified 
position, described in paragraph (a) of this section, to reflect changes 
affecting the employee's qualified position, including any changes to 
the description of information listed in paragraph (a), such as 
enhancements to the employee's CTMS qualifications. Except as necessary 
for purposes of recordkeeping under this section, any update to the 
documentation associated with a DHS-CS employee's qualified position is 
not a promotion, transfer, or reassignment for any other purpose under 5 
U.S.C. or 5 CFR.
    (d) Documenting an assignment. The Department documents a DHS-CS 
employee's initial assignment as part of documenting the employee's 
qualified position under this section. The Department updates the 
documentation associated with a DHS-CS employee's qualified position for 
each of the employee's subsequent assignments described in Sec.  
158.703.
    (e) Assignment information. Documentation of each assignment under 
this section includes the following operational information:
    (1) Statement of cybersecurity work activities;
    (2) Timeframe, such as anticipated duration;
    (3) Primary DHS organization;
    (4) Personnel security requirements;
    (5) Location, such as official worksite determined under Sec.  
158.704;
    (6) Information related to work scheduling under Sec.  158.705; and
    (7) Information related to the performance management program, 
including information relevant to appraisal reviews, mission impact 
reviews, and development reviews, described in subpart H of this part.
    (f) Integrating with existing processes. For purposes of 
recordkeeping for DHS-CS employees, including documenting positions and 
assignments under this section, the Department uses existing Federal 
personnel recordkeeping processes, standards, requirements, and systems 
of record. CTMS policy implementing this section addresses integration 
of the approach to talent management under this part, including 
definitions used in this part, with existing Federal personnel 
recordkeeping processes, standards, requirements, and systems of record, 
as necessary.



Sec.  158.707  Details and opportunities outside DHS.

    (a) DHS-CS employees serving in renewable appointments or continuing 
appointments may be detailed to:
    (1) A position in the excepted service in another agency under 31 
U.S.C. 1535;
    (2) A position in the SES in another agency under 5 CFR 317.903;
    (3) A position in the competitive service in another agency under 31 
U.S.C. 1535 and 5 CFR 300.301, if approved by the Director of the Office 
of Personnel Management;
    (4) Certain offices of the White House under 3 U.S.C.112;
    (5) The Congress under 2 U.S.C. 4301(f);
    (6) An international organization under 5 U.S.C. 3343; or
    (7) Another detail opportunity under other provisions of applicable 
law.

[[Page 373]]

    (b) Individuals from outside the DHS-CS may not be detailed to a 
qualified position.
    (c) DHS-CS employees serving in continuing appointments may be 
assigned to eligible non-Federal organizations under the 
Intergovernmental Personnel Act in accordance with 5 U.S.C. 3371-3375 
and 5 CFR part 334.



Sec.  158.708  Directed assignments.

    (a) Occasionally, the Department may direct a subsequent assignment 
of a DHS-CS employee, and such a directed subsequent assignment may 
require a change in the employee's official worksite, determined under 
Sec.  158.704. For such directed subsequent assignments of a DHS-CS 
employee, the Department pays or reimburses expenses or allowances under 
and in accordance with the Federal Travel Regulations at 41 CFR chapters 
301 and 302, and for such directed assignments that are not temporary, 
DHS provides notice to and consultation with the employee as described 
in this paragraph.
    (b) Directed subsequent assignments expected to last less than six 
months are considered temporary, and for purposes under the Federal 
Travel Regulations at 41 CFR chapters 301 and 302, are temporary duty.
    (c) For such directed subsequent assignments expected to last six 
months or more and with an official worksite in a DHS-CS employee's 
current commuting area, defined in 5 CFR 550.703, the Department 
provides the employee written notice at least 30 calendar days before 
the effective date of the subsequent assignment. This notice requirement 
may be waived only when the employee consents in writing.
    (d) For such directed subsequent assignments expected to last six 
months or more and with an official worksite outside of a DHS-CS 
employee's current commuting area, defined in 5 CFR 550.703, DHS 
consults with the employee on the reasons for, and the employee's 
preferences regarding, the proposed change in assignment. Following such 
consultation, the Department provides the employee written notice at 
least 90 calendar days before the effective date of the assignment. This 
notice requirement may be waived only when the employee consents in 
writing.



Sec.  158.709  Exemption from other laws regarding deployment.

    The provisions of laws, among other similar laws, listed in 
Sec. Sec.  158.405, 158.502, and 158.605 do not apply under CTMS, to the 
DHS-CS, or to talent management involving the individuals described in 
Sec.  158.103.



                       Subpart H_Developing Talent

    Authority: 5 U.S.C. Chapters 41 and 43; 5 CFR parts 410 and 430.



Sec.  158.801  Definitions.

    As used in this subpart:
    Appraisal has the same meaning as that term in 5 CFR 430.203.
    Appraisal period has the same meaning as that term in 5 CFR 430.203.
    Appraisal program has the same meaning as that term in 5 CFR 
430.203.
    Appraisal system and performance appraisal system have the same 
meanings as those terms in 5 CFR 430.203.
    Mission impact has the same meaning as defined in Sec.  158.104.
    Performance has the same meaning as that term in 5 CFR 430.203.
    Performance rating has the same meaning as that term in 5 CFR 
430.203.
    Progress review has the same meaning as that term in 5 CFR 430.203.
    Rating of record has the same meaning as that term in 5 CFR 430.203.



Sec.  158.802  Performance management program.

    (a) In alignment with the DHS-CS's core values described in Sec.  
158.305 and the compensation strategy described in Sec.  158.601, the 
Secretary or designee establishes and administers a systematic 
performance management program to:
    (1) Establish and maintain individual accountability among DHS-CS 
employees;
    (2) Manage, recognize, and develop the performance of each DHS-CS 
employee; and
    (3) Improve effectiveness of DHS-CS employees in executing the DHS 
cybersecurity mission.
    (b) The performance management program comprises the following 
ongoing reviews:
    (1) Appraisal reviews described in Sec.  158.804;

[[Page 374]]

    (2) Mission impact reviews described in Sec.  158.805; and
    (3) Development reviews described in Sec.  158.806.
    (c) To complete appraisal reviews, mission impact reviews, and 
development reviews for a DHS-CS employee, the Department may collect, 
on a periodic or ongoing basis, information and input from:
    (1) The DHS-CS employee;
    (2) Other DHS-CS employees;
    (3) The employee's supervisor; and
    (4) Other appropriate officials.



Sec.  158.803  Career development program.

    (a) Career development program. In alignment with the DHS-CS's core 
values described in Sec.  158.305 and the compensation strategy 
described in Sec.  158.601, the Secretary or designee establishes and 
administers a career development program to:
    (1) Guide the career progression of each DHS-CS employee;
    (2) Ensure development of the collective expertise of DHS-CS 
employees through continual learning; and
    (3) Ensure continued alignment between the qualifications of DHS-CS 
employees and CTMS qualifications.
    (b) Career progression. Career progression in the DHS-CS is based on 
enhancement of CTMS qualifications and salary progression resulting from 
recognition adjustments under Sec.  158.631. Career progression in the 
DHS-CS is not based on length of service in the DHS-CS or the Federal 
Government. The Department guides the career progression of DHS-CS 
employees using development strategies based on:
    (1) Information from development reviews, described in Sec.  
158.806;
    (2) Mission-related requirements; and
    (3) Strategic talent priorities.
    (c) Commitment to continual learning. The Department establishes, 
maintains, and communicates criteria for continual learning. Such 
criteria include recommended and required learning activities, including 
completion of specific courses of study, completion of mission-related 
training defined in 5 CFR 410.101, performance of certain DHS-CS 
cybersecurity work as part of assignments, and participation in 
opportunities for professional development and training described in 
Sec.  158.640. The Department aims to utilize all available 
opportunities for DHS-CS employee development, including opportunities 
under this part and under or based on authorities in 5 U.S.C. and 5 CFR 
relating to continual learning, professional development, and training, 
as appropriate.
    (d) Verification of qualifications enhancements. The Department 
verifies DHS-CS employees' enhancement of CTMS qualifications, which may 
include review by the CTMB or assessment using standardized instruments 
and procedures designed to measure the extent to which a DHS-CS employee 
has enhanced the employee's qualifications. Verification of enhancement 
to CTMS qualifications may require updating the documentation associated 
with the employee's qualified position, as described in Sec.  158.706.



Sec.  158.804  Appraisal reviews.

    (a) Under 5 U.S.C. Chapter 43 and 5 CFR part 430, the Department 
establishes an appraisal program to review and evaluate the performance 
of DHS-CS employees to ensure DHS-CS employees' individual 
accountability.
    (b) The appraisal program for DHS-CS employees includes one or more 
progress reviews, as defined in 5 CFR 430.203, and an appraisal of an 
employee's performance that results in a rating of record, as defined in 
5 CFR 430.203.
    (c) The Department addresses unacceptable performance, as defined in 
5 U.S.C. 4301(3), under the provisions of 5 CFR part 432 or part 752. 
The CTMB may assist with any decision, or action, or both, made under 
the authority in this section and 5 CFR part 430 and 5 CFR part 432 or 
752.
    (d) If the Department determines a DHS-CS employee's performance is 
unacceptable or the employee receives an unacceptable rating of record, 
the employee is ineligible to receive recognition under Sec. Sec.  
158.630 through 158.634 and the employee may be excluded from mission 
impact reviews under Sec.  158.805.



Sec.  158.805  Mission impact reviews.

    (a) The Department reviews a DHS-CS employee's mission impact 
throughout the employee's service in

[[Page 375]]

the DHS-CS and generates a mission impact summary at least annually. The 
Department may conduct mission impact reviews concurrently with 
development reviews.
    (b) In reviewing a DHS-CS employee's mission impact, individually or 
as part of a group of DHS-CS employees, or both, the Department 
considers factors such as:
    (1) Superior application of CTMS qualifications to perform DHS-CS 
cybersecurity work;
    (2) Significant enhancements to CTMS qualifications;
    (3) Special contributions to cybersecurity technologies, techniques, 
tactics, or procedures; and
    (4) Notable improvements to execution of the DHS cybersecurity 
mission.
    (c) The Department uses mission impact summary information to make 
distinctions among DHS-CS employees, such as comparing, categorizing, 
and ranking DHS-CS employees on the basis of mission impact to support 
decisions related to recognition for DHS-CS employees under Sec. Sec.  
158.630 through 158.634.



Sec.  158.806  Development reviews.

    (a) The Department reviews a DHS-CS employee's career progression, 
as described in Sec.  158.803(b) throughout the employee's service in 
the DHS-CS. The Department generates a development summary, at least 
annually, which may include plans for a DHS-CS employee's continual 
learning in alignment with the criteria for continual learning under the 
career development program described in Sec.  158.803.
    (b) As part of development reviews, the Department may compare, 
categorize, and rank DHS-CS employees to support decisions related to 
professional development and training under Sec.  158.640. The 
Department may also use information from development reviews in matching 
subsequent assignments under Sec.  158.703. The Department may conduct 
development reviews concurrently with mission impact reviews.



           Subpart I_Employee Rights, Requirements, and Input



Sec.  158.901  Federal employee rights and processes.

    (a) Adverse actions: Nothing in this part affects the rights of CS 
employees under 5 U.S.C. Chapter 75, 5 U.S.C. 4303, and 5 CFR parts 432 
and 752.
    (b) Reductions in force. The provisions of 5 U.S.C. Chapter 35, 
Subchapter I and 5 CFR part 351 regarding reductions in force apply to 
talent management actions taken under this part.
    (c) Redress with third parties. Nothing in this part affects the 
rights, as provided by law, of a DHS-CS employee to seek review before a 
third party of a talent management action taken under this part 
involving that employee, including seeking review before the:
    (1) Equal Employment Opportunity Commission, regarding 
discrimination under Federal anti-discrimination laws;
    (2) Merit Systems Protection Board, regarding matters such as 
adverse actions under 5 U.S.C. Chapter 75 or Chapter 43 and individual 
rights of action under 5 U.S.C. Chapter 12;
    (3) Office of Special Counsel, regarding matters such as 
whistleblower retaliation and other prohibited personnel practices under 
5 U.S.C. 2302 and the Hatch Act (5 U.S.C. 7321 et seq.); and
    (4) Department of Labor, regarding matters covered by the Uniformed 
Services Employment and Reemployment Rights Act (38 U.S.C. 4301 et 
seq.).
    (d) Back pay. Back pay remains available under 5 U.S.C. 5596 and 5 
CFR part 550, subpart H, for unjustified or unwarranted talent 
management actions.



Sec.  158.902  Ethics requirements.

    (a) DHS-CS employees, including such employees providing 
uncompensated service and DHS-CS advisory appointees, are employees 
covered by the Ethics in Government Act section 101(f)(3), and are 
subject to the criminal conflict of interest rules as well as government 
ethics requirements applicable to Federal employees, including:
    (1) Criminal conflict of interest provisions in 18 U.S.C. 201-209;

[[Page 376]]

    (2) Ethics in Government Act, as amended, and implementing 
regulations in 5 CFR, Chapter XVI, Subchapter B, including financial 
disclosure reporting in 5 CFR part 2634 and the Standards of Ethical 
Conduct for Employees of the Executive Branch in 5 CFR part 2635;
    (3) Supplemental Standards of Ethical Conduct for Employees of the 
Department of Homeland Security in 5 CFR part 4601; and
    (4) Department policy.
    (b) Under the ethics requirements described in paragraph (a) of this 
section, DHS-CS employees must seek approval for certain outside 
activities, comply with ethics program requirements, and other 
applicable laws, including post-government employment restrictions.



Sec.  158.903  Employee input program.

    (a) Program. The Department establishes and administers a program 
for DHS-CS employees to express employment-related concerns and 
recommendations for enhancing CTMS administration and DHS-CS management. 
Under such a program, a DHS-CS employee may request review of certain 
talent management actions related to the employee's employment in the 
DHS-CS or related to the processes, systems, and programs established 
under this part, or both. The Cybersecurity Talent Management Board may 
use information from this program for the periodic evaluation of CTMS 
described in Sec.  158.302.
    (b) Policy. CTMS policy implementing this section addresses:
    (1) Talent management actions covered by the employee input program;
    (2) The process for DHS-CS employees to express input; and
    (3) The interaction of the employee input program with relevant 
processes for redress with third parties of employment-related actions, 
including those described in Sec.  158.901.



                     Subpart J_Advisory Appointments



Sec.  158.1001  Advisory appointments and advisory appointees.

    (a) An advisory appointment is an appointment to a qualified 
position that:
    (1) The Secretary determines is of a policy-determining, policy-
making, or policy-advocating character or involves a close and 
confidential working relationship with the Secretary or other key 
appointed officials;
    (2) Does not have a salary set by statute; and
    (3) Is not required to be filled by an appointment by the President.
    (b) An advisory appointment to a qualified position is treated as a 
Schedule C position under 5 CFR 213.3301 except regarding appointment 
and compensation. Talent management for a DHS-CS advisory appointee is 
in accordance with the provisions of 5 CFR applicable to Schedule C 
appointees, except that appointment and compensation for a DHS-CS 
advisory appointee is governed by this part.
    (c) Employment restrictions such as those concerning the criminal 
conflict of interest statutes, standards of ethical conduct, partisan 
political activity, and contained in laws such as Executive Orders, 
government-wide ethics regulations and the Hatch Act (5 U.S.C. 7321 et 
seq.), apply to a DHS-CS advisory appointee as if the employee were a 
Schedule C appointee.
    (d) The Department tracks and coordinates advisory appointments with 
the Executive Office of the President and the Office of Personnel 
Management (OPM), as appropriate.



Sec.  158.1002  Appointment of advisory appointees.

    (a) Appointment of an individual, including a former DHS-CS 
employee, to an advisory appointment is governed by this subpart J and 
subpart E of this part.
    (b) An individual for appointment to an advisory appointment must 
participate in the assessment program described in Sec.  158.520. The 
Secretary or designee must approve the appointment of an individual to 
an advisory appointment by name, and an individual appointed to an 
advisory appointment serves at the will of the Secretary.
    (c) A DHS-CS advisory appointee may be removed at any time. In 
accordance with 5 U.S.C. 7511(b), the provisions of 5 U.S.C. Chapter 75, 
subchapter II do not apply to talent management actions taken under this 
part for a DHS advisory appointee.

[[Page 377]]

    (d) An advisory appointment terminates no later than the end of the 
term of the U.S. President under which the advisory appointee was 
appointed.
    (e) The Secretary or designee establishes a limit on the number of 
advisory appointments under this subpart J, and the total number of 
advisory appointments under this subpart may not exceed that limit at 
any time.
    (f) The Department may not change an advisory appointment to a 
renewable appointment or continuing appointment.
    (g) The Department may not use an advisory appointment solely or 
primarily for the purpose of detailing any individual to the White 
House.



Sec.  158.1003  Compensation for advisory appointees.

    (a) General. Compensation for a DHS-CS advisory appointee is 
governed by this subpart J and subpart F of this part. A DHS-CS advisory 
appointee may provide uncompensated service and any such service is 
gratuitous service.
    (b) Compensation. As compensation for service in the DHS-CS, a DHS-
CS advisory appointee receives a salary as described in paragraph (c) 
this section, unless the appointee is providing uncompensated service. A 
DHS-CS advisory appointee, except such an employee providing 
uncompensated service, may also receive additional compensation as 
described in paragraph (d) of this paragraph.
    (c) Salary. A DHS-CS advisory appointee receives a salary under the 
salary system described in Sec.  158.610.
    (1) Setting salary. The Department determines the salary for an 
individual accepting an advisory appointment to a qualified position 
under Sec.  158.620.
    (2) Adjusting salary. The Department determines any adjustments to 
salary of a DHS-CS advisory appointee under Sec.  158.621.
    (3) Extended range. A DHS-CS advisory appointee is ineligible for a 
salary in the extended range.
    (4) Local cybersecurity talent market supplement. The Department may 
provide a DHS-CS advisory appointee a local cybersecurity talent market 
supplement under Sec.  158.612.
    (d) Additional compensation. In alignment with the compensation 
strategy in Sec.  158.601, the Department may provide the following 
types of additional compensation to a DHS-CS advisory appointee for the 
purposes of each such type as described under this part and subject to 
the requirements of this section. An individual appointed to an advisory 
appointment is ineligible to receive any type of additional compensation 
under this part as part of an offer of employment in the DHS-CS.
    (1) Types. Additional compensation under CTMS for a DHS-CS advisory 
appointee is:
    (i) Recognition adjustments under Sec.  158.631, except the 
Secretary or designee must approve any such recognition for a DHS-CS 
advisory appointee;
    (ii) Recognition payments under Sec.  158.632, except the Secretary 
or designee must approve any such recognition for a DHS-CS advisory 
appointee;
    (iii) Recognition time-off under Sec.  158.633, except the Secretary 
or designee must approve any such recognition for a DHS-CS advisory 
appointee;
    (iv) Honorary recognition under Sec.  158.634;
    (v) Professional development and training under Sec.  158.640, so 
long as a professional development and training program described in 
Sec.  158.640 explicitly covers DHS-CS advisory appointee and prohibits 
such employees from receiving any payment or reimbursement for costs of 
academic degree training or expenses to obtain professional credentials, 
including examinations to obtain such credentials;
    (vi) Allowances in nonforeign areas under Sec.  158.643; and
    (vii) Other types of compensation, including leave and benefits, 
authorized under Sec. Sec.  158.650 through 158.655 and provided in 
accordance with relevant provisions of other laws.
    (2) Combining types. A DHS-CS advisory appointee may receive any 
type of additional compensation described in paragraph (c)(1) of this 
section in combination with any other such type subject to the 
requirements of subpart F of this part and the requirements and 
restrictions of this section.
    (3) Restrictions. Additional compensation described in paragraph 
(d)(1) of

[[Page 378]]

this section is subject to, and may be limited by:
    (i) The aggregate compensation limit described in Sec.  158.604;
    (ii) Prohibitions in 5 U.S.C. 4508, guidance from the Office of 
Management and Budget and Office of Personnel Management, and any other 
provisions of law governing compensation for political appointees; and
    (iii) Other requirements and restrictions in CTMS policy.
    (e) Compensation administration. For purposes of administering 
compensation under this part for a DHS-CS advisory appointee, the 
Department administers salary and other compensation, including leave, 
based on consideration of the employee's work schedule under the work 
scheduling system described in Sec.  158.705, and may convert the 
appointee's salary into an hourly rate, biweekly rate, or other rate.

                        PARTS 159	199 [RESERVED]

[[Page 379]]



         CHAPTER X--PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD




  --------------------------------------------------------------------
Part                                                                Page
1000            Organization and delegation of powers and 
                    duties of the privacy and Civil 
                    Liberties Oversight Board...............         381
1001            Procedures for disclosure of records under 
                    the Freedom of Information Act..........         383
1002            Implementation of the Privacy Act of 1974...         392
1003            Implementation of the Government in the 
                    Sunshine Act............................         394
1004-1099

 [Reserved]

[[Page 381]]



PART 1000_ORGANIZATION AND DELEGATION OF POWERS AND DUTIES OF THE PRIVACY
AND CIVIL LIBERTIES OVERSIGHT BOARD--Table of Contents



Sec.
1000.1 Purpose.
1000.2 Definitions.
1000.3 Organization.
1000.4 Functions.
1000.5 Delegations of authority.

    Authority: 5 U.S.C. 552.

    Source: 78 FR 33689, June 5, 2013, unless otherwise noted.



Sec.  1000.1  Purpose.

    This part describes the organization of the Board, and the 
assignment of authorities and the responsibilities of the Board, 
individual Board members, and employees.



Sec.  1000.2  Definitions.

    As used in this part:
    Board means the Privacy and Civil Liberties Oversight Board, 
established by the Implementing Recommendations of the 9/11 Commission 
Act of 2007, Public Law 110-53.
    Chairman means the Chairman of the Board, as appointed by the 
President and confirmed by the Senate under section 801(a) of the 
Implementing Recommendations of the 9/11 Commission Act of 2007, Public 
Law 110-53.
    Executive Director means the individual appointed by the Chairman to 
act as the Executive Director (or, in the event the Chairman position is 
vacant, by the Board) to discharge the responsibilities assigned to the 
Executive Director.
    General Counsel means the individual appointed by the Chairman to 
act as the chief legal officer of the Board or, if the General Counsel 
is absent or unavailable, the Deputy General Counsel, or in the event 
both positions are vacant, the individual(s) designated by the Chairman 
(or, in the event the Chairman position is vacant, by the Board) to 
discharge the responsibilities assigned to the General Counsel. If both 
the General Counsel and Deputy General Counsel are absent and 
unavailable for a prolonged period of time, the Chairman (or the Board 
in the event the Chairman position is vacant) may designate any Staff 
Member who is an active member of the bar of any state, territory, or 
the District of Columbia to temporarily discharge the responsibilities 
assigned to the General Counsel until the General Counsel or Deputy 
General Counsel is again available or a successor has been duly 
appointed.
    Member means an individual appointed by the President, with the 
advice and consent of the Senate, to be a member of the Board.

[78 FR 33689, June 5, 2013, as amended at 84 FR 36456, July 29, 2019]



Sec.  1000.3  Organization.

    (a) The Board is comprised of four part-time Board members and a 
full-time Chairman, each appointed by the President with the advice and 
consent of the Senate.
    (b) The Board's staff is comprised of the following:
    (1) Mission staff who assist the Board with its advice, oversight, 
and other mission functions, as described in 42 U.S.C. 2000ee(d) and 6 
CFR 1000.4; and
    (2) Administrative staff who support the Board's operations on a 
variety of administrative matters, such as budget, contracts, 
information technology and information assurance, and security; and
    (3) Legal staff who provide the Board and agency employees with 
legal advice and ethical guidance.

[78 FR 33689, June 5, 2013, as amended at 84 FR 36456, July 29, 2019]



Sec.  1000.4  Functions.

    (a) The Board provides advice and counsel to the President and 
executive departments and agencies to ensure that privacy and civil 
liberties are appropriately considered in proposed legislation, 
regulations, and policies, and in the implementation of new and existing 
legislation, regulations, and policies, related to efforts to protect 
the Nation from terrorism;
    (b) The Board oversees actions by the executive branch relating to 
efforts to protect the Nation from terrorism to

[[Page 382]]

determine whether such actions appropriately protect privacy and civil 
liberties and are consistent with governing laws, regulations, and 
policies regarding privacy and civil liberties; and
    (c) The Board receives and reviews reports and other information 
from privacy and civil liberties officers under 42 U.S.C. 2000ee-1 and, 
when appropriate, makes recommendations to and coordinates the 
activities of privacy and civil liberties officers on relevant 
interagency matters.



Sec.  1000.5  Delegations of authority.

    (a) The Board. The Board is the head of the agency. The Board is 
responsible for the overall planning, direction, and control of the 
agency's agenda. The delegations of authority in this part do not extend 
to the following actions which are reserved to the Board:
    (1) Disposition of all rulemaking and similar proceedings involving 
the promulgation of rules or the issuance of statements of general 
policy.
    (2) Determination of advice or recommendations to the President or 
executive departments and agencies regarding the matters described in 42 
U.S.C. 2000ee(d).
    (3) Determination of the Board's annual agenda or other statement of 
operational priorities; and
    (4) Redelegation to one or more Board members or staff of those 
responsibilities delegated to the Chairman in Sec.  1000.3(b), in the 
event of a vacancy.
    (5) Formulation and implementation of policies designed to assure 
the effective administration of the Board's operations and the efficient 
operations of the staff.
    (6) Any authority that is not delegated by the Board in this part, 
or otherwise vested in officials other than the Board, is reserved to 
the Board. The Board may reverse delegations at any time, and all 
delegated authority reverts to the Board upon the termination or 
expiration of the delegation.
    (b) The Chairman. The Chairman is the executive and administrative 
head of the Board. The Chairman has the authority, duties, and 
responsibilities assigned to the Chairman under 42 U.S.C. 2000ee(h)(5) 
and (j)(1) and is responsible for the agency's day-to-day operations. 
The Chairman is delegated the authority to:
    (1) Exercise control over the Board's management and functioning;
    (2) Implement and execute the Board's budget;
    (3) Develop and effectively use staff support to carry out the 
functions of the Board, including, but not limited to, the supervision 
and removal of Board employees and the assignment and distribution of 
work among staff;
    (4) Convene and preside at all meetings of the Board and ensure that 
every vote and official act of the Board required by law to be recorded 
is accurately and promptly recorded by the General Counsel;
    (5) Redelegate to one or more Board staff persons those 
responsibilities to the Executive Director or General Counsel under this 
part, in the event that either position is unfilled.
    (6) Authorize any officer or employee of the Board to perform a 
function vested in, delegated, or otherwise designated to the Chairman.
    (c) Executive Director. The Executive Director manages the staff and 
assists with the day-to-day operation of the agency. The Executive 
Director is delegated authority to--
    (1) Manage the Board's mission-related projects in accordance with 
the priorities set by the Board;
    (2) Supervise the Board's mission staff; and
    (3) Authorize any officer or employee of the Board to perform a 
function vested in, delegated, or otherwise designated to the Executive 
Director.
    (d) General Counsel. The General Counsel is the Board's chief legal 
officer, and serves as the Board's legal advisor. The General Counsel is 
delegated authority to--
    (1) Serve as the Board's Designated Ethics Official in accordance 
with 5 CFR 2638.202;
    (2) Certify Board votes and conduct other necessary corporate 
secretary functions consistent with Board policies and procedures; and
    (3) Authorize any officer or employee of the Board to perform a 
function vested in, delegated, or otherwise designated to the General 
Counsel.

[[Page 383]]

    (e) Individual Board Members. Any member delegated authority vested 
in the Chairman under paragraph (a) of this section may redelegate that 
authority to one or more Board employees.
    (f) Exercise of authority. In carrying out any functions delegated 
under this part, members and staff are governed in the exercise of those 
functions by all applicable Federal statutes and regulations, and by the 
regulations, orders, and rules of the Board.

[78 FR 33689, June 5, 2013, as amended at 78 FR 38811, June 28, 2013; 84 
FR 36456, July 29, 2019]



PART 1001_PROCEDURES FOR DISCLOSURE OF RECORDS UNDER THE FREEDOM OF
INFORMATION ACT--Table of Contents



Sec.
1001.1 Purpose and scope.
1001.2 Definitions.
1001.3 Availability of records.
1001.4 Categories of exemptions.
1001.5 Requests for records.
1001.6 Responsibility for responding to requests.
1001.7 Administrative appeals.
1001.8 Time frame for Board response.
1001.9 Business information.
1001.10 Fees.
1001.11 Other rights and services.

    Authority: 5 U.S.C. 552, as amended; Executive Order 12600.

    Source: 78 FR 66997, Nov. 8, 2013, unless otherwise noted.



Sec.  1001.1  Purpose and scope.

    The regulations in this part implement the provisions of the FOIA.



Sec.  1001.2  Definitions.

    The following definitions apply to this part:
    Board means the Privacy and Civil Liberties Oversight Board, 
established by the Implementing Recommendations of the 9/11 Commission 
Act of 2007, Public Law 110-53.
    Chairman means the Chairman of the Board, as appointed by the 
President and confirmed by the Senate under section 801(a) of the 
Implementing Recommendations of the 9/11 Commission Act of 2007, Public 
Law 110-53, or any person to whom the Board has delegated authority for 
the matter concerned.
    Chief FOIA Officer means the senior official to whom the Board 
delegated responsibility for efficient and appropriate compliance with 
the FOIA.
    Commercial use request means a FOIA request from or on behalf of a 
person who seeks information for a use or purpose that furthers his or 
her commercial, trade, or profit interests, including pursuit of those 
interests through litigation.
    Confidential business information means trade secrets and 
confidential, privileged, or proprietary business or financial 
information submitted to the Board by a person.
    Direct costs mean in the case of commercial use requesters those 
expenses the Board has actually incurred to search for, duplicate, and 
review documents in response to a FOIA request. Direct costs include, 
but are not limited to, the salary of the employee performing the work 
and costs associated with duplication.
    Educational institution means a preschool, a public or private 
elementary or secondary school, an institution of undergraduate or 
graduate higher education, an institution of professional education, or 
an institution of vocational education, which operates a program or 
programs of scholarly research.
    Fee waiver means the waiver or reduction of processing fees if a 
requester can demonstrate that OMB's Fee Guidelines' standards are 
satisfied, including that the information is in the public interest and 
is not a commercial interest.
    FOIA means the Freedom of Information Act, 5 U.S.C. 552, as amended. 
The FOIA applies to third-party requests for documents concerning the 
general activities of the government and the Board in particular. A 
request by a U.S. citizen or an individual lawfully admitted for 
permanent residence for access to his or her own records is considered a 
Privacy Act request, under the Privacy Act of 1974, 5 U.S.C. 552a, as 
amended. See 6 CFR 1002.3.
    FOIA Officer means the individual to whom the Board has delegated 
authority to carry out the Board's day-to-day FOIA administration.

[[Page 384]]

    FOIA Public Liaison means the individual designated by the Chairman 
to assist FOIA requesters with concerns about the Board's processing of 
their FOIA request, including assistance in resolving disputes.
    Non-commercial scientific institution means an organization operated 
solely for the purpose of conducting scientific research, the results of 
which are not intended to promote any product or research, and not 
operated on a commercial basis.
    Person includes an individual, partnership, corporation, 
association, or public or private organization other than an agency.
    Record means any writing, drawing, map, recording, diskette, DVD, 
CD-ROM, tape, film, photograph, or other documentary material, 
regardless of medium, by which information is preserved, including 
documentary material stored electronically.
    Redact means delete or mark over.
    Representative of the news media means any person or entity that 
gathers information of potential public interest to a segment of the 
public, uses its editorial skills to turn the raw materials into a 
distinct work, and distributes that work to an audience.
    Requester category means one of the three categories in which 
requesters will be placed for the purpose of determining whether a 
requester will be charged fees for search, review, or duplication. They 
are:
    (1) Commercial requestors,
    (2) Non-commercial scientific or educational institutions or news 
media requestors, and
    (3) All other requestors.
    Submitter means any person or entity from whom the Board obtains 
confidential business information, directly or indirectly.
    Unusual circumstances means, to the extent reasonably necessary for 
the proper processing of a FOIA request:
    (1) The need to search for and collect the requested records from 
physically separate facilities;
    (2) The need to search for, collect and appropriately examine a 
voluminous amount of separate and distinct records which are demanded in 
a single request; or
    (3) The need for consultation, which shall be conducted with all 
practicable speed, with another agency having a substantial interest in 
the determination of the request.

[78 FR 66997, Nov. 8, 2013, as amended at 82 FR 34835, July 27, 2017]



Sec.  1001.3  Availability of records.

    (a) In accordance with 5 U.S.C. 552(a)(1), the Board publishes the 
following records in the Federal Register and makes an index of the 
records publicly available:
    (1) Descriptions of the Board's organization and the established 
places at which, the employees from whom, and the methods by which, the 
public may obtain information, submit documents, or obtain decisions;
    (2) Statements of the general course and method by which the Board's 
functions are channeled and determined, including the nature and 
requirements of all formal and informal procedures available;
    (3) Rules of procedure, descriptions of forms available or the 
places at which forms may be obtained, and instructions as to the scope 
and contents of all papers, reports, or examinations;
    (4) Substantive rules of general applicability adopted as authorized 
by law and statements of general policy or interpretations of general 
applicability formulated and adopted by the Board; and
    (5) Each amendment, revision, or repeal of any material listed in 
paragraphs (a)(1) through (4) of this section.
    (b) In accordance with 5 U.S.C. 552(a)(2), the Board shall make the 
following materials available for public inspection and copying:
    (1) Statements of policy and interpretation that have been adopted 
by the Board and not published in the Federal Register;
    (2) Administrative staff manuals and instructions to staff that 
affect a member of the public;
    (3) Copies of all records, regardless of the form or format, which 
have been released to any person under paragraph (c) of this section and 
that, because of their nature or subject matter, the Board determines 
have become or are

[[Page 385]]

likely to become the subject of subsequent requests for substantially 
the same records; and
    (4) A general index of the records referred to in paragraph (b)(3) 
of this section.
    (c) In accordance with 5 U.S.C. 552(a)(3), the Board shall make 
available, upon proper request, as described in section 5 of this part, 
all non-exempt Board records, or portions of records, not previously 
made public under paragraphs (a) and (b) of this section.
    (d) The FOIA applies only to Board records in existence at the time 
of the request; the FOIA does not require that the Board create new 
records in order to respond to FOIA requests. When responsive records 
are located, the Board adopts a presumption of disclosure and openness.



Sec.  1001.4  Categories of exemptions.

    (a) The FOIA does not require disclosure of matters that are:
    (1) Specifically authorized under criteria established by an 
executive order to be kept secret in the interest of national defense or 
foreign policy and are, in fact, properly classified under executive 
order;
    (2) Related solely to the internal personnel rules and practices of 
the Board;
    (3) Specifically exempted from disclosure by statute (other than the 
Government in the Sunshine Act, 5 U.S.C. 552b, as amended), provided 
that such statute:
    (i) Requires that the matters be withheld from the public in such a 
manner as to leave no discretion on the issue, establishes particular 
criteria for withholding, or refers to particular types of matters to be 
withheld; and
    (ii) If enacted after October 28, 2009, specifically cites to 
Exemption 3 of the FOIA, 5 U.S.C. 552(b)(3);
    (4) Trade secrets and commercial or financial information obtained 
from a person and privileged or confidential;
    (5) Inter-agency or intra-agency memoranda or letters, which would 
not be available at law to a party other than an agency in litigation 
with the Board;
    (6) Personnel and medical files and similar files the disclosure of 
which would constitute a clearly unwarranted invasion of personal 
privacy;
    (7) Records or information compiled for law enforcement purposes, 
but only to the extent that the production of such law enforcement 
records or information:
    (i) Could reasonably be expected to interfere with enforcement 
proceedings;
    (ii) Would deprive a person of a right to a fair trial or impartial 
adjudication;
    (iii) Could reasonably be expected to constitute an unwarranted 
invasion of personal privacy;
    (iv) Could reasonably be expected to disclose the identity of a 
confidential source, including a state, local, or foreign agency or 
authority or any private institution that furnished information on a 
confidential basis, and, in the case of a record or information compiled 
by a criminal investigation, or by an agency conducting a lawful 
national security intelligence investigation, information furnished by a 
confidential source;
    (v) Would disclose techniques and procedures for law enforcement 
investigations or prosecutions or would disclose guidelines for law 
enforcement investigations or prosecutions if such disclosure could 
reasonably be expected to risk circumvention of the law; or
    (vi) Could reasonably be expected to endanger the life or physical 
safety of any individual.
    (8) Contained in or related to examination, operating, or condition 
reports prepared by, on behalf of, or for the use of an agency 
responsible for the regulation or supervision of financial institutions; 
or
    (9) Geological and geophysical information and data, including maps, 
concerning wells.
    (b) [Reserved]



Sec.  1001.5  Requests for records.

    (a) You may request copies of records under this part by email to 
[email protected] or in writing addressed to FOIA Officer, Privacy and 
Civil Liberties Oversight Board. Requestors should check the Board's Web 
site at https://www.pclob.gov for the Board's current mailing address. 
Please provide contact information, such as your phone number, email 
address, and/or

[[Page 386]]

mailing address, to assist the Board in communicating with you and 
providing released records.
    (b) Your request shall reasonably describe the records sought with 
sufficient specificity, and when possible, include names, dates, and 
subject matter, in order to permit the FOIA Officer to locate the 
records with a reasonable amount of effort. If the FOIA Officer cannot 
locate responsive records based on your written description, you will be 
notified and advised that further identifying information is necessary 
before the request can be fulfilled. Requesters who are attempting to 
reformulate or modify such a request may discuss their request with the 
Board's FOIA Officer or FOIA Public Liaison. If a request does not 
reasonably describe the records sought, the Board's response to the 
request is likely to be delayed.
    (c) Although requests are considered either FOIA or Privacy Act 
requests, the Board processes requests for records in accordance with 
both laws so as to provide the greatest degree of lawful access while 
safeguarding an individual's personal privacy.
    (d) Your request should specify your preferred form or format 
(including electronic formats) for the records you seek. We will 
accommodate your request if the record is readily available in that form 
or format. When you do not specify the form or format of the response, 
we will provide responsive records in the form or format most convenient 
to us.

[82 FR 34835, July 27, 2017]



Sec.  1001.6  Responsibility for responding to requests.

    (a) In general. The Board delegates authority to grant or deny FOIA 
requests in whole or in part to the FOIA Officer. When conducting a 
search for responsive records, the FOIA Officer generally will search 
for records in existence on the date of the search. If another date is 
used, the FOIA Officer shall inform the requester of the date used.
    (b) Responses. The FOIA Officer will notify you of his or her 
determination to grant or deny your FOIA request in the time frame 
stated in Sec.  1001.8. The Board will release reasonably segregable 
non-exempt information. For any adverse determination, including those 
regarding any disputed fee matter; a denial of a request for a fee 
waiver; or a determination to withhold a record, in whole or in part, 
that a record does not exist or cannot be located; or to deny a request 
for expedited processing; the notice shall include the following 
information:
    (1) The name(s) of any person responsible for the determination to 
deny the request in whole or in part;
    (2) A brief statement of the reason(s) for the denial, including any 
FOIA exemption applied in denying the request. The FOIA Officer will 
indicate, if technically feasible, the amount of information deleted and 
the exemption under which a deletion is made on the released portion of 
the record, unless including that indication would harm an interest 
protected by the exemption;
    (3) An estimate of the volume of information withheld, if 
applicable. This estimate does not need to be provided if it is 
ascertainable based on redactions in partially disclosed records or if 
the disclosure of the estimate would harm an interest protected by an 
applicable FOIA exemption;
    (4) A statement that the adverse determination may be appealed and a 
description of the requirements for an appeal under Sec.  1001.7; and
    (5) A statement notifying you of the assistance available from the 
Board's FOIA Public Liaison and the dispute resolution services offered 
by OGIS.
    (c) Consultations and referrals. (1) Upon receipt of a FOIA request 
for a record within the Board's possession, the FOIA Officer should 
determine if the Board or another federal agency is best able to 
determine eligibility for disclosure under the FOIA. If the FOIA Officer 
determines that another agency is better able to evaluate the 
releasibility of the record, the FOIA Officer shall:
    (1) Upon receipt of a FOIA request for a record within the Board's 
possession, the FOIA Officer should determine if the Board or another 
federal agency is best able to determine eligibility for disclosure 
under the FOIA. As to any such record, the FOIA Officer must proceed in 
one of the following ways:

[[Page 387]]

    (i) Consultation. When records originated with the Board, but 
contain within them information of interest to or originated by another 
agency or Federal Government office, the FOIA Officer must consult with 
that other entity prior to making a release determination.
    (ii) Referral. When the FOIA Officer believes that a different 
agency is best able to determine whether to disclose the record the FOIA 
Officer will refer the responsibility for responding to the request 
regarding that record to that agency (but only if that other department 
or agency is subject to FOIA). Ordinarily, the department or agency that 
originated the record will be presumed best able to determine whether to 
disclose it. However, if the FOIA Officer and the originating agency 
jointly agree that the Board is in the best position to respond 
regarding the record, then the record may be handled as a consultation.
    (2) Whenever a request is made for information that is classified, 
the FOIA Officer shall refer the responsibility for responding to that 
portion of the request to the agency that originated the information, or 
has the primary interest in it, as appropriate. Whenever a record 
contains information that the Board has derivatively classified because 
it contains information classified by another agency, the FOIA Officer 
shall refer the responsibility for responding to the request regarding 
that information to the agency that classified the underlying 
information or originated the record.
    (3) If responsibility for responding to a request is referred to 
another department or agency, the FOIA Officer shall notify you of the 
referral. This notice shall identify the part of the request that has 
been referred and the name of each department or agency to which the 
request, or part of the request, has been referred, when appropriate and 
available, the notice will include a point of contact for the referral 
agency or department.
    (d) Coordination. The standard referral procedure is not appropriate 
where disclosure of the identity of the agency to which the referral 
would be made is classified for national security reasons or otherwise 
could harm an interest protected by an applicable exemption, such as the 
exemptions that protect personal privacy or national security interests. 
For instance, if the Board locates within its files materials 
originating with an Intelligence Community agency, and the involvement 
of that agency in the matter is classified and not publicly 
acknowledged, then to disclose or give attribution to the involvement of 
that Intelligence Community agency could cause national security harms. 
In such an instance, in order to avoid harm to an interest protected by 
an applicable exemption, the Board will coordinate with the originating 
agency to seek its views on the disclosability of the record. The 
release determination for the record that is the subject of the 
coordination will then be conveyed to the requester by the Board.

[78 FR 66997, Nov. 8, 2013, as amended at 82 FR 34836, July 27, 2017]



Sec.  1001.7  Administrative appeals.

    (a) You may appeal an adverse determination related to your FOIA 
request, or the Board's failure to respond to your FOIA request within 
the prescribed time limits, to the Chief FOIA Officer, Privacy and Civil 
Liberties Oversight Board. Requestors should check the Board's Web site 
at https://www.pclob.gov for the Board's current mailing address.
    (b) Your appeal must be in writing, sent to the address posted on 
the Board's Web site in accordance with paragraph (a) of this section, 
and it must be postmarked, or in the case of electronic submissions, 
transmitted, within 90 calendar days after the date of the letter 
denying your request, in whole or in part. The appeal should clearly 
identify the agency determination that is being appealed and the 
assigned case request number. In case of the Board's failure to respond 
within the statutory time frame, you may submit an administrative appeal 
at any time until an agency response has been provided. For the most 
expeditious handling, your appeal letter and envelope, or subject line 
of the electronic transmission, should be marked ``Freedom of 
Information Act appeal.''

[[Page 388]]

    (c) Your appeal letter should state facts and may cite legal or 
other authorities in support of your request.
    (d) On receipt of any appeal involving classified information, the 
Chief FOIA Officer must take appropriate action to ensure compliance 
with applicable classification rules.
    (e) The Chief FOIA Officer shall respond to all administrative 
appeals in writing and within the time frame stated in Sec.  1001.8(d). 
If the decision affirms, in whole or in part, the FOIA Officer's 
determination, the letter shall contain a statement of the reasons for 
the affirmance, including any FOIA exemption(s) applied, and will inform 
you of the FOIA's provisions for court review. If the Chief FOIA Officer 
reverses or modifies the FOIA Officer's determination, in whole or in 
part, you will be notified in writing and your request will be 
reprocessed in accordance with that decision. The Board may work with 
Office of Government Information Services (OGIS) to resolve disputes 
between FOIA requestors and the Board. A requester may also contact OGIS 
in the following ways: Via mail to OGIS, National Archives and Records 
Administration, 8601 Adelphi Road--OGIS, College Park, MD 20740 
(ogis.archives.gov), via email at [email protected], or via the telephone at 
202-741-5770 or 877-684-6448. Facsimile is also available at 202-741-
5769.

[82 FR 34836, July 27, 2017]



Sec.  1001.8  Time frame for Board response.

    (a) In general. The Board ordinarily shall respond to requests 
according to their order of receipt.
    (b) Multi-track processing. The Board may use two or more processing 
tracks by distinguishing between simple and more complex requests based 
on the amount of work or time needed to process the request.
    (c) Initial decisions. The Board shall determine whether to comply 
with a FOIA request within 20 working days after our receipt of the 
request, unless the time frame for response is extended due to unusual 
circumstances as further described in paragraph (f) of this section. A 
request is received by the Board, for purposes of commencing the 20-day 
timeframe for its response, on the day it is received by the FOIA 
Officer or, in any event, not later than ten days after the request is 
first received by any Board office.
    (d) Administrative appeals. The Chief FOIA Officer shall determine 
whether to affirm or overturn a decision subject to administrative 
appeal within 20 working days after receipt of the appeal, unless the 
time frame for response is extended in accordance with subsection (e) of 
this section.
    (e) Tolling timelines. We may toll the 20-day timeframe set forth in 
paragraphs (c) or (d) of this section:
    (1) One time to await information that we reasonably requested from 
you, as permitted by 5 U.S.C. 552(a)(6)(A)(iii)(I);
    (2) As necessary to clarify with you issues regarding the fee 
assessment.
    (3) If we toll the time frame for response under paragraphs (e)(1) 
or (2) of this section, the tolling period ends upon our receipt of your 
response.
    (f) Unusual circumstances. In the event of unusual circumstances, we 
may extend the time frame for response provided in paragraphs (c) or (d) 
of this section by providing you with written notice of the unusual 
circumstances and the date on which a determination is expected to be 
made. Where the extension is for more than ten working days, we will 
provide you with an opportunity either to modify your request so that it 
may be processed within the statutorily-prescribed time limits or to 
arrange an alternative time period for processing your request or 
modified request.
    (g) Aggregating requests. When we reasonably believe that multiple 
requests submitted by a requester, or by a group of requesters acting in 
concert, involving clearly related matters, can be viewed as a single 
request that involves unusual circumstances, we may aggregate the 
requests for the purposes of fees and processing activities, which may 
result in an extension of the processing time.
    (h) Expedited processing. You may request that the Board expedite 
processing of your FOIA request. To receive expedited processing, you 
must demonstrate a compelling need for such processing.

[[Page 389]]

    (1) For requests for expedited processing, a ``compelling need'' 
involves:
    (i) Circumstances in which the lack of expedited treatment could 
reasonably be expected to pose an imminent threat to the life or 
physical safety of an individual; or
    (ii) A request made by a person primarily engaged in disseminating 
information, with a time urgency to inform the public of actual or 
alleged federal government activity.
    (2) Your request for expedited processing must be in writing and may 
be made at the time of the initial FOIA request or at any later time.
    (3) Your request for expedited processing must include a statement, 
certified to be true and correct to the best of your knowledge and 
belief, explaining in detail the basis for requesting expedited 
processing. If you are a person primarily engaged in disseminating 
information, you must establish a particular urgency to inform the 
public about the federal government activity involved in the request.
    (4) The FOIA Officer will decide whether to grant or deny your 
request for expedited processing within ten calendar days of receipt. 
You will be notified in writing of the determination. Appeals of adverse 
decisions regarding expedited processing shall be processed 
expeditiously.



Sec.  1001.9  Business information.

    (a) Designation of confidential business information. In the event a 
FOIA request is made for confidential business information previously 
submitted to the Government by a commercial entity or on behalf of it 
(hereinafter 'submitter'), the regulations in this section apply. When 
submitting confidential business information, you must use a good-faith 
effort to designate, by use of appropriate markings, at the time of 
submission or at a reasonable time thereafter, any portions of your 
submission that you consider to be exempt from disclosure under FOIA 
Exemption 4, 5 U.S.C. 552(b)(4). Your designation will expire ten years 
after the date of submission unless you request, and provide 
justification for, a longer designation period.
    (b) Notice to submitters. Whenever you designate confidential 
business information as provided in paragraph (a) of this section, or 
the Board has reason to believe that your submission may contain 
confidential business information, we will provide you with prompt 
written notice of a FOIA request that seeks your business information. 
The notice shall:
    (1) Give you an opportunity to object to disclosure of your 
information, in whole or in part;
    (2) Describe the business information requested or include copies of 
the requested records or record portions containing the information; and
    (3) Inform you of the time frame in which you must respond to the 
notice.
    (c) Opportunity to object to disclosure. The Board shall allow you a 
reasonable time to respond to the notice described in paragraph (b) of 
this section. If you object to the disclosure of your information, in 
whole or in part, you must provide us with a detailed written statement 
of your objection. The statement must specify all grounds for 
withholding any portion of the information under any FOIA exemption and, 
when relying on FOIA Exemption 4, it must explain why the information is 
a trade secret or commercial or financial information that is privileged 
and confidential. If you fail to respond within the time frame specified 
in the notice, the Board will conclude that you have no objection to 
disclosure of your information. The Board will only consider information 
that we receive within the time frame specified in the notice. Any 
information provided by a submitter under this subpart may itself be 
subject to disclosure under the FOIA.
    (d) Notice of intent to disclose. The Board will consider your 
objection and specific grounds for non-disclosure in deciding whether to 
disclose business information. Whenever the Board decides to disclose 
business information over your objection, we will provide you with 
written notice that includes:
    (1) A statement of the reasons why each of your bases for 
withholding were not sustained;
    (2) A description of the business information to be disclosed; and
    (3) A specified disclosure date, which shall be a reasonable time 
after the notice.

[[Page 390]]

    (e) Exceptions to the notice requirement. The notice requirements of 
paragraphs (c) and (d) of this section shall not apply if:
    (1) The Board determines that the information shall not be 
disclosed;
    (2) The information lawfully has been published or has been 
officially made available to the public;
    (3) Disclosure of the information is required by statute (other than 
the FOIA) or by a regulation issued in accordance with the requirements 
of Executive Order 12600;
    (4) The designation made by the submitter under paragraph (a) of 
this section appears obviously frivolous, except that, in such a case, 
the Board shall, within a reasonable time prior to the date the 
disclosure will be made, give the submitter written notice of the final 
decision to disclose the information.
    (f) Notice to requesters. Whenever we provide a submitter with the 
notice described in paragraph (b) of this section, we also will provide 
notice to the requester that notice and opportunity to object to the 
disclosure are being provided to the submitter. The Board also must 
notify the requester when it notifies the submitter of its intent to 
disclose the requested information, and whenever a submitter files a 
lawsuit to prevent the disclosure of the information.

[78 FR 66997, Nov. 8, 2013, as amended at 82 FR 34836, July 27, 2017]



Sec.  1001.10  Fees.

    (a) We will charge fees that recoup the full allowable direct costs 
we incur in processing your FOIA request. Fees may be charged for 
search, review or duplication. As a matter of administrative discretion, 
the Board may release records without charge or at a reduced rate 
whenever the Board determines that the interest of the United States 
government would be served. We will use the most efficient and least 
costly methods to comply with your request. The Board may charge for 
search time even if no records are located or the records located are 
exempt from disclosure. If the Board fails to comply with the FOIA's 
time limits in which to respond to a request, it may not charge search 
fees, unless the circumstances outlined in paragraph (o) of this section 
are met.
    (b) With regard to manual searches for records, we will charge the 
salary rate(s) (calculated as the basic rate of pay plus 16 percent of 
that basic rate to cover benefits) of the employee(s) performing the 
search.
    (c) In calculating charges for computer searches for records, we 
will charge at the actual direct cost of providing the service, 
including the cost of operating computers and other electronic 
equipment, such as photocopiers and scanners, directly attributable to 
searching for records potentially responsive to your FOIA request and 
the portion of the salary of the operators/programmers performing the 
search.
    (d) We may only charge requesters seeking documents for commercial 
use for time spent reviewing records to determine whether they are 
exempt from mandatory disclosure. Charges may be assessed only for the 
initial review--that is, the review undertaken the first time we analyze 
the applicability of a specific exemption to a particular record or 
portion of a record. Records or portions of records withheld in full 
under an exemption that is subsequently determined not to apply may be 
reviewed again to determine the applicability of other exemptions not 
previously considered. We may assess the costs for such subsequent 
review. No charge will be made for review at the administrative appeal 
stage of exemptions applied at the initial review stage.
    (e) Records will be duplicated at a rate of $.10 per page, except 
that the Board may adjust this rate from time to time by rule published 
in the Federal Register. For copies prepared by computer, such as tapes, 
CDs, DVDs, or printouts, we will charge the actual cost, including 
operator time, of production. For other methods of reproduction or 
duplication, we will charge the actual direct costs of producing the 
document(s). If we estimate that duplication charges are likely to 
exceed $25, we will notify you of the estimated amount of fees, unless 
you indicated in advance your willingness to pay fees as high as those 
anticipated. Our notice will offer you an opportunity to confer with 
Board personnel to reformulate

[[Page 391]]

the request to meet your needs at a lower cost. If the Board notifies 
you that the actual or estimated fees are in excess of $25.00, your 
request will not be considered received and further work will not be 
completed until you commit in writing to pay the actual or estimated 
total fee, or designate some amount of fees you are willing to pay, or 
in the case of a noncommercial use requester who has not yet been 
provided with your statutory entitlements, you designate that you seek 
only that which can be provided by the statutory entitlements. The 
Board's FOIA Officer or Public Liaison are available to assist you in 
reformulating your request to meet your needs at a lower cost.
    (f) We will charge you the full costs of providing you with the 
following services:
    (1) Certifying that records are true copies; or
    (2) Sending records by special methods such as express mail.
    (g) We may assess interest charges on an unpaid bill starting on the 
31st calendar day following the day on which the billing was sent. 
Interest shall be at the rate prescribed in 31 U.S.C. 3717 and will 
accrue from the date of the billing until payment is received by the 
Board.
    (h) We will not charge a search fee for requests by educational 
institutions, non-commercial scientific institutions, or representatives 
of the news media. A search fee will be charged for a commercial use 
request.
    (i) The Board will not charge duplication fees for requests by 
educational institutions, non-commercial scientific institutions, or 
representatives of the news media for a non-commercial use request if 
the agency fails to comply with the FOIA's time limits in which to 
respond to a request.
    (j) Except for a commercial use request, we will not charge you for 
the first 100 pages of duplication and the first two hours of search.
    (k) You may not file multiple requests, each seeking portions of a 
document or documents, solely for the purpose of avoiding payment of 
fees. When the Board reasonably believes that a requester, or a group of 
requesters acting in concert, has submitted requests that constitute a 
single request involving clearly related matters, we may aggregate those 
requests and charge accordingly.
    (l) We may not require you to make payment before we begin work to 
satisfy the request or to continue work on a request, unless:
    (1) We estimate or determine that the allowable charges that you may 
be required to pay are likely to exceed $250; or
    (2) You have previously failed to pay a fee charged within 30 
calendar days of the date of billing.
    (m) In cases in which the Board requires advance payment, the 
request will not be considered received and further work will not be 
completed until the required payment is received. If you do not pay the 
advance payment within 30 calendar days after the date of the Board's 
fee determination, the request will be closed.
    (n) Upon written request, we may waive or reduce fees that are 
otherwise chargeable under this part. If you request a waiver or 
reduction in fees, you must demonstrate that a waiver or reduction in 
fees is in the public interest because disclosure of the requested 
records is likely to contribute significantly to the public 
understanding of the operations or activities of the government and is 
not primarily in your commercial interest. After processing, actual fees 
must exceed $25, for the Board to require payment of fees.
    (o) If the Board has determined that unusual circumstances, as 
defined by the FOIA, apply and more than 5,000 pages are necessary to 
respond to the request, the Board may charge search fees, or, in the 
case of requesters described in paragraph (h) of this section, may 
charge duplication fees, if the following steps are taken. The Board 
must have provided timely written notice of unusual circumstances to the 
requester in accordance with the FOIA and the agency must have discussed 
with the requester via written mail, email, or telephone (or made not 
less than three good-faith attempts to do so) how the requester could 
effectively limit the scope of the request in accordance with 5 U.S.C. 
552(a)(6)(B)(ii). If this exception is satisfied, the Board

[[Page 392]]

may charge all applicable fees incurred in the processing of the 
request.

[82 FR 34847, July 27, 2017]



Sec.  1001.11  Other rights and services.

    Nothing in this subpart shall be construed to entitle any person, as 
of right, to any service or to the disclosure of any record to which 
such person is not entitled under the FOIA.

[82 FR 34837, July 27, 2017]



PART 1002_IMPLEMENTATION OF THE PRIVACY ACT OF 1974--Table of Contents



Sec.
1002.1 Purpose and scope.
1002.2 Definitions.
1002.3 Privacy Act requests.
1002.4 Responses to Privacy Act requests.
1002.5 Administrative appeals.
1002.6 Fees.
1002.7 Penalties.

    Authority: 5 U.S.C. 552a.

    Source: 78 FR 66997, Nov. 8, 2013, unless otherwise noted.



Sec.  1002.1  Purpose and scope.

    The regulations in this part implement the provisions of the Privacy 
Act.



Sec.  1002.2  Definitions.

    The following terms used in this part are defined in the Privacy 
Act: Individual, maintain, record, system of records, statistical 
record, and routine use. The following definitions also apply in this 
part:
    Board means the Privacy and Civil Liberties Oversight Board, 
established by the Implementing Recommendations of the 9/11 Commission 
Act of 2007, Pub. L. 110-53.
    Chairman means the Chairman of the Board, as appointed by the 
President and confirmed by the Senate under section 801(a) of the 
Implementing Recommendations of the 9/11 Commission Act of 2007, Pub. L. 
110-53, or any person to whom the Board has delegated authority in the 
matter concerned.
    General Counsel means the Board's principal legal advisor, or his or 
her designee.
    Privacy Act means the Privacy Act of 1974, 5 U.S.C. 552a, as 
amended.
    Privacy Act Officer means the person designated by the Board to be 
responsible for the day-to-day administration of the Privacy Act.



Sec.  1002.3  Privacy Act requests.

    (a) Requests to determine if you are the subject of a record. You 
may request that the Board inform you if we maintain a system of records 
that contains records about you. Your request must follow the procedures 
described in paragraph (b) of this section.
    (b) Requests for access. You may request access to a Board record 
about you in writing or by appearing in person. You should direct your 
request to the Privacy Act Officer. Written requests may be sent to: 
Privacy Act Officer, Privacy and Civil Liberties Oversight Board, 2100 K 
Street NW., Suite 500, Washington, DC 20427. Your request should include 
the following information:
    (1) Your name, address, and telephone number;
    (2) The system(s) of records in which the requested information is 
contained; and
    (3) At your option, authorization for copying expenses.
    (4) Written requests. In addition to the information described in 
paragraphs (b)(1) through (3) of this section, written requests must 
include a statement affirming your identity, signed by you and witnessed 
by two persons (including witnesses' addresses) or notarized.
    (i) Witnessed. If your statement is witnessed, it must include a 
sentence above the witnesses' signatures attesting that they personally 
know you or that you have provided satisfactory proof of your identity.
    (ii) Notarized. If your statement is notarized, you must provide the 
notary with adequate proof of your identity in the form of a drivers' 
license, passport, or other identification acceptable to the notary.
    (iii) The Board, in its discretion, may require additional proof of 
identification depending on the nature and sensitivity of the records in 
the system of records.
    (iv) For the quickest possible handling, your letter and envelope 
should be marked ``Privacy Act Request''.
    (5) In person requests. In addition to the information described in 
paragraphs (b)(1) through (3) of this section,

[[Page 393]]

if you make your request in person, you must provide adequate proof of 
identification at the time of your request. Adequate proof of 
identification includes a valid drivers' license, valid passport, or 
other current identification that includes your address and photograph.
    (c) Requests for amendment or correction of records. You may request 
an amendment to or correction of a record about you in person or by 
writing to the Privacy Act Officer following the procedures described in 
paragraph (b) of this section. Your request for amendment or correction 
should identify each particular record at issue, state the amendment or 
correction sought, and describe why the record is not accurate, 
relevant, timely, or complete.
    (d) Requests for an accounting of disclosures. Except for those 
disclosures for which the Privacy Act does not require an accounting, 
you may request an accounting of any disclosure by the Board of a record 
about you. Your request for an accounting of disclosures must be made in 
writing following the procedures described in subsection (b) of this 
section.
    (e) Requests for access on behalf of someone else. (1) If you are 
making a request on behalf of someone else, your request must include a 
statement from that individual verifying his or her identity, as 
provided in paragraph (b)(4) of this section. Your request also must 
include a statement certifying that individual's agreement that records 
about him or her may be released to you.
    (2) If you are the parent or guardian of the individual to whom the 
requested record pertains, or the individual to whom the record pertains 
has been deemed incompetent by a court, your request for access to 
records about that individual must include:
    (i) The identity of the individual who is the subject of the record, 
including his or her name, current address, and date and place of birth;
    (ii) Verification of your identity in accordance with paragraph 
(b)(4) of this section;
    (iii) Verification that you are the subject's parent or guardian, 
which may be established by a copy of the subject's birth certificate 
identifying you as his or her parent, or a court order establishing you 
as guardian; and
    (iv) A statement certifying that you are making the request on the 
subject's behalf.



Sec.  1002.4  Responses to Privacy Act requests.

    (a) Acknowledgement. The Privacy Act Officer shall provide you with 
a written acknowledgment of your written request under section 3 within 
ten business days of our receipt of your request.
    (b) Grants of requests. If you make your request in person, the 
Privacy Act Officer shall respond to your request directly, either by 
granting you access to the requested records, upon payment of any 
applicable fee and with a written record of the grant of your request 
and receipt of the records, or by informing you when a response may be 
expected. If you are accompanied by another person, you must authorize 
in writing any discussion of the records in the presence of the third 
person. If your request is in writing, the Privacy Act Officer shall 
provide you with written notice of the Board's decision to grant your 
request and the amount of any applicable fee. The Privacy Act Officer 
shall disclose the records to you promptly, upon payment of any 
applicable fee.
    (c) Denials of requests in whole or in part. The Privacy Act Officer 
shall notify you in writing of his or her determination to deny, in 
whole or in part, your request. This writing shall include the following 
information:
    (1) The name and title or position of the person responsible for the 
denial;
    (2) A brief statement of the reason for the denial(s), including any 
applicable Privacy Act exemption;
    (3) A statement that you may appeal the denial and a brief 
description of the requirements for appeal under Sec.  1002.5.
    (d) Request for records not covered by the Privacy Act or subject to 
Privacy Act exemption. If the Privacy Act Officer determines that a 
requested record is not subject to the Privacy Act or the records are 
subject to Privacy Act exemption, your request will be processed

[[Page 394]]

in accordance with the Board's Freedom of Information Act procedures at 
6 CFR part 1001.



Sec.  1002.5  Administrative appeals.

    Appeal procedures.
    (1) You may appeal any decision by the Board to deny, in whole or in 
part, your request under Sec.  1002.3 no later than 60 days after the 
decision is rendered.
    (2) Your appeal must be in writing, sent to the General Counsel at 
the address specified in Sec.  1002.3(b) and contain the following 
information:
    (i) Your name;
    (ii) Description of the record(s) at issue;
    (iii) The system of records in which the record(s) is contained;
    (iv) A statement of why your request should be granted.
    (3) The General Counsel shall determine whether to uphold or reverse 
the initial determination within 30 working days of our receipt of your 
appeal. The General Counsel shall notify you of his or her decision, 
including a brief statement of the reasons for the decision, in writing. 
The General Counsel's decision will be the final action of the Board.
    (b) Statement of disagreement. If your appeal of our determination 
related to your request for amendment or correction is denied in whole 
or in part, you may file a Statement of Disagreement that states the 
basis for your disagreement with the denial. Statements of Disagreement 
must be concise and must clearly identify each part of any record that 
is disputed. The Privacy Act Officer will place your Statement of 
Disagreement in the system of records in which the disputed record is 
maintained and shall mark the disputed record to indicate that a 
Statement of Disagreement has been filed and where it may be found.
    (c) Notification of amendment, correction, or disagreement. Within 
30 working days of the amendment or correction of a record, the Privacy 
Act Officer shall notify all persons, organizations, or agencies to 
which the Board previously disclosed the record, if an accounting of 
that disclosure was made, that the record has been corrected or amended. 
If you filed a Statement of Disagreement, the Privacy Act Officer shall 
append a copy of it to the disputed record whenever it is disclosed and 
also may append a concise statement of its reason(s) for denying the 
request to amend or correct the record.



Sec.  1002.6  Fees.

    We will not charge a fee for search or review of records requested 
under this part, or for the correction of records. If you request copies 
of records, we may charge a fee of $.10 per page.



Sec.  1002.7  Penalties.

    Any person who makes a false statement in connection with any 
request for a record or an amendment or correction thereto under this 
part is subject to the penalties prescribed in 18 U.S.C. 494 and 495 and 
5 U.S.C. 552a(i)(3).




PART 1003_IMPLEMENTATION OF THE GOVERNMENT IN THE SUNSHINE ACT-
-Table of Contents



Sec.
1003.1 Purpose and scope.
1003.2 Definitions.
1003.3 Open meetings.
1003.4 Procedures for public announcement of meetings.
1003.5 Grounds on which meetings may be closed or information withheld.
1003.6 Procedures for closing meetings or withholding information, and 
          requests by affected persons to close a meeting.
1003.7 Changes following public announcement.
1003.8 Transcripts, recordings, or minutes of closed meetings.
1003.9 Public availability and retention of transcripts, recordings, and 
          minutes, and applicable fees.

    Authority: 5 U.S.C. 552b.

    Source: 78 FR 67002, Nov. 8, 2013, unless otherwise noted.



Sec.  1003.1  Purpose and scope.

    (a) The regulations in this part implement the provisions of the 
Sunshine Act.
    (b) Requests for all records other than those described in Sec.  
1003.9, shall be governed by the Board's Freedom of Information Act 
procedures at 6 CFR part 1001.

[[Page 395]]



Sec.  1003.2  Definitions.

    The following definitions apply in this part:
    Board means the Privacy and Civil Liberties Oversight Board, 
established by the Implementing Recommendations of the 9/11 Commission 
Act of 2007, Public Law 110-53.
    Chairman means the Chairman of the Board, as appointed by the 
President and confirmed by the Senate under section 801(a) of the 
Implementing Recommendations of the 9/11 Commission Act of 2007, Public 
Law 110-53, or any person to whom the Board delegated authority in the 
matter concerned.
    General Counsel means the Board's principal legal advisor, or his or 
her designee.
    Meeting means the deliberations of three or more Board members that 
determine or result in the joint conduct or disposition of official 
Board business. A meeting does not include:
    (1) Notational voting or similar consideration of business for the 
purpose of recording votes, whether by circulation of material to 
members' individually in writing or by a polling of the members 
individually by phone.
    (2) Action by three or more members to:
    (i) Open or close a meeting or to release or withhold information 
pursuant to section 1003.6 of this part;
    (ii) Set an agenda for a proposed meeting;
    (iii) Call a meeting on less than seven days' notice, as permitted 
by Sec.  1003.4; or
    (iv) Change the subject matter or the determination to open or to 
close a publicly announced meeting under Sec.  1003.7.
    (3) A session attended by three or more members for the purpose of 
having the Board's staff or expert consultants, another federal agency, 
or other persons or organizations brief or otherwise provide information 
to the Board concerning any matters within the purview of the Board, 
provided that the members do not engage in deliberations that determine 
or result in the joint conduct or disposition of official business on 
such matters.
    (4) A gathering of members for the purpose of holding informal, 
preliminary discussions or exchanges of views which do not effectively 
predetermine official action.
    Member means an individual duly appointed and confirmed to the 
Board.
    Public observation means attendance by the public at a meeting of 
the Board, but does not include public participation.
    Public participation means the presentation or discussion of 
information, raising of questions, or other manner of involvement in a 
meeting of the Board by the public in a manner that contributes to the 
disposition of official Board business.
    Sunshine Act means the Government in the Sunshine Act, 5 U.S.C. 
552b.



Sec.  1003.3  Open meetings.

    (a) Except as otherwise provided in this part, every portion of a 
Board meeting shall be open to public observation.
    (b) Board meetings, or portions thereof, shall be open to public 
participation when an announcement to that effect is published under 
Sec.  1003.4. Public participation shall be conducted in an orderly, 
non-disruptive manner and in accordance with any procedures the Chairman 
may establish. Public participation may be terminated for good cause as 
determined by the Board upon the advice of the General Counsel based on 
unanticipated developments.



Sec.  1003.4  Procedures for public announcement of meetings.

    (a) Except as otherwise provided in this section, the Board shall 
make a public announcement at least seven days prior to a meeting. The 
public announcement shall include:
    (1) The time and place of the meeting;
    (2) The subject matter of the meeting;
    (3) Whether the meeting is to be open, closed, or portions of a 
meeting will be closed;
    (4) Whether public participation will be allowed;
    (5) The name and telephone number of the person who will respond to 
requests for information about the meeting;
    (b) The seven day prior notice required by paragraph (a) of this 
section may be reduced only if:

[[Page 396]]

    (1) A majority of all members determine by recorded vote that Board 
business requires that such meeting be scheduled in less than seven 
days; and
    (2) The public announcement required by this section is made at the 
earliest practicable time.
    (c) When a meeting has been called by the Chairman, the notice shall 
contain such agenda items as the Chairman designates. The notice shall 
be circulated to Members in advance of publication and Members, by 
majority vote, may add additional agenda items.
    (d) When a meeting is called by a majority of Members, the notice 
shall contain such agenda items as have been approved by a majority of 
the Board.
    (e) The Executive Director will ensure that the final agenda for the 
meeting conforms to the notice published in the Federal Register.
    (f) If public notice is provided by means other than publication in 
the Federal Register, notice will be promptly submitted to the Federal 
Register for publication.

[78 FR 67002, Nov. 8, 2013, as amended at 82 FR 34838, July 27, 2017]



Sec.  1003.5  Grounds on which meetings may be closed or information
withheld.

    A meeting, or portion thereof, may be closed and information 
pertinent to such meeting withheld if the Board determines that the 
meeting or release of information is likely to disclose matters that 
are:
    (a) Specifically authorized under criteria established by an 
executive order to be kept secret in the interests of national defense 
or foreign policy; and, in fact, are properly classified pursuant to 
such executive order. In making the determination that this exemption 
applies, the Board shall rely on the classification assigned to the 
document or assigned to the information from the federal agency from 
which the document was received.
    (b) Related solely to the internal personnel rules and practices of 
the Board;
    (c) Specifically exempt from disclosure by statute (other than 5 
U.S.C. 552), provided that such statute:
    (1) Requires that the matters be withheld from the public in such a 
manner as to leave no discretion on the issue; or
    (2) Establishes particular criteria for withholding or refers to 
particular types of matters to be withheld;
    (d) Trade secrets and commercial or financial information obtained 
from a person and privileged or confidential;
    (e) Involved with accusing any person of a crime or formally 
censuring any person;
    (f) Of a personal nature, if disclosure would constitute a clearly 
unwarranted invasion of personal privacy;
    (g) Either investigatory records compiled for law enforcement 
purposes or information which, if written, would be contained in such 
records, but only to the extent that the production of records or 
information would:
    (1) Interfere with enforcement proceedings;
    (2) Deprive a person of a right to either a fair trial or an 
impartial adjudication;
    (3) Constitute an unwarranted invasion of personal privacy;
    (4) Disclose the identity of a confidential source or sources and, 
in the case of a record compiled either by a criminal law enforcement 
authority or by an agency conducting a lawful national security 
intelligence investigation, confidential information furnished only by 
the confidential source(s);
    (5) Disclose investigative techniques and procedures; or
    (6) Endanger the life or physical safety of law enforcement 
personnel;
    (h) Contained in or relating to examination, operating, or condition 
reports prepared by, on behalf of, or for the use of an agency 
responsible for the regulation or supervision of financial institutions;
    (i) If prematurely disclosed, likely to significantly frustrate 
implementation of a proposed action of the Board, except that this 
subsection shall not apply in any instance where the Board has already 
disclosed to the public the content or nature of its proposed action or 
is required by law to make such disclosure on its own initiative prior 
to taking final action on such proposal; and
    (j) Specifically concerned with the Board's issuance of a subpoena, 
or its

[[Page 397]]

participation in a civil action or proceeding, an action in a foreign 
court or international tribunal, or an arbitration, or the initiation, 
conduct, or disposition by the Board of a particular case or formal 
agency adjudication pursuant to the procedures in 5 U.S.C. 554 or 
otherwise involving a determination on the record after opportunity for 
a hearing.



Sec.  1003.6  Procedures for closing meetings or withholding information,
and requests by affected persons to close a meeting.

    (a) A meeting or portion of a meeting may be closed and information 
pertaining to a meeting withheld under Sec.  1003.5 only by vote of a 
majority of members.
    (b) A separate vote of the members shall be taken with respect to 
each meeting or portion of a meeting proposed to be closed and with 
respect to information which is proposed to be withheld. A single vote 
may be taken with respect to a series of meetings or portions of a 
meeting that are proposed to be closed, so long as each meeting or 
portion thereof in the series involves the same particular matter and is 
scheduled to be held no more than 30 days after the initial meeting in 
the series. The vote of each member shall be recorded and no proxies 
shall be allowed.
    (c) A person whose interests may be directly affected by a portion 
of a meeting may request in writing that the Board close that portion 
for any of the reasons referred to in Sec.  1003.5(e), (f) and (g). Upon 
the request of a member, a recorded vote shall be taken whether to close 
such meeting or portion thereof.
    (d) For every meeting closed, the General Counsel shall publicly 
certify that, in his or her opinion, the meeting may be closed to the 
public and shall state each relevant basis for closing the meeting. If 
the General Counsel invokes the bases set forth in Sec.  1003.5(a) or 
(c), he/she shall rely upon the classification or designation assigned 
to the information by the originating agency. A copy of such 
certification, together with a statement by the presiding officer 
setting forth the time and place of the meeting and the persons present, 
shall be retained by the Board as part of the transcript, recording, or 
minutes required by Sec.  1003.8.



Sec.  1003.7  Changes following public announcement.

    (a) The time, place, and agenda items of a meeting following the 
public announcement described in Sec.  1003.4, or the determination of 
the Board to open or close a meeting, or a portion thereof, to the 
public may be changed following public announcement only if:
    (1) A majority of all members determine by recorded vote that Board 
business so requires and that no earlier announcement of the change was 
possible; and
    (2) The Board publicly announces such change and the vote of each 
member thereon at the earliest practicable time.
    (b) Changes to the time, place and agenda items of a meeting called 
by the Chairman pursuant to Sec.  1003.4(c) must be made with the 
concurrence of the Chairman, except that when Members have, by majority 
vote, added additional agenda items, the addition of those agenda items 
does not require the Chairman's concurrence.

[82 FR 34838, July 27, 2017]



Sec.  1003.8  Transcripts, recordings, or minutes of closed meetings.

    Along with the General Counsel's certification and presiding 
officer's statement referred to in Sec.  1003.6(d), the Board shall 
maintain a complete transcript or electronic recording adequate to 
record fully the proceedings of each meeting, or a portion thereof, 
closed to the public. Alternatively, for any meeting closed pursuant to 
Sec.  1003.5(h) or (j), the Board may maintain a set of minutes adequate 
to record fully the proceedings, including a description of each of the 
views expressed on any item and the record of any roll call vote.



Sec.  1003.9  Public availability and retention of transcripts, recordings,
and minutes, and applicable fees.

    (a) The Board shall make available, in a place easily accessible, 
such as www.pclob.gov, to the public the transcript, electronic 
recording, or minutes

[[Page 398]]

of a meeting, except for items of discussion or testimony related to 
matters the Board determines may be withheld under Sec.  1003.6.
    (b) Copies of the nonexempt portions of the transcripts or minutes 
shall be provided upon receipt of the actual costs of the transcription 
or duplication.
    (c) The Board shall maintain meeting transcripts, recordings, or 
minutes of each meeting closed to the public for a period ending at the 
later of two years following the date of the meeting, or one year after 
the conclusion of any Board proceeding with respect to the closed 
meeting.

                       PARTS 1004	1099 [RESERVED]

[[Page 399]]



                              FINDING AIDS




  --------------------------------------------------------------------

  A list of CFR titles, subtitles, chapters, subchapters and parts, and 
an alphabetical list of agencies publishing in the CFR are included in 
the CFR Index and Finding Aids volume to the Code of Federal Regulations 
which is published separately and revised annually.

  Table of CFR Titles and Chapters
  Alphabetical List of Agencies Appearing in the CFR
  List of CFR Sections Affected

[[Page 401]]



                    Table of CFR Titles and Chapters




                     (Revised as of January 1, 2024)

                      Title 1--General Provisions

         I  Administrative Committee of the Federal Register 
                (Parts 1--49)
        II  Office of the Federal Register (Parts 50--299)
       III  Administrative Conference of the United States (Parts 
                300--399)
        IV  Miscellaneous Agencies (Parts 400--599)
        VI  National Capital Planning Commission (Parts 600--699)

                    Title 2--Grants and Agreements

            Subtitle A--Office of Management and Budget Guidance 
                for Grants and Agreements
         I  Office of Management and Budget Governmentwide 
                Guidance for Grants and Agreements (Parts 2--199)
        II  Office of Management and Budget Guidance (Parts 200--
                299)
            Subtitle B--Federal Agency Regulations for Grants and 
                Agreements
       III  Department of Health and Human Services (Parts 300--
                399)
        IV  Department of Agriculture (Parts 400--499)
        VI  Department of State (Parts 600--699)
       VII  Agency for International Development (Parts 700--799)
      VIII  Department of Veterans Affairs (Parts 800--899)
        IX  Department of Energy (Parts 900--999)
         X  Department of the Treasury (Parts 1000--1099)
        XI  Department of Defense (Parts 1100--1199)
       XII  Department of Transportation (Parts 1200--1299)
      XIII  Department of Commerce (Parts 1300--1399)
       XIV  Department of the Interior (Parts 1400--1499)
        XV  Environmental Protection Agency (Parts 1500--1599)
     XVIII  National Aeronautics and Space Administration (Parts 
                1800--1899)
        XX  United States Nuclear Regulatory Commission (Parts 
                2000--2099)
      XXII  Corporation for National and Community Service (Parts 
                2200--2299)
     XXIII  Social Security Administration (Parts 2300--2399)
      XXIV  Department of Housing and Urban Development (Parts 
                2400--2499)
       XXV  National Science Foundation (Parts 2500--2599)
      XXVI  National Archives and Records Administration (Parts 
                2600--2699)

[[Page 402]]

     XXVII  Small Business Administration (Parts 2700--2799)
    XXVIII  Department of Justice (Parts 2800--2899)
      XXIX  Department of Labor (Parts 2900--2999)
       XXX  Department of Homeland Security (Parts 3000--3099)
      XXXI  Institute of Museum and Library Services (Parts 3100--
                3199)
     XXXII  National Endowment for the Arts (Parts 3200--3299)
    XXXIII  National Endowment for the Humanities (Parts 3300--
                3399)
     XXXIV  Department of Education (Parts 3400--3499)
      XXXV  Export-Import Bank of the United States (Parts 3500--
                3599)
     XXXVI  Office of National Drug Control Policy, Executive 
                Office of the President (Parts 3600--3699)
    XXXVII  Peace Corps (Parts 3700--3799)
     LVIII  Election Assistance Commission (Parts 5800--5899)
       LIX  Gulf Coast Ecosystem Restoration Council (Parts 5900--
                5999)
        LX  Federal Communications Commission (Parts 6000--6099)

                        Title 3--The President

         I  Executive Office of the President (Parts 100--199)

                           Title 4--Accounts

         I  Government Accountability Office (Parts 1--199)

                   Title 5--Administrative Personnel

         I  Office of Personnel Management (Parts 1--1199)
        II  Merit Systems Protection Board (Parts 1200--1299)
       III  Office of Management and Budget (Parts 1300--1399)
        IV  Office of Personnel Management and Office of the 
                Director of National Intelligence (Parts 1400--
                1499)
         V  The International Organizations Employees Loyalty 
                Board (Parts 1500--1599)
        VI  Federal Retirement Thrift Investment Board (Parts 
                1600--1699)
      VIII  Office of Special Counsel (Parts 1800--1899)
        IX  Appalachian Regional Commission (Parts 1900--1999)
        XI  Armed Forces Retirement Home (Parts 2100--2199)
       XIV  Federal Labor Relations Authority, General Counsel of 
                the Federal Labor Relations Authority and Federal 
                Service Impasses Panel (Parts 2400--2499)
       XVI  Office of Government Ethics (Parts 2600--2699)
       XXI  Department of the Treasury (Parts 3100--3199)
      XXII  Federal Deposit Insurance Corporation (Parts 3200--
                3299)
     XXIII  Department of Energy (Parts 3300--3399)
      XXIV  Federal Energy Regulatory Commission (Parts 3400--
                3499)
       XXV  Department of the Interior (Parts 3500--3599)

[[Page 403]]

      XXVI  Department of Defense (Parts 3600--3699)
    XXVIII  Department of Justice (Parts 3800--3899)
      XXIX  Federal Communications Commission (Parts 3900--3999)
       XXX  Farm Credit System Insurance Corporation (Parts 4000--
                4099)
      XXXI  Farm Credit Administration (Parts 4100--4199)
    XXXIII  U.S. International Development Finance Corporation 
                (Parts 4300--4399)
     XXXIV  Securities and Exchange Commission (Parts 4400--4499)
      XXXV  Office of Personnel Management (Parts 4500--4599)
     XXXVI  Department of Homeland Security (Parts 4600--4699)
    XXXVII  Federal Election Commission (Parts 4700--4799)
        XL  Interstate Commerce Commission (Parts 5000--5099)
       XLI  Commodity Futures Trading Commission (Parts 5100--
                5199)
      XLII  Department of Labor (Parts 5200--5299)
     XLIII  National Science Foundation (Parts 5300--5399)
       XLV  Department of Health and Human Services (Parts 5500--
                5599)
      XLVI  Postal Rate Commission (Parts 5600--5699)
     XLVII  Federal Trade Commission (Parts 5700--5799)
    XLVIII  Nuclear Regulatory Commission (Parts 5800--5899)
      XLIX  Federal Labor Relations Authority (Parts 5900--5999)
         L  Department of Transportation (Parts 6000--6099)
       LII  Export-Import Bank of the United States (Parts 6200--
                6299)
      LIII  Department of Education (Parts 6300--6399)
       LIV  Environmental Protection Agency (Parts 6400--6499)
        LV  National Endowment for the Arts (Parts 6500--6599)
       LVI  National Endowment for the Humanities (Parts 6600--
                6699)
      LVII  General Services Administration (Parts 6700--6799)
     LVIII  Board of Governors of the Federal Reserve System 
                (Parts 6800--6899)
       LIX  National Aeronautics and Space Administration (Parts 
                6900--6999)
        LX  United States Postal Service (Parts 7000--7099)
       LXI  National Labor Relations Board (Parts 7100--7199)
      LXII  Equal Employment Opportunity Commission (Parts 7200--
                7299)
     LXIII  Inter-American Foundation (Parts 7300--7399)
      LXIV  Merit Systems Protection Board (Parts 7400--7499)
       LXV  Department of Housing and Urban Development (Parts 
                7500--7599)
      LXVI  National Archives and Records Administration (Parts 
                7600--7699)
     LXVII  Institute of Museum and Library Services (Parts 7700--
                7799)
    LXVIII  Commission on Civil Rights (Parts 7800--7899)
      LXIX  Tennessee Valley Authority (Parts 7900--7999)
       LXX  Court Services and Offender Supervision Agency for the 
                District of Columbia (Parts 8000--8099)
      LXXI  Consumer Product Safety Commission (Parts 8100--8199)

[[Page 404]]

    LXXIII  Department of Agriculture (Parts 8300--8399)
     LXXIV  Federal Mine Safety and Health Review Commission 
                (Parts 8400--8499)
     LXXVI  Federal Retirement Thrift Investment Board (Parts 
                8600--8699)
    LXXVII  Office of Management and Budget (Parts 8700--8799)
      LXXX  Federal Housing Finance Agency (Parts 9000--9099)
   LXXXIII  Special Inspector General for Afghanistan 
                Reconstruction (Parts 9300--9399)
    LXXXIV  Bureau of Consumer Financial Protection (Parts 9400--
                9499)
    LXXXVI  National Credit Union Administration (Parts 9600--
                9699)
     XCVII  Department of Homeland Security Human Resources 
                Management System (Department of Homeland 
                Security--Office of Personnel Management) (Parts 
                9700--9799)
    XCVIII  Council of the Inspectors General on Integrity and 
                Efficiency (Parts 9800--9899)
      XCIX  Military Compensation and Retirement Modernization 
                Commission (Parts 9900--9999)
         C  National Council on Disability (Parts 10000--10049)
        CI  National Mediation Board (Parts 10100--10199)
       CII  U.S. Office of Special Counsel (Parts 10200--10299)
       CII  U.S. Office of Special Counsel (Parts 10300--10399)
       CIV  Office of the Intellectual Property Enforcement 
                Coordinator (Part 10400--10499)

                      Title 6--Domestic Security

         I  Department of Homeland Security, Office of the 
                Secretary (Parts 1--199)
         X  Privacy and Civil Liberties Oversight Board (Parts 
                1000--1099)

                         Title 7--Agriculture

            Subtitle A--Office of the Secretary of Agriculture 
                (Parts 0--26)
            Subtitle B--Regulations of the Department of 
                Agriculture
         I  Agricultural Marketing Service (Standards, 
                Inspections, Marketing Practices), Department of 
                Agriculture (Parts 27--209)
        II  Food and Nutrition Service, Department of Agriculture 
                (Parts 210--299)
       III  Animal and Plant Health Inspection Service, Department 
                of Agriculture (Parts 300--399)
        IV  Federal Crop Insurance Corporation, Department of 
                Agriculture (Parts 400--499)
         V  Agricultural Research Service, Department of 
                Agriculture (Parts 500--599)
        VI  Natural Resources Conservation Service, Department of 
                Agriculture (Parts 600--699)
       VII  Farm Service Agency, Department of Agriculture (Parts 
                700--799)

[[Page 405]]

      VIII  Agricultural Marketing Service (Federal Grain 
                Inspection Service, Fair Trade Practices Program), 
                Department of Agriculture (Parts 800--899)
        IX  Agricultural Marketing Service (Marketing Agreements 
                and Orders; Fruits, Vegetables, Nuts), Department 
                of Agriculture (Parts 900--999)
         X  Agricultural Marketing Service (Marketing Agreements 
                and Orders; Milk), Department of Agriculture 
                (Parts 1000--1199)
        XI  Agricultural Marketing Service (Marketing Agreements 
                and Orders; Miscellaneous Commodities), Department 
                of Agriculture (Parts 1200--1299)
       XIV  Commodity Credit Corporation, Department of 
                Agriculture (Parts 1400--1499)
        XV  Foreign Agricultural Service, Department of 
                Agriculture (Parts 1500--1599)
       XVI  [Reserved]
      XVII  Rural Utilities Service, Department of Agriculture 
                (Parts 1700--1799)
     XVIII  Rural Housing Service, Rural Business-Cooperative 
                Service, Rural Utilities Service, and Farm Service 
                Agency, Department of Agriculture (Parts 1800--
                2099)
        XX  [Reserved]
       XXV  Office of Advocacy and Outreach, Department of 
                Agriculture (Parts 2500--2599)
      XXVI  Office of Inspector General, Department of Agriculture 
                (Parts 2600--2699)
     XXVII  Office of Information Resources Management, Department 
                of Agriculture (Parts 2700--2799)
    XXVIII  Office of Operations, Department of Agriculture (Parts 
                2800--2899)
      XXIX  Office of Energy Policy and New Uses, Department of 
                Agriculture (Parts 2900--2999)
       XXX  Office of the Chief Financial Officer, Department of 
                Agriculture (Parts 3000--3099)
      XXXI  Office of Environmental Quality, Department of 
                Agriculture (Parts 3100--3199)
     XXXII  Office of Procurement and Property Management, 
                Department of Agriculture (Parts 3200--3299)
    XXXIII  Office of Transportation, Department of Agriculture 
                (Parts 3300--3399)
     XXXIV  National Institute of Food and Agriculture (Parts 
                3400--3499)
      XXXV  Rural Housing Service, Department of Agriculture 
                (Parts 3500--3599)
     XXXVI  National Agricultural Statistics Service, Department 
                of Agriculture (Parts 3600--3699)
    XXXVII  Economic Research Service, Department of Agriculture 
                (Parts 3700--3799)
   XXXVIII  World Agricultural Outlook Board, Department of 
                Agriculture (Parts 3800--3899)
       XLI  [Reserved]

[[Page 406]]

      XLII  Rural Business-Cooperative Service and Rural Utilities 
                Service, Department of Agriculture (Parts 4200--
                4299)
         L  Rural Business-Cooperative Service, and Rural 
                Utilities Service, Department of Agriculture 
                (Parts 5000--5099)

                    Title 8--Aliens and Nationality

         I  Department of Homeland Security (Parts 1--499)
         V  Executive Office for Immigration Review, Department of 
                Justice (Parts 1000--1399)

                 Title 9--Animals and Animal Products

         I  Animal and Plant Health Inspection Service, Department 
                of Agriculture (Parts 1--199)
        II  Agricultural Marketing Service (Fair Trade Practices 
                Program), Department of Agriculture (Parts 200--
                299)
       III  Food Safety and Inspection Service, Department of 
                Agriculture (Parts 300--599)

                           Title 10--Energy

         I  Nuclear Regulatory Commission (Parts 0--199)
        II  Department of Energy (Parts 200--699)
       III  Department of Energy (Parts 700--999)
         X  Department of Energy (General Provisions) (Parts 
                1000--1099)
      XIII  Nuclear Waste Technical Review Board (Parts 1300--
                1399)
      XVII  Defense Nuclear Facilities Safety Board (Parts 1700--
                1799)
     XVIII  Northeast Interstate Low-Level Radioactive Waste 
                Commission (Parts 1800--1899)

                      Title 11--Federal Elections

         I  Federal Election Commission (Parts 1--9099)
        II  Election Assistance Commission (Parts 9400--9499)

                      Title 12--Banks and Banking

         I  Comptroller of the Currency, Department of the 
                Treasury (Parts 1--199)
        II  Federal Reserve System (Parts 200--299)
       III  Federal Deposit Insurance Corporation (Parts 300--399)
        IV  Export-Import Bank of the United States (Parts 400--
                499)
         V  [Reserved]
        VI  Farm Credit Administration (Parts 600--699)
       VII  National Credit Union Administration (Parts 700--799)
      VIII  Federal Financing Bank (Parts 800--899)
        IX  (Parts 900--999)[Reserved]

[[Page 407]]

         X  Consumer Financial Protection Bureau (Parts 1000--
                1099)
        XI  Federal Financial Institutions Examination Council 
                (Parts 1100--1199)
       XII  Federal Housing Finance Agency (Parts 1200--1299)
      XIII  Financial Stability Oversight Council (Parts 1300--
                1399)
       XIV  Farm Credit System Insurance Corporation (Parts 1400--
                1499)
        XV  Department of the Treasury (Parts 1500--1599)
       XVI  Office of Financial Research, Department of the 
                Treasury (Parts 1600--1699)
      XVII  Office of Federal Housing Enterprise Oversight, 
                Department of Housing and Urban Development (Parts 
                1700--1799)
     XVIII  Community Development Financial Institutions Fund, 
                Department of the Treasury (Parts 1800--1899)

               Title 13--Business Credit and Assistance

         I  Small Business Administration (Parts 1--199)
       III  Economic Development Administration, Department of 
                Commerce (Parts 300--399)
        IV  Emergency Steel Guarantee Loan Board (Parts 400--499)
         V  Emergency Oil and Gas Guaranteed Loan Board (Parts 
                500--599)

                    Title 14--Aeronautics and Space

         I  Federal Aviation Administration, Department of 
                Transportation (Parts 1--199)
        II  Office of the Secretary, Department of Transportation 
                (Aviation Proceedings) (Parts 200--399)
       III  Commercial Space Transportation, Federal Aviation 
                Administration, Department of Transportation 
                (Parts 400--1199)
         V  National Aeronautics and Space Administration (Parts 
                1200--1299)
        VI  Air Transportation System Stabilization (Parts 1300--
                1399)

                 Title 15--Commerce and Foreign Trade

            Subtitle A--Office of the Secretary of Commerce (Parts 
                0--29)
            Subtitle B--Regulations Relating to Commerce and 
                Foreign Trade
         I  Bureau of the Census, Department of Commerce (Parts 
                30--199)
        II  National Institute of Standards and Technology, 
                Department of Commerce (Parts 200--299)
       III  International Trade Administration, Department of 
                Commerce (Parts 300--399)
        IV  Foreign-Trade Zones Board, Department of Commerce 
                (Parts 400--499)
       VII  Bureau of Industry and Security, Department of 
                Commerce (Parts 700--799)

[[Page 408]]

      VIII  Bureau of Economic Analysis, Department of Commerce 
                (Parts 800--899)
        IX  National Oceanic and Atmospheric Administration, 
                Department of Commerce (Parts 900--999)
        XI  National Technical Information Service, Department of 
                Commerce (Parts 1100--1199)
      XIII  East-West Foreign Trade Board (Parts 1300--1399)
       XIV  Minority Business Development Agency (Parts 1400--
                1499)
        XV  Office of the Under-Secretary for Economic Affairs, 
                Department of Commerce (Parts 1500--1599)
            Subtitle C--Regulations Relating to Foreign Trade 
                Agreements
        XX  Office of the United States Trade Representative 
                (Parts 2000--2099)
            Subtitle D--Regulations Relating to Telecommunications 
                and Information
     XXIII  National Telecommunications and Information 
                Administration, Department of Commerce (Parts 
                2300--2399) [Reserved]

                    Title 16--Commercial Practices

         I  Federal Trade Commission (Parts 0--999)
        II  Consumer Product Safety Commission (Parts 1000--1799)

             Title 17--Commodity and Securities Exchanges

         I  Commodity Futures Trading Commission (Parts 1--199)
        II  Securities and Exchange Commission (Parts 200--399)
        IV  Department of the Treasury (Parts 400--499)

          Title 18--Conservation of Power and Water Resources

         I  Federal Energy Regulatory Commission, Department of 
                Energy (Parts 1--399)
       III  Delaware River Basin Commission (Parts 400--499)
        VI  Water Resources Council (Parts 700--799)
      VIII  Susquehanna River Basin Commission (Parts 800--899)
      XIII  Tennessee Valley Authority (Parts 1300--1399)

                       Title 19--Customs Duties

         I  U.S. Customs and Border Protection, Department of 
                Homeland Security; Department of the Treasury 
                (Parts 0--199)
        II  United States International Trade Commission (Parts 
                200--299)
       III  International Trade Administration, Department of 
                Commerce (Parts 300--399)
        IV  U.S. Immigration and Customs Enforcement, Department 
                of Homeland Security (Parts 400--599) [Reserved]

[[Page 409]]

                     Title 20--Employees' Benefits

         I  Office of Workers' Compensation Programs, Department 
                of Labor (Parts 1--199)
        II  Railroad Retirement Board (Parts 200--399)
       III  Social Security Administration (Parts 400--499)
        IV  Employees' Compensation Appeals Board, Department of 
                Labor (Parts 500--599)
         V  Employment and Training Administration, Department of 
                Labor (Parts 600--699)
        VI  Office of Workers' Compensation Programs, Department 
                of Labor (Parts 700--799)
       VII  Benefits Review Board, Department of Labor (Parts 
                800--899)
      VIII  Joint Board for the Enrollment of Actuaries (Parts 
                900--999)
        IX  Office of the Assistant Secretary for Veterans' 
                Employment and Training Service, Department of 
                Labor (Parts 1000--1099)

                       Title 21--Food and Drugs

         I  Food and Drug Administration, Department of Health and 
                Human Services (Parts 1--1299)
        II  Drug Enforcement Administration, Department of Justice 
                (Parts 1300--1399)
       III  Office of National Drug Control Policy (Parts 1400--
                1499)

                      Title 22--Foreign Relations

         I  Department of State (Parts 1--199)
        II  Agency for International Development (Parts 200--299)
       III  Peace Corps (Parts 300--399)
        IV  International Joint Commission, United States and 
                Canada (Parts 400--499)
         V  United States Agency for Global Media (Parts 500--599)
       VII  U.S. International Development Finance Corporation 
                (Parts 700--799)
        IX  Foreign Service Grievance Board (Parts 900--999)
         X  Inter-American Foundation (Parts 1000--1099)
        XI  International Boundary and Water Commission, United 
                States and Mexico, United States Section (Parts 
                1100--1199)
       XII  United States International Development Cooperation 
                Agency (Parts 1200--1299)
      XIII  Millennium Challenge Corporation (Parts 1300--1399)
       XIV  Foreign Service Labor Relations Board; Federal Labor 
                Relations Authority; General Counsel of the 
                Federal Labor Relations Authority; and the Foreign 
                Service Impasse Disputes Panel (Parts 1400--1499)
        XV  African Development Foundation (Parts 1500--1599)
       XVI  Japan-United States Friendship Commission (Parts 
                1600--1699)
      XVII  United States Institute of Peace (Parts 1700--1799)

[[Page 410]]

                          Title 23--Highways

         I  Federal Highway Administration, Department of 
                Transportation (Parts 1--999)
        II  National Highway Traffic Safety Administration and 
                Federal Highway Administration, Department of 
                Transportation (Parts 1200--1299)
       III  National Highway Traffic Safety Administration, 
                Department of Transportation (Parts 1300--1399)

                Title 24--Housing and Urban Development

            Subtitle A--Office of the Secretary, Department of 
                Housing and Urban Development (Parts 0--99)
            Subtitle B--Regulations Relating to Housing and Urban 
                Development
         I  Office of Assistant Secretary for Equal Opportunity, 
                Department of Housing and Urban Development (Parts 
                100--199)
        II  Office of Assistant Secretary for Housing-Federal 
                Housing Commissioner, Department of Housing and 
                Urban Development (Parts 200--299)
       III  Government National Mortgage Association, Department 
                of Housing and Urban Development (Parts 300--399)
        IV  Office of Housing and Office of Multifamily Housing 
                Assistance Restructuring, Department of Housing 
                and Urban Development (Parts 400--499)
         V  Office of Assistant Secretary for Community Planning 
                and Development, Department of Housing and Urban 
                Development (Parts 500--599)
        VI  Office of Assistant Secretary for Community Planning 
                and Development, Department of Housing and Urban 
                Development (Parts 600--699) [Reserved]
       VII  Office of the Secretary, Department of Housing and 
                Urban Development (Housing Assistance Programs and 
                Public and Indian Housing Programs) (Parts 700--
                799)
      VIII  Office of the Assistant Secretary for Housing--Federal 
                Housing Commissioner, Department of Housing and 
                Urban Development (Section 8 Housing Assistance 
                Programs, Section 202 Direct Loan Program, Section 
                202 Supportive Housing for the Elderly Program and 
                Section 811 Supportive Housing for Persons With 
                Disabilities Program) (Parts 800--899)
        IX  Office of Assistant Secretary for Public and Indian 
                Housing, Department of Housing and Urban 
                Development (Parts 900--1699)
         X  Office of Assistant Secretary for Housing--Federal 
                Housing Commissioner, Department of Housing and 
                Urban Development (Interstate Land Sales 
                Registration Program) (Parts 1700--1799) 
                [Reserved]
       XII  Office of Inspector General, Department of Housing and 
                Urban Development (Parts 2000--2099)
        XV  Emergency Mortgage Insurance and Loan Programs, 
                Department of Housing and Urban Development (Parts 
                2700--2799) [Reserved]

[[Page 411]]

        XX  Office of Assistant Secretary for Housing--Federal 
                Housing Commissioner, Department of Housing and 
                Urban Development (Parts 3200--3899)
      XXIV  Board of Directors of the HOPE for Homeowners Program 
                (Parts 4000--4099) [Reserved]
       XXV  Neighborhood Reinvestment Corporation (Parts 4100--
                4199)

                           Title 25--Indians

         I  Bureau of Indian Affairs, Department of the Interior 
                (Parts 1--299)
        II  Indian Arts and Crafts Board, Department of the 
                Interior (Parts 300--399)
       III  National Indian Gaming Commission, Department of the 
                Interior (Parts 500--599)
        IV  Office of Navajo and Hopi Indian Relocation (Parts 
                700--899)
         V  Bureau of Indian Affairs, Department of the Interior, 
                and Indian Health Service, Department of Health 
                and Human Services (Part 900--999)
        VI  Office of the Assistant Secretary, Indian Affairs, 
                Department of the Interior (Parts 1000--1199)
       VII  Office of the Special Trustee for American Indians, 
                Department of the Interior (Parts 1200--1299)

                      Title 26--Internal Revenue

         I  Internal Revenue Service, Department of the Treasury 
                (Parts 1--End)

           Title 27--Alcohol, Tobacco Products and Firearms

         I  Alcohol and Tobacco Tax and Trade Bureau, Department 
                of the Treasury (Parts 1--399)
        II  Bureau of Alcohol, Tobacco, Firearms, and Explosives, 
                Department of Justice (Parts 400--799)

                   Title 28--Judicial Administration

         I  Department of Justice (Parts 0--299)
       III  Federal Prison Industries, Inc., Department of Justice 
                (Parts 300--399)
         V  Bureau of Prisons, Department of Justice (Parts 500--
                599)
        VI  Offices of Independent Counsel, Department of Justice 
                (Parts 600--699)
       VII  Office of Independent Counsel (Parts 700--799)
      VIII  Court Services and Offender Supervision Agency for the 
                District of Columbia (Parts 800--899)
        IX  National Crime Prevention and Privacy Compact Council 
                (Parts 900--999)

[[Page 412]]

        XI  Department of Justice and Department of State (Parts 
                1100--1199)

                            Title 29--Labor

            Subtitle A--Office of the Secretary of Labor (Parts 
                0--99)
            Subtitle B--Regulations Relating to Labor
         I  National Labor Relations Board (Parts 100--199)
        II  Office of Labor-Management Standards, Department of 
                Labor (Parts 200--299)
       III  National Railroad Adjustment Board (Parts 300--399)
        IV  Office of Labor-Management Standards, Department of 
                Labor (Parts 400--499)
         V  Wage and Hour Division, Department of Labor (Parts 
                500--899)
        IX  Construction Industry Collective Bargaining Commission 
                (Parts 900--999)
         X  National Mediation Board (Parts 1200--1299)
       XII  Federal Mediation and Conciliation Service (Parts 
                1400--1499)
       XIV  Equal Employment Opportunity Commission (Parts 1600--
                1699)
      XVII  Occupational Safety and Health Administration, 
                Department of Labor (Parts 1900--1999)
        XX  Occupational Safety and Health Review Commission 
                (Parts 2200--2499)
       XXV  Employee Benefits Security Administration, Department 
                of Labor (Parts 2500--2599)
     XXVII  Federal Mine Safety and Health Review Commission 
                (Parts 2700--2799)
        XL  Pension Benefit Guaranty Corporation (Parts 4000--
                4999)

                      Title 30--Mineral Resources

         I  Mine Safety and Health Administration, Department of 
                Labor (Parts 1--199)
        II  Bureau of Safety and Environmental Enforcement, 
                Department of the Interior (Parts 200--299)
        IV  Geological Survey, Department of the Interior (Parts 
                400--499)
         V  Bureau of Ocean Energy Management, Department of the 
                Interior (Parts 500--599)
       VII  Office of Surface Mining Reclamation and Enforcement, 
                Department of the Interior (Parts 700--999)
       XII  Office of Natural Resources Revenue, Department of the 
                Interior (Parts 1200--1299)

                 Title 31--Money and Finance: Treasury

            Subtitle A--Office of the Secretary of the Treasury 
                (Parts 0--50)
            Subtitle B--Regulations Relating to Money and Finance

[[Page 413]]

         I  Monetary Offices, Department of the Treasury (Parts 
                51--199)
        II  Fiscal Service, Department of the Treasury (Parts 
                200--399)
        IV  Secret Service, Department of the Treasury (Parts 
                400--499)
         V  Office of Foreign Assets Control, Department of the 
                Treasury (Parts 500--599)
        VI  Bureau of Engraving and Printing, Department of the 
                Treasury (Parts 600--699)
       VII  Federal Law Enforcement Training Center, Department of 
                the Treasury (Parts 700--799)
      VIII  Office of Investment Security, Department of the 
                Treasury (Parts 800--899)
        IX  Federal Claims Collection Standards (Department of the 
                Treasury--Department of Justice) (Parts 900--999)
         X  Financial Crimes Enforcement Network, Department of 
                the Treasury (Parts 1000--1099)

                      Title 32--National Defense

            Subtitle A--Department of Defense
         I  Office of the Secretary of Defense (Parts 1--399)
         V  Department of the Army (Parts 400--699)
        VI  Department of the Navy (Parts 700--799)
       VII  Department of the Air Force (Parts 800--1099)
            Subtitle B--Other Regulations Relating to National 
                Defense
       XII  Department of Defense, Defense Logistics Agency (Parts 
                1200--1299)
       XVI  Selective Service System (Parts 1600--1699)
      XVII  Office of the Director of National Intelligence (Parts 
                1700--1799)
     XVIII  National Counterintelligence Center (Parts 1800--1899)
       XIX  Central Intelligence Agency (Parts 1900--1999)
        XX  Information Security Oversight Office, National 
                Archives and Records Administration (Parts 2000--
                2099)
       XXI  National Security Council (Parts 2100--2199)
      XXIV  Office of Science and Technology Policy (Parts 2400--
                2499)
     XXVII  Office for Micronesian Status Negotiations (Parts 
                2700--2799)
    XXVIII  Office of the Vice President of the United States 
                (Parts 2800--2899)

               Title 33--Navigation and Navigable Waters

         I  Coast Guard, Department of Homeland Security (Parts 
                1--199)
        II  Corps of Engineers, Department of the Army, Department 
                of Defense (Parts 200--399)
        IV  Great Lakes St. Lawrence Seaway Development 
                Corporation, Department of Transportation (Parts 
                400--499)

[[Page 414]]

                          Title 34--Education

            Subtitle A--Office of the Secretary, Department of 
                Education (Parts 1--99)
            Subtitle B--Regulations of the Offices of the 
                Department of Education
         I  Office for Civil Rights, Department of Education 
                (Parts 100--199)
        II  Office of Elementary and Secondary Education, 
                Department of Education (Parts 200--299)
       III  Office of Special Education and Rehabilitative 
                Services, Department of Education (Parts 300--399)
        IV  Office of Career, Technical, and Adult Education, 
                Department of Education (Parts 400--499)
         V  Office of Bilingual Education and Minority Languages 
                Affairs, Department of Education (Parts 500--599) 
                [Reserved]
        VI  Office of Postsecondary Education, Department of 
                Education (Parts 600--699)
       VII  Office of Educational Research and Improvement, 
                Department of Education (Parts 700--799) 
                [Reserved]
            Subtitle C--Regulations Relating to Education
        XI  [Reserved]
       XII  National Council on Disability (Parts 1200--1299)

                          Title 35 [Reserved]

             Title 36--Parks, Forests, and Public Property

         I  National Park Service, Department of the Interior 
                (Parts 1--199)
        II  Forest Service, Department of Agriculture (Parts 200--
                299)
       III  Corps of Engineers, Department of the Army (Parts 
                300--399)
        IV  American Battle Monuments Commission (Parts 400--499)
         V  Smithsonian Institution (Parts 500--599)
        VI  [Reserved]
       VII  Library of Congress (Parts 700--799)
      VIII  Advisory Council on Historic Preservation (Parts 800--
                899)
        IX  Pennsylvania Avenue Development Corporation (Parts 
                900--999)
         X  Presidio Trust (Parts 1000--1099)
        XI  Architectural and Transportation Barriers Compliance 
                Board (Parts 1100--1199)
       XII  National Archives and Records Administration (Parts 
                1200--1299)
        XV  Oklahoma City National Memorial Trust (Parts 1500--
                1599)
       XVI  Morris K. Udall Scholarship and Excellence in National 
                Environmental Policy Foundation (Parts 1600--1699)

             Title 37--Patents, Trademarks, and Copyrights

         I  United States Patent and Trademark Office, Department 
                of Commerce (Parts 1--199)
        II  U.S. Copyright Office, Library of Congress (Parts 
                200--299)

[[Page 415]]

       III  Copyright Royalty Board, Library of Congress (Parts 
                300--399)
        IV  National Institute of Standards and Technology, 
                Department of Commerce (Parts 400--599)

           Title 38--Pensions, Bonuses, and Veterans' Relief

         I  Department of Veterans Affairs (Parts 0--199)
        II  Armed Forces Retirement Home (Parts 200--299)

                       Title 39--Postal Service

         I  United States Postal Service (Parts 1--999)
       III  Postal Regulatory Commission (Parts 3000--3099)

                  Title 40--Protection of Environment

         I  Environmental Protection Agency (Parts 1--1099)
        IV  Environmental Protection Agency and Department of 
                Justice (Parts 1400--1499)
         V  Council on Environmental Quality (Parts 1500--1599)
        VI  Chemical Safety and Hazard Investigation Board (Parts 
                1600--1699)
       VII  Environmental Protection Agency and Department of 
                Defense; Uniform National Discharge Standards for 
                Vessels of the Armed Forces (Parts 1700--1799)
      VIII  Gulf Coast Ecosystem Restoration Council (Parts 1800--
                1899)
        IX  Federal Permitting Improvement Steering Council (Part 
                1900)

          Title 41--Public Contracts and Property Management

            Subtitle A--Federal Procurement Regulations System 
                [Note]
            Subtitle B--Other Provisions Relating to Public 
                Contracts
        50  Public Contracts, Department of Labor (Parts 50-1--50-
                999)
        51  Committee for Purchase From People Who Are Blind or 
                Severely Disabled (Parts 51-1--51-99)
        60  Office of Federal Contract Compliance Programs, Equal 
                Employment Opportunity, Department of Labor (Parts 
                60-1--60-999)
        61  Office of the Assistant Secretary for Veterans' 
                Employment and Training Service, Department of 
                Labor (Parts 61-1--61-999)
 Chapters 
   62--100  [Reserved]
            Subtitle C--Federal Property Management Regulations 
                System
       101  Federal Property Management Regulations (Parts 101-1--
                101-99)
       102  Federal Management Regulation (Parts 102-1--102-299)
 Chapters 
  103--104  (Parts 103-001--104-099) [Reserved]

[[Page 416]]

       105  General Services Administration (Parts 105-1--105-999)
       109  Department of Energy Property Management Regulations 
                (Parts 109-1--109-99)
       114  Department of the Interior (Parts 114-1--114-99)
       115  Environmental Protection Agency (Parts 115-1--115-99)
       128  Department of Justice (Parts 128-1--128-99)
 Chapters 
  129--200  [Reserved]
            Subtitle D--Federal Acquisition Supply Chain Security
       201  Federal Acquisition Security Council (Parts 201-1--
                201-99).
            Subtitle E [Reserved]
            Subtitle F--Federal Travel Regulation System
       300  General (Parts 300-1--300-99)
       301  Temporary Duty (TDY) Travel Allowances (Parts 301-1--
                301-99)
       302  Relocation Allowances (Parts 302-1--302-99)
       303  Payment of Expenses Connected with the Death of 
                Certain Employees (Part 303-1--303-99)
       304  Payment of Travel Expenses from a Non-Federal Source 
                (Parts 304-1--304-99)

                        Title 42--Public Health

         I  Public Health Service, Department of Health and Human 
                Services (Parts 1--199)
 Chapters 
   II--III  [Reserved]
        IV  Centers for Medicare & Medicaid Services, Department 
                of Health and Human Services (Parts 400--699)
         V  Office of Inspector General-Health Care, Department of 
                Health and Human Services (Parts 1000--1099)

                   Title 43--Public Lands: Interior

            Subtitle A--Office of the Secretary of the Interior 
                (Parts 1--199)
            Subtitle B--Regulations Relating to Public Lands
         I  Bureau of Reclamation, Department of the Interior 
                (Parts 400--999)
        II  Bureau of Land Management, Department of the Interior 
                (Parts 1000--9999)
       III  Utah Reclamation Mitigation and Conservation 
                Commission (Parts 10000--10099)

             Title 44--Emergency Management and Assistance

         I  Federal Emergency Management Agency, Department of 
                Homeland Security (Parts 0--399)

[[Page 417]]

        IV  Department of Commerce and Department of 
                Transportation (Parts 400--499)

                       Title 45--Public Welfare

            Subtitle A--Department of Health and Human Services 
                (Parts 1--199)
            Subtitle B--Regulations Relating to Public Welfare
        II  Office of Family Assistance (Assistance Programs), 
                Administration for Children and Families, 
                Department of Health and Human Services (Parts 
                200--299)
       III  Office of Child Support Enforcement (Child Support 
                Enforcement Program), Administration for Children 
                and Families, Department of Health and Human 
                Services (Parts 300--399)
        IV  Office of Refugee Resettlement, Administration for 
                Children and Families, Department of Health and 
                Human Services (Parts 400--499)
         V  Foreign Claims Settlement Commission of the United 
                States, Department of Justice (Parts 500--599)
        VI  National Science Foundation (Parts 600--699)
       VII  Commission on Civil Rights (Parts 700--799)
      VIII  Office of Personnel Management (Parts 800--899)
        IX  Denali Commission (Parts 900--999)
         X  Office of Community Services, Administration for 
                Children and Families, Department of Health and 
                Human Services (Parts 1000--1099)
        XI  National Foundation on the Arts and the Humanities 
                (Parts 1100--1199)
       XII  Corporation for National and Community Service (Parts 
                1200--1299)
      XIII  Administration for Children and Families, Department 
                of Health and Human Services (Parts 1300--1399)
       XVI  Legal Services Corporation (Parts 1600--1699)
      XVII  National Commission on Libraries and Information 
                Science (Parts 1700--1799)
     XVIII  Harry S. Truman Scholarship Foundation (Parts 1800--
                1899)
       XXI  Commission of Fine Arts (Parts 2100--2199)
     XXIII  Arctic Research Commission (Parts 2300--2399)
      XXIV  James Madison Memorial Fellowship Foundation (Parts 
                2400--2499)
       XXV  Corporation for National and Community Service (Parts 
                2500--2599)

                          Title 46--Shipping

         I  Coast Guard, Department of Homeland Security (Parts 
                1--199)
        II  Maritime Administration, Department of Transportation 
                (Parts 200--399)

[[Page 418]]

       III  Coast Guard (Great Lakes Pilotage), Department of 
                Homeland Security (Parts 400--499)
        IV  Federal Maritime Commission (Parts 500--599)

                      Title 47--Telecommunication

         I  Federal Communications Commission (Parts 0--199)
        II  Office of Science and Technology Policy and National 
                Security Council (Parts 200--299)
       III  National Telecommunications and Information 
                Administration, Department of Commerce (Parts 
                300--399)
        IV  National Telecommunications and Information 
                Administration, Department of Commerce, and 
                National Highway Traffic Safety Administration, 
                Department of Transportation (Parts 400--499)
         V  The First Responder Network Authority (Parts 500--599)

           Title 48--Federal Acquisition Regulations System

         1  Federal Acquisition Regulation (Parts 1--99)
         2  Defense Acquisition Regulations System, Department of 
                Defense (Parts 200--299)
         3  Department of Health and Human Services (Parts 300--
                399)
         4  Department of Agriculture (Parts 400--499)
         5  General Services Administration (Parts 500--599)
         6  Department of State (Parts 600--699)
         7  Agency for International Development (Parts 700--799)
         8  Department of Veterans Affairs (Parts 800--899)
         9  Department of Energy (Parts 900--999)
        10  Department of the Treasury (Parts 1000--1099)
        12  Department of Transportation (Parts 1200--1299)
        13  Department of Commerce (Parts 1300--1399)
        14  Department of the Interior (Parts 1400--1499)
        15  Environmental Protection Agency (Parts 1500--1599)
        16  Office of Personnel Management, Federal Employees 
                Health Benefits Acquisition Regulation (Parts 
                1600--1699)
        17  Office of Personnel Management (Parts 1700--1799)
        18  National Aeronautics and Space Administration (Parts 
                1800--1899)
        19  Broadcasting Board of Governors (Parts 1900--1999)
        20  Nuclear Regulatory Commission (Parts 2000--2099)
        21  Office of Personnel Management, Federal Employees 
                Group Life Insurance Federal Acquisition 
                Regulation (Parts 2100--2199)
        23  Social Security Administration (Parts 2300--2399)
        24  Department of Housing and Urban Development (Parts 
                2400--2499)
        25  National Science Foundation (Parts 2500--2599)

[[Page 419]]

        28  Department of Justice (Parts 2800--2899)
        29  Department of Labor (Parts 2900--2999)
        30  Department of Homeland Security, Homeland Security 
                Acquisition Regulation (HSAR) (Parts 3000--3099)
        34  Department of Education Acquisition Regulation (Parts 
                3400--3499)
        51  Department of the Army Acquisition Regulations (Parts 
                5100--5199) [Reserved]
        52  Department of the Navy Acquisition Regulations (Parts 
                5200--5299)
        53  Department of the Air Force Federal Acquisition 
                Regulation Supplement (Parts 5300--5399) 
                [Reserved]
        54  Defense Logistics Agency, Department of Defense (Parts 
                5400--5499)
        57  African Development Foundation (Parts 5700--5799)
        61  Civilian Board of Contract Appeals, General Services 
                Administration (Parts 6100--6199)
        99  Cost Accounting Standards Board, Office of Federal 
                Procurement Policy, Office of Management and 
                Budget (Parts 9900--9999)

                       Title 49--Transportation

            Subtitle A--Office of the Secretary of Transportation 
                (Parts 1--99)
            Subtitle B--Other Regulations Relating to 
                Transportation
         I  Pipeline and Hazardous Materials Safety 
                Administration, Department of Transportation 
                (Parts 100--199)
        II  Federal Railroad Administration, Department of 
                Transportation (Parts 200--299)
       III  Federal Motor Carrier Safety Administration, 
                Department of Transportation (Parts 300--399)
        IV  Coast Guard, Department of Homeland Security (Parts 
                400--499)
         V  National Highway Traffic Safety Administration, 
                Department of Transportation (Parts 500--599)
        VI  Federal Transit Administration, Department of 
                Transportation (Parts 600--699)
       VII  National Railroad Passenger Corporation (AMTRAK) 
                (Parts 700--799)
      VIII  National Transportation Safety Board (Parts 800--999)
         X  Surface Transportation Board (Parts 1000--1399)
        XI  Research and Innovative Technology Administration, 
                Department of Transportation (Parts 1400--1499) 
                [Reserved]
       XII  Transportation Security Administration, Department of 
                Homeland Security (Parts 1500--1699)

[[Page 420]]

                   Title 50--Wildlife and Fisheries

         I  United States Fish and Wildlife Service, Department of 
                the Interior (Parts 1--199)
        II  National Marine Fisheries Service, National Oceanic 
                and Atmospheric Administration, Department of 
                Commerce (Parts 200--299)
       III  International Fishing and Related Activities (Parts 
                300--399)
        IV  Joint Regulations (United States Fish and Wildlife 
                Service, Department of the Interior and National 
                Marine Fisheries Service, National Oceanic and 
                Atmospheric Administration, Department of 
                Commerce); Endangered Species Committee 
                Regulations (Parts 400--499)
         V  Marine Mammal Commission (Parts 500--599)
        VI  Fishery Conservation and Management, National Oceanic 
                and Atmospheric Administration, Department of 
                Commerce (Parts 600--699)

[[Page 421]]





           Alphabetical List of Agencies Appearing in the CFR




                     (Revised as of January 1, 2024)

                                                  CFR Title, Subtitle or 
                     Agency                               Chapter

Administrative Conference of the United States    1, III
Advisory Council on Historic Preservation         36, VIII
Advocacy and Outreach, Office of                  7, XXV
Afghanistan Reconstruction, Special Inspector     5, LXXXIII
     General for
African Development Foundation                    22, XV
  Federal Acquisition Regulation                  48, 57
Agency for International Development              2, VII; 22, II
  Federal Acquisition Regulation                  48, 7
Agricultural Marketing Service                    7, I, VIII, IX, X, XI; 9, 
                                                  II
Agricultural Research Service                     7, V
Agriculture, Department of                        2, IV; 5, LXXIII
  Advocacy and Outreach, Office of                7, XXV
  Agricultural Marketing Service                  7, I, VIII, IX, X, XI; 9, 
                                                  II
  Agricultural Research Service                   7, V
  Animal and Plant Health Inspection Service      7, III; 9, I
  Chief Financial Officer, Office of              7, XXX
  Commodity Credit Corporation                    7, XIV
  Economic Research Service                       7, XXXVII
  Energy Policy and New Uses, Office of           2, IX; 7, XXIX
  Environmental Quality, Office of                7, XXXI
  Farm Service Agency                             7, VII, XVIII
  Federal Acquisition Regulation                  48, 4
  Federal Crop Insurance Corporation              7, IV
  Food and Nutrition Service                      7, II
  Food Safety and Inspection Service              9, III
  Foreign Agricultural Service                    7, XV
  Forest Service                                  36, II
  Information Resources Management, Office of     7, XXVII
  Inspector General, Office of                    7, XXVI
  National Agricultural Library                   7, XLI
  National Agricultural Statistics Service        7, XXXVI
  National Institute of Food and Agriculture      7, XXXIV
  Natural Resources Conservation Service          7, VI
  Operations, Office of                           7, XXVIII
  Procurement and Property Management, Office of  7, XXXII
  Rural Business-Cooperative Service              7, XVIII, XLII
  Rural Development Administration                7, XLII
  Rural Housing Service                           7, XVIII, XXXV
  Rural Utilities Service                         7, XVII, XVIII, XLII
  Secretary of Agriculture, Office of             7, Subtitle A
  Transportation, Office of                       7, XXXIII
  World Agricultural Outlook Board                7, XXXVIII
Air Force, Department of                          32, VII
  Federal Acquisition Regulation Supplement       48, 53
Air Transportation Stabilization Board            14, VI
Alcohol and Tobacco Tax and Trade Bureau          27, I
Alcohol, Tobacco, Firearms, and Explosives,       27, II
     Bureau of
AMTRAK                                            49, VII
American Battle Monuments Commission              36, IV
American Indians, Office of the Special Trustee   25, VII
Animal and Plant Health Inspection Service        7, III; 9, I
Appalachian Regional Commission                   5, IX
Architectural and Transportation Barriers         36, XI
   Compliance Board
[[Page 422]]

Arctic Research Commission                        45, XXIII
Armed Forces Retirement Home                      5, XI; 38, II
Army, Department of                               32, V
  Engineers, Corps of                             33, II; 36, III
  Federal Acquisition Regulation                  48, 51
Benefits Review Board                             20, VII
Bilingual Education and Minority Languages        34, V
     Affairs, Office of
Blind or Severely Disabled, Committee for         41, 51
     Purchase from People Who Are
  Federal Acquisition Regulation                  48, 19
Career, Technical, and Adult Education, Office    34, IV
     of
Census Bureau                                     15, I
Centers for Medicare & Medicaid Services          42, IV
Central Intelligence Agency                       32, XIX
Chemical Safety and Hazard Investigation Board    40, VI
Chief Financial Officer, Office of                7, XXX
Child Support Enforcement, Office of              45, III
Children and Families, Administration for         45, II, III, IV, X, XIII
Civil Rights, Commission on                       5, LXVIII; 45, VII
Civil Rights, Office for                          34, I
Coast Guard                                       33, I; 46, I; 49, IV
Coast Guard (Great Lakes Pilotage)                46, III
Commerce, Department of                           2, XIII; 44, IV; 50, VI
  Census Bureau                                   15, I
  Economic Affairs, Office of the Under-          15, XV
       Secretary for
  Economic Analysis, Bureau of                    15, VIII
  Economic Development Administration             13, III
  Emergency Management and Assistance             44, IV
  Federal Acquisition Regulation                  48, 13
  Foreign-Trade Zones Board                       15, IV
  Industry and Security, Bureau of                15, VII
  International Trade Administration              15, III; 19, III
  National Institute of Standards and Technology  15, II; 37, IV
  National Marine Fisheries Service               50, II, IV
  National Oceanic and Atmospheric                15, IX; 50, II, III, IV, 
       Administration                             VI
  National Technical Information Service          15, XI
  National Telecommunications and Information     15, XXIII; 47, III, IV
       Administration
  National Weather Service                        15, IX
  Patent and Trademark Office, United States      37, I
  Secretary of Commerce, Office of                15, Subtitle A
Commercial Space Transportation                   14, III
Commodity Credit Corporation                      7, XIV
Commodity Futures Trading Commission              5, XLI; 17, I
Community Planning and Development, Office of     24, V, VI
     Assistant Secretary for
Community Services, Office of                     45, X
Comptroller of the Currency                       12, I
Construction Industry Collective Bargaining       29, IX
     Commission
Consumer Financial Protection Bureau              5, LXXXIV; 12, X
Consumer Product Safety Commission                5, LXXI; 16, II
Copyright Royalty Board                           37, III
Corporation for National and Community Service    2, XXII; 45, XII, XXV
Cost Accounting Standards Board                   48, 99
Council on Environmental Quality                  40, V
Council of the Inspectors General on Integrity    5, XCVIII
     and Efficiency
Court Services and Offender Supervision Agency    5, LXX; 28, VIII
     for the District of Columbia
Customs and Border Protection                     19, I
Defense, Department of                            2, XI; 5, XXVI; 32, 
                                                  Subtitle A; 40, VII
  Advanced Research Projects Agency               32, I
  Air Force Department                            32, VII
  Army Department                                 32, V; 33, II; 36, III; 
                                                  48, 51
  Defense Acquisition Regulations System          48, 2
  Defense Intelligence Agency                     32, I

[[Page 423]]

  Defense Logistics Agency                        32, I, XII; 48, 54
  Engineers, Corps of                             33, II; 36, III
  National Imagery and Mapping Agency             32, I
  Navy, Department of                             32, VI; 48, 52
  Secretary of Defense, Office of                 2, XI; 32, I
Defense Contract Audit Agency                     32, I
Defense Intelligence Agency                       32, I
Defense Logistics Agency                          32, XII; 48, 54
Defense Nuclear Facilities Safety Board           10, XVII
Delaware River Basin Commission                   18, III
Denali Commission                                 45, IX
Disability, National Council on                   5, C; 34, XII
District of Columbia, Court Services and          5, LXX; 28, VIII
     Offender Supervision Agency for the
Drug Enforcement Administration                   21, II
East-West Foreign Trade Board                     15, XIII
Economic Affairs, Office of the Under-Secretary   15, XV
     for
Economic Analysis, Bureau of                      15, VIII
Economic Development Administration               13, III
Economic Research Service                         7, XXXVII
Education, Department of                          2, XXXIV; 5, LIII
  Bilingual Education and Minority Languages      34, V
       Affairs, Office of
  Career, Technical, and Adult Education, Office  34, IV
       of
  Civil Rights, Office for                        34, I
  Educational Research and Improvement, Office    34, VII
       of
  Elementary and Secondary Education, Office of   34, II
  Federal Acquisition Regulation                  48, 34
  Postsecondary Education, Office of              34, VI
  Secretary of Education, Office of               34, Subtitle A
  Special Education and Rehabilitative Services,  34, III
       Office of
Educational Research and Improvement, Office of   34, VII
Election Assistance Commission                    2, LVIII; 11, II
Elementary and Secondary Education, Office of     34, II
Emergency Oil and Gas Guaranteed Loan Board       13, V
Emergency Steel Guarantee Loan Board              13, IV
Employee Benefits Security Administration         29, XXV
Employees' Compensation Appeals Board             20, IV
Employees Loyalty Board                           5, V
Employment and Training Administration            20, V
Employment Policy, National Commission for        1, IV
Employment Standards Administration               20, VI
Endangered Species Committee                      50, IV
Energy, Department of                             2, IX; 5, XXIII; 10, II, 
                                                  III, X
  Federal Acquisition Regulation                  48, 9
  Federal Energy Regulatory Commission            5, XXIV; 18, I
  Property Management Regulations                 41, 109
Energy, Office of                                 7, XXIX
Engineers, Corps of                               33, II; 36, III
Engraving and Printing, Bureau of                 31, VI
Environmental Protection Agency                   2, XV; 5, LIV; 40, I, IV, 
                                                  VII
  Federal Acquisition Regulation                  48, 15
  Property Management Regulations                 41, 115
Environmental Quality, Office of                  7, XXXI
Equal Employment Opportunity Commission           5, LXII; 29, XIV
Equal Opportunity, Office of Assistant Secretary  24, I
     for
Executive Office of the President                 3, I
  Environmental Quality, Council on               40, V
  Management and Budget, Office of                2, Subtitle A; 5, III, 
                                                  LXXVII; 14, VI; 48, 99
  National Drug Control Policy, Office of         2, XXXVI; 21, III
  National Security Council                       32, XXI; 47, II
  Presidential Documents                          3
  Science and Technology Policy, Office of        32, XXIV; 47, II
  Trade Representative, Office of the United      15, XX
     States
[[Page 424]]

Export-Import Bank of the United States           2, XXXV; 5, LII; 12, IV
Family Assistance, Office of                      45, II
Farm Credit Administration                        5, XXXI; 12, VI
Farm Credit System Insurance Corporation          5, XXX; 12, XIV
Farm Service Agency                               7, VII, XVIII
Federal Acquisition Regulation                    48, 1
Federal Acquisition Security Council              41, 201
Federal Aviation Administration                   14, I
  Commercial Space Transportation                 14, III
Federal Claims Collection Standards               31, IX
Federal Communications Commission                 2, LX; 5, XXIX; 47, I
Federal Contract Compliance Programs, Office of   41, 60
Federal Crop Insurance Corporation                7, IV
Federal Deposit Insurance Corporation             5, XXII; 12, III
Federal Election Commission                       5, XXXVII; 11, I
Federal Emergency Management Agency               44, I
Federal Employees Group Life Insurance Federal    48, 21
     Acquisition Regulation
Federal Employees Health Benefits Acquisition     48, 16
     Regulation
Federal Energy Regulatory Commission              5, XXIV; 18, I
Federal Financial Institutions Examination        12, XI
     Council
Federal Financing Bank                            12, VIII
Federal Highway Administration                    23, I, II
Federal Home Loan Mortgage Corporation            1, IV
Federal Housing Enterprise Oversight Office       12, XVII
Federal Housing Finance Agency                    5, LXXX; 12, XII
Federal Labor Relations Authority                 5, XIV, XLIX; 22, XIV
Federal Law Enforcement Training Center           31, VII
Federal Management Regulation                     41, 102
Federal Maritime Commission                       46, IV
Federal Mediation and Conciliation Service        5, CIII; 29, XII
Federal Mine Safety and Health Review Commission  5, LXXIV; 29, XXVII
Federal Motor Carrier Safety Administration       49, III
Federal Permitting Improvement Steering Council   40, IX
Federal Prison Industries, Inc.                   28, III
Federal Procurement Policy Office                 48, 99
Federal Property Management Regulations           41, 101
Federal Railroad Administration                   49, II
Federal Register, Administrative Committee of     1, I
Federal Register, Office of                       1, II
Federal Reserve System                            12, II
  Board of Governors                              5, LVIII
Federal Retirement Thrift Investment Board        5, VI, LXXVI
Federal Service Impasses Panel                    5, XIV
Federal Trade Commission                          5, XLVII; 16, I
Federal Transit Administration                    49, VI
Federal Travel Regulation System                  41, Subtitle F
Financial Crimes Enforcement Network              31, X
Financial Research Office                         12, XVI
Financial Stability Oversight Council             12, XIII
Fine Arts, Commission of                          45, XXI
Fiscal Service                                    31, II
Fish and Wildlife Service, United States          50, I, IV
Food and Drug Administration                      21, I
Food and Nutrition Service                        7, II
Food Safety and Inspection Service                9, III
Foreign Agricultural Service                      7, XV
Foreign Assets Control, Office of                 31, V
Foreign Claims Settlement Commission of the       45, V
     United States
Foreign Service Grievance Board                   22, IX
Foreign Service Impasse Disputes Panel            22, XIV
Foreign Service Labor Relations Board             22, XIV
Foreign-Trade Zones Board                         15, IV
Forest Service                                    36, II
General Services Administration                   5, LVII; 41, 105
  Contract Appeals, Board of                      48, 61
  Federal Acquisition Regulation                  48, 5

[[Page 425]]

  Federal Management Regulation                   41, 102
  Federal Property Management Regulations         41, 101
  Federal Travel Regulation System                41, Subtitle F
  General                                         41, 300
  Payment From a Non-Federal Source for Travel    41, 304
       Expenses
  Payment of Expenses Connected With the Death    41, 303
       of Certain Employees
  Relocation Allowances                           41, 302
  Temporary Duty (TDY) Travel Allowances          41, 301
Geological Survey                                 30, IV
Government Accountability Office                  4, I
Government Ethics, Office of                      5, XVI
Government National Mortgage Association          24, III
Grain Inspection, Packers and Stockyards          7, VIII; 9, II
     Administration
Great Lakes St. Lawrence Seaway Development       33, IV
     Corporation
Gulf Coast Ecosystem Restoration Council          2, LIX; 40, VIII
Harry S. Truman Scholarship Foundation            45, XVIII
Health and Human Services, Department of          2, III; 5, XLV; 45, 
                                                  Subtitle A
  Centers for Medicare & Medicaid Services        42, IV
  Child Support Enforcement, Office of            45, III
  Children and Families, Administration for       45, II, III, IV, X, XIII
  Community Services, Office of                   45, X
  Family Assistance, Office of                    45, II
  Federal Acquisition Regulation                  48, 3
  Food and Drug Administration                    21, I
  Indian Health Service                           25, V
  Inspector General (Health Care), Office of      42, V
  Public Health Service                           42, I
  Refugee Resettlement, Office of                 45, IV
Homeland Security, Department of                  2, XXX; 5, XXXVI; 6, I; 8, 
                                                  I
  Coast Guard                                     33, I; 46, I; 49, IV
  Coast Guard (Great Lakes Pilotage)              46, III
  Customs and Border Protection                   19, I
  Federal Emergency Management Agency             44, I
  Human Resources Management and Labor Relations  5, XCVII
       Systems
  Immigration and Customs Enforcement Bureau      19, IV
  Transportation Security Administration          49, XII
HOPE for Homeowners Program, Board of Directors   24, XXIV
     of
Housing and Urban Development, Department of      2, XXIV; 5, LXV; 24, 
                                                  Subtitle B
  Community Planning and Development, Office of   24, V, VI
       Assistant Secretary for
  Equal Opportunity, Office of Assistant          24, I
       Secretary for
  Federal Acquisition Regulation                  48, 24
  Federal Housing Enterprise Oversight, Office    12, XVII
       of
  Government National Mortgage Association        24, III
  Housing--Federal Housing Commissioner, Office   24, II, VIII, X, XX
       of Assistant Secretary for
  Housing, Office of, and Multifamily Housing     24, IV
       Assistance Restructuring, Office of
  Inspector General, Office of                    24, XII
  Public and Indian Housing, Office of Assistant  24, IX
       Secretary for
  Secretary, Office of                            24, Subtitle A, VII
Housing--Federal Housing Commissioner, Office of  24, II, VIII, X, XX
     Assistant Secretary for
Housing, Office of, and Multifamily Housing       24, IV
     Assistance Restructuring, Office of
Immigration and Customs Enforcement Bureau        19, IV
Immigration Review, Executive Office for          8, V
Independent Counsel, Office of                    28, VII
Independent Counsel, Offices of                   28, VI
Indian Affairs, Bureau of                         25, I, V
Indian Affairs, Office of the Assistant           25, VI
     Secretary
Indian Arts and Crafts Board                      25, II

[[Page 426]]

Indian Health Service                             25, V
Industry and Security, Bureau of                  15, VII
Information Resources Management, Office of       7, XXVII
Information Security Oversight Office, National   32, XX
     Archives and Records Administration
Inspector General
  Agriculture Department                          7, XXVI
  Health and Human Services Department            42, V
  Housing and Urban Development Department        24, XII, XV
Institute of Peace, United States                 22, XVII
Intellectual Property Enforcement Coordinator,    5, CIV
     Office of
Inter-American Foundation                         5, LXIII; 22, X
Interior, Department of                           2, XIV
  American Indians, Office of the Special         25, VII
       Trustee
  Endangered Species Committee                    50, IV
  Federal Acquisition Regulation                  48, 14
  Federal Property Management Regulations System  41, 114
  Fish and Wildlife Service, United States        50, I, IV
  Geological Survey                               30, IV
  Indian Affairs, Bureau of                       25, I, V
  Indian Affairs, Office of the Assistant         25, VI
       Secretary
  Indian Arts and Crafts Board                    25, II
  Land Management, Bureau of                      43, II
  National Indian Gaming Commission               25, III
  National Park Service                           36, I
  Natural Resource Revenue, Office of             30, XII
  Ocean Energy Management, Bureau of              30, V
  Reclamation, Bureau of                          43, I
  Safety and Environmental Enforcement, Bureau    30, II
       of
  Secretary of the Interior, Office of            2, XIV; 43, Subtitle A
  Surface Mining Reclamation and Enforcement,     30, VII
       Office of
Internal Revenue Service                          26, I
International Boundary and Water Commission,      22, XI
     United States and Mexico, United States 
     Section
International Development, United States Agency   22, II
     for
  Federal Acquisition Regulation                  48, 7
International Development Cooperation Agency,     22, XII
     United States
International Development Finance Corporation,    5, XXXIII; 22, VII
     U.S.
International Joint Commission, United States     22, IV
     and Canada
International Organizations Employees Loyalty     5, V
     Board
International Trade Administration                15, III; 19, III
International Trade Commission, United States     19, II
Interstate Commerce Commission                    5, XL
Investment Security, Office of                    31, VIII
James Madison Memorial Fellowship Foundation      45, XXIV
Japan-United States Friendship Commission         22, XVI
Joint Board for the Enrollment of Actuaries       20, VIII
Justice, Department of                            2, XXVIII; 5, XXVIII; 28, 
                                                  I, XI; 40, IV
  Alcohol, Tobacco, Firearms, and Explosives,     27, II
       Bureau of
  Drug Enforcement Administration                 21, II
  Federal Acquisition Regulation                  48, 28
  Federal Claims Collection Standards             31, IX
  Federal Prison Industries, Inc.                 28, III
  Foreign Claims Settlement Commission of the     45, V
       United States
  Immigration Review, Executive Office for        8, V
  Independent Counsel, Offices of                 28, VI
  Prisons, Bureau of                              28, V
  Property Management Regulations                 41, 128
Labor, Department of                              2, XXIX; 5, XLII
  Benefits Review Board                           20, VII
  Employee Benefits Security Administration       29, XXV
  Employees' Compensation Appeals Board           20, IV
  Employment and Training Administration          20, V
  Federal Acquisition Regulation                  48, 29

[[Page 427]]

  Federal Contract Compliance Programs, Office    41, 60
       of
  Federal Procurement Regulations System          41, 50
  Labor-Management Standards, Office of           29, II, IV
  Mine Safety and Health Administration           30, I
  Occupational Safety and Health Administration   29, XVII
  Public Contracts                                41, 50
  Secretary of Labor, Office of                   29, Subtitle A
  Veterans' Employment and Training Service,      41, 61; 20, IX
       Office of the Assistant Secretary for
  Wage and Hour Division                          29, V
  Workers' Compensation Programs, Office of       20, I, VI
Labor-Management Standards, Office of             29, II, IV
Land Management, Bureau of                        43, II
Legal Services Corporation                        45, XVI
Libraries and Information Science, National       45, XVII
     Commission on
Library of Congress                               36, VII
  Copyright Royalty Board                         37, III
  U.S. Copyright Office                           37, II
Management and Budget, Office of                  5, III, LXXVII; 14, VI; 
                                                  48, 99
Marine Mammal Commission                          50, V
Maritime Administration                           46, II
Merit Systems Protection Board                    5, II, LXIV
Micronesian Status Negotiations, Office for       32, XXVII
Military Compensation and Retirement              5, XCIX
     Modernization Commission
Millennium Challenge Corporation                  22, XIII
Mine Safety and Health Administration             30, I
Minority Business Development Agency              15, XIV
Miscellaneous Agencies                            1, IV
Monetary Offices                                  31, I
Morris K. Udall Scholarship and Excellence in     36, XVI
     National Environmental Policy Foundation
Museum and Library Services, Institute of         2, XXXI
National Aeronautics and Space Administration     2, XVIII; 5, LIX; 14, V
  Federal Acquisition Regulation                  48, 18
National Agricultural Library                     7, XLI
National Agricultural Statistics Service          7, XXXVI
National and Community Service, Corporation for   2, XXII; 45, XII, XXV
National Archives and Records Administration      2, XXVI; 5, LXVI; 36, XII
  Information Security Oversight Office           32, XX
National Capital Planning Commission              1, IV, VI
National Counterintelligence Center               32, XVIII
National Credit Union Administration              5, LXXXVI; 12, VII
National Crime Prevention and Privacy Compact     28, IX
     Council
National Drug Control Policy, Office of           2, XXXVI; 21, III
National Endowment for the Arts                   2, XXXII
National Endowment for the Humanities             2, XXXIII
National Foundation on the Arts and the           45, XI
     Humanities
National Geospatial-Intelligence Agency           32, I
National Highway Traffic Safety Administration    23, II, III; 47, VI; 49, V
National Imagery and Mapping Agency               32, I
National Indian Gaming Commission                 25, III
National Institute of Food and Agriculture        7, XXXIV
National Institute of Standards and Technology    15, II; 37, IV
National Intelligence, Office of Director of      5, IV; 32, XVII
National Labor Relations Board                    5, LXI; 29, I
National Marine Fisheries Service                 50, II, IV
National Mediation Board                          5, CI; 29, X
National Oceanic and Atmospheric Administration   15, IX; 50, II, III, IV, 
                                                  VI
National Park Service                             36, I
National Railroad Adjustment Board                29, III
National Railroad Passenger Corporation (AMTRAK)  49, VII
National Science Foundation                       2, XXV; 5, XLIII; 45, VI
  Federal Acquisition Regulation                  48, 25
National Security Council                         32, XXI; 47, II

[[Page 428]]

National Technical Information Service            15, XI
National Telecommunications and Information       15, XXIII; 47, III, IV, V
     Administration
National Transportation Safety Board              49, VIII
Natural Resource Revenue, Office of               30, XII
Natural Resources Conservation Service            7, VI
Navajo and Hopi Indian Relocation, Office of      25, IV
Navy, Department of                               32, VI
  Federal Acquisition Regulation                  48, 52
Neighborhood Reinvestment Corporation             24, XXV
Northeast Interstate Low-Level Radioactive Waste  10, XVIII
     Commission
Nuclear Regulatory Commission                     2, XX; 5, XLVIII; 10, I
  Federal Acquisition Regulation                  48, 20
Occupational Safety and Health Administration     29, XVII
Occupational Safety and Health Review Commission  29, XX
Ocean Energy Management, Bureau of                30, V
Oklahoma City National Memorial Trust             36, XV
Operations Office                                 7, XXVIII
Patent and Trademark Office, United States        37, I
Payment From a Non-Federal Source for Travel      41, 304
     Expenses
Payment of Expenses Connected With the Death of   41, 303
     Certain Employees
Peace Corps                                       2, XXXVII; 22, III
Pennsylvania Avenue Development Corporation       36, IX
Pension Benefit Guaranty Corporation              29, XL
Personnel Management, Office of                   5, I, IV, XXXV; 45, VIII
  Federal Acquisition Regulation                  48, 17
  Federal Employees Group Life Insurance Federal  48, 21
       Acquisition Regulation
  Federal Employees Health Benefits Acquisition   48, 16
       Regulation
  Human Resources Management and Labor Relations  5, XCVII
       Systems, Department of Homeland Security
Pipeline and Hazardous Materials Safety           49, I
     Administration
Postal Regulatory Commission                      5, XLVI; 39, III
Postal Service, United States                     5, LX; 39, I
Postsecondary Education, Office of                34, VI
President's Commission on White House             1, IV
     Fellowships
Presidential Documents                            3
Presidio Trust                                    36, X
Prisons, Bureau of                                28, V
Privacy and Civil Liberties Oversight Board       6, X
Procurement and Property Management, Office of    7, XXXII
Public and Indian Housing, Office of Assistant    24, IX
     Secretary for
Public Contracts, Department of Labor             41, 50
Public Health Service                             42, I
Railroad Retirement Board                         20, II
Reclamation, Bureau of                            43, I
Refugee Resettlement, Office of                   45, IV
Relocation Allowances                             41, 302
Research and Innovative Technology                49, XI
     Administration
Rural Business-Cooperative Service                7, XVIII, XLII, L
Rural Development Administration                  7, XLII
Rural Housing Service                             7, XVIII, XXXV, L
Rural Utilities Service                           7, XVII, XVIII, XLII, L
Safety and Environmental Enforcement, Bureau of   30, II
Science and Technology Policy, Office of          32, XXIV; 47, II
Secret Service                                    31, IV
Securities and Exchange Commission                5, XXXIV; 17, II
Selective Service System                          32, XVI
Small Business Administration                     2, XXVII; 13, I
Smithsonian Institution                           36, V
Social Security Administration                    2, XXIII; 20, III; 48, 23
Soldiers' and Airmen's Home, United States        5, XI
Special Counsel, Office of                        5, VIII
Special Education and Rehabilitative Services,    34, III
     Office of
State, Department of                              2, VI; 22, I; 28, XI

[[Page 429]]

  Federal Acquisition Regulation                  48, 6
Surface Mining Reclamation and Enforcement,       30, VII
     Office of
Surface Transportation Board                      49, X
Susquehanna River Basin Commission                18, VIII
Tennessee Valley Authority                        5, LXIX; 18, XIII
Trade Representative, United States, Office of    15, XX
Transportation, Department of                     2, XII; 5, L
  Commercial Space Transportation                 14, III
  Emergency Management and Assistance             44, IV
  Federal Acquisition Regulation                  48, 12
  Federal Aviation Administration                 14, I
  Federal Highway Administration                  23, I, II
  Federal Motor Carrier Safety Administration     49, III
  Federal Railroad Administration                 49, II
  Federal Transit Administration                  49, VI
  Great Lakes St. Lawrence Seaway Development     33, IV
       Corporation
  Maritime Administration                         46, II
  National Highway Traffic Safety Administration  23, II, III; 47, IV; 49, V
  Pipeline and Hazardous Materials Safety         49, I
       Administration
  Secretary of Transportation, Office of          14, II; 49, Subtitle A
  Transportation Statistics Bureau                49, XI
Transportation, Office of                         7, XXXIII
Transportation Security Administration            49, XII
Transportation Statistics Bureau                  49, XI
Travel Allowances, Temporary Duty (TDY)           41, 301
Treasury, Department of the                       2, X; 5, XXI; 12, XV; 17, 
                                                  IV; 31, IX
  Alcohol and Tobacco Tax and Trade Bureau        27, I
  Community Development Financial Institutions    12, XVIII
       Fund
  Comptroller of the Currency                     12, I
  Customs and Border Protection                   19, I
  Engraving and Printing, Bureau of               31, VI
  Federal Acquisition Regulation                  48, 10
  Federal Claims Collection Standards             31, IX
  Federal Law Enforcement Training Center         31, VII
  Financial Crimes Enforcement Network            31, X
  Fiscal Service                                  31, II
  Foreign Assets Control, Office of               31, V
  Internal Revenue Service                        26, I
  Investment Security, Office of                  31, VIII
  Monetary Offices                                31, I
  Secret Service                                  31, IV
  Secretary of the Treasury, Office of            31, Subtitle A
Truman, Harry S. Scholarship Foundation           45, XVIII
United States Agency for Global Media             22, V
United States and Canada, International Joint     22, IV
     Commission
United States and Mexico, International Boundary  22, XI
     and Water Commission, United States Section
U.S. Copyright Office                             37, II
U.S. Office of Special Counsel                    5, CII
Utah Reclamation Mitigation and Conservation      43, III
     Commission
Veterans Affairs, Department of                   2, VIII; 38, I
  Federal Acquisition Regulation                  48, 8
Veterans' Employment and Training Service,        41, 61; 20, IX
     Office of the Assistant Secretary for
Vice President of the United States, Office of    32, XXVIII
Wage and Hour Division                            29, V
Water Resources Council                           18, VI
Workers' Compensation Programs, Office of         20, I, VII
World Agricultural Outlook Board                  7, XXXVII

[[Page 431]]



List of CFR Sections Affected



All changes in this volume of the Code of Federal Regulations (CFR) that 
were made by documents published in the Federal Register since January 
1, 2019 are enumerated in the following list. Entries indicate the 
nature of the changes effected. Page numbers refer to Federal Register 
pages. The user should consult the entries for chapters, parts and 
subparts as well as sections for revisions.
For changes to this volume of the CFR prior to this listing, consult the 
annual edition of the monthly List of CFR Sections Affected (LSA). The 
LSA is available at www.govinfo.gov. For changes to this volume of the 
CFR prior to 2001, see the ``List of CFR Sections Affected, 1949-1963, 
1964-1972, 1973-1985, and 1986-2000'' published in 11 separate volumes. 
The ``List of CFR Sections Affected 1986-2000'' is available at 
www.govinfo.gov.

                                  2019

6 CFR
                                                                   84 FR
                                                                    Page
Chapter I
5 Appendix C amended.................................17942, 20241, 45643
27 Authority citation revised......................................13508
27.300 (b)(3) revised..............................................13508
37 Technical correction............................................48045
37.3 Amended.......................................................46426
37.5 (c) revised...................................................55019
Chapter X
1000.2 Amended.....................................................36456
1000.3 (b) revised.................................................36456
1000.5 (a)(5), (b)(5), (6), (c), (d) introductory text, and (2) 
        revised; (a)(6) added; (b)(7) through (10) removed.........36456

                                  2020

6 CFR
                                                                   85 FR
                                                                    Page
Chapter I
Chapter I Notification.............................................59651
5.24 Amended.......................................................11830
5.25 (a) and (b) amended...........................................11830
5.26 (c) amended...................................................11830
5.27 (c) amended...................................................11830
5.42 (a) revised...................................................22582
5.43 (a) introductory text revised; (g) added......................22582
5.41--5.49 (Subpart C) Appendix A added............................22582
5 Appendix C amended..........................14733, 14735, 45967, 62933
19 Authority citation revised; eff. 1-19-21........................82130
19.2 Amended; eff. 1-19-21.........................................82130
19.3 (a), (b), and (e) revised; (f) added; eff. 1-19-21............82130
19.4 (b) and (c) revised; eff. 1-19-21.............................82131
19.5 Amended; eff. 1-19-21.........................................82131
19.6 Revised; eff. 1-19-21.........................................82131
19.7 Removed; eff. 1-19-21.........................................82131
19.8 Revised; eff. 1-19-21.........................................82131
19.11 Added; eff. 1-19-21..........................................82132
19 Appendix A revised; eff. 1-19-21................................82132
19 Appendix B added; eff. 1-19-21..................................82132
27.300 (b)(3) revised..............................................36478
37.5 (b) and (c) revised...........................................23208

                                  2021

6 CFR
                                                                   86 FR
                                                                    Page
Chapter I
Chapter I Notification......................................13971, 52953
Chapter I Policy statement.........................................38209
5 Appendix C amended............15779, 44574, 50603, 55475, 61667, 69977
27 Authority citation revised......................................41890
27.100 Amended.....................................................41890
27.105 Amended.....................................................41890

[[Page 432]]

27.110 Revised.....................................................41890
27.115 Amended.....................................................41891
27.120 Heading revised; (a) and (b) amended........................41891
27.200 (a), (b)(1), (c) heading, and (1) amended...................41891
27.203 (a)(7), (8), (b)(1)(v), (2), and (c) amended................41891
27.204 (a)(2), (b)(1), (2), and (c) amended; (b)(2) heading added; 
        (b)(3) heading revised.....................................41891
27.205 (a) and (b) amended.........................................41891
27.210 (a), (b)(3), and (c) amended; (b)(1) revised................41891
27.215 (a) introductory text, (3), (b), and (d)(2) amended.........41891
27.220 Nomenclature change.........................................41892
27.225 Nomenclature change; (d)(1) amended.........................41892
27.230 Nomenclature change.........................................41892
27.235 (a) introductory text amended...............................41892
27.240 (a) and (b) amended.........................................41892
27.245 (a)(1) introductory text, (i), and (b) amended..............41892
27.250 (c)(1), (2), (d)(3), (e), and (f) amended...................41892
27.255 (a)(1), (2), and (6) amended................................41892
27.300 Nomenclature change; (b)(1), (2), (c)(1)(iv), (v), (d), and 
        (f) amended................................................41892
27.300 (b)(3) revised..............................................57539
27.305 (a) amended.................................................41892
27.310 Nomenclature change; (b)(1), (3), (5), (c), and (d) 
        introductory text amended..................................41892
27.315 (b) amended.................................................41892
27.320 Amended; (b) amended........................................41892
27.325 Amended.....................................................41892
27.330 (b) amended.................................................41892
27.335 (b)(1) and (2) amended......................................41892
27.345 Nomenclature change; (b)(3) and (d)(1) through (3) amended 
                                                                   41893
27.400 Nomenclature change; (a), (b) introductory text, (b)(3), 
        (4), (7), (9), (c)(1), (d) introductory text, (6) through 
        (8), (f)(1) introductory text, (2) heading, (4), (g), 
        (h)(1), (i)(1) introductory text, (2) introductory text, 
        (6), and (7) amended.......................................41893
27.405 (a) introductory text, (b), (c), (d)(1), and (2) amended....41893
27.410 Heading and (b) amended.....................................41894
37.5 (b) and (c) revised; interim..................................23240
158 Added; interim.................................................47893

                                  2022

6 CFR
                                                                   87 FR
                                                                    Page
Chapter I
Chapter I Notification.............................................31093
5 Authority citation revised.......................................68601
5.2 Amended........................................................68601
5.3 (a)(1) and (b) amended.........................................68601
5.5 (a) and (e)(2) amended.........................................68601
5.8 (a)(1) amended.................................................68601
5.1--5.13 (Subpart A) Appendix I removed...........................68601
5.20--5.36 (Subpart B) Revised.....................................68601
5 Appendix A revised...............................................68607
5 Appendix C amended..........................................4125, 6403
27.300 (b)(3) revised...............................................1326
29 Authority citation revised......................................77972
29.1 Revised.......................................................77972
29.2 Revised.......................................................77972
29.3 Revised.......................................................77972
29.4 Revised.......................................................77972
29.5 Revised.......................................................77972
29.6 Revised.......................................................77972
29.7 Revised.......................................................77972
29.8 Revised.......................................................77972
29.9 Revised.......................................................77972
126 Added; interim.................................................48438

                                  2023

6 CFR
                                                                   88 FR
                                                                    Page
Chapter I
5 Appendix C amended.........................................2797, 19213
27.300 (b)(3) revised...............................................2182
37.4 Added.........................................................44192
37.5 (b) and (c) revised...........................................14476
37.17 (e)(1), (g)(1), and (m) revised..............................44192
37.19 Introductory text revised....................................44192


                                  [all]