[Federal Register Volume 72, Number 47 (Monday, March 12, 2007)]
[Notices]
[Pages 11040-11042]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: E7-4408]


-----------------------------------------------------------------------

DEPARTMENT OF THE INTERIOR

Office of the Secretary


Privacy Act of 1974, as Amended; Amendment of an Existing System 
of Records

AGENCY: Office of the Secretary, Department of the Interior.

ACTION: Proposed amendment of an existing system of records.

-----------------------------------------------------------------------

SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 552a), 
the Office of the Secretary is issuing public notice of its intent to 
amend an existing Privacy Act system of records notice, Interior, DOI--
30, ``Enterprise Access Control Service (EACS),'' to implement Homeland 
Security Presidential Directive 12 (HSPD-12). HSPD-12 requires federal 
agencies to use a common identification credential for both logical and 
physical access to federally controlled facilities and information 
systems. Accordingly, the National Business Center, within the Office 
of the Secretary of the Department of the Interior, is planning to 
link, via Web services, its enterprise information technology 
directory, the Enterprise Access Control Service (EACS), with the 
identity management system (operated by the National Business Center) 
which automates the process of issuing HSPD-12 compliant credentials to 
all Departmental employees, contractors, volunteers and other 
individuals who require regular, ongoing access to agency facilities, 
systems and networks, based on sound criteria to verify an individual's 
identity, that are strongly resistant to fraud, tampering, 
counterfeiting, and terrorist exploitation, and that provide for rapid, 
electronic authentification of personal identity, by a provider whose 
reliability has been established through an official accreditation 
process. For this reason, it is renaming and renumbering Interior, DOI-
30, ``Enterprise Access Control Service (EACS)'' as Interior, DOI-47: 
``HSPD-12: Logical Security Files (Enterprise Access Control Service/
EACS).''

DATES: Effective Date: 5 U.S.C. 552a(e)(11) requires that the public be 
provided a 30-day period in which to comment on the agency's intended 
use of the information in the system of records. The Office of 
Management and Budget, in its Circular A-130, requires an additional 
10-day period (for a total of 40 days) in which to make these comments. 
Any persons interested in commenting on this proposed amendment may do 
so by submitting comments in writing to the Office of the Secretary 
Privacy Act Officer, Sue Ellen Sloca, U.S. Department of the Interior, 
MS-120 SIB, 1951 Constitution Avenue, NW., Washington, DC 20240, or by 
e-mail to [email protected]. Comments received within 40 days 
of publication in the Federal Register will be considered. The system 
will be effective as proposed at the end of the comment period unless 
comments are received which would require a contrary determination. The 
Department will publish a revised notice if changes are made based upon 
a review of comments received.

FOR FURTHER INFORMATION CONTACT: Richard A. Delph, Office of the Chief 
Information Officer, Office of the Secretary, Department of the 
Interior, 625 Herndon Parkway, Herndon, VA 20170 or by e-mail to 
[email protected].

SUPPLEMENTARY INFORMATION: In this notice, the Department of the 
Interior is amending Interior, DOI-30, ``Enterprise Access Control 
Service (EACS),'' to implement HSPD-12, and is renaming and renumbering 
it as Interior, DOI-47: ``HSPD-12: Logical Security Files (Enterprise 
Access Control Service/EACS).'' In the process, it is expanding the 
categories of individuals covered by the system to include all 
individuals authorized to access DOI systems and networks, e.g., 
volunteers and other individuals who require regular, ongoing access to 
Departmental information systems and networks, individuals who have 
been issued HSPD-12 compliant credentials from other Federal agencies 
who require access to Departmental information systems and networks, 
etc.
    Accordingly, the Department of the Interior proposes to amend the 
system notice for Interior, DOI-30, ``Enterprise Access Control Service 
(EACS)'' in its entirety to read as follows:

    Dated: March 7, 2007.
Sue Ellen Sloca,
Office of the Secretary Privacy Act Officer.
INTERIOR/DOI-47

SYSTEM NAME:
    HSPD-12: Logical Security Files (Enterprise Access Control Service/
EACS)--Interior, DOI-47

SYSTEM LOCATION:
    (1) Data covered by this system are maintained at two primary 
master sites at the following locations under the Department of the 
Interior (DOI), Office of the Secretary, Office of the Chief 
Information Officer, at:
    (a) The Enterprise Hosting Center, Reston, VA, and

[[Page 11041]]

    (b) The Enterprise Hosting Center, Denver, CO.
    (2) DOI bureau and office replicas of the master database of the 
EACS are located at strategic Departmental locations.

CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
    (1) Individuals who require access to Departmental networks, 
information systems, and e-mail services, including Departmental 
employees, contractors, students, interns, volunteers, etc.


    Note: All of these individuals are required to have HSPD-12 
compliant credentials issued from the National Business Center, 
within the Office of the Secretary of the Department of the 
Interior, if they are employed by DOI for more than 180 days.

    (2) Individuals who have been issued HSPD-12 compliant credentials 
from other Federal agencies who require access to Departmental 
networks, information systems and e-mail services.

CATEGORIES OF RECORDS IN THE SYSTEM:
    The following information may be retained in EACS: User full legal 
name, system login name, work e-mail address, web home page address, 
work address, work phone number, other contact information, user access 
and permission rights, password hash values, HSPD-12 authentication, 
digital signature, encryption, and/or other NIST specified 
certificates, along with the date and time of signature retained on the 
signed document, and supervisor's name.

    Note: This list is not intended to be a full list of all 
information currently stored in the EACS.

Authority for maintenance of the system:
    5 U.S.C. 301; the Paperwork Reduction Act of 1995 (44 U.S.C. 3501); 
the Government Paperwork Elimination Act (Pub. L. 105-277, 44 U.S.C. 
3504); and Homeland Security Presidential Directive 12, Policy for a 
Common Identification Standard for Federal Employees and Contractors, 
August 27, 2004.

Routine uses of records maintained in the system including categories 
of users and the purposes of such uses:
The primary purposes of the system are:
    (1) To provide a common authoritative directory service for the 
purpose of ensuring the security of DOI computer networks, resources 
and information and protecting them from unauthorized access, tampering 
or destruction;
    (2) To authenticate and verify that all persons accessing DOI 
computer networks, resources and information are properly authorized to 
access them;
    (3) To ensure that persons signing official digital documents are 
indeed the persons represented and to provide for non-repudiation of 
the use of an electronic signature; and
    (4) To enable an individual to encrypt and decrypt documents for 
secure transmission.

    Note: This system interfaces with the Department's identify 
management system and personnel security files, covered by Interior/
DOI-45, ``HSPD-12: Identity Management System and Personnel Security 
Files.''

Disclosures outside the Department of the Interior may be made:
    (1) To an expert, consultant, or contractor (including employees of 
the contractor) of DOI that performs, on DOI's behalf, services 
requiring access to these records.
    (2) To the Federal Protective Service and appropriate Federal, 
State, local or foreign agencies responsible for investigating 
emergency response situations or investigating or prosecuting the 
violation of or for enforcing or implementing a statute, rule, 
regulation, order or license, when DOI becomes aware of a violation or 
potential violation of a statute, rule, regulation, order or license.
    (3) (a) To any of the following entities or individuals, when the 
circumstances set forth in paragraph (b) are met:
    (i) The U.S. Department of Justice (DOJ);
    (ii) A court or an adjudicative or other administrative body;
    (iii) A party in litigation before a court or an adjudicative or 
other administrative body; or
    (iv) Any DOI employee acting in his or her individual capacity if 
DOI or DOJ has agreed to represent that employee or pay for private 
representation of the employee;
    (b) When:
    (i) One of the following is a party to the proceeding or has an 
interest in the proceeding:
    (A) DOI or any component of DOI;
    (B) Any other Federal agency appearing before the Office of 
Hearings and Appeals;
    (C) Any DOI employee acting in his or her official capacity;
    (D) Any DOI employee acting in his or her individual capacity if 
DOI or DOJ has agreed to represent that employee or pay for private 
representation of the employee;
    (E) The United States, when DOJ determines that DOI is likely to be 
affected by the proceeding; and
    (ii) DOI deems the disclosure to be:
    (A) Relevant and necessary to the proceeding; and
    (B) Compatible with the purpose for which the records were 
compiled.
    (4) To a congressional office in response to a written inquiry that 
an individual covered by the system, or the heir of such individual if 
the covered individual is deceased, has made to the congressional 
office about the individual.
    (5) To an official of another Federal agency to provide information 
needed in the performance of official duties related to reconciling or 
reconstructing data files, in support of the functions for which the 
records were collected and maintained.
    (6) To representatives of the General Services Administration or 
the National Archives and Records Administration to conduct records 
management inspections under the authority of 44 U.S.C. 2903 and 2904.
    (7) To appropriate agencies, entities, and persons when:
    (a) It is suspected or confirmed that the security or 
confidentiality of information in the system of records has been 
compromised; and
    (b) The Department has determined that as a result of the suspected 
or confirmed compromise there is a risk of harm to economic or property 
interest, identity theft or fraud, or harm to the security or integrity 
of this system or other systems or programs (whether maintained by the 
Department or another agency or entity) that rely upon the compromised 
information; and
    (c) The disclosure is made to such agencies, entities and persons 
who are reasonably necessary to assist in connection with the 
Department's efforts to respond to the suspected or confirmed 
compromise and prevent, minimize, or remedy such harm.

POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING, 
AND DISPOSING OF RECORDS IN THE SYSTEM:
STORAGE:
    Records are stored in electronic media on hard disks and magnetic 
tapes.

RETRIEVABILITY:
    Records are retrievable from EACS by any defined field within the 
record. These fields include, but are not limited to: user name, full 
legal name, digital certificate, and Web home address or e-mail 
address.

SAFEGUARDS:
    The computer systems in which records are stored are located in 
computer facilities that are secured by alarm systems and off-master 
key access. EACS access granted to

[[Page 11042]]

individuals is password-protected. In the event that EACS is used to 
validate a user's authentication certificate against existing data 
within the system, access to the user's authentication certificate will 
require the use of a Personal Identification Number (PIN) known only to 
the user. Each person granted access to the system must be individually 
authorized to use the system. A Privacy Act Warning Notice will appear 
on the monitor screen when first displayed. Backup tapes are 
transported in a locked container under armed guard escort and are 
stored in a locked and controlled room in a secure, off-site location. 
A Privacy Impact Assessment was completed to ensure that Privacy Act 
requirements and personally identifiable information safeguard 
requirements are met.

RETENTION AND DISPOSAL:
    Records relating to persons covered by this system are retained in 
accordance with a separate records schedule, identified as item 6600 of 
the Office of the Secretary Consolidated Subject-Function Code Records 
Disposition Schedule currently under development.

SYSTEM MANAGER(S) AND ADDRESS:
    (1) EACS Manager, Office of the Chief Information Officer, Office 
of the Secretary, Department of the Interior, 625 Herndon Parkway, 
Herndon, VA 20170.
    (2) Bureau Security Managers:
    a. Bureau of Indian Affairs: Director, Office of Information 
Technology Security & Privacy, Office of the Chief Information 
Officer--Indian Affairs, 625 Herndon Parkway, Herndon, VA 20170.
    b. Bureau of Indian Education: Director, Office of Information 
Technology Security & Privacy, Office of the Chief Information 
Officer--Indian Affairs, 625 Herndon Parkway, Herndon, VA 20170.
    c. Bureau of Land Management: Division Chief, IT Security, Bureau 
of Land Management, Information Resources Management, 1849 C St., NW., 
Mail Stop 700LS, Washington, DC 20240.
    d. Bureau of Reclamation: Deputy Chief Information Officer, Bureau 
of Reclamation, P.O. Box 25007, Denver, CO 80225.
    e. Minerals Management Service: IT Specialist, Minerals Management 
Service, 381 Elden Street, Mail Stop 2200, Herndon, VA 20170.
     f. National Park Service: Security Program Manager, National Park 
Service, 1201 Eye Street, NW., Washington, DC 20005.
    g. Office of Surface Mining, Reclamation and Enforcement: Logical 
Security Officer, Office of Surface Mining, Reclamation and 
Enforcement, 1951 Constitution Ave., NW., Mail Stop 344 SIB, 
Washington, DC 20240.
    h. Office of the Inspector General: Logical Security Manager, U.S. 
Geological Survey, 12030 Sunrise Valley Drive, Suite 230, Reston, VA 
20191.
    i. Office of the Secretary/National Business Center: Logical 
Security Manager, National Business Center, 7301 W. Mansfield Ave., D 
2130, Denver, CO 80235.
     j. Office of the Solicitor: Chief Information Officer, Division of 
Administration, Office of the Solicitor, 1849 C St., NW., Mail Stop 
6556 MIB, Washington, DC 20240.
    k. U.S. Fish and Wildlife Service: AD IRTM, U.S. Fish and Wildlife 
Service, 4401 N. Fairfax Dr., 3rd Fl., Arlington, VA 22203.
    l. U.S. Geological Survey: Bureau Chief Technology Officer, U.S. 
Geological Survey, 8987 Yellow Brick Road, Baltimore, MD 21237.

NOTIFICATION PROCEDURE:
    An individual requesting notification of the existence of records 
on himself or herself should address his/her request to the appropriate 
Bureau Security Manager identified in (2), above. The request must be 
in writing and signed by the requester. It must include the requester's 
full name, bureau and office affiliation, and work address. (See 43 CFR 
2.60.)

RECORD ACCESS PROCEDURE:
    An individual requesting access to records on himself or herself 
should address his/her request to the appropriate Bureau Security 
Manager identified in (2), above. The request must be in writing and 
signed by the requester. It must include the requester's full name, 
bureau and office affiliation, and work address. (See 43 CFR 2.63.)

CONTESTING RECORDS PROCEDURE:
    An individual requesting amendment of records on himself or herself 
should address his/her request to the appropriate Bureau Security 
Manager identified in (2), above. The request must be in writing and 
signed by the requester. It must include the requester's full name, 
bureau and office affiliation, and work address. (See 43 CFR 2.71.)

RECORD SOURCE CATEGORIES:
    Information is obtained from individuals covered by the system, 
supervisors, and designated approving officials, certificate issuing 
authorities, and network systems officials, as well as the National 
Business Center's identity management system (covered by Interior, DOI-
45: ``HSPD-12: Identity Management System and Personnel Security 
Files).''

EXEMPTIONS CLAIMED FOR THE SYSTEM:
    None.
[FR Doc. E7-4408 Filed 3-9-07; 8:45 am]
BILLING CODE 4310-RK-P