﻿<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="pai.xsl" xmlns="http://www.fdsys.gov/pai/2013"?>

<pai>
<agency toc="yes">
<name>Department of Homeland Security</name>
<abbrev>
DHS
</abbrev>
    .
    <previousPubs id="systems" toc="yes">
        <title>Systems of Records Published Between January 2, 2024 and December 31, 2025</title>
    </previousPubs>
    <previouslyPublished>
        <url>https://www.govinfo.gov/content/pkg/FR-2024-01-22/pdf/2024-01057.pdf</url>
        <title>Privacy Act of 1974 Matching Program</title>
        <date year="2024" month="1" day="22" />
    </previouslyPublished>
    <previouslyPublished>
        <url>https://www.govinfo.gov/content/pkg/FR-2024-02-27/pdf/2024-03936.pdf</url>
        <title>6 CFR Part 5;Final rule.</title>
        <date year="2024" month="2" day="27" />
    </previouslyPublished>
    <previouslyPublished>
        <url>https://www.govinfo.gov/content/pkg/FR-2024-07-05/pdf/2024-14768.pdf</url>
        <title>(ICE)-011 Criminal Arrest Records and Immigration Enforcement Records (CARIER).</title>
        <date year="2024" month="7" day="5" />
    </previouslyPublished>
    <previouslyPublished>
        <url>https://www.govinfo.gov/content/pkg/FR-2024-09-09/pdf/2024-20155.pdf</url>
        <title>DHS/FEMA-008 Disaster Recovery Assistance Files System of Records</title>
        <date year="2024" month="9" day="9" />
    </previouslyPublished>
    <previouslyPublished>
        <url>https://www.govinfo.gov/content/pkg/FR-2024-11-19/pdf/2024-26836.pdf</url>
        <title>6 CFR Part 5;Final rule.</title>
        <date year="2024" month="11" day="19" />
    </previouslyPublished>
    <previouslyPublished>
        <url>https://www.govinfo.gov/content/pkg/FR-2025-01-13/pdf/2024-31357.pdf</url>
        <title>§5.33 Use and collection of Social Security Numbers; Proposed Rule</title>
        <date year="2025" month="1" day="13" />
    </previouslyPublished>
    <previouslyPublished>
        <url>https://www.govinfo.gov/content/pkg/FR-2025-03-26/pdf/2025-05074.pdf</url>
        <title>Rescindment; DHS/FEMA-017 Individuals and Households Program Equity Analysis Records System of Records.</title>
        <date year="2025" month="3" day="26" />
    </previouslyPublished>
    <previouslyPublished>
        <url>https://www.govinfo.gov/content/pkg/FR-2025-07-21/pdf/2025-13609.pdf</url>
        <title>Department of Homeland Security (DHS)/U.S. Immigration and Customs Enforcement (ICE)-008 Search, Arrest, and Seizure Records.</title>
        <date year="2025" month="7" day="21" />
    </previouslyPublished>
    <previouslyPublished>
        <url>https://www.govinfo.gov/content/pkg/FR-2025-07-21/pdf/2025-13613.pdf</url>
        <title>Department of Homeland Security (DHS)/U.S. Immigration and Customs Enforcement (ICE)-006 ICE Intelligence Records System (IIRS).</title>
        <date year="2025" month="7" day="21" />
    </previouslyPublished>
    <previouslyPublished>
        <url>https://www.govinfo.gov/content/pkg/FR-2025-07-22/pdf/2025-13709.pdf</url>
        <title>Computer Matching.</title>
        <date year="2025" month="7" day="22" />
    </previouslyPublished>
    <previouslyPublished>
        <url>https://www.govinfo.gov/content/pkg/FR-2025-10-31/pdf/2025-19735.pdf</url>
        <title>Department of Homeland Security (DHS)/U.S. Citizenship and Immigration Services (USCIS)-004 Systematic Alien Verification for Entitlements Program System of Records.</title>
        <date year="2025" month="10" day="31" />
    </previouslyPublished>
    <previouslyPublished>
        <url>https://www.govinfo.gov/content/pkg/FR-2025-12-23/pdf/2025-23783.pdf</url>
        <title>Final Rule; § 5.3.</title>
        <date year="2025" month="12" day="23" />
    </previouslyPublished>
    <previouslyPublished>
        <url>https://www.govinfo.gov/content/pkg/FR-2025-12-31/pdf/2025-24030.pdf</url>
        <title>Modified: Multiple SoRNs.</title>
        <date year="2025" month="12" day="31" />
    </previouslyPublished>


    <routineUses id="routine" toc="yes">
<xhtmlContent>
<p><b>Editorial Note:</b> The Department of Homeland Security came into existence on January 24, 2003. Many of its
organizational elements were transferred in whole or in part from other agencies. As of December 31, 2013, the Department
had not yet issued a complete publication of all of its systems of records. The systems of records shown below reflect
only those Privacy Act documents published in the <i>Federal Register</i> under the name of the Department of Homeland
Security between January 24, 2003 and December 31, 2019.</p>
<p><b>Routine Uses: Federal Energy Management Agency</b></p>
<p><i>Introduction to Routine Uses:</i> We have identified certain routine uses that apply to many of the FEMA systems of notice records. We will list the specific routine uses applicable to an individual system of record under the "Routine Use" section of the notice itself and they will correspond to the numbering of the routine uses published below. These uses are published only once in the interest of simplicity, economy and to avoid redundancy, rather than repeating them in every individual system notice. 
</p><p>(1) <i>Routine Use--Law Enforcement:</i> A record from any FEMA system of records, which indicates either by itself or in combination with other information within FEMA’s possession, a violation or potential violation of law, whether civil, criminal or regulatory in nature, and whether arising by general statute, or by regulation, rule or order issued pursuant thereto, and which we may disclose, as a routine use, to the appropriate agency whether Federal, State, territorial, local or foreign, or foreign agency or professional organization, charged with the responsibility of enforcing, implementing, investigating or prosecuting such violation or charged with implementing the statute, rule, regulation or order issued under it. 
</p><p>(2) <i>Routine Use--Disclosure When Requesting Information:</i> We may disclose as a routine use a record from a FEMA system of records to a Federal, State or local agency, maintaining civil, criminal, regulatory, licensing or other enforcement information or other pertinent information, such as current licenses, if necessary, to obtain information, relevant to an agency decision concerning the hiring or retention of an employee, the issuance of a security clearance, the letting of a contract, or the issuance of a license, grant or other benefit. 
</p><p>(3) <i>Routine Use--Disclosure of Requested Information:</i> We may disclose as a routine use a record from a FEMA system of records to a Federal agency, in response to a written request in connection with the hiring or retention of an employee, the issuance of an investigation of an employee, the letting of a contract, or the issuance of a license, grant, or other benefit by the requesting agency, to the extent that the information is relevant and necessary to the requesting agency’s decision on the matter. 
</p><p>(4) <i>Routine Use--Grievance, Complaint, Appeal:</i> We may disclose as a routine use a record from a FEMA system of records to an authorized appeal or grievance examiner, formal complaints examiner, equal opportunity investigator, arbitrator, mediator, or other duly authorized official engaged in investigation or settlement of a grievance, complaint, or appeal by an employee. We may disclose a record from this system of records to the Office of Personnel Management as government-wide records; we will consider those records as part of the government-wide system. We may transfer as a routine use other official personnel records covered by notices published by FEMA and considered to be separate systems of records to the Office of Personnel management in accordance with official personnel programs and activities. 
</p><p>(5) <i>Routine Use--Congressional Inquiries:</i> We may disclose as a routine use a record from a FEMA system of records to a Member of Congress or to a Congressional staff member in response to an inquiry of the Congressional office made at the request of the individual about whom the record is maintained. 
</p><p>(6) <i>Routine Use--Private Relief Legislation:</i> We may disclose as a routine use the information contained in a FEMA system of records to the Office of Management and Budget in connection with the review of private relief legislation as set forth in OMB Circular No. A-19 at any stage of the legislative coordination and clearance process as set forth in that circular. 
</p><p>(7) <i>Routine Use--Disclosure to the Office of Personnel Management:</i> We may disclose as a routine use a record from a FEMA system of records to the Office of Personnel Management concerning information on pay and leave benefits, retirement deductions, and any other information concerning personnel actions. 
</p><p>(8) <i>Routine Use--Disclosure to National Archives and Records Administration:</i> We may disclose as a routine use a record from a FEMA system of records management inspections conducted under authority of 44 U.S.C. 2904 and 2906. 
</p><p>(9) <i>Routine Use--Grand Jury:</i> We may disclose as a routine use a record from any system of records to a grand jury agent pursuant to a federal or State grand jury subpoena or to a prosecution request that such record be released for the purpose of its introduction to a grand jury.  

</p></xhtmlContent></routineUses>

    


    <section id="all1" toc="yes">
	<systemNumber>/ALL-001</systemNumber>

<subsection type="systemName">Department of Homeland Security Freedom of Information Act and Privacy Act Records System of Records.
</subsection>
<subsection type="systemName">DHS/ALL—001 Freedom of Information Act and Privacy Act Records.</subsection>
<subsection type="securityClassification"><xhtmlContent>
<p>Classified and unclassified.</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent>
<p>Records are maintained at DHS and component Freedom of Information Act (FOIA) offices in Washington, DC, and at field locations. Electronic records are maintained within electronic request tracking systems. These records reside within DHS and component FOIA office systems and databases. These systems and databases include commercial off-the-shelf applications as well as government developed applications and systems.</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent>
<p>The system encompasses all individuals who submit FOIA requests, Privacy Act requests, and administrative appeals to DHS; individuals whose requests and/or records have been referred to DHS by other agencies; attorneys or other persons representing individuals submitting such requests and appeals; individuals who are the subjects of such requests and appeals; individuals who file litigation based on their requests; Department of Justice (DOJ) and other government litigators; and/or DHS personnel assigned to handle such requests or appeals.</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p>• Records received, created, or compiled in processing FOIA and Privacy Act requests or appeals, including:
</p><p>• Original requests and administrative appeals and responses to either or both;
</p><p>• Intra or interagency memoranda, referrals, correspondence, notes, fee schedules, assessments, cost calculations, and other documentation related to the referral and/or processing of the FOIA and/or Privacy Act request or appeal;
</p><p>• Correspondence with the individuals or entities that submitted the requested records and copies of the requested records, including records that might contain confidential business information or personal information;
</p><p>• Correspondence related to fee determinations and collection of fees owed under the FOIA; and
</p><p>• Copies of requested records and records under administrative appeals.
</p><p>• Types of information in the records may include:
</p><p>• Requesters' and their attorneys' or representatives' information including name, address, email address, telephone numbers, fax numbers, office telephone numbers, and FOIA and Privacy Act case numbers;
</p><p>• Name, address, email address, telephone numbers, and fax number of DHS employees and contractors;
</p><p>• Name of the person who is the subject of the request or administrative appeal;
</p><p>• Fee determinations and amounts of fees owed;
</p><p>• Unique case identifier;
</p><p>• Alien Registration Number (A-Number) of the requester/appellant or the attorney or other individual representing the requester, or other identifier assigned to the request or appeal;
</p><p>• Other identifiers provided by a requester/appellant about him or herself, or about the individual whose records are requested, such as social security number, driver's license number, FBI Number, or A-Number.
</p><p>• The system also contains copies of documents relevant to appeals and lawsuits brought under the FOIA and Privacy Act including those from DOJ and other government litigators.</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p>5 U.S.C. 552 (Freedom of Information Act), 5 U.S.C. 552a (Privacy Act); 44 U.S.C. 3101 (Records Management by Federal Agencies); E.O. 12958 (Classified National Security Information, as amended).</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p>The purpose of this system is to support the processing of record access requests and administrative appeals under the FOIA, as well as access, notification, and amendment requests and administrative appeals under the Privacy Act, whether DHS receives such requests directly from the requester or via referral from another agency. In addition this system is used to support agency participation in litigation arising from such requests and appeals, and to assist DHS in carrying out any other responsibilities under the FOIA or the access or amendment provisions of the Privacy Act.</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, which includes the release of the name of individuals making FOIA requests and a description of the records requested as required by FOIA, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
<p>A. To the Department of Justice (DOJ) including United States Attorney Offices, or other federal agency conducting litigation or in proceedings before any court, adjudicative or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
<p>1. DHS or any component thereof;</p>
<p>2. Any employee or former employee of DHS in his/her official capacity;</p>
<p>3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
<p>4. The U.S. or any agency thereof.</p>
<p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
<p>C. To National Archives and Records Administration (NARA) or the General Services Adminstration (GSA) pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
<p>D. To an agency, or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
<p>E. To appropriate agencies, entities, and persons when:</p>
<p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;</p>
<p>2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
<p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS's efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
<p>G. To an appropriate federal, state, tribal, local, international, or foreign agency, including law enforcement, or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations.</p>
<p>H. To a federal, state, local, or foreign agency or entity for the purpose of consulting with that agency or entity to enable DHS to make a determination as to the propriety of access to or correction of information, or for the purpose of verifying the identity of an individual or the accuracy of information submitted by an individual who has requested access to or amendment of information.</p>
<p>I. To a federal agency or other federal entity that furnished the record or information for the purpose of permitting that agency or entity to make a decision regarding access to or correction of the record or information, or to a federal agency or entity for purposes of providing guidance or advice regarding the handling of particular requests.</p>
<p>J. To the DOJ, to the Department of Treasury (DOT), or to a consumer reporting agency for collection action on any delinquent debt when circumstances warrant.</p>
<p>K. To the Office of Management and Budget (OMB) or the DOJ to obtain advice regarding statutory and other requirements under the FOIA or Privacy Act.</p>
<p>L. To National Archives and Records Administration, Office of Government Information Services (OGIS), to the extent necessary to fulfill its responsibilities in 5 U.S.C. 552(h), to review administrative agency policies, procedures, and compliance with the FOIA, and to facilitate OGIS's offering of mediation services to resolve disputes between persons making FOIA requests and administrative agencies.</p>
<p>M. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations, or in response to a subpoena, or in connection with criminal law proceedings.</p>
<p>N. In an appropriate proceeding before a court, grand jury, or administrative or adjudicative body, when DHS determines that the records are relevant to the proceeding; or in an appropriate proceeding before an administrative or adjudicative body when the adjudicator determines the records to be relevant to the proceeding.</p>
<p>O. To appropriate federal, state, tribal, local, or foreign governmental agencies or multilateral government organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a statute, rule, regulation, order, or license, when DHS believes the information would assist enforcement of applicable civil or criminal laws.</p>
<p>P. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS's officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy, or that disclosure would violate any federal statuate or regulation.</p>
<p>Disclosure to consumer reporting agencies:</p>
<p>Privacy Act information may be reported to consumer reporting agencies pursuant to 5 U.S.C. 552a(b)(12).</p> </xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored on paper and/or in electronic form. Records that contain national security information and are classified are stored in accordance with applicable executive orders, statutes, and agency implementing regulations.</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p>Records are retrieved by the name of the requester or appellant; the number assigned to the request or appeal; and in some instances the name of the attorney representing the requester or appellant, the name of an individual who is the subject of such a request or appeal, and/or the name or other identifier of DHS personnel assigned to handle such requests or appeals.</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of compromising the information that is stored. Records and technical equipment are maintained in buildings with restricted access. The required use of password protection identification features and other system protection methods also restrict access. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
</xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p>Records are retained and disposed of in accordance with the NARA's General Records Schedule 14, which can be found at:<i>http://www.archives.gov/records-mgmt/grs/grs14.html</i>.</p>
<p>FOIA and Privacy Act records in litigation are retained for ten years after the end of the fiscal year in which judgment was made or when all appeals have been exhausted, whichever is later. This disposition is temporary and is under review and approval was approved by the NARA through pending schedule N1-563-08-33, Item 11.</p>
<p>If the FOIA or Privacy Act record deals with significant policy-making issues, it is a permanent record.</p>
<p>A FOIA or Privacy Act record may qualify as a permanent federal record if the FOIA or Privacy Act record deals with significant policy-making issues. The National Archives, a facility operated by the National Archives and Records Administration (NARA), is responsible for safeguarding Government records. It requires that permanent records go to the National Archives when they are at least 30 years old or when the Agency determines that they are no longer needed for business purposes. Permanent records include all records accessioned by NARA into the National Archives of the United States and later increments of the same records, and those for which the disposition is permanent on SF 115s, Request for Records Disposition Authority, approved by NARA on or after May 14, 1973.</p>
</xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent>
<p>For DHS Headquarters records, Deputy Chief FOIA Officer, Privacy Office, Department of Homeland Security, Washington, DC 20528. For components of DHS, the System Manager can be found at<i>http://www.dhs.gov/foia</i>under "contacts."</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p>If you are seeking notification of and access to any record contained in this system of records, or seeking to contest its content, you may submit a request in writing to the DHS Headquarters' or component's FOIA Officer, whose contact information can be found at<i>http://www.dhs.gov/foia</i>under "contacts." If you believe more than one component maintains records in this system of records concerning you, you may submit the request to the Chief Privacy Officer and Chief FOIA Officer, Department of Homeland Security, 245 Murray Drive SW., Building 410, STOP-0655, Washington, DC 20528.</p>
<p>When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity, meaning that you must provide your full name, current address and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer,<i>http://www.dhs.gov</i>or 1-866-431-0486. In addition you should:
</p><p>• Explain why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created; and
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.
</p><p>• If your request is seeking records on behalf of another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.
</p><p>• Without the above information the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p>See "Notification procedure" above.</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p>See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p>Records are obtained from those individuals who submit requests and administrative appeals pursuant to the FOIA and the Privacy Act or who file litigation regarding such requests and appeals; the agency record keeping systems searched in the process of responding to such requests and appeals; Departmental personnel assigned to handle such requests, appeals, and/or litigation; other agencies or entities that have referred to DHS requests concerning DHS records, or that have consulted with DHS regarding handling of particular requests; and submitters or subjects of records or information that have provided assistance to DHS in making access or amendment determinations.</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent>
<p>Pursuant to 5 U.S.C. 552a(j)(2), potions of this system are exempt from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3) and (4): (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8), (e)(12); (f); (g)(1); and (h). Additionally, pursuant to 5 U.S.C. 552a(k)(1), (k)(2), (k)(3), (k)(5), and (k)(6), portions of this system are exempt from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). When DHS is processing Privacy Act and/or FOIA requests, responding to appeals, or participating in FOIA or Privacy Act litigation, exempt materials from other systems of records may become part of the records in this system.</p>
<p>To the extent that copies of exempt records from other systems of records are entered into this system, DHS claims the same exemptions for those records that are claimed for the original primary systems of records from which they originated.</p>
</xhtmlContent></subsection></section>
<section id="all2" toc="yes">
	<systemNumber>/ALL-002</systemNumber>
<subsection type="systemName">Department of Homeland Security Mailing and Other Lists System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>This system of records is located in the Department of Homeland Security, Washington, DC 20528, as well as in the
component DHS offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>All persons appearing on mailing lists maintained throughout DHS to facilitate mailings to multiple addressees
and other activities in furtherance of DHS duties. These lists include persons who have requested DHS material; members
of the news media who have provided contact information; persons who serve on DHS boards and committees other than those
covered by the Federal Advisory Committee Act which are covered under DHS/ALL 009 Advisory Committees (73 FR 57639), and
other individuals having business with DHS who have provided contact information; individuals who enter contests
sponsored by DHS; contractors or other individuals who work or attend meetings at DHS; and other persons who attend or
have an interest in DHS programs, contests, exhibits, conferences, training courses, and similar events.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Individual’s name;
</p><p>• Age;
</p><p>• School grade; (where appropriate)
</p><p>• School name; (where appropriate)
</p><p>• Telephone numbers;
</p><p>• E-mail address;
</p><p>• Mailing address;
</p><p>• Position/title;
</p><p>• Business affiliation (where appropriate);
</p><p>• Other contact information provided to DHS by individuals covered by this system of records; and
</p><p>• Computer-generated identifier or case number where created in order to retrieve information.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; 44 U.S.C. 3101.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The system is maintained for the purpose of mailing informational literature or responses to those who request
it; maintaining lists of individuals who attend meetings; maintaining information regarding individuals who enter
contests sponsored by DHS; and for other purposes for which mailing or contact lists may be created.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records of information contained in this system may be disclosed outside Department of Homeland Security (DHS) as
a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:
</p><p>A. To the Department of Justice or other Federal agency conducting litigation or in proceedings before any court,
adjudicative or administrative body, when it is necessary to the litigation and one of the following is a party to the
litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>J. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Information typically will be retrieved by an identification number assigned by computer or case number where
created for tracking purposes, by e-mail address, or by name of an individual.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Some records are retained and disposed of in accordance with the National Archives and Records Administration’s
General Records Schedule 12 (Communications Records). Other records are retained and disposed of in accordance with
General Records Schedule 1. Files may be retained for up to three years or less depending on the record. For records that
may be used in litigation, the files related to that litigation will be retained for three years after final court
adjudication.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>For Headquarters components of the Department of Homeland Security, the System Manager is the Director of
Departmental Disclosure, Department of Homeland Security, Washington, DC 20528. For components of the Department of
Homeland Security, the System Manager can be found at <i>http://www.dhs.gov/foia</i> under "contacts."
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to the component’s FOIA Officer, whose contact information can be
found at <i>http://www.dhs.gov/foia</i> under "contacts." If an individual believes more than one component
maintains Privacy Act records concerning him or her the individual may submit the request to the Chief Privacy Officer,
Department of Homeland Security, 245 Murray Drive, SW., Building 410, STOP-0550, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Identify which component(s) of the Department you believe may have the information about you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) will not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information contained in this system is obtained from affected individuals/organizations, public source data,
other government agencies and/or information already in other DHS records systems.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="all3" toc="yes">
<systemNumber>/ALL-003</systemNumber>

<subsection type="systemName">Department of Homeland Security General Training Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at several Headquarters locations and in component offices of the Department of Homeland
Security, in both Washington, DC and field locations.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>The Homeland Security Act of 2002, Pub. L. 107-296, 6 U.S.C. 121; Federal Records Act, 44 U.S.C. 3101; 6
CFR Part 5; 5 U.S.C. app. 3; 5 U.S.C. 301 and Ch. 41; Executive Order 11348, as amended by Executive Order 12107; and
Executive Order 9397 (SSN).
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Current and former employees of DHS, volunteers and contractors; any individual who is or has been an employee of
DHS and who has applied for, participated in or assisted with a training program; any other Federal employee or private
individual, including contractors and others, who has participated in or assisted with training programs recommended,
sponsored or operated by the Department of Homeland Security; and other participants in training programs, including
instructors, course developers, observers, and interpreters.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>The system includes all records pertaining to training, including:
</p><p>• Individual’s name;
</p><p>• Date of birth;
</p><p>• Social security number;
</p><p>• Address;
</p><p>• Phone numbers;
</p><p>• Email addresses;
</p><p>• Occupation;
</p><p>• Nomination forms;
</p><p>• Registration forms;
</p><p>• Course rosters and sign-in sheets;
</p><p>• Instructor lists;
</p><p>• Schedules;
</p><p>• Payment records, including financial, travel and related expenditures;
</p><p>• Examination and testing materials;
</p><p>• Grades and student evaluations;
</p><p>• Course and instructor critiques;
</p><p>• Equipment issued to trainees and other training participants; and other reports pertaining to training;
and
</p><p>• Individuals who apply for but are not accepted for training.
</p><p>Purpose:</p>
<p>This record system will collect and document training given to DHS employees, contractors, and others who are
provided DHS training. This system will provide DHS with a means to track the particular training that is provided,
identify training trends and needs, monitor and track the expenditure of training and related travel funds, schedule
training classes and programs, schedule instructors, track training items issued to students, assess the effectiveness of
training, identify patterns, respond to requests for information related to the training of DHS personnel and other
individuals, and facilitate the compilation of statistical information about training.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records of information contained in this system may be disclosed outside Department of Homeland Security (DHS) as
a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:
</p><p>A. To the Department of Justice or other Federal agency conducting litigation or in proceedings before any court,
adjudicative or administrative body, when it is necessary to the litigation and one of the following is a party to the
litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To a Federal, State, tribal, local or foreign government agency or professional licensing authority in response to
its request, in connection with the hiring or retention of an employee, the issuance of a security clearance, the
reporting of an investigation of an employee, the letting of a contract, or the issuance or status of a license, grant,
or other benefit by the requesting entity, to the extent that the information is relevant and necessary to the requesting
entity’s decision on the matter.
</p><p>I. To educational institutions or training facilities for purposes of enrollment and verification of employee
attendance and performance.
</p><p>J. To the Equal Employment Opportunity Commission, Merit Systems Protection Board, Office of the Special Counsel,
Federal Labor Relations Authority, or Office of Personnel Management or to arbitrators and other parties responsible for
processing any personnel actions or conducting administrative hearings or appeals, or if needed in the performance of
authorized duties.
</p><p>K. To the Department of Justice or a consumer reporting agency for further action on a delinquent debt when
circumstances warrant.
</p><p>L. To employers to the extent necessary to obtain information pertinent to the individual’s fitness and qualifications
for training and to provide training status.
</p><p>M. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>Yes.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Data may be retrieved by the individual’s name, social security number, or other personal identifier.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records are maintained and disposed in accordance with National Archives and Records Administration General
Records Schedule, No. 1.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>For Headquarters components of the Department of Homeland Security, the System Manager is the Director of
Departmental Disclosure, Department of Homeland Security, Washington, DC 20528. For components of the Department of
Homeland Security, the System Manager can be found at <i>http://www.dhs.gov/foia</i> under "contacts."
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to the component’s FOIA Officer, whose contact information can be
found at <i>http://www.dhs.gov/foia</i> under "contacts." If an individual believes more than one component
maintains Privacy Act records concerning him or her the individual may submit the request to the Chief Privacy Officer,
Department of Homeland Security, 245 Murray Drive, SW., Building 410, STOP-0550, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Identify which component(s) of the Department you believe may have the information about you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) will not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification Procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification Procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information originates within DHS and from the individual to whom the record pertains.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security has exempted certain records in this system on the basis of 5 U.S.C. 552a(k)
(6) in order to preserve the objectivity and fairness of testing and examination material.
</p></xhtmlContent></subsection></section>
<section id="all4" toc="yes">
<systemNumber>/ALL-004</systemNumber>
<subsection type="systemName">Department of Homeland Security General Information Technology Access Account Records System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Sensitive but unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at several Headquarters locations and in component offices of the Department of Homeland
Security, in both Washington, DC and field locations.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>• All persons who are authorized to access DHS information technology resources, including employees,
contractors, grantees, private enterprises, and any lawfully designated representative of the above and including
representatives of federal, state, territorial, tribal, local, international, or foreign government agencies or entities,
in furtherance of the DHS mission.
</p><p>• Individuals who serve on DHS boards and committees;
</p><p>• Individuals who have business with DHS and who have provided personal information in order to facilitate
access to DHS information technology resources;
</p><p>• Individuals who are points of contact provided for government business, operations, or programs, and the
individual(s) they list as emergency contacts;
</p><p>• Individuals who voluntarily join a DHS-owned and operated web portal for collaboration purposes; and
</p><p>• Individuals who request access but are denied, or who have had access revoked.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>• Name;
</p><p>• Social Security Number;
</p><p>• Business and affiliations;
</p><p>• Facility positions held;
</p><p>• Business telephone numbers;
</p><p>• Cellular phone numbers;
</p><p>• Pager numbers;
</p><p>• Numbers where individuals can be reached while on travel or otherwise away from the office;
</p><p>• Citizenship;
</p><p>• Level of access;
</p><p>• Home addresses;
</p><p>• Business addresses;
</p><p>• Electronic mail addresses of senders and recipients;
</p><p>• Justification for access to DHS computers, networks, or systems;
</p><p>• Verification of training requirements or other prerequisite requirements for access to DHS computers,
networks, or systems;
</p><p>• Records on access to DHS computers and networks including user ID and passwords;
</p><p>• Registration numbers or IDs associated with DHS Information Technology resources;
</p><p>• Date and time of access;
</p><p>• Logs of activity of DHS IT resources;
</p><p>• IP address of access;
</p><p>• Logs of Internet activity; and
</p><p>• Records on the authentication of the access request, names, phone numbers of other contacts, and positions
or business/organizational affiliations and titles of individuals who can verify that the individual seeking access has a
need to access as well as other contact information provided to the Department that is derived from other sources to
facilitate authorized access to DHS Information Technology resources.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>44 U.S.C. 3101; EO 9397 (SSN), as amended by EO 13487; and 44 U.S.C. 3534.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>This system will collect a discreet set of personally identifiable information in order to provide authorized
individuals access to, or interact with DHS information technology resources, and allow DHS to track use of DHS IT
resources. Directly resulting from the use of DHS information technology resources is the collection, review, and
maintenance of any logs, audits, or other such security data regarding the use of such information technology resources.
</p><p>The system enables DHS to maintain: Account information required for approved access to information technology; lists
of individuals who are appropriate organizational points of contact; and lists of individuals who are emergency points of
contact. The system will also enable DHS to provide individuals access to certain programs and meeting attendance and
where appropriate, allow for sharing of information between individuals in the same operational program to facilitate
collaboration.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3), as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body, when it is relevant or necessary to
the litigation and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or General Services Administration pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but
only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To sponsors, employers, contractors, facility operators, grantees, experts, and consultants in connection with
establishing an access account for an individual or maintaining appropriate points of contact and when necessary to
accomplish a DHS mission function or objective related to this system of records.
</p><p>I. To other individuals in the same operational program supported by an information technology system, where
appropriate notice to the individual has been made that his or her contact information will be shared with other members
of the same operational program in order to facilitate collaboration.
</p><p>J. To federal agencies such as Office of Personnel Management, the Merit Systems Protection Board, the Office of
Management and Budget, Federal Labor Relations Authority, Government Accountability Office, and the Equal Employment
Opportunity Commission in the fulfillment of these agencies’ official duties.
</p><p>K. To international, federal, state and local, tribal, private and/or corporate entities for the purpose of the
regular exchange of business contact information in order to facilitate collaboration for official business.
</p><p>L. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are on paper and/or in digital or other electronic form. Digital and other electronic
images are stored on a storage area network in a secured environment. Records, whether paper or electronic, may be stored
at the DHS Headquarters or at the component level.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Information may be retrieved, sorted, and/or searched by an identification number assigned by computer, social
security number, by facility, by business affiliation, email address, or by the name of the individual, or other employee
data fields previously identified in this SORN.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Information in this system is safeguarded in accordance with applicable laws, rules and policies, including the
DHS Information Technology Security Program Handbook and DHS Information Security Program Policy and Handbook. Further,
DHS/ALL-004 General Information Technology Access Account Records system of records security protocols will
meet multiple National Institute of Standards and Technology (NIST) Security Standards from Authentication to
Certification and Accreditation. Records in the DHS/ALL-004 General Information Technology Access Account
Records system of records will be maintained in a secure, password-protected electronic system that will utilize security
hardware and software to include: Multiple firewalls, active intruder detection, and role-based access controls.
Additional safeguards will vary by component and program. All records are protected from unauthorized access through
appropriate administrative, physical, and technical safeguards. These safeguards include: Restricting access to
authorized personnel who have a "need to know;" using locks; and password protection identification features.
Classified information is appropriately stored in accordance with applicable requirements. DHS file areas are locked
after normal duty hours and the facilities are protected from the outside by security personnel.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records are securely retained and disposed of in accordance with the National Archives and Records
Administration’s General Records Schedule 24, section 6, "User Identification, Profiles, Authorizations, and
Password Files." Inactive records will be destroyed or deleted 6 years after the user account is terminated or
password is altered, or when no longer needed for investigative or security purposes, whichever is later.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>The System Manager is the Chief Information Officer (CIO), Department of Homeland Security, Washington, DC 20528.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to the Headquarters’ or component’s FOIA Officer, whose contact
information can be found at <i>http://www.dhs.gov/foia</i> under "contacts." If an individual believes more
than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the
Chief Privacy Officer and Chief Freedom of Information Act Officer, Privacy Office, Department of Homeland Security, 245
Murray Drive SW., Building 410, STOP-0655, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records, your
request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, <i>http://www.dhs.gov</i> or 1
-866-431-0486. In addition you should:
</p><p>• Explain why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created; and
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records.
</p><p>If your request is seeking records pertaining to another living individual, you must include a statement from that
individual certifying his/her agreement for you to access his/her records.
</p><p>Without the above information the component(s) may not be able to conduct an effective search, and your request may be
denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information contained in this system is obtained from affected individuals/organizations/facilities, public
source data, other government agencies and/or information already in other DHS records systems.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="all5" toc="yes">
<systemNumber>/ALL-005</systemNumber>
<subsection type="systemName">DHS Redress and Response Records System.</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained by the Department of Homeland Security at the DHS Data Center in Washington, DC and at a
limited number of remote locations where DHS components or programs maintain secure facilities and conduct DHS’s mission.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this notice consist of:
</p><p>A. All individuals who submit information through the DHS Traveler Redress Inquiry Program (TRIP).
</p><p>B. All individuals whose records have been referred to a DHS component or program redress process by other components,
programs, or agencies in connection with DHS TRIP.
</p><p>C. Attorneys or other persons representing individuals submitting such requests and appeals and individuals who are
the subjects of such requests.
</p><p>D. DHS personnel or contractors assigned to handle such requests or appeals.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>DHS Redress and Response Records System may contain:
</p><p>A. Individual’s name; date of birth; contact information; phone number; e-mail address; address; flight or travel
information; application information, including the date of request and a description of the circumstances that led to
the request of the redress form; passport number; appropriate immigration documents; documents used to support
application for entry; correspondence from individuals regarding their redress requests; records of contacts made by or
on behalf of individuals; documents submitted to verify identity or otherwise support the request for redress; and any
other document relevant and appropriate to the particular redress program.
</p><p>B. For those requesting redress as representatives of affected individuals, representative name, contact information,
phone number, e-mail address, relationship to the affected individuals, and power of attorney.
</p><p>C. The name of the DHS component, DHS program, or other Federal agency, which will be responsible for addressing the
incoming redress request as well as supporting components or agencies.
</p><p>D. Administrative and contact information concerning DHS employees, contractors, or other agency representatives
associated with the processing and/or adjudication of requests submitted to the redress process.
</p><p>E. Appropriate information to reflect the resolution of a particular redress request, information determined during
adjudication of the case, and sensitive information relevant to the redress process for the individual.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>Privacy Act of 1974, 5 U.S.C. 552a, as amended; Intelligence Reform and Terrorism Prevention Act of 2004, section
4012, 49 U.S.C. 114(f); 19 U.S.C. 482, 1461, 1496, and 1581-1582; 8 U.S.C. 1357; Title VII of Public Law 104-
208; 49 U.S.C. 44909; and others.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>This system maintains records in support of DHS TRIP that: (1) Coordinates DHS traveler redress programs to
create a more efficient, effective, and easier process for individuals who believe they have been denied entry, refused
boarding for transportation, or identified for additional screening at DHS component or program operational locations,
including airports, seaports, train stations and land borders that may result in the individual being delayed or
inconvenienced; and (2) stores information submitted by and collected from the individual or an individual’s
representative and information recompiled from or created from information from other DHS components and program and
other government agencies, in order to address the individual’s redress request.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3):
</p><p>A. To a Federal, State, territorial, tribal, local, international, or foreign government agency or entity for the
purpose of consulting with that agency or entity: (1) To assist in making a determination regarding redress for an
individual in connection with the operations of a DHS component or program; (2) for the purpose of verifying the identity
of an individual seeking redress in connection with the operations of a DHS component or program; or (3) for the purpose
of verifying the accuracy of information submitted by an individual who has requested such redress on behalf of another
individual.
</p><p>B. To a Federal agency or entity that furnished a record or information for the purpose of permitting that agency or
entity to make a decision regarding access to or correction of the record or information or to a Federal agency or entity
that has information relevant to the redress request for purposes of obtaining guidance, additional information, or
advice from such Federal agency or entity regarding the handling of this particular redress request.
</p><p>C. To third parties lawfully authorized in connection with a Federal Government program, which is authorized by law,
regulation, or rule, but only the information necessary and relevant to effectuate or to carry out a particular redress
result for an individual and disclosure is appropriate to enable these third parties to carry out their responsibilities
related to the Federal Government program, such as when the name and appropriate associated information about an
individual who has been cleared and distinguished from a known or suspected threat to aviation security, is shared with
the airlines to prevent future delays and disruptions for that individual while traveling.
</p><p>D. To contractors, grantees, experts, consultants, and others performing or working on a contract, service, grant,
cooperative agreement, or otherwise have an agency relationship with DHS, when the disclosure is necessary and relevant
to the operation of the DHS TRIP program or the redress process of a DHS component or program in compliance with the
Privacy Act, 5 U.S.C. 552a, as amended, including 5 U.S.C. 552a(m), in the case of the operation of all or a portion of
this system of records on behalf of DHS.
</p><p>E. To an appropriate Federal, State, territorial, tribal, local, international, or foreign law enforcement agency or
other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law,
where a record, either on its face or in conjunction with other information, indicates a violation or potential violation
of law, which includes criminal, civil, or regulatory violations and disclosure is appropriate to the proper performance
of the official duties of the person receiving the disclosure.
</p><p>F. To an appropriate Federal, State, territorial, tribal, local, international, or foreign government intelligence
entity, counterterrorism agency, or other appropriate authority charged with investigating threats or potential threats
to national or international security or assisting in counterterrorism efforts, where a record, either on its face or in
conjunction with other information, identifies a threat or potential threat to national or international security, which
includes terrorist activities, and disclosure is appropriate to the proper performance of the official duties of the
person receiving the disclosure.
</p><p>G. To a Congressional office, for the record of an individual in response to an inquiry from that Congressional office
made at the request of the individual to whom the record pertains.
</p><p>H. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>I. To the United States Department of Justice (DOJ) (including United States Attorney offices) or another Federal
agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is
necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:
(1) The United States, or any department or agency thereof; (2) any employee of DHS in his or her official capacity; or
(3) any employee of DHS in his or her individual capacity where DOJ has agreed to represent said employee.
</p><p>J. To appropriate agencies, entities, and persons when: (1) It is suspected or confirmed that the security or
confidentiality of information in the System of Records has been compromised; (2) DHS has determined that, as a result of
the suspected or confirmed compromise, there is a risk of harm to economic or property interests, identity theft or
fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or
another agency or entity) that rely upon the compromised information; and (3) the disclosure is made to such agencies,
entities, and persons who are reasonably necessary to assist in connection with the DHS’s efforts to respond to the
suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records are stored electronically at the DHS Data Center in a secure facility. In addition, the records may be
stored on a local system, magnetic disc, tape, CD-ROM, and other digital media, and may also be retained in hard
copy format in secure file folders at the location of the DHS component or program for which the redress process exists.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Data are retrievable by the individual’s name or other identifier, such as case number, as well as non-
identifying information.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Information in this system is safeguarded in accordance with applicable laws, rules, and policies, including the
DHS Information Technology Security Program Handbook. The Redress and Response Records System security protocols will
meet applicable NIST Security Standards, from Authentication to Certification and Accreditation. Records in the system
will be maintained in a secure, password-protected electronic system that will utilize security hardware and software to
include multiple firewalls, active intruder detection, and role-based access controls. Additional safeguards will vary by
component and program. All records are protected from unauthorized access through appropriate administrative, physical,
and technical safeguards. These safeguards include restricting access to authorized personnel who have a need-to-know,
using locks, and password protection identification features. DHS file areas are locked after normal duty hours and the
facilities are protected from the outside by security personnel.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>DHS TRIP handles both information collected directly from the individual and information collected from DHS
components and other agencies. DHS is working on a retention schedule with its Senior Records Officer for information
collected directly from the individual. It is anticipated that the retention period for these records will be up to seven
years. To the extent information is collected from other systems, data is retained in accordance with the record
retention requirements of those systems.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>The System Manager is the Program Manager, DHS TRIP, U.S. Department of Homeland Security, Washington, DC 20528.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Any individual who wants to know whether this system of records contains a record about him or her may contact
the System Manager, noted above. An e-mail address and fax number will be provided to the individual after the submission
of the redress request that may also be used.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Requests for access should be submitted to the System Manager when an individual seeks to access his or her
information. Requesters will be required to provide adequate identification, such as a driver’s license, employee
identification card, or other identifying document. Additional identification procedures may be required in some
instances in accordance with various adjudication procedures related to the redress processing by DHS components or other
agencies.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Requests for correction or amendment must identify the information to be changed and the corrective action
sought. Requests must be submitted to the System Manager as provided above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Any person, including citizens and representatives of Federal, State or local governments; businesses; and
industries. Any Federal system with records appropriate and relevant to the redress process.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>No exemption shall be asserted with respect to information submitted by and collected from the individual or the
individual’s representative in the course of any redress process associated with this System of Records.
</p><p>This system, however, may contain records or information recompiled from or created from information contained in
other systems of records, which are exempt from certain provisions of the Privacy Act. For these records or information
only, in accordance with 5 U.S.C. 552a(j)(2), (k)(1), (k)(2), and (k)(5), DHS will also claim the original exemption for
these records or information from subsections (c)(3) and (4); (d)(1), (2), (3), and (4); (e)(1), (2), (3), (4)(G) through
(I), (5), and (8); (f); and (g) of the Privacy Act of 1974, as amended, as necessary and appropriate to protect such
information. Such exempt records or information may be law enforcement or national security investigation records, law
enforcement activity and encounter records, or terrorist screening records.
</p><p>These records could come from various DHS systems, such as the Treasury Enforcement Communications System (TECS) and
the Transportation Security Information System (TSIS), or from third agency systems. DHS, after conferring with the
appropriate component or agency, may waive applicable exemptions in appropriate circumstances and where it would not
appear to interfere with or adversely affect the law enforcement or national security purposes of the systems from which
the information is recompiled or in which it is contained. As required under the Privacy Act, DHS will issue a rule to
describe more fully the needs and requirements for taking such exemptions on such information.
</p></xhtmlContent></subsection></section>
<section id="all6" toc="yes">
<systemNumber>/ALL-006</systemNumber>
<subsection type="systemName">Department of Homeland Security Accident Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at several Headquarters locations and in component offices of DHS, in both Washington, DC,
and field locations.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include DHS employees or contractors and non-employees who have
been injured on DHS property, or while performing their official duties. DHS employees or other individuals who file
claims seeking benefits under the Federal Employee Compensation Act File (FECA) are covered by DOL/GOVT-1 Workers’
Compensation Programs, Federal Employee Compensation Act File, and are not included in this DHS system.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Injured person’s name;
</p><p>• Individual’s age;
</p><p>• Job title;
</p><p>• Length of employment and current position;
</p><p>• Employee classification;
</p><p>• Home address;
</p><p>• Telephone number;
</p><p>• Accident and investigation reports;
</p><p>• Accident and/or report number;
</p><p>• Date of accident;
</p><p>• Place of accident;
</p><p>• Nature of accident;
</p><p>• Operator license;
</p><p>• Insurance information;
</p><p>• Description of injury;
</p><p>• Description of vehicles involved (title, make, year, license number, driver), if applicable;
</p><p>• Type of treatment given;
</p><p>• Description of the damaged property;
</p><p>• Root cause analysis;
</p><p>• Safety and health programs involved;
</p><p>• Records of injuries and illnesses;
</p><p>• Physicians’ reports;
</p><p>• Incident analysis;
</p><p>• Short-term and long-term preventive actions taken;
</p><p>• Correspondence involving insurance claims; and
</p><p>• Witness, suspect, subject information.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; The Federal Records Act, 44 U.S.C. 3101; Section 19 of Occupational Health &amp;amp;amp;amp;amp;amp; Safety Act of
1970; 5 U.S.C. 8101-8150, 8191-8193; Executive Order 11807.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to document accidents that occur on DHS property or while an employee or contractor
is on official duty.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body when it is necessary to the litigation
and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where the Department of Justice or DHS has agreed to represent
the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. &amp;amp;amp;amp;amp;#167;&amp;amp;amp;amp;amp;#167; 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To the employee’s beneficiary in the event of death following the accident or injury or to the employee’s agent in
case of disability.
</p><p>I. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to
opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection
with criminal law proceedings or in response to a subpoena from a court of competent jurisdiction.
</p><p>J. To third parties during the course of law enforcement investigation to the extent necessary to obtain information
pertinent to the investigation, provided disclosure is appropriate to the proper performance of the official duties of
the officer making the disclosure.
</p><p>K. To appropriate Federal, State, local, tribal, or foreign governmental agencies or multilateral governmental
organizations for the purpose of protecting the vital interests of a data subject or other persons, including to assist
such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to
combat other significant public health threats; appropriate notice will be provided of any identified health threat or
risk.
</p><p>L. To Department of Labor for processing and adjudicating claims under the Federal Employee’s Compensation Act or
other workmen’s compensation claims.
</p><p>M. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by name, accident and/or report number, and/or date of accident.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records are destroyed six years after a case is closed, in accordance with National Archives and Records
Administration General Records Schedule 10, Item 5.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>For Headquarters and components of DHS, the System Manager is the Director of Departmental Disclosure, Department
of Homeland Security, Washington, DC 20528. For components of DHS, the System Manager can be found at <i>
http://www.dhs.gov/foia</i> under "contacts."
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to the Headquarters or component’s FOIA Officer, whose contact
information can be found at <i>http://www.dhs.gov/foia</i> under "contacts." If an individual believes more
than one component maintains Privacy Act records concerning him or her the individual may submit the request to the Chief
Privacy Officer, Department of Homeland Security, 245 Murray Drive, SW., Building 410, STOP-0550, Washington, DC
20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Identify which component(s) of the Department you believe may have the information about you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification Procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification Procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information originates with individuals, including employees and contractors, who have been injured on DHS
property or while excising their official duties. Police reports, witness reports, statements from employees’
supervisors, doctors’ reports, reports of investigations conducted DHS, and/or insurance claims may also be included.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from subsections (d) of the Privacy Act pursuant to 5
U.S.C. 552a(k)(3).
</p></xhtmlContent></subsection></section>
<section id="all7" toc="yes">
<systemNumber>/ALL-007</systemNumber>
    <subsection type="systemName">
        Department of Homeland Security (DHS)/ALL-007 Accounts Payable.
    </subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p>Unclassified.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p>Records are maintained at several Headquarters locations and in Component offices of DHS, in both Washington, D.C. and field offices.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p>The Chief Financial Officer, Financial Management Division, ocfo-fmd@hq.dhs.gov, Department of Homeland Security, Washington, D.C. 20528.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="authorityForMaintenance">
        <xhtmlContent>
            <p> 5 U.S.C. 5701 et seq., Travel, Transportation, and Subsistence; 44 U.S.C. 3101; 19 U.S.C. 1451; 31 U.S.C. 7701(c); the Chief Financial Officers Act of 1990, Pub. L. 101-576; Digital Accountability and Transparency Act (DATA Act) of 2014, Pub. L. 113-101, sec. 5; Debt Collection Improvement Act of 1996, Pub. L. 104-134; and 6 CFR part 11, Subpart A – Debt Collection.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p>The purpose of this system is to collect and maintain information from individuals in connection with reimbursable services provided to DHS to ensure the Department properly pays these individuals. This system will allow DHS to maintain payment records and record monies owed.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
            <p> Categories of individuals include any individual or organization that serves as a creditor to DHS, including parties in interest for which reimbursable services are performed and employees for travel related reimbursements.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p> Categories of records in this system includes:</p>
            <p>•Individual’s name;</p>
            <p>•Date of birth;</p>
            <p>•Employee identification number;</p>
            <p>•Tax identification number, which may be a Social Security number in certain instances;</p>
            <p>•Addresses and other general contact information, such as phone numbers, facsimile numbers, or email addresses;</p>
            <p>•Importer of record number;</p>
            <p>•Records of expenses (bills, refund checks, receipts, out-of-pocket travel expenses);</p>
            <p>•Records of payments;</p>
            <p>•Disbursement schedules;</p>
            <p>•Bank account information;</p>
            <p>•Invoices</p>
            <p>•Monies owed; and</p>
            <p>•Electronic financial institution data.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p>Records are obtained from DHS, its Components and offices, and individuals submitting supporting documentation for reimbursement.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p>In addition to those disclosures generally permitted under 5 U.S.C. § 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. § 552a(b)(3) as follows:</p>
            <p> A. To the Department of Justice (DOJ), including Offices of the United States Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
            <p>  1. DHS or any Component thereof;</p>
            <p>  2. Any employee or former employee of DHS in his/her official capacity;</p>
            <p>  3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
            <p>  4. The United States or any agency thereof.</p>
            <p> B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
            <p> C. To the National Archives and Records Administration or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. §§ 2904 and 2906.</p>
            <p> D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
            <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
            <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
            <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
            <p> H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            <p> I. To unions recognized as exclusive bargaining representatives under the Civil Service Reform Act of 1978, 5 U.S.C. §§ 7111 and 7114.</p>
            <p> J. To the Merit Systems Protection Board, arbitrators, the Federal Labors Relations Authority, Equal Employment Opportunity Commission, and other parties responsible for the administration of the Federal Labor-Management Program for the purpose of processing any corrective actions, grievances, or conducting administrative hearings or appeals, or if needed in the performance of other similar authorized duties.</p>
            <p> K. To federal agencies that provide financial management services for DHS Components under a cross-servicing agreement for purposes such as budgeting, purchasing, procurement, reimbursement, reporting, and collection functions.</p>
            <p> L.To the Department of the Treasury to verify eligibility for payment and to effect disbursement of authorized payments.</p>
            <p> M. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
            <p>To the U.S. Department of the Treasury when disclosure of the information is relevant to review payment and award eligibility through the Do Not Pay Working System for the purposes of identifying, preventing, or recouping improper payments to an applicant for, or recipient of, Federal funds, including funds disbursed by a state (meaning a state of the United States, the District of Columbia, a territory or possession of the United States, or a federally recognized Indian tribe) in a state-administered, federally funded program.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p>DHS stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
            <p>Records may be retrieved by an individual’s name, tax identification number/Social Security number, employee identification number, or other personal identifier referenced in the categories of records in the system.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p>DHS destroys records six years after final payment or cancellation, or longer if required for a business use, in accordance with National Archives and Records Administration (NARA) General Records Schedule 1.1, Financial Management and Reporting Records, item 010, and DAA-GRS-2013-0003-0001.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
            <p>DHS safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and Headquarters or Component’s Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one Component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
            <p>When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR part 5. The individual must first verify his or her identity, meaning that the individual must provide his or her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
            <p>•Explain why he or she believes the Department would have information on him or her;</p>
            <p>•Identify which Component(s) of the Department the individual believes may have the information about him or her;</p>
            <p>•Specify when the individual believes the records would have been created; and</p>
            <p>•Provide any other information that will help the FOIA staff determine which DHS Component agency may have responsive records.</p>
            <p>If an individual’s request is seeking records pertaining to another living individual, the person seeking the records must include a statement from the subject individual certifying his or her agreement for the requestor to access his or her records.</p>
            <p>Without the above information, the Component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p>For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p>See "Record Access Procedures."</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p> None.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="history">
        <xhtmlContent>
            <p>80 FR 58289 (September 28, 2015); 73 FR 61885 (October 17, 2008).</p>
        </xhtmlContent></subsection></section>
<section id="all8" toc="yes">
<systemNumber>/ALL-008</systemNumber>
    <subsection type="systemName">
        Department of Homeland Security (DHS)/ALL-008 Accounts Receivable.
    </subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p>Unclassified.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p>Records are maintained at several Headquarters locations and in Component offices of DHS, in both Washington, D.C. and field offices.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p>The Chief Financial Officer, Financial Management Division, ocfo-fmd@hq.dhs.gov, Department of Homeland Security, Washington, D.C. 20528.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="authorityForMaintenance">
        <xhtmlContent>
            <p>5 U.S.C. sec. 5701 et seq., Travel, Transportation, and Subsistence; 19 U.S.C. sec. 1451; 26 U.S.C. sec. 6401(d); 31 U.S.C. sec. 7701(c);  Chief Financial Officers Act of 1990, Pub. L. 101-576; Federal Debt Collection Procedures Act of 1990, Pub. L. 101-647; Debt Collection Improvement Act of 1996, Pub. L. 104-134; Digital Accountability and Transparency Act (DATA Act) of 2014, Pub. L. 113-101, sec. 5; and 6 C.F.R. Part 11, Subpart A – Debt Collection.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p>The purpose of this system is to collect and maintain records of debts owed to DHS.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
            <p>Any individual or organization that is indebted to DHS. This may include: (1) individuals; (2) household members; (3) spouses; and (4) employers.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p>•Individual’s name;</p>
            <p>•Date of birth;</p>
            <p>•Tax identification number, which may be a Social Security number in certain instances;</p>
            <p>•Addresses;</p>
            <p>•Phone numbers;</p>
            <p>•Email addresses;</p>
            <p>•Name of employer;</p>
            <p>•Waiver of Debt Letter of Appeal;</p>
            <p>•Receipts;</p>
            <p>•Notices of debts;</p>
            <p>•Invoices;</p>
            <p>•Record of payments, including refunds and overpayments;</p>
            <p>•Records of previous improper payments by DHS;</p>
            <p>•Records relevant to determinations of an individual’s or organization’s eligibility to receive payments from the Federal Government, including death records, Federal debt records, and status of individuals on Federal sanctions lists;</p>
            <p>•Number and amount of unpaid or overdue bills;</p>
            <p>•Record of satisfaction of debt or referral for further action;</p>
            <p>•Correspondence and documentation with debtors and creditors;</p>
            <p>•Electronic financial institution data;</p>
            <p>•Household Information:</p>
            <p>• Spouse information:</p>
            <p>•Date of birth;</p>
            <p>•Basic contact information;</p>
            <p>•Tax identification number, which may be a Social Security number in certain instances; and</p>
            <p>•Name of employer.</p>
            <p>• Dependent information:</p>
            <p>•Name;</p>
            <p>•Age;</p>
            <p>•Relationship.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p>Records are obtained from DHS, its Components and offices, and individuals submitting supporting documentation for reimbursement. Records covered by other systems of records include the Department of the Treasury/Bureau of the Fiscal Service .023-Do Not Pay Payment Verification Records, 78 FR 73923 (Dec. 9, 2013).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
            <p>A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other Federal agency conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
            <p>1. DHS or any Component thereof;</p>
            <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
            <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
            <p>4. The United States or any agency thereof.</p>
            <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
            <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. sec. 2904 and 2906.</p>
            <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
            <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
            <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
            <p>G. To an appropriate Federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
            <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            <p>I. To a Federal, state, or local agency so that the agency may adjudicate an individual’s eligibility for a benefit.</p>
            <p>J. To the DOJ or other Federal agency for further collection action on any delinquent debt when circumstances warrant.</p>
            <p>K. To a debt collection agency for the purposes of debt collection.</p>
            <p>L. To approved Federal, state, and local government agencies for any legally mandated purpose in accordance with their authorizing statute or law and where an approved Memorandum of Agreement or Computer Matching Agreement is in place between DHS and the entity.</p>
            <p>M. To provide information to unions recognized as exclusive bargaining representatives under the Civil Service Reform Act of 1978, 5 U.S.C. sec. 7111 and 7114.</p>
            <p>N. To the Merit Systems Protection Board, arbitrators, the Federal Labor Relations Authority, Equal Employment Opportunity Commission, and other parties responsible for the administration of the Federal Labor-Management Relations Program for the purpose of processing any corrective actions, grievances, or conducting administrative hearings or appeals, or if needed in the performance of other similar authorized duties.</p>
            <p>O. To Federal agencies that provide financial management services for DHS Components under a cross-servicing agreement for purposes such as budgeting, purchasing, procurement, reimbursement, reporting, and collection functions.</p>
            <p>P. To the Government Accountability Office, DOJ, or Offices of the United States Attorney, copies of the Debt Collection Officer’s file regarding the debt and actions taken to attempt to collect monies owed.</p>
            <p>Q. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            <p>To the U.S. Department of the Treasury when disclosure of the information is relevant to review payment and award eligibility through the Do Not Pay Working System for the purposes of identifying, preventing, or recouping improper payments to an applicant for, or recipient of, Federal funds, including funds disbursed by a state (meaning a state of the United States, the District of Columbia, a territory or possession of the United States, or a federally recognized Indian tribe) in a state-administered, federally funded program.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p>DHS stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
            <p>Records may be retrieved by an individual’s name, tax identification number/Social Security number, employee identification number, or other personal identifier.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p>DHS destroys records six years after final payment or cancellation, or longer if required for a business use, in accordance with National Archives and Records Administration (NARA) General Records Schedule 1.1, Financial Management and Reporting Records, item 010, and DAA-GRS-2013-0003-0001.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
            <p>DHS safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and Headquarters or Component’s Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one Component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
            <p>When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his or her identity, meaning that the individual must provide his or her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
            <p>•Explain why he or she believes the Department would have information on him or her;</p>
            <p>•Identify which Component(s) of the Department the individual believes may have the information about him or her;</p>
            <p>•Specify when the individual believes the records would have been created; and</p>
            <p>•Provide any other information that will help the FOIA staff determine which DHS Component agency may have responsive records.</p>
            <p>If an individual’s request is seeking records pertaining to another living individual, the person seeking the records must include a statement from the subject individual certifying his or her agreement for the requestor to access his or her records.</p>
            <p>Without the above information, the Component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p>For records covered by the Privacy Act or covered JRA records, see "Record Access Procedures" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p>See "Record Access Procedures."</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p>None.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="history">
        <xhtmlContent>
            <p>80 FR 58289 (September 28, 2015); 73 FR 61885 (October 17, 2008).</p>
        </xhtmlContent></subsection></section>
<section id="all9" toc="yes">
<systemNumber>/ALL-009</systemNumber>

<subsection type="systemName">Department of Homeland Security Advisory Committees.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at several Headquarters locations and in component offices of DHS in both Washington, DC,
and field locations.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include any individual who applied to be on a committee, is
currently serving on a committee, and/or has served on a committee and is no longer serving. Committee alternates are
also included in this system. Individuals may be Federal employees.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system may include:
</p><p>• Individual’s name;
</p><p>• Social security number;
</p><p>• Place and date of birth;
</p><p>• Gender;
</p><p>• Ethnicity;
</p><p>• Home address;
</p><p>• E-mail address;
</p><p>• Telephone number(s);
</p><p>• Political affiliation, when appropriate;
</p><p>• Work address;
</p><p>• Employer;
</p><p>• Title;
</p><p>• Marital status;
</p><p>• Military service;
</p><p>• Education;
</p><p>• Registration in professional societies;
</p><p>• Work experience;
</p><p>• Record of performance;
</p><p>• Publications authored;
</p><p>• Membership on boards and committees;
</p><p>• Professional awards; and
</p><p>• Other information which can be used to determine if the individual is fit to serve on the committee, such
as description of private associations.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; the Federal Records Act, 44 U.S.C. 3101; Pub. L. 92-463, Federal Advisory Committee Act, as
amended; 5 U.S.C., App. 2 &amp;amp;amp;amp;amp;#167; 8; E.O. 9397; 14 U.S.C. 632; The Omnibus Budget Reconciliation Act of 1987, Pub. L.
101-103, sec 9503(c), 101 Stat. 1330, 1330-381 (1987) (codified at 19 U.S.C. sec 2071 note).
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to collect and maintain information on advisory committee members. This system also
collects and maintains information on applicants to identify the most qualified applicant and ensure a balanced advisory
committee.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body when it is necessary to the litigation
and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where the Department of Justice or DHS has agreed to represent
the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To an appropriate Federal, State, local, tribal, foreign, or international agency, if the information is relevant
and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or issuance of a
security clearance, license, contract, grant, or other benefit, or it the information is relevant and necessary to a DHS
decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an
investigation of an employee, the letting of a contract, or the issuance of a license, grant or other benefit and when
disclosure is appropriate to the proper performance of the official duties of the person making the request.
</p><p>I. To the General Services Administration to facilitate committee management within the Federal Government.
</p><p>J. To an authorized appeal or grievance examiner, formal complaints examiner, equal employment opportunity
investigator, arbitrator, or other duly authorized official engaged in investigation or settlement of a grievance,
complaint, or appeal filed by an employee.
</p><p>K. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to
opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection
with criminal law proceedings or in response to a subpoena from a court of competent jurisdiction.
</p><p>L. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>By individual name and/or personal identifier.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records documenting the committee’s establishment, membership, policy, organization, deliberations, findings, and
recommendations are permanent. These files are transferred to the National Archives and Records Administration on
termination of the committee, in accordance with National Archives and Records Administration General Records Schedule
26. Earlier transfer is authorized for committees operating for three years or longer. Files relating to day-to-day
committee activities and/or do not contain unique information of historical value are destroyed/deleted when the records
are three years old.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>For Headquarters components of DHS, the System Manager is the Director of Departmental Disclosure, Department of
Homeland Security, Washington, DC 20528. For components of DHS, the System Manager can be found at <i>
http://www.dhs.gov/foia</i> under "contacts."
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to the Headquarters or the component’s FOIA Officer, whose contact
information can be found at <i>http://www.dhs.gov/foia</i> under "contacts." If an individual believes more
than one component maintains Privacy Act records concerning him or her the individual may submit the request to the Chief
Privacy Officer, Department of Homeland Security, 245 Murray Drive, SW., Building 410, STOP-0550, Washington, DC
20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Identify which component(s) of the Department you believe may have the information about you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification Procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification Procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>From the individual of record.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="all10" toc="yes">
<systemNumber>/ALL-010</systemNumber>
<subsection type="systemName">Department of Homeland Security Asset Management Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent>
<p> Unclassified.</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent>
<p> DHS maintains records at several Headquarters locations and in Component offices of DHS, in both Washington, D.C. and field locations. DHS also maintains records in the Department of Interior’s (DOI) Oracle Federal Financials (OFF) Virtual Environment in Reston, VA and Denver, CO. </p>
</xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent>
<p> Categories of individuals covered by this system include all current and former DHS employees and contractors assigned government-owned assets (e.g., laptop computers, communication equipment, firearms, and other assets).</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p> Categories of records maintained in this system include:</p>
<p>Individual’s name;</p>
<p>Employee ID number; enter Email address;</p>
<p>Office name;</p>
<p>Office location;</p>
<p>Office telephone number;</p>
<p>Property management records, which include information on government-owned property (e.g., laptop computers, communication equipment, firearms, and other assets) in the personal custody of the individuals covered by this system and used in the performance of their official duties. </p>
</xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p> 5 U.S.C. 301; the Federal Records Act, 44 U.S.C. 3101; 40 U.S.C. 121; and 41 CFR Chapter 101.</p>
</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p> The purpose of this system is to track all DHS-owned or controlled property that has been issued to current and former DHS employees and contractors.</p>
</xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p> In addition to those disclosures generally permitted under 5 U.S.C. § 552a(b) of the Privacy Act, all or a portion of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. § 552a(b)(3) as follows: </p>
<p> A. To the Department of Justice (DOJ), including Offices of the United States Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
<p>  1. DHS or any Component thereof;</p>
<p>  2. Any employee or former employee of DHS in his/her official capacity;</p>
<p>  3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
<p>  4. The United States or any agency thereof.</p>
<p> B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
<p> C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. §§ 2904 and 2906.</p>
<p> D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
<p> E. To appropriate agencies, entities, and persons when:</p>
<p> 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; </p>
<p> 2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the compromised information; and</p>
<p> 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p> F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
<p> G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
<p> H. To unions recognized as exclusive bargaining representatives under the Civil Service Reform Act of 1978, 5 U.S.C. §§ 7111 and 7114.</p>
<p> I. To the Merit Systems Protection Board, arbitrators, the Federal Labors Relations Authority, Equal Employment Opportunity Commission and other parties responsible for the administration of the Federal Labor-Management Program for the purpose of processing any corrective actions, or grievances, or conducting administrative hearings or appeals, or if needed in the performance of other authorized duties. </p>
<p> J. To federal agencies that provide financial management services for DHS Components under a cross-servicing agreement for purposes such as budgeting, purchasing, procurement, reimbursement, asset management,  reporting, and collection functions</p>
<p> K. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
<p>Disclosure to consumer reporting agencies: </p>
<p> None.</p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>Storage:</p>
<p> DHS stores records in this system electronically in multiple databases or on paper in secure facilities in a locked drawer behind a locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.</p>
</xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p> DHS retrieves data by name or employee ID number.</p>
</xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p>DHS safeguards records in this system in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies.  DHS has imposed strict controls to minimize the risk of compromising the information that is being stored.  DHS limits access to the computer system containing the records to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.  </p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p> DHS destroys records in accordance with the NARA General Record Schedule 3, Inventory Files (NC1-64-77-5 item 10b), and are destroyed two years after equipment is removed from agency control.</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent>
<p> The Chief Readiness Support Officer, Department of Homeland Security, Washington, D.C. 20528. </p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p> Individuals seeking notification of and access to any record contained in this system of records, including DHS records hosted by another federal agency under a cross-servicing agreement for financial management services, or seeking to contest its content, may submit a request in writing to the Headquarters or Component’s Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia-contact-information. If an individual believes more than one Component maintains Privacy Act records concerning him or her the individual may submit the request to the Chief Privacy Officer, Department of Homeland Security, 245 Murray Drive, S.W., Building 410, STOP-0655, Washington, D.C. 20528-0655.</p>
<p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. § 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy  and  FOIA Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, you should:</p>
<p>Explain why you believe the Department would have information on you;</p>
<p>Identify which Component(s) of the Department you believe may have the information about you;</p>
<p>Specify when you believe the records would have been created; and </p>
<p>Provide any other information that will help the FOIA staff determine which DHS Component agency may have responsive records; </p>
<p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
<p>Without the above information, the Component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
</xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p> Records are generated from property purchase orders and receipts; acquisition, transfer and disposal of data; or otherwise from the record subject. </p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent>
<p> None.</p></xhtmlContent></subsection></section>

<section id="all11" toc="yes">
<systemNumber>/ALL-011</systemNumber>
    <subsection type="systemName">
        Department of Homeland Security/ALL-011 Biographies and Awards.
    </subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p>Unclassified.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p>Records are maintained at several Headquarters locations and in Component offices of the Department of Homeland Security, in both Washington, D.C. and field locations.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p>For DHS Headquarters Components, the System Manager is the Deputy Chief Freedom of Information Act (FOIA) Officer, Department of Homeland Security, Washington, D.C. 20528. For Components of DHS, the System Manager can be found at http://www.dhs.gov/foia under "Contacts."</p>
        </xhtmlContent>
    </subsection>
    <subsection type="authorityForMaintenance">
        <xhtmlContent>
            <p>5 U.S.C. 4502 et seq., 5 U.S.C. 301, 5 U.S.C. 4103, 44 U.S.C. 3101, Public Law 107-296, Executive Order (E.O.) 9830, and E.O. 12107.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p>The purpose of this system is to (1) collect and use biographic information on professional background, education, qualifications, and academic achievements of DHS employees, DHS contractors, and non-DHS individuals as background information to consider and publicly recognize DHS awardees and nominees; (2) aid DHS in setting up and conducting meetings with DHS and contractor employees; and (3) create information materials for publication outside of the Department as part of public events, conferences, and meetings.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
            <p>Categories of individuals within this system include:</p>
            <p>1. Current and former DHS employees, contractors, and other non-DHS individuals who are award nominators, recipients, or nominees. This category of individuals does not include DHS employees who receive Departmental employment performance-based awards as that information is covered for the purposes pursuant to "OPM/GOVT-2 Employee Performance File System Records."</p>
            <p>2. Non-DHS individuals who attend meetings with DHS personnel who provide biographic information to aid DHS in setting up and conducting such meetings.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p>•  Full name;</p>
            <p>•  Date of birth;</p>
            <p>•  Place of birth;</p>
            <p>•  Photo;</p>
            <p>•  Work history and experience;</p>
            <p>•  Education;</p>
            <p>•  Military experience, if applicable;</p>
            <p>•  Civic duties and previous awards;</p>
            <p>•  Immigration history, to include date of naturalization;</p>
            <p>•  Hometown;</p>
            <p>•  Hobbies and personal interests;</p>
            <p>•  Job title;</p>
            <p>•  Name and job title of Supervisor;</p>
            <p>•  Personal and/or Professional phone numbers;</p>
            <p>•  Personal and/or Professional email addresses;</p>
            <p>•  Personal and/or Professional addresses;</p>
            <p>•  Employee/Contractor identification or badge number;</p>
            <p>•  Identity documentation;</p>
            <p>•  Professional qualifications, beyond what is described in OPM-approved position description;</p>
            <p>•  Type of award for which received/nominated for (e.g., President, Secretary, or Component Leadership);</p>
            <p>•  Name of the nominating official;</p>
            <p>•  Nomination materials including a summary of outstanding accomplishments, distinguished service, or extraordinary valor to make him or her eligible for an award;</p>
            <p>•  Published factual account of the nominee’s accomplishments; and</p>
            <p>•  Other information directly relevant to the award that may be collected and distributed to the public.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p>Records are obtained directly from DHS employees, contractors, and non-DHS individuals who have submitted biographies to DHS or have been selected or nominated for a DHS award; the nominating individual or organization; or other sources available to the general public.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
            <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other Federal agency conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
            <p>1. DHS or any component thereof;</p>
            <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
            <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
            <p>4. The United States or any agency thereof.</p>
            <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
            <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. sec. 2904 and 2906.</p>
            <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
            <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
            <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary and otherwise compatible with the purpose of collection to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
            <p>G. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            <p>H. To unions recognized as exclusive bargaining representatives of the individual under the Civil Service Reform Act of 1978, 5 U.S.C. 7111 and 7114, the Merit Systems Protection Board, arbitrators, the Federal Labor Relations Authority, and other parties responsible for the administration of the Federal labor-management program for the purpose of processing any corrective actions, grievances, conducting administrative hearings or appeals, or if needed in the performance of other authorized duties.</p>
            <p>I. To audiences attending a particular event, conference, or meeting when the biographies of speakers are used as background in introductions or other informational material, and to the public when used to recognize individuals for awards not covered pursuant to an OPM SORN or used to recognize non-DHS individuals.</p>
            <p>J. To an appropriate Federal, state, local, tribal, foreign, or international agency, if the information is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, delegation or designation of authority, or other benefit, or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant, delegation or designation of authority, or other benefit and disclosure is appropriate to the proper performance of the official duties of the person making the request.</p>
            <p>K. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p>DHS stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
            <p>DHS retrieves records by name, job title, date of naturalization, award title, and location where the individual resides or works.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p>DHS retains and disposes of records in accordance with NARA General Records Schedule (GRS) 2.2, item 30. Employee awards files (excluding records relating to Department-level awards and awards for non-DHS individuals) will be destroyed when two years old or two years after award is approved or disapproved, whichever is later, but longer retention is authorized if required for a business use. Individual Components may develop separate retention schedules in consultation with NARA. Records pertaining to Department-level awards and all awards for non-DHS individuals must be scheduled by submitting an SF 115, Request for Records Disposition Authority, to NARA. Records pertaining to biographies for meetings and speaking engagements are retained and disposed of in accordance with NARA GRS 6.4, item 10. Records will be destroyed when three years old, or no longer needed, whichever is later.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
            <p>DHS safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS has imposed strict controls to minimize the risk of compromising the stored information. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information in furtherance of the performance of their official duties, and who have appropriate clearances or permissions.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and Chief FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief FOIA Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the JRA provide a right of access, certain records about a person may be available under FOIA.</p>
            <p>When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief FOIA Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
            <p>•  Explain why the individual believes the Department would have information on him/her;</p>
            <p>•  Identify which component(s) of the Department the individual believes may have the information about him/her;</p>
            <p>•  Specify when the individual believes the records would have been created; and</p>
            <p>•  Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
            <p>If an individual’s request is seeking records pertaining to another living individual, the first individual must include a statement from the second individual certifying his/her agreement for the first individual to access his/her records. Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p>For records covered by the Privacy Act or covered JRA records, see "Record Access Procedures" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p>See "Record Access Procedures."</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p>None.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="history">
        <xhtmlContent>
            <p>DHS/ALL-011 Department of Homeland Security Biographies and Awards, 73 FR 66654 (Nov. 10, 2008).</p>
        </xhtmlContent></subsection></section>
<section id="all12" toc="yes">
<systemNumber>/ALL-012</systemNumber>

<subsection type="systemName">Department of Homeland Security Childcare.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the DHS offices and childcare facilities.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>DHS employees, other Federal Employees, and other individuals at Family Childcare (FCC) Homes enrolled in DHS-
sponsored childcare programs and eligible children.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Employee’s/guardian’s name;
</p><p>• Employee’s/guardian’s home address;
</p><p>• Employee’s/guardian’s home phone;
</p><p>• Employee’s/guardian’s financial information to include:
</p><p>• Salary information;
</p><p>• Family income;
</p><p>• Credit card information;
</p><p>• Bank information;
</p><p>• Employee’s/guardian’s work address;
</p><p>• Employee’s/guardian’s work phone;
</p><p>• Employee’s/guardian’s email address;
</p><p>• Emergency contact’s name;
</p><p>• Emergency contact’s address;
</p><p>• Emergency contact’s phone;
</p><p>• Child’s name;
</p><p>• Child’s address;
</p><p>• Child’s phone;
</p><p>• Medical, dental, and insurance provider data;
</p><p>• Medical history of the child including records of immunizations, allergies, and current medications;
</p><p>• Records of physical, emotional, or other special care requirements;
</p><p>• A picture of the child;
</p><p>• Correspondence between the childcare facility and the guardian, such as authorization to release the child
to another person besides the guardian and field trip permission slips; and
</p><p>• Records provided by parents/guardians to enhance cultural and social enrichment activities. These records
may include family background, cultural, and ethnic data such as religion, native language, and family composition.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; 14 U.S.C. 515; 40 U.S.C. 590, Childcare Services for Federal Employees; The Federal Records Act, 44
U.S.C. 3101; Executive Order 9373.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to administer DHS-sponsored childcare programs.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body when it is necessary to the litigation
and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where the Department of Justice or DHS has agreed to represent
the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To provide to Federal, State, or local governments and agencies to report medical conditions and other data
required by law; in order to aid in preventive health and communicable disease control problems.
</p><p>I. To the Department of Agriculture for use in determining eligibility to participate in the Childcare Food Program.
</p><p>J. To appropriate State and local governmental agencies as well as non-profit organizations to determine eligibility
for State and local or non-profit childcare subsidies.
</p><p>K. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by the employee/guardian’s name and by the child’s name.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Child’s record file is destroyed three years after date of last action. Registration/medical forms may be sent to
another facility if a child transfers. Child Care Food Program eligibility records are transferred to an audit file at
the end of each year where they are not retrieved by child’s name. Records subject to an audit are destroyed after three
years or after being audited, whichever is sooner.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>For Headquarters components of DHS, the System Manager is the Director of Departmental Disclosure, Department of
Homeland Security, Washington, DC 20528. For components of DHS, the System Manager can be found at <i>
http://www.dhs.gov/foia</i> under "contacts."
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to the Headquarters’ or component’s FOIA Officer, whose contact
information can be found at <i>http://www.dhs.gov/foia</i> under "contacts." If an individual believes more
than one component maintains Privacy Act records concerning him or her the individual may submit the request to the Chief
Privacy Officer, Department of Homeland Security, 245 Murray Drive, SW., Building 410, STOP-0550, Washington, DC
20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Identify which component(s) of the Department you believe may have the information about you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are generated from guardians and child’s medical care providers.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="all13" toc="yes">
<systemNumber>/ALL-013</systemNumber>
<subsection type="systemName">Department of Homeland Security Claims Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at several Headquarters locations and in component offices of DHS, in both Washington, DC
and field locations.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Any individual or entity who submits a claim to DHS and/or its components or against whom DHS files a claim.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Individual’s or entity’s name;
</p><p>• Social security number;
</p><p>• Entity’s corporate tax identification number;
</p><p>• Addresses;
</p><p>• Telephone numbers;
</p><p>• Description of the claim;
</p><p>• Status of the claim;
</p><p>• Banking account and routing number;
</p><p>• Correspondence between the claimant or claimant’s representative and DHS;
</p><p>• Witness statements;
</p><p>• Photos;
</p><p>• Documents submitted by the claimant or claimant’s representative in support of the claim; and
</p><p>• Documents relating to the administrative handling of the claim.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; The Federal Records Act, 44 U.S.C. 3101; The Homeland Security Act of 2002, Public Law 107-
296; 6 U.S.C. 121; 28 U.S.C. 2671-2680; Federal Tort Claims Act; and Executive Order 9397.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to respond to and process claims submitted to, or by, DHS, including requests for
waivers of claims.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body when it is necessary to the litigation
and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where the Department of Justice or DHS has agreed to represent
the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to
opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection
with criminal law proceedings or in response to a subpoena from a court of competent jurisdiction.
</p><p>I. To appropriate Federal, state, local, tribal, or foreign governmental agencies or multilateral governmental
organizations for the purpose of protecting the vital interests of a data subject or other persons, including to assist
such agencies or organizations in preventing exposure to or transmission of a communicable disease or to combat other
significant public health threats; appropriate notice will be provided of any identified health threat or risk.
</p><p>J. To another Federal agency or third party, including insurance companies or worker’s compensation carriers, when the
claimant(s) may be covered for the damage, loss or injury by insurance and/or a third party is alleged to have or may
have, caused or contributed to the damage, loss or injury of the claimant(s).
</p><p>K. To foreign governments when the claimant is a citizen of that foreign nation or when the United States has an
agreement with that foreign country which affects payment of the claim
</p><p>L. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p><p>To the U.S. Department of the Treasury when disclosure of the information is relevant to review payment and award eligibility through the Do Not Pay Working System for the purposes of identifying, preventing, or recouping improper payments to an applicant for, or recipient of, Federal funds, including funds disbursed by a state (meaning a state of the United States, the District of Columbia, a territory or possession of the United States, or a federally recognized Indian tribe) in a state-administered, federally funded program.</p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Data may be retrieved by an individual’s or entity’s name, Social Security number, corporate tax identification
number, address, description and status of claim, and/or other personal identifier.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records are destroyed after six years and three months of claim settlement, in accordance with National Archives
and Records Administration General Records Schedule 6, Item 10. For claims which the Government’s right to collect was
not extended, records are destroyed ten years, three months after the year in which the Government’s right to collect
first accrued, in accordance with National Archives and Records Administration General Records Schedule 6, Item 10.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>For Headquarters components of DHS, the System Manager is the Director of Departmental Disclosure, Department of
Homeland Security, Washington, DC 20528. For components of DHS, the System Manager can be found at <i>
http://www.dhs.gov/foia</i> under "contacts."
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to the Headquarters’ or component’s FOIA Officer, whose contact
information can be found at <i>http://www.dhs.gov/foia</i> under "contacts." If an individual believes more
than one component maintains Privacy Act records concerning him or her the individual may submit the request to the Chief
Privacy Officer, Department of Homeland Security, 245 Murray Drive, SW., Building 410, STOP-0550, Washington, DC
20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Identify which component(s) of the Department you believe may have the information about you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information originates from individuals and entities who submit claims, responses to claims, or requests for
waiver of claims to DHS.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from subsections (c)(3) and (4); (d); (e)(1), (2),
(3), (5), and (8); and (g) of the Privacy Act pursuant to 5 U.S.C.(j)(2). In additional, the Secretary of Homeland
Security has exempted this system from subsections (c)(3), (d), (e)(1), (e)(4)(G), (H), (I), and (f) of the Privacy Act
pursuant to 5 U.S.C. 552a(k)(1), (2), and (3).
</p></xhtmlContent></subsection></section>
    <section id="all14" toc="yes">
        <systemNumber>/ALL-014</systemNumber>
        <subsection type="systemName"> Department of Homeland Security (DHS)/ALL-014 Personnel Emergency Contact Information </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
               
                    <p> Unclassified.</p></xhtmlContent>
                </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p> Records are maintained at DHS and Federal Emergency Management Agency (FEMA) Headquarters in Washington, D.C. and field offices. Personnel emergency contact information is typically maintained locally by individual DHS offices.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p> The System Manager is the Director, Office of Operations Coordination (OPS), Department of Homeland Security, Washington, D.C. 20528.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>The Homeland Security Act of 2002, 6 U.S.C. sec. 313, 314, 317, 320, 321a, and 711; Robert T. Stafford Disaster Relief and Emergency Assistance Act, as amended, 42 U.S.C. sec. 5144, 5149, 5170b, 5192, and 5197.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is for DHS workforce accountability, to support DHS all-hazards emergency response deployments and exercises, and to contact designated persons in the event of an emergency.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>Categories of individuals in this system include:</p>
                <p>•Current and former DHS personnel, including Federal employees and contractors;</p>
                <p>•Current and former Federal employees, contractors, or other individuals (e.g., SLTT personnel) who participate in or conduct emergency response training exercises;</p>
                <p>•Current and former Federal employees, contractors, or other individuals (e.g., state, local, tribal, and territorial (SLTT) personnel) who respond to all-hazards emergencies including technical, manmade, or natural disasters; and</p>
                <p>•Individuals identified by current or former DHS personnel as emergency points of contact, including family members and next of kin.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>Categories of records related to current and former DHS personnel, including Federal employees and contractors, include:</p>
                <p>• Name;</p>
                <p>• Work contact information (address, email address, phone, fax);</p>
                <p>• Personal contact information (address, email address, phone numbers, pager number, and personal identification number [PIN]);</p>
                <p>• Company/organization name;</p>
                <p>• Supervisor name and contact information.</p>
                <p>Categories of records related to DHS and non-DHS individuals identified as emergency points of contact may include:</p>
                <p>• Name;</p>
                <p>• Work contact information (address, email address, phone, fax);</p>
                <p>• Personal contact information (address, email address, phone numbers, pager number, and pin number); and</p>
                <p>• Relationship to current or former DHS personnel.</p>
                <p>Categories of records related to DHS and non-DHS Federal employees, contractors or other individuals who participate in or who respond to all-hazards emergencies including technical, manmade or natural disasters, or who participate in emergency response training exercises may include:</p>
                <p>• Name;</p>
                <p>• Social Security number;</p>
                <p>• Date of birth;</p>
                <p>• Identifiers related to deployment;</p>
                <p>• Height, weight, and other personal characteristics, if applicable;</p>
                <p>• Work contact information (address, email address, phone, fax);</p>
                <p>• Personal contact information (address, email address, phone numbers, pager number, and pin number);</p>
                <p>• Deployment contact information (lodging address and phone number) while deployed;</p>
                <p>• Company/organization name and organization code;</p>
                <p>• Job information (position title, start date, duty status, pay status, and employment type);</p>
                <p>• Supervisor name and contact information;</p>
                <p>• Deployment point of contact name and contact information;</p>
                <p>• Approvals, authorizations, certifications, and proficiency levels for training and deployment;</p>
                <p>• Information on deployment position (program area, position type);</p>
                <p>• Geospatial location information;</p>
                <p>• Status of credentials for access to regulated facilities;</p>
                <p>• Status of Government credit card (yes or no);</p>
                <p>• Clearance and access level;</p>
                <p>• Deployment information (duty station, dates, and lodging);</p>
                <p>• Skills inventory, qualifications, specialties, and proficiency levels;</p>
                <p>• Volunteered medical information;</p>
                <p>• Emergency response group/non-emergency response group status; and</p>
                <p>• Emergency recall rosters.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p> Records are obtained from DHS personnel (including Federal employees and contractors); individuals who participate in or conduct exercises or who respond to all-hazards emergencies including technical, manmade, or natural disasters; and other government agencies.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p> In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other Federal agency conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. sec. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when:</p>
                <p>1. DHS determines that information from this system of records is reasonably necessary and otherwise compatible with the purpose of collection to assist another Federal recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach; or</p>
                <p>2. DHS suspects or has confirmed that there has been a breach of this system of records; and (a) DHS has determined that as a result of the suspected or confirmed breach, there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (b) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>G. To an appropriate Federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To a Federal, state, tribal, or local agency, if the information is relevant and necessary, for the requesting agency’s approval on the issuance of a security clearance or for the purpose of providing support in an all-hazards emergencies including technical, manmade, or natural disasters.</p>
                <p>I. To Federal, state, tribal, local, international, or foreign governmental agencies or executive offices, relief agencies, and non-governmental organizations, when disclosure is appropriate for performance of the official duties required in response to all-hazards including technical, manmade, or natural disasters.</p>
                <p>J. To identified emergency contacts of:</p>
                <p>1. Current and former DHS personnel, including Federal employees and contractors;</p>
                <p>2. Current and former Federal employees, contractors, or other individuals who participate in or conduct exercises; or</p>
                <p>3. Current and former Federal employees, contractors, or other individuals who respond to all-hazards emergencies including technical, manmade, or natural disasters.</p>
                <p>K. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
               
                </xhtmlContent>
    </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p> DHS stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p> DHS retrieves records by an individual’s name, location, or other personal identifier.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p> Records relating to current and former DHS employees, and individuals designated as emergency points of contact, will be reviewed annually and will be updated as necessary, and will be destroyed when obsolete, or upon separation or transfer of the employee, in accordance with National Archives and Records Administration (NARA) General Records Schedule (GRS) GRS 5.3, Item No. 020 (DAA-GRS-2016-0004-0002). Records on non-DHS individuals will be deleted when obsolete and of no longer use to the Department. The Department also intends to rely on GRS 2.7, Employee Health and Safety, which is currently pending with NARA. Federal Emergency Management Agency Records Schedule EOM-16, which will cover records related to deployment activities, will be submitted by FEMA to NARA for review and approval. FEMA proposes that records related to deployment activities be considered temporary records with a cutoff at the end of each calendar year and are destroyed 50 years after the cutoff date.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p> DHS safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p> Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and Headquarters or component’s FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                <p>When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform to the Privacy Act regulations set forth in 6 CFR part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                <p>• Explain why the individual believes the Department would have information on him/her;</p>
                <p>• Identify which component(s) of the Department the individual believes may have the information about him or her;</p>
                <p>• Specify when the individual believes the records would have been created; and</p>
                <p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If an individual’s request is seeking records pertaining to another living individual, the first individual must include a statement from the second individual certifying his/her agreement for the first individual to access his or her records.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p> For records covered by the Privacy Act or covered JRA records, see "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p> See "Record Access procedure."</p>
               
                </xhtmlContent>
    </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p> None.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p> 81 FR 48832 (July 26, 2016); 73 FR 61888 (October 17, 2008).</p>
</xhtmlContent>
        </subsection>
    </section>

    <section id="all15" toc="yes">
<systemNumber>/ALL-015</systemNumber>

<subsection type="systemName">Department of Homeland Security Employee Assistance Program Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent>
<p>Unclassified.</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent>
<p> Records are maintained at the United States Coast Guard Headquarters in Washington, D.C. and field offices.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent>
<p> All USCG active duty, reserve, and retired active duty and reserve military personnel and their eligible dependents/individuals who have been referred for assistance or counseling, are being assisted or counseled, or have been assisted or counseled by the USCG Employee Assistance Program.  Eligibility will vary based on status.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p>Categories of records in this system include:</p>
<p>Military personnel's name;</p>
<p>Eligible dependent/individual's name, if applicable;</p>
<p>Social Security number;</p>
<p>Employee identification number;</p>
<p>Date of birth;</p>
<p>Addresses;</p>
<p>E-mail address;</p>
<p>Telephone numbers;</p>
<p>Job-related information including: job title; rank; duty station; supervisor's name and telephone number; documents received from supervisors or personnel regarding work place problems or performance; leave and attendance records; and workplace-related recommendations made to supervisors as a result of a team meeting;</p>
<p>Counseling and intervention-related information including: notes and documentation of Employee Assistance Program counselors; records of treatment, including non-clinical educational interventions; counseling referrals; team reports; records of employee attendance at treatment and counseling programs; prognosis of individuals in treatment or counseling programs; insurance data; addresses and contact information of treatment facilities; name and address of individuals providing treatment or counseling or intervention; and Privacy Act notification forms and written consent forms;</p>
<p>USCG Workplace Violence and related Critical Incident Team records of the Workplace Violence Prevention Program, maintained by USCG Work-Life personnel.  These records may include written reports and recommendations to leadership personnel regarding alleged work place violence incidents;</p>
<p>USCG Critical Incident Stress Management-related records, which may include descriptions of incidents, consultations, interventions, and may contain personally-identifying information (for the purpose of follow-on contacts with those thought to be impacted by the critical incident);</p>
<p>USCG Sexual Assault Prevention and Response Program case records maintained by USCG Work-Life personnel.  These records are used to facilitate services for victims and their family members as appropriate.  In addition to information cited above, these records may contain Victim Reporting Preference Statement, case notes, and safety plan.  Record may also contain descriptions of alleged assaults;</p>
<p>USCG Victim Support Person or Victim Advocate maintained by USCG Work-Life personnel.  These are maintained in conjunction with efforts to provide assistance to victims of crime.  Records will contain signed Victim Support Person or Victim Advocate Statement of Understanding and Victim Support Person or Victim Advocate Supervisor; </p>
<p>Statement of Understanding, assignment information, and notes regarding results of screening interview, relevant training received, and any other information relevant to the Victim Support Person's or Victim Advocate's provision of support services to victims;</p>
<p>USCG Critical Incident Stress Management Peer Volunteers maintained by USCG Work-Life personnel.  These records contain statement of understanding, notes regarding screening interview, record of related training received, and any other information relevant to the peer's provision of services when deployed after a critical incident;</p>
<p>Case records maintained by USCG Work-Life personnel on USCG Active Duty members who have demonstrated suicidal behavior.  The purpose of these records is to facilitate continuity of care for personnel who have exhibited suicidal behavior.  These records will contain reports regarding each incident and follow-up case notes;</p>
<p>Reports of USCG active duty suicidal behavior incidents, work place violence incidents, critical incidents, and sexual assaults are maintained by USCG Headquarters (CG-1112).  These reports are received from Work-Life Offices, which are responsible for providing services for the related programs described above.  Their purpose is to ensure continuity of care and to identify any systemic issues found in aggregate data.</p>
</xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p>5 U.S.C. 7361, 7362, 7901, and 7904; 5 U.S.C. 301; Federal Records Act, 44 U.S.C. 3101.</p>
</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p> The Employee Assistance Program will maintain information gathered by and in the possession of the USCG Employee Assistance Program, an internal agency program designed to assist employees of USCG and, in certain instances, their eligible dependents/individuals, in regard to a variety of personal and/or work related problems. The program involves counseling, educational, and consultative services provided through the internal and external Employee Assistance Program for alcohol, drug, emotional, or behavioral problems, and addresses mandatory and voluntary counseling following exposure to a traumatic incident, responses to critical incidents that impact employees, and workplace incidents involving actual violence or the threat of violence and necessary follow up.</p>
</xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p>  Disclosure of substance abuse records is limited to the parameters set forth in 42 U.S.C. 290dd, 290ee, and Public Law 100-71, Section 503(e). Accordingly, a Federal employee's substance abuse records may not be disclosed without the prior written consent of the employee, unless the disclosure would be one of the following:</p>
<p>    A.  To the Department of Justice (including Offices of the United States Attorneys) or other Federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body when it is necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
<p>1.  DHS or any component thereof;</p>
<p>2.  Any employee of DHS in his/her official capacity;</p>
<p>3.  Any employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
<p>4.  The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and DHS determines that the records are both relevant and necessary to the litigation and the use of such records is compatible with the purpose for which DHS collected the records.</p>
<p>B.  To appropriate agencies, entities, and persons when:</p>
<p>1.  DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;</p>
<p>2.  The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by the Department or another agency or entity) or harm to the individual who relies upon the compromised information;</p>
<p>3.  The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with the Department’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p>C.  To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records.  Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
<p>D.  To appropriate State and local authorities to report, under State law, incidents of suspected child abuse or neglect to the extent described under 42 CFR 2.12.</p>
<p>E.  To any person or entity to the extent necessary to prevent an imminent and potential crime that directly threatens loss of life or serious bodily injury.</p>
<p>F.  To report to appropriate authorities when an individual is potentially at risk to harm himself or herself or others.</p>
<p>G.  To medical personnel to the extent necessary to meet a bona fide medical emergency.</p>
<p>H.  To qualified personnel for the purpose of conducting scientific research, management audits, financial audits, or program evaluation provided that employees are individually identified.</p>
<p>I.  To the employee's medical review official.</p>
<p>J.  To the administrator of any Employee Assistance Program in which the employee is receiving counseling or treatment or is otherwise participating.</p>
<p>K.  To any supervisory or management official within the employee's agency having authority to take adverse personnel action against such employee.</p>
<p>L.  Pursuant to the order of a court of competent jurisdiction when required by the United States Government to defend against any challenge against any adverse personnel action. See 42 U.S.C. 290dd, 290ee, and Public Law 100-71, Section 503(e).</p>
<p>Disclosure to consumer reporting agencies:  </p>
<p>None.</p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>Storage:</p>
<p> USCG stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door.  The records may be stored on magnetic disc, tape, or digital media.</p>
</xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p> USCG may retrieve records/data by a Military personnel's or eligible dependent's name.  USCG Critical Incident Stress Management-related records are filed by unit name and are not retrievable by individual name, but instead, by unit name.</p>
</xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p> USCG safeguards records in this system in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies.  USCG imposes strict controls to minimize the risk of compromising the information in this system.  Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.     </p>
</xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p> USCG maintains and disposes of records in accordance with National Archives and Records Administration-approved agency Records Schedule, SSIC 1754, item 1 (AUTH: N1-026-07-1, Item1) Employee Assistance Program (EAP) Coordinator Case Records; if not disclosed under the Privacy Act, records are retained for three years after the client has ceased contact and then destroyed.</p>
<p> Employee Assistance Program client records may contain Department of Transportation-required Substance Abuse evaluations and USCG Sexual Abuse Prevention and Response Program client records; if not disclosed under the Privacy Act, these are destroyed with the EAP Coordinator case records three years after the last contact with the client.</p>
<p> Employee Assistance Program Coordinator Case Records that USCG discloses  are retained until five years after the client has ceased contact or, if later, for five years after last disclosure of information from the record, as authorized by General Records Schedule 14, item 23.</p>
<p> All records will be retained beyond their normal maintenance period until any pending litigation is completed.  This will be true whether or not the client has terminated employment with DHS/USCG.  Individual states may require longer retention. The rules in this system notice should not be construed to authorize any violation of such state laws that have greater restrictions.</p>
<p> USCG will destroy files only after the required period of maintenance, with a witness present, by either (1) a DHS or USCG Employee Assistance Program Administrator or an Employee Assistance Program Administrator from another organization that contracts with DHS or USCG for Employee Assistance Program services, or (2) by designated staff of a private or governmental organization under contract with DHS or USCG to provide document destruction services.  The witness must be trained in the proper handling of records covered by the Privacy Act and 42 CFR part 2.</p>
<p> USCG destroys written records by shredding or burning.  USCG destroys records stored on hard drives using software tools that ensure the protection of the confidential information by making reconstruction or compromise by reuse impracticable.  USCG disposes of records contained on back-up tapes/diskettes by either physically destroying the tapes/diskettes or by deleting them using software tools which ensure the protection of the confidential information by making reconstruction or compromise by reuse impracticable.</p>
<p> USCG transfers records located away from the destruction site in a confidential manner.  No other information about Employee Assistance Program clients may be maintained once these files have been destroyed.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent>
<p> Commandant (CG-111), United States Coast Guard, Mail Stop 7907, Washington, D.C. 20593-0001.</p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p> Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Commandant (CG-611), United States Coast Guard, Mail Stop 7710, Washington, D.C. 20593.</p>
<p>If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive, S.W., Building 410, STOP-0655, Washington, D.C. 20528.</p>
<p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR part 5.  You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth.  You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization.  While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486.  In addition, you should:</p>
<p>Explain why you believe the Department would have information on you;</p>
<p>Identify which component(s) of the Department you believe may have the information about you;</p>
<p>Specify when you believe the records would have been created; and </p>
<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records; and</p>
<p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
<p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
</xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p>Records are retained from the following sources:</p>
<p>USCG Employee Assistance Program: the client, the licensed mental health provider, and collateral sources and resources intended to help the client;</p>
<p>USCG Workplace Violence and related Critical Incident Team: investigation records, personnel records, critical incident team assembled to make recommendations to command, subject's supervisors, and the subject;</p>
<p>USCG Critical Incident Stress Management-related records: Work-Life staff, Peers, Incident commander, command(s) affected, individuals impacted by incident, and other support persons who may be mobilized to assist those impacted by the event;</p>
<p>USCG Sexual Assault Prevention and Response Program: victim, victim support person, medical personnel assisting victim, criminal investigations and investigators, and other support personnel intended to assist victim;</p>
<p>USCG Victim Support Persons (VSP): the victim support person, Work-Life staff, VSP's or Victim Advocate's work supervisor, and other support persons who may assist in training;</p>
<p>USCG Critical Incident Stress Management Peer Volunteers: Peer, Peer's supervisor, Work-Life staff, and other support persons who may assist in training;</p>
<p>Case records maintained by USCG Work-Life personnel on USCG Duty members who have demonstrated suicidal behavior: the patient, medical personnel, patient's command, and Work-Life staff and other support persons who may assist in helping the patient; and </p>
<p>Reports of USCG active duty suicidal behavior incidents, work place violence incidents, critical incidents, and sexual assaults maintained by USCG Headquarters (CG-1112): Work-Life staff and others as described above under their related programs.</p>
</xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
    <section id="all16" toc="yes">
        <systemNumber>/ALL-016</systemNumber>

        <subsection type="systemName">
            Department of Homeland Security Correspondence Records.
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                Unclassified.</xhtmlContent>
            </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
           
                <p>Records are maintained at several Headquarters locations and in component offices of the Department of Homeland Security, in both Washington, D.C. and field locations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p> For DHS Headquarters, the System Manager is the Chief Information Officer, cio@hq.dhs.gov, 202-447-3735, Department of Homeland Security, Washington, D.C. 20528. For components of DHS, the System Managers are their respective Chief Information Officers. Links to component contact information can be found at https://www.dhs.gov/direct-contact-information under "Contact information for DHS Components."</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p> 5 U.S.C. 301, 31 U.S.C. 1115(b)(6), 44 U.S.C. 3101, 44 U.S.C. 3506, 40 U.S.C. 11313, E.O. 13571.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p> The purpose of this system is to manage all correspondence including incoming information and responses to inquiries, comments, or complaints made to DHS.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>Individuals who submit inquiries, complaints, comments, or other correspondence to DHS, excluding Privacy Act or FOIA requests, or standard immigration applications; individuals who are the subject of the correspondence; and any responding individual on behalf of DHS are covered by this SORN.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>•Full name;</p>
                <p>•Physical and mailing addresses;</p>
                <p>•Email address;</p>
                <p>•Phone number;</p>
                <p>•Web form information (e.g., IP addresses);</p>
                <p>•Who the complaint, compliment, comment, or issue is about;</p>
                <p>•Incoming correspondence excluding Privacy Act or FOIA requests, or standard immigration applications;</p>
                <p>•DHS’s reply;</p>
                <p>•Responder’s name on behalf of DHS;</p>
                <p>•Call and Customer Service Center records (to include recordings of calls and online real time interactions with customer service representatives);</p>
                <p>•Associated case or file numbers (e.g., Alien Number);</p>
                <p>•Receipt number;</p>
                <p>•Account ID;</p>
                <p>•Additional unsolicited personal information provided by the individual (including Social Security number); and</p>
                <p>•Other related materials.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p> Records are obtained from all sources of incoming correspondence and responses by DHS. A non-exclusive list of correspondence sources includes members of the general public, call and customer service centers, unions, trade organizations, non-profits, business or governmental entities, including the news media and congressional offices.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p> In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other Federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>H. To an appropriate Federal, state, tribal, territorial, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>I. To another Federal agency to refer correspondence or respond to correspondence given the nature of the complaint, compliment, comment, or issue.</p>
                <p>J. To unions recognized as exclusive bargaining representatives of the individual under the Civil Service Reform Act of 1978, 5 U.S.C. 7111 and 7114, the Merit Systems Protection Board, arbitrators, the Federal Labor Relations Authority, and other parties responsible for the administration of the Federal labor-management program for the purpose of processing any corrective action, or grievances, or conducting administrative hearings or appeals, or if needed in the performance of other authorized duties.</p>
                <p>K. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
               
                </xhtmlContent>
    </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>Records may be retrieved by individual name and date of correspondence.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p> Executive level records are permanent and files are cut off annually and transferred to the National Archives and Records Administration 15 years after cut-off date, in accordance with National Archives and Records Administration (NARA) General Schedule DAA-0563-2013-0005-0003. Public correspondence and communication that require no formal response or action are temporary and are destroyed when 90 days old, unless longer retention is authorized when required for business use, in accordance with NARA General Records Schedule (GRS) 6.4, item 20. Correspondence relating to a specific case or action is not considered public correspondence and will be filed and maintained with the appropriate case or action file under its specific retention schedule. DHS Components may create their own retention schedules for correspondence received. NARA GRS 4.1, item 010, covers when a Department, Component, office, or individual is tasked to review the correspondence or inquiry. Actual assignments and any reminder emails that an action is required are destroyed immediately, or when no longer needed for reference.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p>DHS safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to any paper files or computer systems containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and Chief FOIA Officer, or a component FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia under "contact information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the JRA provide a right of access, certain records about a person may be available under FOIA.</p>
                <p>When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                <p>•Explain why the individual believes the Department would have information on him/her;</p>
                <p>•Identify which component(s) of the Department the individual believes may have the information about him/her;</p>
                <p>•Specify when the individual believes the records would have been created; and</p>
                <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
                <p>If an individual’s request is seeking records pertaining to another living individual, the first individual must include, in accordance with 6 CFR Part 5.21, a statement from the second individual certifying his/her agreement for the first individual to access his/her records. Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p> For records covered by the Privacy Act or covered JRA records, see "Record Access Procedures" above, and 6 CFR Part 5.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures."</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>None.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>73 FR 66657.</p>
            </xhtmlContent>
        </subsection>
    </section>

    <section id="all17" toc="yes">
<systemNumber>/ALL-017</systemNumber>
<subsection type="systemName">General Legal Records System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Classified and Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at DHS and component locations in Washington, DC and field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include DHS employees and former employees, other federal agency
employees and former employees, members of the public, individuals involved in litigation with DHS or involving DHS,
individuals who either file administrative complaints with DHS or are the subjects of administrative complaints initiated
by DHS, individuals who are named parties in cases in which DHS believes it will or may become involved, matters within
the jurisdiction of the Department either as plaintiffs or as defendants in both civil and criminal matters, witnesses,
and to the extent not covered by any other system, tort and property claimants who have filed claims against the
Government and individuals who are subject of an action requiring approval or action by a DHS official, such as appeals,
actions, training, awards, foreign travel, promotions, selections, grievances and delegations, OGC attorneys to whom
cases are assigned, and attorneys and authorized representatives for whom DHS has received complaints regarding their
practices before DHS and/or the Executive Office for Immigration Review (EOIR).
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Names of individuals involved in each legal case;
</p><p>• Names of witnesses;
</p><p>• Records relating to litigation by or against the U.S. Government (or litigation in which the U.S.
Government is not a party, but has an interest) resulting from questions concerning DHS cases and legal actions that the
Department either is involved in or in which it believes it will or may become involved;
</p><p>• Claims by or against the Government, other than litigation cases, arising from a transaction with DHS, and
documents related thereto, including demographic information, vouchers, witness statements, legal decisions, and related
material pertaining to such claims;
</p><p>• Investigation reports;
</p><p>• Legal authority;
</p><p>• Legal opinions and memoranda;
</p><p>• Criminal actions;
</p><p>• Criminal conviction records;
</p><p>• Claims and records regarding discrimination, including employment and sex discrimination;
</p><p>• Claims and records regarding the Rehabilitation Act;
</p><p>• Claims against non-DHS attorneys and/or representatives who engage in unethical activities or exhibit
unprofessional behavior;
</p><p>• Copies of petitions filed with DHS;
</p><p>• Personnel matters;
</p><p>• Contracts;
</p><p>• Foreclosures;
</p><p>• Actions against DHS officials;
</p><p>• Titles to real property;
</p><p>• Records relating to requests for DHS records other than requests under the Freedom of Information Act and
the Privacy Act of 1974;
</p><p>• Testimonies of DHS employees in federal, state, local, or administrative criminal or civil litigation;
</p><p>• Documentary evidence;
</p><p>• Supporting documents including the legal and programmatic issues of the case, correspondence, legal
opinions and memoranda and related records;
</p><p>• State Bar grievance/discipline proceedings records;
</p><p>• Security Clearance Information
</p><p>• Records concerning requests for information regarding the use of reproductions of obligations of the
United States, including bonds, checks, coins, coupons, currencies (U.S. and foreign), fractional notes, postage stamps
(U.S. and foreign), postal money orders, and postmarks;
</p><p>• Any type of legal document, including but not limited to complaints, summaries, affidavits, litigation
reports, motions, subpoenas, and any other court filing or administrative filing or evidence;
</p><p>• Employee and former employee ethics question forms and responses; and
</p><p>• Court transcripts.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; The Federal Records Act, 44 U.S.C. 3101; The Homeland Security Act of 2002, Public Law 107-
296; The Aviation and Transportation Security Act, Public Law 107-71.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to assist DHS attorneys in providing legal advice to DHS personnel on a wide
variety of legal issues; to collect the information of any individual who is, or will be, in litigation with the
Department, as well as the attorneys representing the plaintiff(s) and defendant(s) response to claims by employees,
former employees, and other individuals; to assist in the settlement of claims against the government; to represent DHS
during litigation, and to maintain internal statistics.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other federal agency or federal
executive office conducting litigation or in anticipation of litigation before any court, adjudicative or administrative
body, when it is necessary to the litigation and one of the following is a party to the litigation or has an interest in
such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. any employee of DHS in his/her official capacity;
</p><p>3. any employee or former employee of DHS in his/her individual capacity where the Department of Justice or DHS has
agreed to represent the employee; or
</p><p>4. the United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to
opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection
with criminal law proceedings or in response to a subpoena from a court of competent jurisdiction.
</p><p>I. To third parties during the course of an investigation to the extent necessary to obtain information pertinent to
the investigation, provided disclosure is appropriate to the proper performance of the official duties of the officer
making the disclosure.
</p><p>J. To a federal, state, local, tribal, foreign, or international agency, where such agency has requested information
relevant or necessary for the hiring or retention of an individual, or the issuance of a security clearance, license,
contract, grant, or other benefit, or if necessary to obtain information relevant to a DHS decision concerning the hiring
or retention of an individual, the issuance of a security clearance, license, contract, grant, or other benefit.
</p><p>K. To international and foreign governmental entities in accordance with law and formal or informal international
agreement.
</p><p>L. To State Bar Grievance Committees and local Attorney General offices for disbarment or disciplinary proceedings.
</p><p>M. To unions recognized as exclusive bargaining representatives under the Civil Service Reform Act of 1978, 5 U.S.C.
7111 and 7114, the Merit Systems Protection Board, arbitrators, the Federal Labor Relations Authority, and other parties
responsible for the administration of the Federal labor-management program for the purpose of processing any corrective
actions, or grievances, or conducting administrative hearings or appeals, or if needed in the performance of other
authorized duties.
</p><p>N. To the appropriate federal, state, local, tribal, territorial, foreign, or international agency, regarding
individuals who pose or are suspected of posing a risk to transportation or national security.
</p><p>O. To a former employee of DHS, in accordance with applicable regulations, for purposes of responding to an official
inquiry by a federal, state, or local government entity or professional licensing authority; or facilitating
communications with a former employee that may be necessary for personnel--related or other official purposes where
the Department requires information or consultation assistances from the former employee regarding a matter within that
person’s former area of responsibility.
</p><p>P. To the DOJ, United States Attorney’s Office, or other federal agencies for further collection action on any
delinquent debt when circumstances warrant, as well as to a debt collection agency for the purpose of debt collection.
</p><p>Q. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>R. To the Department of Transportation and its operating administrations when necessary or relevant to (1) Ensure
safety and security in any mode of transportation, (2) enforce DHS regulations or requirements, or (3) the issuance,
maintenance, or renewal of a license, certificate, contract, grant, or other benefit.
</p><p>S. To third parties about individuals who are their employees, job applicants, contractors, or any other individual
who is issued credentials or granted clearances by the third party to secured areas when relevant to such employment,
application, contract, or issuance of the credential or clearance.
</p><p>Disclosure to consumer reporting agencies:
</p><p>Privacy Act information may be reported to consumer reporting agencies pursuant to 5 U.S.C. 552a(b)(12)
collecting on behalf of the United States Government.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities behind a locked door. The
electronic records are stored on magnetic disc, tape, digital media, CD-ROM, and computer.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Data may be retrieved by individual’s name.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>For DHS Headquarters, records are kept for 10 years, in accordance with National Archives and Records
Administration General Records Schedule [schedule in process.] For components of DHS, retention may vary. Please contact
the component system manager.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>The System Managers are the respective General Counsel/Chief Counsel for DHS and each of its components. Their
addresses will vary according to each component.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment
procedures of the Privacy Act because it is a law enforcement system. However, DHS will consider individual requests to
determine whether or not information may be released. Thus, individuals seeking notification of and access to any record
contained in this system of records, or seeking to contest its content, may submit a request in writing to the
Headquarters’ or component’s FOIA Officer, whose contact information can be found at <i>http://www.dhs.gov/foia</i> under
"contacts." If an individual believes more than one component maintains Privacy Act records concerning him or
her the individual may submit the request to the Chief Privacy Officer, Department of Homeland Security, 245 Murray
Drive, SW., Building 410, STOP-0665, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-(866) 431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created;
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records; and
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information originates with DHS and its components, court subpoenas, law enforcement agencies, other federal,
state, and local courts, state bar licensing agencies, state bar grievance agencies, and inquiries and/or complaints from
witnesses or members of the general public.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from subsections (c)(3) and (c)(4); (d); (e)(1), (e)
(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (e)(12); (f); (g)(1); and (h) of the Privacy Act pursuant
to 5 U.S.C. 552a(j)(2). In addition, the Secretary of Homeland Security has exempted this system from subsections (c)(3);
(d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) of the Privacy Act pursuant to 5 U.S.C. 552a(k)(1), (k)(2), (k)(3),
and (k)(5).
</p></xhtmlContent></subsection></section>
<section id="all18" toc="yes">
<systemNumber>/ALL-018</systemNumber>
    <subsection type="systemName">
        Department of Homeland Security (DHS) ALL-018 Administrative Grievance Records System of Records
    </subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p>Unclassified.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p>Records are maintained at the DHS Headquarters in Washington, D.C., and/or component offices of DHS, in both Washington, D.C., and their field offices.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p> For Headquarters and components of DHS, the System Manager is the Director of Departmental Disclosure, Department of Homeland Security, Washington, D.C. 20528.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="authorityForMaintenance">
        <xhtmlContent>
            <p> 5 U.S.C. 1302, 3301, 3302, and 7121; 3 CFR part 335; 5 CFR part 771; and Executive Orders (E.O.) 10988, 11491, 13837, as amended or revoked, if applicable.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p>The purpose of this system of records is to collect, maintain, and store information related to administrative grievances filed by current and former DHS personnel. The records are used by the Department to resolve employee concerns about working conditions, the administration of collective bargaining agreements, employee/supervisor relations, work processes, or other similar issues.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
            <p>Current or former DHS employees, except OIG employees, who have filed grievances in accordance with the Agency’s Administrative Grievance System or pursuant to a negotiated grievance procedure.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p> The system contains records relating to grievances filed by current and former agency employees within all components of the Department. These records contain all documents related to the grievance, including:</p>
            <p>•Individual’s name;</p>
            <p>•Date of birth;</p>
            <p>•Social Security number (SSN);</p>
            <p>•Phone numbers;</p>
            <p>•Email addresses;</p>
            <p>•Addresses;</p>
            <p>•Statements of witnesses;</p>
            <p>•Reports of interviews and hearings;</p>
            <p>•Examiner’s findings and recommendations;</p>
            <p>•A copy of the original and final decision;</p>
            <p>•Related correspondence and exhibits;</p>
            <p>•Additional records of contact information for witnesses, interviewers, examiners and employee representatives of the grievant;</p>
            <p>•Other identifying information dependent upon the specific nature of the topic being grieved and may involve the collection of personal data from the grievant or other individuals involved.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p> Records are obtained from individuals who file a grievance; the individual on whom the record is maintained; testimony of witnesses, agency officials, grievance examiners, or arbitrator; and by related correspondence from organizations or persons.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
            <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
            <p>1. DHS or any component thereof;</p>
            <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
            <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
            <p>4. The United States or any agency thereof.</p>
            <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
            <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. sec. 2904 and 2906.</p>
            <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
            <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
            <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
            <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
            <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            <p>I. To any source from which additional information is requested in the course of processing a grievance, to the extent necessary to identify the individual, inform the source of the purpose(s) of the request, and identify the type of information requested.</p>
            <p>J. To a Federal agency, in response to its request, in connection with the hiring or retention of an individual, the issuance of a security clearance, the conducting of a security or suitability investigation of an individual, the classifying of jobs, the letting of a contract, or the issuance of a license, grant, or other benefit by the requesting agency, to the extent that the information is relevant and necessary to requesting the agency’s decision on the matter.</p>
            <p>K. To the Merit Systems Protection Board, the Office of the Special Counsel, the Federal Labor Relations Authority and its General Counsel, the Equal Employment Opportunity Commission, or the Office of Personnel Management when requested in performance of their authorized duties.</p>
            <p>L. To appropriate labor organizations acting in their official capacity as a representative of the grievant or affected employees under 5 U.S.C. Chapter 71, when relevant and necessary to their duties of representation concerning personnel policies, practices, and matters affecting work conditions.</p>
            <p>M. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p>DHS stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
            <p> Records may be retrieved by the names of the individuals on whom they are maintained or by other personal identifier.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p> Records relating to grievances filed by individuals, whether through formal or informal administrative grievance processes, are temporary and destroyed no sooner than four years but less than seven years after the case is closed. OPM has determined that agencies may decide how long (within the range of four to seven years) administrative grievance records need to be retained, but must select one fixed retention period and publish that retention period in the agency’s records disposition manual. This retention period follows National Archives and Records Administration (NARA) General Records Schedule (GRS) 2.3, Item 60 (DAA-GRS-2015-0007-0017).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
            <p> DHS safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p> Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and Headquarters or component’s FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about the individual may be available under the Freedom of Information Act.</p>
            <p>When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform to the Privacy Act regulations set forth in 6 CFR part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
            <p>•Explain why he or she believes the Department would have information being requested;</p>
            <p>•Identify which component(s) of the Department the individual believes may have the information;</p>
            <p>•Specify when the individual believes the records would have been created; and</p>
            <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
            <p>If an individual’s request is seeking records pertaining to another living individual, the first individual must include a statement from the second individual certifying his/her agreement for the first individual to access his/her records.</p>
            <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p> For records covered by the Privacy Act or covered Judicial Redress Act records, see "Record Access Procedures" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p>See "Record Access Procedures" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p>None.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="history">
        <xhtmlContent>
            <p>DHS/ALL-018 Grievances, Appeals, and Disciplinary Action Records, 73 FR 61882 (October 17, 2008).</p>
        </xhtmlContent></subsection></section>
<section id="all19" toc="yes">
<systemNumber>/ALL-019</systemNumber>
<subsection type="systemName">Department of Homeland Security Payroll, Personnel, and Time and Attendance Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent>
<p> Unclassified.</p>
</xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent>
<p> Records are maintained at several Headquarters locations; in Component offices of DHS, in both Washington, D.C. and at field locations; and at DHS contractual or other federal agency payroll service provider locations.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent>
<p> Current and former employees of DHS.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p> Categories of records in this system include:   </p>
<p>Payroll Records:</p>
<p>Social Security number;</p>
<p>Employee’s name;</p>
<p>Date of birth;</p>
<p>Gender, Race/National Origin, and Disability Data;</p>
<p>Address data such as home mailing address, email address, work address, etc.;</p>
<p>Duty location;</p>
<p>Position Data such as job title, occupational series, grade, step, pay plan, etc.; </p>
<p>Awards and bonuses;</p>
<p>Employment verification information;</p>
<p>Education and training data; </p>
<p>Military and veteran data; </p>
<p>Taxes;</p>
<p>Other deductions;</p>
<p>Garnishments;</p>
<p>Salary data;</p>
<p>Retirement data;</p>
<p>Pay period;</p>
<p>Fiscal year data;</p>
<p>Benefits; and</p>
<p>Direct deposit information.</p>
<p>Time and Attendance Records:</p>
<p>Employee’s name;</p>
<p>Duty location such as work address or Port of Entry;</p>
<p>Supervisor name;</p>
<p>Timekeeper name;</p>
<p>Position Data such as job title, occupational series, grade, step, pay plan; </p>
<p>Fingerprint hash identification number calculated from a finger scan that cannot be used to recreate a readable fingerprint; </p>
<p>Time-off awards or incentives; </p>
<p>Number and type of hours worked. Type of hours worked may include:</p><p>Regular Hours Worked;</p>
<p>Regular law enforcement availability pay (LEAP); </p>
<p>Overtime (including administratively uncontrollable overtime (AUO));</p>
<p>Telework;</p>
<p>Night Differential; </p>
<p>Compensatory time earned and used;</p>
<p>Compensatory travel earned and used;</p>
<p>Training time;</p>
<p>Tour of duty; and</p>
<p>Military leave.</p>
<p>All forms of leave requests, balances, and credits, including Leave Without Pay (LWOP);</p>
<p>All other absence types, including Absent Without Leave (AWOL) and Suspension; </p>
<p>Information necessary to administer any of the agency’s voluntary leave transfer programs including leave donated or used and any supporting documentation from the leave requestor (which may include medical records);</p>
<p>Any other forms of leave available to current and former employees of DHS;</p>
<p>Investigative case title and tracking number (used to track time worked associated with a specific case); and</p>
<p>Fair Labor Standards Act (FLSA) compensation.</p>
<p>Data Reporting and Personnel and Pay Processing Tables</p>
<p>Nature of action codes;</p>
<p>Civil service authority codes;</p>
<p>Standard remarks;</p>
<p>Signature block table;</p>
<p>Position title table;</p>
<p>Financial organization table; and</p>
<p>Salary tables.</p>
</xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p> 31 U.S.C. 66a; 5 U.S.C. 5501 et seq., 5525 et seq., 5701 et seq., and 6301 et seq.; Executive Order 9397, as amended by Executive Order 13478; Pub. L. 100-202, Pub. L. 100-440, and Pub. L. 101-509. </p>
</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p> The purpose of this system is to ensure proper payment of salary and benefits to DHS personnel, and to track time worked, leave, or other absences for reporting and compliance purposes.</p>
</xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p> In addition to those disclosures generally permitted under 5 U.S.C. § 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. § 552a(b)(3) as follows: </p>
<p> A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other federal agencies conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
<p>  1. DHS or any Component thereof;</p>
<p>  2. Any employee or former employee of DHS in his or her official capacity;</p>
<p>  3. Any employee or former employee of DHS in his or her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
<p>  4. The U.S. Government or any agency thereof. </p>
<p> B.  To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
<p> C.  To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. §§ 2904 and 2906.</p>
<p> D.  To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
<p> E.  To appropriate agencies, entities, and persons when:</p>
<p> 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; </p>
<p> 2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
<p> 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p> F.  To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records.  Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
<p>G.  To an appropriate federal, state, tribal, territorial, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
<p> H.  To provide information to unions recognized as exclusive bargaining representatives under the Civil Service Reform Act of 1978, 5 U.S.C. §§ 7111 and 7114.</p>
<p> I.  To designated officers and employees of federal, state, tribal, territorial, local, or international agencies in connection with the hiring or continued employment of an individual, the conduct of a suitability or security investigation of an individual, the grant, renewal, suspension, or revocation of a security clearance, or the certification of security clearances, to the extent that DHS determines the information is relevant and necessary to the hiring agency’s decision.</p>
<p> J.  To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection with criminal law proceedings.  </p>
<p> K. To the other federal agencies who provide payroll personnel processing services under a cross-servicing agreement for purposes relating to the conversion of DHS employee payroll and personnel processing services; the issuance of paychecks to employees and distribution of wages; and the distribution of allotments and deductions to financial and other institutions, some through electronic funds transfer.</p>
<p> L. To federal, state, tribal, territorial, or local agencies for use in locating individuals and verifying their income sources to enforce child support orders, to establish and modify orders of support, and for enforcement of related court orders.</p>
<p> M. To provide wage and separation information to another federal agency as required by law for payroll purposes.</p>
<p> N. To the Office of Personnel Management, the Merit System Protection Board, Federal Labor Relations Authority, or the Equal Employment Opportunity Commission when requested in the performance of their authorized duties.</p>
<p> O. To the Department of Labor in connection with a claim filed by an employee for compensation due to a job-connected injury or illness.</p>
<p> P. To the Department of the Treasury to issue checks.</p>
<p> Q. To State offices of unemployment compensation with survivor annuity or health benefits claims or records reconciliations.</p>
<p> R. To Federal Employee’s Group Life Insurance or Health Benefits carriers in connection with survivor annuity or health benefits claims or records reconciliations.</p>
<p> S. To the Internal Revenue Service and State and local tax authorities for which an employee is or was subject to tax regardless of whether tax is or was withheld in accordance with Treasury Fiscal Requirements, as required.</p>
<p> T. To officials of labor organizations recognized under 5 U.S.C. Chapter 71 for the purpose of providing information as to the identity of DHS employees contributing union dues each pay period and the amount of dues withheld from each contributor. .</p>
<p> U. To any source from which additional information is requested by DHS relevant to a DHS determination concerning an individual’s pay, leave, or travel expenses, to the extent necessary to identify the individual, inform the source of the purpose(s) of the request, and to identify the type of information requested.  </p>
<p> V. To the Office of Management and Budget at any stage in the legislative coordination and clearance process in connection with private relief legislation as set forth in OMB Circular No. A-19.</p>
<p> W. To the Social Security Administration and the Department of the Treasury to disclose pay data on an annual basis.</p>
<p> X. To a federal agency or in response to a congressional inquiry when additional or statistical information is requested relevant to the DHS Transit Fare Subsidy Program.</p>
<p> Y. To the Department of Health and Human Services for the purpose of providing information on new hires and quarterly wages as required under the Personal Responsibility and Work Opportunity Reconciliation Act of 1996.</p>
<p> Z.  To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
<p>Disclosure to consumer reporting agencies:</p>
<p> Pursuant to 5 U.S.C. § 552a(b)(12): Disclosures may be made from this system to consumer reporting agencies as defined in the Fair Credit Reporting Act (15 U.S.C. § 1681a(f)) or the Federal Claims Collection Act of 1966 (31 U.S.C. § 3701(a)(3)).</p>
<p>To the U.S. Department of the Treasury when disclosure of the information is relevant to review payment and award eligibility through the Do Not Pay Working System for the purposes of identifying, preventing, or recouping improper payments to an applicant for, or recipient of, Federal funds, including funds disbursed by a state (meaning a state of the United States, the District of Columbia, a territory or possession of the United States, or a federally recognized Indian tribe) in a state-administered, federally funded program.</p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>Storage:</p>
<p> DHS stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records are stored on magnetic disc, tape, and digital media.</p>
</xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p> DHS may retrieve records by an individual’s name, Social Security number, position, organizational element, pay period, investigative case title or tracking number (for time worked associated with a specific case), and/or fiscal year.</p>
</xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p>DHS safeguards records in this system in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS has imposed strict controls to minimize the risk of compromising the stored information.  DHS limits access to the computer system containing the records in this system to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions. </p>
</xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p> In accordance with NARA General Records Schedule 2, Item 7, time and attendance records are destroyed after a Government Accountability Office audit or when six years-old; whichever is sooner. In accordance with NARA General Records Schedule 2, Item 1(b), individual employee payroll records are destroyed when 56 years-old. In accordance with NARA General Records Schedule 1, Item 18, supervisor personnel files are reviewed annually and destroyed when a file is superseded/obsolete, or within one year after separation or transfer of an employee.  Duplicate official personnel records are destroyed when six months-old. </p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent>
<p> For DHS Headquarters, the System Manager is the Office of the Chief Human Capital Officer, Department of Homeland Security, Washington, D.C. 20528.  For Components of DHS, the System Manager is the respective Human Capital Officer of the component.  </p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p> Individuals seeking notification of and access to any record contained in this system of records, including DHS records hosted by another federal agency under a cross-servicing agreement for financial management services, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and the Headquarters or Component’s Freedom of Information Act (FOIA) Officer, whose contact information can be found at <i>http://www.dhs.gov/foia-contact-information.</i> If an individual believes more than one Component maintains Privacy Act records concerning him or her the individual may submit the request to the Chief Privacy Officer, Department of Homeland Security, 245 Murray Drive, S.W., Building 410, STOP-0655, Washington, D.C. 20528-0655.</p>
<p> When seeking records about yourself from this system of records or any other Departmental system of records your request must conform with the Privacy Act regulations set forth in 6 CFR Part 5.  You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth.  You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. § 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization.  While no specific form is required, you may obtain forms for this purpose from the Chief FOIA Officer  on the Department’s website at http://www.dhs.gov or by calling toll free 1-866-431-0486.  In addition you should:</p>
<p>Explain why you believe the Department would have information on you.</p>
<p>Identify which Component(s) of the Department you believe may have the information about you.</p>
<p>Specify when you believe the records would have been created. </p>
<p>Provide any other information that will help the FOIA staff determine which DHS   component agency may have responsive records.</p>
<p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
<p>Without this bulleted information the Component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
</xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p> Records are obtained from the individual.</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent>
<p> None. 
</p></xhtmlContent></subsection></section>
<section id="all20" toc="yes">
<systemNumber>/ALL-020</systemNumber>
<subsection type="systemName">Department of Homeland Security Internal Affairs Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at several Headquarters locations and in component offices of DHS, in both Washington, DC,
and field locations.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Any applicants for Federal employment, past and present employees, contractors, and contractor applicants, or any
other individual who is subject to, or involved in, an integrity or disciplinary inquiry or investigation not handled by
OIG.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p><i>Categories of records in this system include:</i>
</p><p>• Individual identifying data, which may include some or all of the following: full name, date of birth,
social security number, addresses, duty station, grade, job series, and entrance on duty date;
</p><p>• Allegations received and method received;
</p><p>• Relevant information from background investigations;
</p><p>• Integrity investigations;
</p><p>• Investigation files;
</p><p>• Incident location;
</p><p>• Case agent/officer or supervisor;
</p><p>• Case/prosecution status;
</p><p>• Photographic images, videotapes, voiceprints, DVDs;
</p><p>• Letters, e-mails, memoranda and reports;
</p><p>• Exhibits, evidence, statements and affidavits; and
</p><p>• Any other information gathered in the course of an integrity or disciplinary inquiry or investigation.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; the Federal Records Act, 44 U.S.C. 3101; Executive Order 9397.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to collect and maintain records on applicants, past and present employees,
contractors, and contractor applicants relating to integrity or disciplinary inquiries or investigations conducted by DHS
Headquarters or its components, except for those investigations conducted by OIG.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body when it is necessary to the litigation
and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where the Department of Justice or DHS has agreed to represent
the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To disclose information to a Federal, State, or local agency, maintaining civil, criminal or other relevant
enforcement information or other pertinent information, which has requested information relevant to or necessary to the
requesting agency’s or the bureau’s hiring or retention of an individual, or issuance of a security clearance, license,
contract, grant, or other benefit.
</p><p>I. To disclose information to a court, magistrate, or administrative tribunal in the course of presenting evidence,
including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement
negotiations, in response to a subpoena from a court of competent jurisdiction.
</p><p>J. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information
pertinent to the investigation, provided disclosure is appropriate to the proper performance of the official duties of
the officer making the disclosure.
</p><p>K. To an authorized appeal or grievance examiner, formal complaints examiner, equal employment opportunity
investigator, arbitrator, or other duly authorized official engaged in investigation or settlement of a grievance,
complaint, or appeal filed by an employee.
</p><p>L. To provide information to unions recognized as exclusive bargaining representatives under the Civil Service Reform
Act of 1978, 5 U.S.C. 7111 and 7114, and in circumstances when union officials represent employees in investigations and
personnel actions.
</p><p>M. To a court, prosecutor, and/or defense attorney in satisfaction of the agency’s obligations under the Giglio,
Jenks, or Brady decisions;
</p><p>N. To management officials at Federal, State or local agencies who may be in a position to take disciplinary or other
corrective action and to boards and panels who may be charged with making recommendations or proposals regarding remedial
action.
</p><p>O. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by the individual’s name, date of birth, or social security number.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>The file records are maintained as long as the subject of the investigation is employed by DHS, and then one year
after the subject terminates employment. The files are then transferred to the Federal Records Center for a period of 25
years, after which they are destroyed.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>For Headquarters and components of DHS, the System Manager is the Director of Departmental Disclosure, Department
of Homeland Security, Washington, DC 20528. For components of DHS, the System Manager can be found at <i>
http://www.dhs.gov/foia</i> under "contacts."
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to the Headquarters’ or component’s FOIA Officer, whose contact
information can be found at <i>http://www.dhs.gov/foia</i> under "contacts." If an individual believes more
than one component maintains Privacy Act records concerning him or her the individual may submit the request to the Chief
Privacy Officer, Department of Homeland Security, 245 Murray Drive, SW., Building 410, STOP-0550, Washington, DC
20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Identify which component(s) of the Department you believe may have the information about you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Sources of information include: individuals who are the subject of the investigation or inquiry, employers, law
enforcement organizations, members of the public, witnesses, education institutions, government agencies, credit bureaus,
references, neighborhood checks, confidential sources, medical service providers, personal interviews, photographic
images, military, financial institutions, citizenship, birth and tax records, and the applicant’s, employee’s or
contractor’s personnel history and application forms.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from subsections (c)(3) and (4); (d); (e)(1), (2),
(3), (5), and (8); and (g) of the Privacy Act pursuant to 5 U.S.C. 552a(j)(2). In additional, the Secretary of Homeland
Security has exempted this system from subsections (c)(3), (d), (e)(1), (e)(4)(G), (H), (I), and (f) of the Privacy Act
pursuant to 5 U.S.C. 552a(k)(1), (2), (k)(3), and (5).
</p></xhtmlContent></subsection></section>
<section id="all21" toc="yes">
<systemNumber>/ALL-021</systemNumber>
<subsection type="systemName">Department of Homeland Security Contractors and Consultants.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at several Headquarters locations and in component offices of DHS, in both Washington, DC,
and field locations.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include any individual who serves as a contractor or consultant
to DHS.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Individual’s name;
</p><p>• Social security number;
</p><p>• Home address;
</p><p>• Telephone numbers (work, home, mobile);
</p><p>• E-mail addresses;
</p><p>• Contract name and number;
</p><p>• Employer;
</p><p>• Work address;
</p><p>• Job title;
</p><p>• Labor category;
</p><p>• Relevant work experience;
</p><p>• DHS-issued property in the possession of the contractor/consultant for the purpose of fulfilling
contractual requirements;
</p><p>• Vendor lists;
</p><p>• Correspondence between the contractor and DHS;
</p><p>• Bidders lists;
</p><p>• Permits;
</p><p>• Licenses;
</p><p>• Easement;
</p><p>• Deliverables;
</p><p>• Proposals;
</p><p>• White papers; and
</p><p>• Key personnel resumes.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; The Federal Records Act, The Homeland Security Act of 2002, Public Law 107-296; Executive
Order 9373; Reorganization Plan No. 2 of 1970 (31 U.S.C. 1111); Executive Order 11541; the Office of Federal Procurement
Policy Act (41 U.S.C. 405); and the Federal Activities Inventory Reform (FAIR) Act of 1998 (31 U.S.C. 501 note).
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to collect and maintain records on DHS contractors and consultants.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body when it is necessary to the litigation
and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where the Department of Justice or DHS has agreed to represent
the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To Federal and state entities when relevant and necessary to disclose information on DHS or its components
purchases and contracts.
</p><p>I. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or as paper records in secure facilities in a locked drawer
and/or behind a secured locked door. The electronic records are stored on magnetic disc, tape, digital media, and CD
-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by name, and/or contract name and number.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.</p>
<p>To the U.S. Department of the Treasury when disclosure of the information is relevant to review payment and award eligibility through the Do Not Pay Working System for the purposes of identifying, preventing, or recouping improper payments to an applicant for, or recipient of, Federal funds, including funds disbursed by a state (meaning a state of the United States, the District of Columbia, a territory or possession of the United States, or a federally recognized Indian tribe) in a state-administered, federally funded program.</p>
</xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records are retained for six years and three months after the final payment to a contractor/consultant in
accordance with National Archives and Records Administration-approved General Records Schedule 3, Item 3--General
Procurement Files.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>For Headquarters and components of DHS, the System Manager is the Director of Departmental Disclosure, Department
of Homeland Security, Washington, DC 20528. For components of DHS, the System Manager can be found at <i>
http://www.dhs.gov/foia</i> under "contacts."
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to the Headquarters’ or component’s FOIA Officer, whose contact
information can be found at <i>http://www.dhs.gov/foia</i> under "contacts." If an individual believes more
than one component maintains Privacy Act records concerning him or her the individual may submit the request to the Chief
Privacy Officer, Department of Homeland Security, 245 Murray Drive, SW., Building 410, STOP-0550, Washington, DC
20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Identify which component(s) of the Department you believe may have the information about you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification Procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification Procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Individuals, contractors, consultants, bidders, financial institutions, insurance companies, community
associations, and other agencies.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="all22" toc="yes">
<systemNumber>/ALL-022</systemNumber>
<subsection type="systemName">Department of Homeland Security Drug Free Workplace Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained by the Office of the Chief Human Capital Officer, at several Headquarters locations, in
component offices of DHS, in both Washington, DC and field locations, and by contractor locations on behalf of DHS.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Current and former employees of DHS and certain applicants for employment with DHS who are tested for or submit
voluntarily or involuntarily to the illegal use, possession, distribution, or trafficking of controlled substances.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Individual’s name;
</p><p>• Social Security number;
</p><p>• Date of birth;
</p><p>• Addresses;
</p><p>• Telephone numbers;
</p><p>• E-mail addresses;
</p><p>• Job title and grade;
</p><p>• Supervisor’s, senior management’s and leadership’s full name, addresses, phone numbers, and email
addresses;
</p><p>• Supervisor’s, senior management’s and leadership’s notes and records regarding an employee’s suspected
and/or confirmed illegal use, possession, distribution, or trafficking of controlled substances;
</p><p>• Records related to any criminal conviction for illegal drug use or evidence obtained from any arrest or
criminal conviction;
</p><p>• Correspondence related to the suspected and/or confirmed illegal use, possession, distribution, or
trafficking of controlled substances of a current or former DHS employee, including electronic mail and other electronic
documents;
</p><p>• Verified positive and negative test results for illegal use of controlled substances;
</p><p>• Evidence of possession, distribution, or trafficking of controlled substances;
</p><p>• Lists of controlled substances verified as positive;
</p><p>• Substance abuse assessment, aftercare, and substance use monitoring results;
</p><p>• Employee records of attendance at treatment, types of treatment, and counseling programs related to
illegal use, possession, distribution, or trafficking of controlled substances;
</p><p>• Records of treatment and counseling referrals related to testing for illegal use, possession,
distribution, or trafficking of controlled substances;
</p><p>• Prognosis of treatment information related to testing for illegal use, possession, distribution, or
trafficking of controlled substances;
</p><p>• Individual’s name, address, work/cell/home phone numbers, email addresses, and other basic identification
data for insurance purposes;
</p><p>• Name, address, telephone numbers, email addresses of treatment facilities;
</p><p>• Name, address, telephone numbers, email addresses of individuals providing treatment; and
</p><p>• Written consent forms.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; Federal Records Act; 44 U.S.C. 3101; The Homeland Security Act of 2002; Public Law 107-296;
42 U.S.C. 290dd-2; 5 U.S.C. 7301; 7361, 7362, 7901, 7904; Executive Order 9373; and Executive Order 12564.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>This record system will maintain information gathered by and in the possession of DHS Drug Free Workplace Program
Officials, used in the course of their duties in verifying positive test results for illegal use of controlled substance,
as well as collecting and maintaining evidence of possession, distribution, or trafficking of controlled substances.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>Disclosure of substance abuse records is limited to the parameters set forth in 42 U.S.C. 290dd, 290ee, and
Public Law 100-71, Section 503(e). Accordingly, a federal employee’s substance abuse records may not be disclosed
without the prior written consent of the employee, unless the disclosure would be one of the following:
</p><p>A. To medical personnel to the extent necessary to meet a bona fide medical emergency;
</p><p>B. To qualified personnel for the purpose of conducting scientific research, management audits, financial audits, or
program evaluation provided that employees are individually identified;
</p><p>C. To the employee’s medical review official;
</p><p>D. To the administrator of any Employee Assistance Program in which the employee is receiving counseling or treatment
or is otherwise participating;
</p><p>E. To any supervisory or management official within the employee’s agency having authority to take adverse personnel
action against such employee; or
</p><p>F. Pursuant to the order of a court of competent jurisdiction where required by the United States Government to defend
against any challenge against any adverse personnel action. See 42 U.S.C. 290dd, 290ee, and Public Law 100-71,
Section 503(e).
</p><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, records, other than
substance abuse records described above, or other information contained in this system may be disclosed outside DHS as a
routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:.
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body when it is necessary to the litigation
and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. any employee of DHS in his/her official capacity;
</p><p>3. any employee of DHS in his/her individual capacity where the Department of Justice or DHS has agreed to represent
the employee; or
</p><p>4. the United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>C. To appropriate State and local authorities to report, under State law, incidents of suspected child abuse or
neglect to the extent described under 42 CFR 2.12.
</p><p>D. To any person or entity to the extent necessary to prevent an imminent and potential crime which directly threatens
loss of life or serious bodily injury.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Data may be retrieved by an individual’s name, date of birth, and social security number.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permission.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records are destroyed after three years, in accordance with National Archives and Records Administration General
Records Schedule 1, Item 36.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>For Headquarters of DHS, the System Manager is the Director of Departmental Disclosure, Department of Homeland
Security, Washington, DC 20528. For components of DHS, the System Manager can be found at <i>http://www.dhs.gov/foia</i>
under "contacts."
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to the Headquarters’ or component’s FOIA Officer, whose contact
information can be found at <i>http://www.dhs.gov/foia</i> under "contacts." If an individual believes more
than one component maintains Privacy Act records concerning him or her the individual may submit the request to the Chief
Privacy Officer, Department of Homeland Security, 245 Murray Drive, SW., Building 410, STOP-0550, Washington, DC
20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Identify which component(s) of the Department you believe may have the information about you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information originates from personnel who submit to drug and alcohol testing, DHS and its components and offices,
and testing and treatment facilities.

</p></xhtmlContent></subsection></section>
    <section id="all23" toc="yes">
        <systemNumber>/ALL-023</systemNumber>
        <subsection type="systemName">
            Personnel Security Management System of Records.
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified and classified.</p>
                </xhtmlContent>
    </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p> Records are maintained at several DHS Headquarters locations and component offices in Washington, D.C. and field locations. For records on background investigations maintained and adjudicated by the Office of Personnel Management (OPM) or the Department of Defense’s (DoD) Defense Counterintelligence and Security Agency, OPM or DoD’s DCSA may retain copies of those records and files pursuant to their records retention schedules.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p> Enterprise Security Services Division (202-447-5010), Office of the Chief Security Officer, Department of Homeland Security, Washington, D.C. 20528.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p> 8 U.S.C. 1357(g); 19 U.S.C. 1401(i); Prison Rape Elimination Act of 2003, Pub. L. No. 108–79, 117 Stat. 972 (45 U.S.C. 15601 et seq.); Executive Order (EO) 9397, as amended by EO 13478; EO 10450; EO 12968; EO 13467; EO 13764; EO 13869; 5 CFR 731; 5 CFR 732; 5 CFR 736; Homeland Security Presidential Directive 12; SEAD 2; SEAD 4; SEAD 5; SEAD 6; 6 CFR part 115; and Intelligence Community Directive 704.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p> The purpose of this system is to collect and maintain records of processing of personnel security-related clearance actions, to record suitability determinations, fitness determinations, whether security clearances are issued or denied, and to verify eligibility for access to classified information or assignment to a sensitive position. Also, records may be used by the Department for adverse personnel actions such as removal from sensitive duties, removal from employment, denial to a restricted or sensitive area, and revocation of security clearance. The system also assists in capturing background investigations and adjudications; directing the clearance process for granting, suspending, revoking, and denying access to classified information; directing the clearance process for granting, suspending, revoking, and denying other federal, state, local, or foreign law enforcement officers the authority to enforce federal laws on behalf of DHS; managing state, local, tribal, and private sector clearance programs and contractor fitness programs; determining eligibility for credentials such as the Law Enforcement Officers Safety Act (LEOSA) Photographic identification card; determining eligibility for unescorted access to DHS-owned, DHS-occupied, or DHS-secured facilities or information technology systems; and/or other activities relating to personnel security management responsibilities at DHS.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p> Also covered are: 1) state, local, and tribal government personnel and private sector individuals who serve on an advisory committee or board sponsored by DHS; 2) federal, state, local, and foreign law enforcement personnel who apply for or are granted authority to enforce federal laws on behalf of DHS; and 3) individuals, including state, local, and tribal government personnel and private sector individuals, who are authorized by DHS to access Departmental facilities, communications security equipment, and/or information technology systems that process sensitive or classified national security information.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                • 	<p>Individual’s name;</p>
                • 	<p>Individual’s address;</p>
                • 	<p>Individual’s phone number;</p>
                • 	<p>Date and place of birth;</p>
                • 	<p>Social Security number;</p>
                • 	<p>Citizenship;</p>
                • 	<p>Access Control Pass or Credential number;</p>
                • 	<p>Facial photograph;</p>
                • 	<p>Fingerprints and fingerprint records;</p>
                • 	<p>Polygraph reports, polygraph charts, polygraph tapes, and notes from polygraph interviews or activities related to polygraph interviews;</p>
                • 	<p>Records relating to the management and operation of DHS personnel security programs, including but not limited to:</p>
                o	<p>Completed standard form questionnaires such as SF-85, SF-85P, and SF-86;</p>
                o	<p>Originals or copies of background investigative reports;</p>
                o	<p>For individuals covered by the DHS PREA rule, information related to whether the individual has been convicted of engaging or attempting to engage in sexual activity facilitated by force, overt or implied threats of force, or coercion, or if the victim did not consent or was unable to consent or refuse; or who has been civilly or administratively adjudicated to have engaged in such activity;</p>
                o	<p>Supporting documentation related to the background investigations and adjudications including criminal background, medical, and financial data;</p>
                o	<p>Documentation related to an individual’s character reference(s), including names, addresses, telephone numbers, and statements;</p>
                o	<p>Publicly available electronic information, including information obtained from social media;</p>
                o	<p>Information related to congressional inquiry; and</p>
                o	<p>Other information relating to an individual’s eligibility for access to classified or sensitive information.</p>
                • 	<p>Records relating to management and operation of DHS programs to safeguard classified and sensitive but unclassified information, including but not limited to:</p>
                o	<p>Document control registries;</p>
                o	<p>Courier authorization requests;</p>
                o	<p>Non-disclosure agreements;</p>
                o	<p>Records of security violations;</p>
                o	<p>Records of document transmittals; and</p>
                o	<p>Requests for secure storage and communications equipment.</p>
                • 	<p>Records relating to the management and operation of DHS special security programs, including but not limited to:</p>
                o	<p>Requests for access to sensitive compartmented information (SCI);</p>
                o	<p>Contact with foreign officials and foreign travel registries; and</p>
                o	<p>Briefing/debriefing statements for special programs, sensitive positions, and other related information and documents required in connection with personnel security clearance determinations.</p>
                • 	<p>Records relating to the management and operation of the DHS security program, including but not limited to:</p>
                o	<p>Inquiries relating to suspected security violation(s);</p>
                o	<p>Recommended remedial actions for possible security violation(s);</p>
                o	<p>Reports of investigation regarding security violations;</p>
                o	<p>Statements of individuals;</p>
                o	<p>Affidavits;</p>
                o	<p>Correspondence;</p>
                o	<p>Documentation pertaining to investigative or analytical efforts by DHS Security program personnel to identify threats to DHS personnel, property, facilities, and information (e.g., travel records obtained as part of continuous evaluation); and</p>
                o	<p>Intelligence reports and database results relating to DHS personnel, applicants, or candidates for DHS employment or access to DHS facilities or information.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p> Records are generated from the individual receiving the background investigation, relevant law enforcement databases, publicly available electronic information, and from sources contacted during personnel and background investigations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p> In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To an appropriate federal, state, local, tribal, foreign, or international agency, if the information is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, delegation or designation of authority, or other benefit, or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant, delegation or designation of authority, or other benefit and disclosure is appropriate to the proper performance of the official duties of the person making the request.</p>
                <p>J. To a prospective or current employer that has, or is likely to have, access to any government facility, information, equipment, network, or system, to the extent necessary to determine the employment eligibility of an individual, based on actions taken by the Department pursuant to a personnel security matter involving the individual.</p>
                <p>K. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations; in connection with criminal law proceedings; or pursuant to the order of a court of competent jurisdiction.</p>
                <p>L. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation, provided disclosure is appropriate to the proper performance of the official duties of the officer making the disclosure.</p>
                <p>M. To a public or professional licensing organization when such information indicates, either by itself or in combination with other information, a violation or potential violation of professional standards, or reflects on the moral, educational, or professional qualifications of an individual who is licensed or who is seeking to become licensed.</p>
                <p>N. To the National Counterintelligence and Security Center (NCSC) to assist in the ongoing review of an individual’s eligibility for access to classified information or to hold a sensitive position.</p>
                <p>O. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>DHS may be retrieve records by individual’s name, date of birth, Social Security number, if applicable, or other unique individual identifier such as access control pass or credential number.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>Pursuant to GRS 5.6, Items 170 through 200, records relating to persons who were not granted security clearances are destroyed one year after consideration of the candidate ends, but longer retention is authorized if required for business use. Records related to individuals granted a clearance are destroyed five years after employee or contractor relationship ends, but longer retention is authorized if required for business use. Records related to alleged security violations are destroyed five years after closure of case or final action, whichever is sooner, but longer retention is authorized if required for business use.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act, and the Judicial Redress Act if applicable, because it is a law enforcement system. However, DHS will consider individual requests to determine whether or not information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and Chief Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                • 	<p>Explain why he or she believes the Department would have information being requested;</p>
                • 	<p>Identify which component(s) of the Department he or she believes may have the information;</p>
                • 	<p>Specify when the individual believes the records would have been created; and</p>
                • 	<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If the request is seeking records pertaining to another living individual, the requester must include an authorization from the second individual certifying his/her agreement for the requester to access his/her records.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p> For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p> The Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(k)(1), (k)(2), (k)(3), and (k)(5), has exempted this system from the following provisions of the Privacy Act, 5 U.S.C. sec. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>DHS/ALL-023 Personnel Security Management System of Records, 74 FR 3084 (January 16, 2009), 75 FR 8088 (February 23, 2010); Implementation of Exemptions, DHS/ALL-023 Personnel Security Management System of Records, 74 FR 50904 (October 1, 2009).</p>
            </xhtmlContent>
        </subsection>
    </section>

    <section id="all24" toc="yes">
<systemNumber>/ALL-024</systemNumber>
<subsection type="systemName">Department of Homeland Security Facility and Perimeter Access Control and Visitor Management System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified, sensitive, for official use only, and classified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at several DHS Headquarters locations and in component offices in both Washington, DC and
field locations.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include: (1) Any employee, contractor, consultant, intern,
fellow, or others with regular access and an access control pass which grants unescorted access to a DHS facility or
other federal facility which DHS or its components provide access control, including the FPS and its contract guards, and
those needing access to information technology systems, and any visitor to a facility for which DHS or its components
provide access control; (2) violators and those accused of security violations of access or perimeter control and those
related to incidents and offenses in and around these facilities; (3) applicants for employment, contractors, or those
needing unescorted access to these facilities or information technology systems; (4) state and local government personnel
and private-sector individuals who serve on an advisory committee and board sponsored by DHS; (5) individuals, including
state and local government personnel and private-sector individuals, who are authorized by DHS to access DHS facilities,
and other federal facilities where DHS controls access through its components, including the FPS and its contract guards,
including classified facilities, communications security equipment, and information technology systems that process
national or homeland security classified information.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in the system include:
</p><p>• Individual’s full name;
</p><p>• Date and place of birth;
</p><p>• Social security number;
</p><p>Note:</p><p>For access to the Nebraska Avenue Complex, DHS employees, including component employees and contractors, are
not required to provide date of birth or social security number to enter the Nebraska Avenue Complex if they provide a
HSPD-12 badge, component badge, credential, or commission book. Component employees and contractors will also
provide name, component, and Nebraska Avenue Complex point of contact name and phone number. Headquarters employees and
contractors can also provide a drivers license as identification to be confirmed within the system of records as a DHS
Headquarters employee. If a component employee or contractor does not have a DHS or component-issued credential at the
point of entry, the individual will be processed into the Nebraska Avenue Complex as a regular visitor requiring a full
name, date of birth, and social security number.
</p><p>• Organization’s name;
</p><p>• Citizenship;
</p><p>• Country of origin, if applicable;
</p><p>• Telephone number;
</p><p>• Physical descriptions;
</p><p>• Biometric information;
</p><p>• Photograph;
</p><p>• Visitor badge number, if applicable;
</p><p>• Date and time of entry and departure;
</p><p>• Drivers license and other form of identification information;
</p><p>• License plate number and state of issuance;
</p><p>• Make and model of vehicle;
</p><p>• Reports, files, records received from other federal agencies;
</p><p>• Records relating to management and operation of DHS programs to safeguard classified and sensitive but
unclassified information, including but not limited to:
</p><p>• Document control registries;
</p><p>• Courier authorization requests;
</p><p>• Non-disclosure agreements;
</p><p>• Records of security violations;
</p><p>• Records of document transmittals; and
</p><p>• Requests for secure storage and communications equipment.
</p><p>• Records relating to the management and operation of the DHS security program, including but not limited
to:
</p><p>• Inquiries relating to suspected security violation(s);
</p><p>• Recommended remedial actions for possible security violation(s);
</p><p>• Reports of investigation regarding security violations;
</p><p>• Information pertaining to incidents and offenses;
</p><p>• Statements of individuals;
</p><p>• Affidavits; and
</p><p>• Correspondence.
</p><p>• Records relating to the management and operation of the facility and perimeter access control and visitor
management system including but not limited to:
</p><p>• Facility and perimeter access registries;
</p><p>• Courier cards;
</p><p>• Access control card requests; and
</p><p>• Specific information from standard DHS forms used to conduct criminal history record checks; and
</p><p>• Closed circuit television (CCTV) systems and recordings.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; the Homeland Security Act, codified in Title 6 of the U.S. Code; 44 U.S.C. 3101; and Executive
Order (EO) 9397; EO 12968; and Federal Property Regulations, issued July 2002.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to collect and maintain records associated with DHS facility and perimeter access
control, including access to DHS information technology and access to classified facilities, as well as visitor security
and management.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body when it is necessary to the litigation
and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the written request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To an appropriate federal, state, local, tribal, foreign, or international agency or contract provider, if the
information is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an
individual, or issuance of a security clearance, license, contract, grant, or other benefit, or if the information is
relevant and necessary to a DHS decision concerning the hiring or retention of an employee or contractor, the issuance of
a security clearance, the reporting of an investigation of an employee or contractor, the letting of a contract, or the
issuance of a license, grant or other benefit and disclosure is appropriate to the proper performance of the official
duties of the person making the request.
</p><p>I. To a public or professional licensing organization when such information indicates, either by itself or in
combination with other information, a violation or potential violation of professional standards, or reflects on the
moral, educational, or professional qualifications of an individual who is licensed or who is seeking to become licensed.
</p><p>J. To an appropriate federal, state, tribal, local, or foreign government agency or organization, or international
organization, lawfully engaged in collecting law enforcement intelligence, whether civil or criminal, or charged with
investigating, prosecuting, enforcing or implementing civil or criminal laws, related rules, regulations or orders, to
enable these entities to carry out their law enforcement responsibilities, including the collection of law enforcement
intelligence, but only when the disclosure is appropriate to the proper performance of the official duties of the person
receiving the disclosure, and;
</p><p>K. To an appropriate federal, state, local, tribal, or foreign government agency, international organization, or
private organization where the President or the Secretary of Department of Homeland Security has declared an event to be
a National Special Security Event, if the information is relevant and necessary to a requesting agency’s decision
concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or
other benefit, or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an
employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a
contract, or the issuance of a license, grant or other benefit, but only when disclosure is appropriate to the proper
performance of the official duties of the person making the request.
</p><p>L. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on servers, magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by individual name, date of birth, and social security number, or other personal
identifier listed above in "Category of Records in the System," if applicable.
</p><p>Note:</p><p>For access to DHS Headquarters, all employees, including component employees and contractors, are not
required to provide date of birth and social security number to enter DHS Headquarters facilities. If they do not have
their credential at the point of entry, they are required to log their name and title, component, data and time, ID of
employee, and point of contact.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize risk of compromising
the information that is being stored. Access to the computer system containing the records in this system is limited to
those individuals who have a need to know the information for the performance of their official duties and who have
appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Pursuant to GRS 18, Item 22a, personnel security clearance files are destroyed upon notification of death or not
later than five years after separation or transfer of employee or no later than five years after contract relationship
expires, whichever is applicable.
</p><p>Pursuant to GRS 18, Item 6, requests and authorizations for individuals to have access to classified files are
destroyed two years after authorization expires.
</p><p>Pursuant to GRS 11, Item 4a, identification credentials including cards, badges, parking permits, photographs, agency
permits to operate motor vehicles, and property, dining room and visitors’ passes, and other identification credentials
are destroyed three months after return to issuing office.
</p><p>Pursuant to GRS 18, Item 17, registers or logs used to record names of outside contractors, service personnel,
visitors, employees admitted to areas, and reports on automobiles and passengers for areas under maximum security are
destroyed five years after final entry or five years after date of document, as appropriate.
</p><p>Other documents pursuant to GRS 18, Item 17b, are destroyed two years after final entry or two years after date of
document, as appropriate.
</p><p>Where records are used as evidence in an investigation or in an administrative, litigation, or other proceeding, the
records will be retained until final disposition of the investigation or proceeding.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>For Headquarters components of DHS: Chief, Physical Security Division (202-447-5010), Office of
Security, Department of Homeland Security, Washington, DC 20528. For components of DHS, the System Manager can be found
at <i>http://www.dhs.gov/foia</i> under "contacts."
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment
procedures of the Privacy Act because it is a law enforcement system. However, DHS will consider individual requests to
determine whether or not information may be released. Thus, individuals seeking notification of and access to any record
contained in this system of records, or seeking to contest its content, may submit a request in writing to the
Headquarters or component’s FOIA Officer, whose contact information can be found at <i>http://www.dhs.gov/foia</i> under
"contacts." If an individual believes more than one component maintains Privacy Act records concerning him or
her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer,
Department of Homeland Security, 245 Murray Drive, SW., Building 410, STOP-0550, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records, your
request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, <i>http://www.dhs.gov</i> or 1
-866-431-0486. In addition, you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created;
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records; and
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are obtained from individuals seeking employment or access to facilities for which DHS and its components
provide security and from individuals involved in incidents and offenses that take place in or around those facilities.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act,
subject to the limitation set forth in (c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) of the Privacy Act
pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5) of the Privacy Act.
</p></xhtmlContent></subsection></section>
<section id="dhs" toc="yes">
<systemNumber>/ALL-025</systemNumber>
    <subsection type="systemName">Department of Homeland Security (DHS)/ALL-025 Law Enforcement Authorities in Support of the Protection of Property Owned, Occupied, or Secured by the Department of Homeland Security System of Records.
</subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
                 <p>Unclassified, sensitive, for official use only, and classified.</p>
        </xhtmlContent>
        </subsection>
            <subsection type="systemLocation">
                <xhtmlContent>
                    <p>Records are maintained at several DHS Headquarters locations and Component offices, in both Washington, D.C. and field locations.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="systemManager">
                <xhtmlContent>
                    <p>For Headquarters components of DHS: Chief, Physical Security Division (202) 447-5010, Office of Security, Department of Homeland Security, Washington, D.C. 20528. For DHS Components, the System Manager can be found at http://www.dhs.gov/foia under "FOIA Contact Information."</p>
                </xhtmlContent>
            </subsection>
            <subsection type="authorityForMaintenance">
                <xhtmlContent>
                    <p>40 U.S.C 1315; 44 U.S.C. sec. 3101; and E.O. 9397 as amended by E.O. 13478; E.O. 10450; E.O. 12968, 5 CFR 731; 5 CFR 732; 5 CFR 736; 32 CFR 147; and DCID 6/4.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="purpose">
                <xhtmlContent>
                    <p>The purpose of this system is to maintain and record the results of law enforcement activities in support of the protection of property owned, occupied, or secured by DHS and its components, including the Federal Protective Service (FPS), and individuals maintaining a presence or access to such property. It will also be used to pursue criminal prosecution or civil penalty action against individuals or entities suspected of offenses that may have been committed against property owned, occupied, or secured by DHS or persons on the property.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="categoriesOfIndividuals">
                <xhtmlContent>
                    <p>Categories of individuals covered by this system include:</p>
                    <p> •  Individuals or entities involved in, or suspected of being involved in, criminal acts against the buildings, grounds, and property that are owned, occupied, or secured by DHS or against persons who are in or on such buildings, grounds, or property.  This category includes property located within or outside of the United States;</p>
                    <p>•  Individuals who provide information that is relevant to the investigation, such as victims and witnesses, and who report such crimes or acts;</p>
                    <p>•  Persons involved in any event, or witnesses an event that affects or impacts the safety, security, or protection of the property, facility, or occupant;</p>
                    <p>•  Current, former, or retired DHS personnel who travel outside the United States while employed by DHS.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="categoriesOfRecords">
                <xhtmlContent>
                    <p>Categories of records in the system may include:</p>
                    <p>•  Individual’s or entity’s name;</p>
                    <p>•  Alias;</p>
                    <p>•  Digital video recordings and CCTV recordings;</p>
                    <p>•  Audio recordings;</p>
                    <p>•  Date of birth, place of birth, and age;</p>
                    <p>•  Social Security number;</p>
                    <p>•  Alien File Number (A-Number);</p>
                    <p>•  Duty/work address and telephone number;</p>
                    <p>•  Race and ethnicity;</p>
                    <p>•  Citizenship;</p>
                    <p>•  Sex;</p>
                    <p>•  Marital status;</p>
                    <p>•  Identifying marks (e.g., tattoos, scars);</p>
                    <p>•  Height and weight;</p>
                    <p>•  Eye and hair color;</p>
                    <p>•  Biometric data (e.g., photograph, fingerprints);</p>
                    <p>•  Home address, telephone number, and other contact information;</p>
                    <p>•  Driver’s license information and citations issued;</p>
                    <p>•  Vehicle information;</p>
                    <p>•  Date, location, nature and details of the incident/offense;</p>
                    <p>•  Alcohol, drugs, or weapons involvement;</p>
                    <p>•  Bias against any particular group;</p>
                    <p>•  Confinement information to include location of correctional facility;</p>
                    <p>•  Gang/cult affiliation, if applicable;</p>
                    <p>•  Release/parole/clemency eligibility dates;</p>
                    <p>•  Foreign travel notices and reports including briefings and debriefings;</p>
                    <p>•  Notices and reports with foreign contacts;</p>
                    <p>•  Reports of investigation;</p>
                    <p>•  Statements of individuals, affidavits, and correspondence;</p>
                    <p>•  Documentation pertaining to criminal activities;</p>
                    <p>•  Investigative surveys;</p>
                    <p>•  Certifications pertaining to qualifications for employment, including but not limited to education, firearms, first aid, and CPR;</p>
                    <p>•  Technical, forensic, polygraph, and other investigative support to criminal investigations to include source control documentation and regional information;</p>
                    <p>•  Data on individuals to include: victims, witnesses, complainants, offenders, and suspects;</p>
                    <p>•  Records of possible espionage, foreign intelligence service elicitation activities, and terrorist collection efforts directed at the Department or its staff, contractors, or visitors;</p>
                    <p>•  Records of close coordination with the intelligence and law enforcement community.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="recordSourceCategories">
                <xhtmlContent>
                    <p>Records are obtained from sources contacted during investigations; state, tribal, international, and local law enforcement; and federal departments and agencies.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="routineUsesOfRecords">
                <xhtmlContent>
                    <p> In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
                    <p>A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                    <p>1. DHS or any component thereof;</p>
                    <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                    <p>3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
                    <p>4. The United States or any agency thereof.</p>
                    <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                    <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
                    <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                    <p>E. To appropriate agencies, entities, and persons when:</p>
                    <p>1. DHS determines that the use of information from this system of records is reasonably necessary and otherwise compatible with the purpose of collection to assist another federal recipient agency or entity in (a) responding to a suspected or confirmed breach or (b) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach; or</p>
                    <p>2. DHS suspects or has confirmed that there has been a breach of this system of records; and (a) DHS has determined that as a result of the suspected or confirmed breach, there is a risk of harm to individuals, harm to DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (b) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                    <p>F. To contractors and their agents, grantees, experts, consultants, FPS Contract Guard companies, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                    <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                    <p>H. To an appropriate federal, state, local, tribal, foreign, or international agency or contract provider, if the information is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee or contractor, the issuance of a security clearance, the reporting of an investigation of an employee or contractor, the letting of a contract, or the issuance of a license, grant, or other benefit, and disclosure is appropriate to the proper performance of the official duties of the person making the request.</p>
                    <p>I. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection with criminal law proceedings or pursuant to the order of a court of competent jurisdiction.</p>
                    <p>J. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation, provided disclosure is appropriate to the proper performance of the official duties of the officer making the disclosure.</p>
                    <p>K. To a federal, state, local agency, or other appropriate entities or individuals, or through established liaison channels to selected foreign governments, in order to provide intelligence, counterintelligence, or other information for the purposes of intelligence, counterintelligence, or antiterrorism activities authorized by United States law, E.O., or other applicable national security directive.</p>
                    <p>L. To a public or professional licensing organization when such information indicates, either by itself or in combination with other information, a violation or potential violation of professional standards, or reflects on the moral, educational, or professional qualifications of an individual who is licensed or who is seeking to become licensed.</p>
                    <p>M. To individuals involved in incidents occurring on federal facilities, their insurance companies, and their attorneys for the purpose of adjudicating a claim, such as personal injury, traffic accident, or other damage to property. The release of personal information is limited to that required to adjudicate a claim.</p>
                    <p>N. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
                  
                    </xhtmlContent>
            </subsection>
            <subsection type="policiesAndPractices">
                <xhtmlContent>
                    <p>DHS stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="retrievability">
                <xhtmlContent>
                    <p> Records may be retrieved by individual name, Social Security number, or other personal identifier listed in "Categories of Records," when applicable.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="retentionAndDisposal">
                <xhtmlContent>
                    <p> Records are pending National Archives and Records Administration approval. DHS has proposed the following retention schedule: Records are maintained in accordance with N1-563-08-4, Item 1. Records are maintained for 20 years after the end of the fiscal year in which the case was closed and are then destroyed. No records will be destroyed until the retention schedule is approved.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="safeguards">
                <xhtmlContent>
                    <p>DHS safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="recordAccessProcedures">
                <xhtmlContent>
                    <p>
                        The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act, and those of the JRA if applicable, because it is a law enforcement system. However, DHS will consider individual requests to determine whether or not information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and Headquarters or component’s FOIA Officer, whose contact information can be found at <i>http://www.dhs.gov/foia</i> under "Contacts Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.
                    </p>
                    <p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. In addition, you should:</p>
                    <p>•  Explain why you believe the Department would have information on you;</p>
                    <p>•  Identify which component(s) of the Department you believe may have the information about you;</p>
                    <p>•  Specify when you believe the records would have been created; and</p>
                    <p>•  Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                    <p>If your request is seeking records pertaining to another living individual, you must, in accordance with 6 CFR 5.21, include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
                    <p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="contestingRecordProcedures">
                <xhtmlContent>
                    <p>For records covered by the Privacy Act or covered JRA records, see "access procedures" above.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="notificationProcedure">
                <xhtmlContent>
                    <p>See "Record Access procedure."</p>
                </xhtmlContent>
            </subsection>
            <subsection type="exemptionsClaimed">
                <xhtmlContent>
                    <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (f); (g)(1). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a (k)(1), (k)(2), and (k)(5),  has exempted this system from the following provisions of the Privacy Act: (c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); (f). When this system receives a record from another system exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="history">
                <xhtmlContent>
                    <p>75 FR 5614; 74 FR 2903.</p>
                </xhtmlContent>
            </subsection>
        </section>



            <section id="all26" toc="yes">
<systemNumber>/ALL-026</systemNumber>
<subsection type="systemName">DHS/ALL Personal Identity Verification Management System (PIVMS).
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Sensitive but unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at Headquarters in Washington, DC, and field offices. The physical and logical access
systems at all DHS and component facilities will have system-level access to the PIVMS for real-time verification of user
credentials.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include: All DHS employees, contractors and their employees,
consultants, volunteers engaged by DHS who require long-term access to Federally controlled facilities and information
systems, as defined by Office of Management and Budget Memorandum 05-24; Federal emergency response officials;
foreign nationals on assignment; and other Federal employees detailed or temporarily assigned to DHS in direct support of
the DHS mission and who work in Federally controlled facilities or require access to Federal information technology
systems. Individuals who require regular, ongoing access to agency facilities, information technology systems, or
information classified in the interest of national security.
</p><p>The system does not apply to occasional visitors or short-term guests to whom DHS will issue temporary identification
and credentials.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Full name;
</p><p>• Date of birth;
</p><p>• Maiden name;
</p><p>• Social Security Number;
</p><p>• Citizenship;
</p><p>• Mother’s maiden name;
</p><p>• Organization/office of assignment;
</p><p>• Employee affiliation and status;
</p><p>• Contact information, such as telephone number(s), work e-mail, and duty location;
</p><p>• Copies of identity source documents;
</p><p>• Fingerprints (10 print and 2 print);
</p><p>• Identifying physical information, such as height, weight, hair color, eye color, and digital photograph;
</p><p>• Financial history;
</p><p>• PIV card issue and expiration dates;
</p><p>• PIV request form;
</p><p>• PIV registrar approval digital signature;
</p><p>• PIV card serial number;
</p><p>• Federal emergency response official designation, affiliation, and related roles;
</p><p>• Computer system user name;
</p><p>• User access and permission rights, authentication certificates;
</p><p>• Clearance level;
</p><p>• Entry on duty date;
</p><p>• Digital signature information; and
</p><p>• Weapons bearer designation.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; Federal Information Security Act (Pub. L. 104-106, Sec. 5113); E-Government Act (Pub.
L. 104-347, sec. 203); the Paperwork Reduction Act of 1995 (44 U.S.C. 3501); and the Government Paperwork
Elimination Act (Pub. L. 105-277, 44 U.S.C. 3504); Homeland Security Presidential Directive-12 (HSPD-
12, issued August 27, 2004); Policy for a Common Identification Standard for Federal Employees and Contractors, August
27, 2004; Federal Property and Administrative Act of 1949, as amended (40 U.S.C. 483); the Intelligence Reform and
Terrorism Prevention Act of 2004, Pub. L. 108-458, Section 3001 (50 U.S.C. 435b) and the Homeland Security Act of
2002, Pub. L. 107-296, as amended.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to:
</p><p>• Ensure the safety and security of DHS facilities, systems, or information, and our occupants and users;
</p><p>• Verify that all persons entering Federal facilities, using Federal information resources, are authorized
to do so; and
</p><p>• Track and control PIV cards issued to persons entering and exiting the DHS facilities or using DHS
systems.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3). Disclosures may be made to:
</p><p>A. To the Department of Justice (DOJ) or other Federal agency conducting litigation or in proceedings before any
court, adjudicative or administrative body, when:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information;
and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To the Department of Justice (DOJ) when:
</p><p>1. The agency or any component thereof;
</p><p>2. Any employee of the agency in his or her official capacity;
</p><p>3. Any employee of the agency in his or her individual capacity where agency or the Department of Justice has agreed
to represent the employee; or
</p><p>4. The United States Government is a party to litigation or has an interest in such litigation, and by careful review,
the agency determines that the records are both relevant and necessary to the litigation and the use of such records by
DOJ is therefore deemed by the agency to be for a purpose compatible with the purpose for which the agency collected the
records.
</p><p>I. To a court or adjudicative body in a proceeding when: (a) The agency or any component thereof; (b) any employee of
the agency in his or her official capacity; (c) any employee of the agency in his or her individual capacity where agency
or the Department of Justice has agreed to represent the employee; or (d) the United States Government is a party to
litigation or has an interest in such litigation, and by careful review, the agency determines that the records are both
relevant and necessary to the litigation and the use of such records is therefore deemed by the agency to be for a
purpose that is compatible with the purpose for which the agency collected the records.
</p><p>J. Except as noted on Forms SF 85, 85-P, and 86, when a record on its face, or in conjunction with other
records, indicates a violation or potential violation of law, whether civil, criminal, or regulatory in nature, and
whether arising by general statute or particular program statute, or by regulation, rule, or order issued pursuant
thereto, disclosure may be made to the appropriate public authority, whether Federal, foreign, State, local, or tribal,
or otherwise, responsible for enforcing, investigating or prosecuting such violation or charged with enforcing or
implementing the statute, or rule, regulation, or order issued pursuant thereto, if the information disclosed is relevant
to any enforcement, regulatory, investigative or prosecutorial responsibility of the receiving entity.
</p><p>K. To a Federal, State, local, foreign, or tribal or other public authority the fact that this system of records
contains information relevant to the retention of an employee, the retention of a security clearance, the letting of a
contract, or the issuance or retention of a license, grant, or other benefit. The other agency or licensing organization
may then make a request supported by the written consent of the individual for the entire record if it so chooses. No
disclosure will be made unless the information has been determined to be sufficiently reliable to support a referral to
another office within the agency or to another Federal agency for criminal, civil, administrative personnel or regulatory
action.
</p><p>L. To the Office of Management and Budget when necessary to the review of private relief legislation pursuant to OMB
Circular No. A-19.
</p><p>M. To a Federal, State, or local agency, or other appropriate entities or individuals, or through established liaison
channels to selected foreign governments, in order to enable an intelligence agency to carry out its responsibilities
under the National Security Act of 1947, as amended, the CIA Act of 1949, as amended, Executive Order 12333 or any
successor order, applicable national security directives, or classified implementing procedures approved by the Attorney
General and promulgated pursuant to such statutes, orders or directives.
</p><p>N. To notify another Federal agency when, or verify whether, a PIV card is no longer valid.
</p><p>O. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>Privacy Act information may be reported to consumer reporting agencies pursuant to 5 U.S.C. 552a(b)(12).
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, paper in secure files, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by name of the individual, Social Security Number and/or by any other unique individual
identifier.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with FISMA and other applicable rules and policies,
including all applicable DHS automated systems security and access policies. Strict controls have been imposed to
minimize the risk of compromising the information that is being stored. Access to the computer system containing the
records in this system is limited to those individuals who have a need to know the information for the performance of
their official duties and who have appropriate clearances or permissions. The system maintains a real-time auditing
function of individuals who access the system. Additional safeguards may vary depending on the component and program.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Pursuant to GRS 18, Item 22a records used to initiate background investigations; register and enroll individuals;
manage the PIV card lifecycle; and, verify, authenticate and revoke PIV cardholder access to Federal resources are
destroyed upon notification of death or not later than 5 years after separation or transfer of employee or no later than
5 years after contract relationship expires, whichever is applicable.
</p><p>Pursuant to GRS 11, Item PIV cards are destroyed three months after they are returned to the issuing office.
</p><p>Pursuant to GRS 11, Item 4a identification credentials are destroyed by cross-cut shredding no later than 90 days
after deactivation.
</p><p>Pursuant to GRS 18, Item 17 registers or logs used to record names of outside contractors, service personnel,
visitors, employees admitted to areas, and reports on automobiles and passengers for areas under maximum security are
destroyed five years after final entry or five years after date of document, as appropriate.
</p><p>Other documents pursuant to GRS 18, Item 17b are destroyed two years after final entry or two years after date of
document, as appropriate.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>DHS HSPD-12 Program Director, Office of Security, U.S. Department of Homeland Security, 245 Murray Lane,
SW., Building 410, Washington, DC 20528.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to the component’s FOIA Officer, whose contact information can be
found at <i>http://www.dhs.gov/foia</i> under "contacts." If an individual believes more than one component
maintains Privacy Act records concerning him or her the individual may submit the request to the Chief Privacy Officer,
Department of Homeland Security, 245 Murray Drive, SW., Building 410, STOP-0550, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty or perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov/foia</i> or 1-866-431-0486.
In addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information about you,
</p><p>• Identify which component(s) of the Department you believe may have the information about you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) will not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification Procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification Procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are obtained from the employee, contractor, or applicant; sponsoring agency; former sponsoring agency;
other Federal agencies; contract employer; former employer.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="all27" toc="yes">
<systemNumber>/ALL-027</systemNumber>
<subsection type="systemName">Department of Homeland Security--The History of the Department of Homeland Security System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Classified, sensitive, and unclassified. </p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at Department of Homeland Security headquarters (History Office, Office of Policy) as well
as component headquarters in Washington, DC, and field locations.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include: Current and former federal employees, including
political appointees, civilian, contractor, and military personnel assigned or detailed to the Department. Also, covered
by this system are individuals who are formally or informally associated with the Department, including advisory
committee members, employees of other agencies and departments in the federal government, and other individuals in the
private and public sector who contribute to the history of the Department.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Individuals or interviewees full name;
</p><p>• Individuals or interviewees provided address;
</p><p>• Individuals or interviewees provided phone number(s);
</p><p>• Individuals or interviewees provided e-mail address;
</p><p>• Occupational background and position(s);
</p><p>• Public speeches and articles by an individual;
</p><p>• Public and internal correspondence, interviews, press releases and announcements, and various other tapes
and transcripts of Departmental activities;
</p><p>• Photographs;
</p><p>• Biographical information;
</p><p>• Interview records on magnetic tape or other electronic format;
</p><p>• Transcriptions from written and oral interviews and discussions;
</p><p>• Access agreements; and
</p><p>• Interviewee accounts and recollections of experiences at component legacy agencies; the events of
September 11, 2001; the establishment of the Department and its predecessor the Office of Homeland Security; the history
of the Department including legacy components; major issues facing the Department; and the future of the Department.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; and 44 U.S.C. 3101.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to collect historically relevant information about the Department to support
policy, initiatives, announcements, public releases of information, as well as to inform current and future leadership,
employees, and the public about the history of the Department.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body, when it is necessary to the
litigation and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individuals that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>E. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>F. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>G. To the Government Printing Office or other publishing offices for production of a final document.
</p><p>H. To the National Archives and other government or public libraries in order to respond to inquiries about DHS.
</p><p>I. To audiences attending a particular event, location, or meeting where the history of the Department is exhibited or
presented.
</p><p>J. To scholars (historians and other disciplines) or any other interested individuals for research in writing
dissertations, articles, books, and other documents for government, commercial, and nonprofit publication or developing
material for other media use.
</p><p>K. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by name, subject, employment position, or event.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records relating to background material are temporary, to be destroyed when no longer needed for administrative
purposes, or ten years after the completion of the project. Records for the Headquarters History Office Project Files and
Oral History Program are permanent in accordance with National Archives and Records Administration through approved
schedule N1-563-07-3.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Historian (202-282-8682), History Office, Office of Policy, U.S. Department of Homeland Security,
Washington, DC 20528.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to the Headquarters’ or component’s FOIA Officer, whose contact
information can be found at <i>http://www.dhs.gov/foia</i> under "contacts." If an individual believes more
than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the
Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive,
SW., Building 410, STOP-0550, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records, your
request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer,<i> http://www.dhs.gov</i> or 1
-866-431-0486. In addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created;
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records; and
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Individuals, interviewees, press releases, newspapers, journals, copies of internal Department records, and
individuals submit records on a voluntary basis to the History Offices. Individuals who are interviewed for records must
sign and are provided a notice under the Privacy Act pursuant to 5 U.S.C. 552a.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act,
subject to the limitations set forth in (c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(5), and (e)(8); and (g) of the
Privacy Act pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system
from the following provisions of the Privacy Act, subject to the limitations set forth in (c)(3), (d), (e)(1), (e)(4)(G),
(H), (I), and (f) of the Privacy Act pursuant to 5 U.S.C. 552a(k)(1), (k)(2), (k)(3), and (k)(5).
</p></xhtmlContent></subsection></section>
<section id="all29" toc="yes">
<systemNumber>/ALL-029</systemNumber>
<subsection type="systemName">Civil Rights and Civil Liberties Records System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified, sensitive, and classified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the Department Office for Civil Rights and Civil Liberties (CRCL), component civil
rights and civil liberties offices, and within offices of a component that does not have a designated civil rights and
civil liberties office, but these functions are dispersed within other offices of the component, in Washington, DC and
field locations.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include:
</p><p>Persons who contact the CRCL or component civil rights and civil liberties staff, to allege abuses of civil rights and
civil liberties, or to allege racial, ethnic, or religious profiling by DHS, its employees, contractors, grantees, or
others acting under the authority of the Department; persons alleged to be involved in civil rights or civil liberties
abuses or racial, ethnic, or religious profiling, victims or witnesses to such abuse; third parties not directly involved
in the alleged incident, but identified as relevant persons to an investigation; and DHS employees and contractors.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in the system include:
</p><p>Information relating to allegations of abuses of civil rights, civil liberties, and racial, ethnic, and religious
profiling by Department employees and officials will be collected, as well as similar allegations relating to persons or
entities under Department control (such as contractors or programs). Basic information about complainants will be
collected, including, but not limited to:
</p><p>• Complainant’s name;
</p><p>• Complainant’s home and work mailing address;
</p><p>• Complainant’s home, cell and work telephone and fax numbers;
</p><p>• Complainant’s home and work e-mail address;
</p><p>• Complainant’s social security number or alien registration number, if necessary and appropriate;
</p><p>• Name of representative filing a claim on behalf of a complainant;
</p><p>• Allegation occurrence date and time;
</p><p>• Allegation facility name and location;
</p><p>• DHS component referenced;
</p><p>• Information on a complainant’s country of origin/race/religion (CRCL does not solicit this information, it
is tracked if individuals provide it);
</p><p>• Allegation details, primary and secondary issues, and primary and secondary basis;
</p><p>• Other information that may appear in the system or in the file folder on a case-by-case basis might
include:
</p><p>• Photographic facial images;
</p><p>• Bank account numbers;
</p><p>• Vehicle license plate information; and
</p><p>• Civil or criminal history information.
</p><p>• Paper investigative files and documents depending on the particular investigation, but may include:
</p><p>• Letters, memoranda, and other documents alleging abuses of civil rights, civil liberties, and profiling
from complainants;
</p><p>• Internal letters, memoranda, and other communications within DHS;
</p><p>• Results of an investigation of allegations;
</p><p>• Transcripts, interview notes, investigative notes;
</p><p>• Documentation concerning requests for additional information needed to complete the investigation;
</p><p>• Medical records;
</p><p>• Copy of passport;
</p><p>• Evidentiary documents and material, comments, and reports relating to the alleged abuses and to the
resolution of the complaint; and
</p><p>• Similar information regarding witnesses, persons involved in the alleged incident, or any other persons
with relevant information regarding the alleged abuses may also be collected.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>6 U.S.C. 345; 5 U.S.C. 301; 49 U.S.C. 114; 44 U.S.C. 3101; section 803 of Public Law 110-53; E.O. 12958, as
amended.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to allow CRCL, component civil rights and civil liberties staff, and staff of
components who do not have a designated civil rights and civil liberties office, but who do perform related functions, to
maintain relevant information necessary to review complaints or comments about alleged civil rights or civil liberties
violations, including racial, ethnic, or religious profiling related to the Department’s activities. The system will also
track and maintain investigative files and records of complaint resolution and other issues, and facilitate oversight and
accountability of the Department’s civil rights and civil liberties complaint resolution mechanisms.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (DOJ), (including United States Attorney Offices, or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body, when it is necessary to the
litigation and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration (NARA) or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use is subject to the same Privacy
Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, Tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To another Federal agency with responsibility for labor or employment relations or other issues, including Equal
Employment Opportunity issues, when that agency has jurisdiction over issues reported to CRCL, or component civil rights
and civil liberties staff, and staff of components who do not have a designated civil rights and civil liberties office,
but who do perform related functions.
</p><p>I. To an organization or individual in either the public or private sector, either foreign or domestic, where there is
a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to
the extent the information is relevant to the protection of life or property.
</p><p>J. To a former employee of the Department for purposes of responding to an official inquiry by a Federal, State, or
local government entity or professional licensing authority, in accordance with applicable Department regulations; or
facilitating communications with a former employee that may be necessary for personnel-related or other official purposes
where the Department requires information and/or consultation assistance from the former employee regarding a matter
within that person’s former area of responsibility.
</p><p>K. To the Office of Management and Budget (OMB), the DOJ, or the Office of Special Counsel (OSC), to obtain advice
regarding statutory and other requirements related to civil rights and civil liberties.
</p><p>L. To a Federal, State, territorial, Tribal, local, international, or foreign government agency or entity for the
purpose of consulting with that agency or entity: 1. To assist in making a determination regarding redress for an
individual in connection with the operations of a DHS component or program; 2. for the purpose of verifying the identity
of an individual seeking redress in connection with the operations of a DHS component or program; or 3. for the purpose
of verifying the accuracy of information submitted by an individual who has requested such redress on behalf of another
individual.
</p><p>M. To a Federal agency or entity that furnished a record or information for the purpose of permitting that agency or
entity to make a decision regarding access to or correction of the record or information or to a Federal agency or entity
that has information relevant to the redress request for purposes of obtaining guidance, additional information, or
advice from such Federal agency or entity regarding the handling of this particular redress request.
</p><p>N. To third parties lawfully authorized in connection with a Federal government program, which is authorized by law,
regulation, or rule, but only the information necessary and relevant to effectuate or to carry out a particular redress
result for an individual and disclosure is appropriate to enable these third parties to carry out their responsibilities
related to the Federal government program, such as when the name and appropriate associated information about an
individual who has been cleared and distinguished from a known or suspected threat to aviation security, is shared with
the airlines to prevent future delays and disruptions for that individual while traveling.
</p><p>O. To the Department of Transportation (DOT) and its operating administrations when relevant or necessary to (1)
ensure safety and security in any mode of transportation; (2) enforce safety- and security-related regulations and
requirements; (3) assess and distribute intelligence or law enforcement information related to transportation security;
(4) assess and respond to threats to transportation; (5) oversee the implementation and ensure the adequacy of security
measures at airports and other transportation facilities; (6) plan and coordinate any actions or activities that may
affect transportation safety and security or the operations of transportation operators; or (7) the issuance,
maintenance, or renewal of a license, certificate, contract, grant, or other benefit.
</p><p>P. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by name, incident code, social security number or other unique personal identifier.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Referred issues are sent to DHS components for resolution. Components will maintain the record copy in accordance
with the component’s related record disposition schedule. CRCL will maintain a reference copy containing the original
complaint, all related and relevant documents, and the component’s memorandum of resolution in accordance with records
schedule N1-563-07-6, b.1 and will destroy or delete seven years after resolution or closure of the
case.
</p><p>Retained issues are either maintained by CRCL because of the significance of the issue, which may result in policy
change, or issues retuned from the component for resolution in accordance with N1-563-07-6, b.2 and
will destroy or delete seventy-five years after resolution or closure of the case.
</p><p>Significant case files involve allegations made against senior DHS officials; attract national media or congressional
attention; present significant or novel questions of law or policy; and result in substantive changes in DHS policies and
procedures. Significant case files will be selected by the Headquarters and component civil rights and civil liberties
offices based on these criteria. In accordance with N1-563-07-6, b.3 records are maintained through the
end of fiscal year in which the significant case file is closed. Records are transferred to NARA five years after the
case is closed according to NARA transfer guidance and regulations.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>For DHS: Complaints Manager (202-357-8178), Office for Civil Rights and Civil Liberties, Department
of Homeland Security, 1201 New York Avenue, NW., Washington DC 20528.
</p><p>For components of DHS, the System Manager can be found at <i>http://www.dhs.gov/foia</i> under "contacts."
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment
procedures of the Privacy Act because it is a law enforcement system. However, CRCL, component civil rights and civil
liberties offices, and staff of components who do not have a designated civil rights and civil liberties office but who
do perform related functions, will consider individual requests to determine whether or not information may be released.
Thus, individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to the CRCL FOIA Officer, whose contact information can be found at
<i>http://www.dhs.gov/foia</i> under "contacts." If an individual believes more than one component maintains
Privacy Act records concerning him or her the individual may submit the request to the Chief Privacy Officer and Chief
Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive, SW., Building 410, STOP-
0655, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, <i>http://www.dhs.gov</i> or 1
-866-431-0486. In addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created;
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records; and
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information is collected from individuals who file complaints, eyewitnesses, third parties, DHS employees and/or
contractors, illegal aliens involved in the circumstances that gave rise to the complaint, open sources such as non-fee
Internet sources and newspapers, and other entities with information pertinent to the matter under investigation. The
information is received via correspondence, telephone calls, e-mails, and facsimiles.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security proposes to exempt certain portions of this system relating to ongoing
investigations and national security activities from the following provisions of the Privacy Act, subject to the
limitations set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) pursuant to 5 U.S.C.
552a(k)(1), (k)(2), (k)(3), and (k)(5).
</p></xhtmlContent></subsection></section>
<section id="all30" toc="yes">
<systemNumber>/ALL-030</systemNumber>
<subsection type="systemName">Use of the Terrorist Screening Database (TSDB) System of Records.
</subsection>
     <subsection type="securityClassification">
        <xhtmlContent>
            <p>Unclassified.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p> Records are maintained at DHS and Component Headquarters in Washington, D.C. and field offices.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
            <p> Categories of individuals covered by this system include:</p>
            <p>(a) Individuals known or suspected to be or have been engaged in conduct constituting, in preparation for, in aid of, or related to terrorism ("known or suspected terrorists");</p>
            <p>(b) Individuals who are foreign nationals or lawful permanent resident aliens and who are excludable from the United States based on their familial relationship, association, or connection with a known or suspected terrorist as described in sec. 212(a)(3)(B) of the Immigration and Nationality Act of 1952 ("INA exceptions");</p>
            <p>(c) Individuals who were officially detained during military operations, but not as Enemy Prisoners of War, and who have been identified to pose an actual or possible threat to national security ("military detainees"); and</p>
            <p>(d) Individuals known or suspected to be or have been engaged in conduct constituting, in aid of, or related to transnational organized crime, thereby posing a possible threat to national security ("transnational organized crime actors").</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p> Categories of records in this system include:</p>
            <p>1. Identifying biographic information, such as name, date of birth, place of birth, passport or driver’s license information, and other available identifying particulars used to compare the identity of an individual being screened with a subject in the TSDB;</p>
            <p>2. Biometric information, such as photographs, fingerprints, or iris images, and associated biographic and contextual information;</p>
            <p>3. References to or information from other government law enforcement and intelligence databases, or other relevant databases that may contain terrorism or national security information, such as unique identification numbers used in other systems;</p>
            <p>4. Information collected and compiled to maintain an audit trail of the activity of authorized users of WLS information systems; and</p>
            <p>5. System-generated information, including metadata, archived records and record histories from WLS.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="authorityForMaintenance">
        <xhtmlContent>
            <p> Homeland Security Act of 2002, Pub. L. 107-296, 116 Stat. 2135; The Tariff Act of 1930, Pub. L. 71-361, 46 Stat. 741, as amended; The Immigration and Nationality Act; 49 U.S.C. 114, 5103a, 40113, ch. 49 and 46105; Homeland Security Presidential Directive/HSPD-6, "Integration and Use of Screening Information to Protect Against Terrorism" (Sept. 16, 2003); Homeland Security Presidential Directive/HSPD-11, "Comprehensive Terrorist-Related Screening Procedures" (Aug. 27, 2004); National Security Presidential Directive/NSPD-59/Homeland Security Presidential Directive/HSPD-24, "Biometrics for Identification and Screening to Enhance National Security" (June 5, 2008); E.O. 13388, "Further Strengthening the Sharing of Terrorism Information to Protect Americans," 70 FR 62023 (Oct. 25, 2005); Intelligence Reform and Terrorism Prevention Act of 2004, Pub. L. 108–458, 118 Stat 3638; National Security Act of 1947, Pub. L. 235, 61 Stat. 495, as amended; and 28 U.S.C. 533.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p>DHS and its Components collect, use, maintain, and disseminate information in the DHS Watchlist Service (WLS) to facilitate DHS mission-related functions, such as counterterrorism, law enforcement, border security, and inspection activities. The TSDB data, which includes personally identifiable information (PII), is necessary for DHS to effectively and efficiently assess the risk or threat posed by a person for the conduct of its mission.</p>
            <p>The Federal Bureau of Investigation’s (FBI’s) Terrorist Screening Center (TSC) provides a near real time, synchronized version of the TSDB to DHS in order to improve the timeliness and governance of watchlist data exchanged between the FBI’s TSC and DHS and its Component systems that currently use TSDB data.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
            <p>A. To the Department of Justice (DOJ)/FBI/TSC in order to receive confirmations that the information has been appropriately transferred and any other information related to the reconciliation process so that DHS is able to maintain a synchronized copy of the TSDB.</p>
            <p> DHS will share information contained in this system to Components internal to DHS pursuant to subsec. 552a(b)(1) of the Privacy Act, and subsequently may be shared externally outside DHS at the programmatic level pursuant to routine uses described in the following published system of records notices:</p>
            <p>(1) DHS/TSA-002 Transportation Security Threat Assessment System (T-STAS), 79 FR 46862, Aug. 11, 2014;</p>
            <p>(2) DHS/TSA-019 Secure Flight Records, 80 FR 223, Jan. 5, 2015;</p>
            <p>(3) DHS/CBP-011 TECS, 73 FR 77778, Dec. 19, 2008;</p>
            <p>(4) DHS/CBP-006, Customs and Border Protection Automated Targeting System, 77 FR 30297, May 22, 2012;</p>
            <p>(5) DHS/US-VISIT-004, DHS Automated Biometric Identification System (IDENT), 72 FR 31080, June 5, 2007;</p>
            <p>(6) DHS/IA-001, Office of Intelligence and Analysis (I&amp;amp;amp;amp;amp;amp;A) Enterprise Records System, 73 FR 28128, May 15, 2008;</p>
            <p>(7) DHS/ICE-009, ICE External Investigations, 75 FR 404, Jan. 5, 2010; and</p>
            <p>(8) DHS/USCIS-006 Fraud Detection and National Security Records, 77 FR 47411, Aug. 8, 2012.</p>
            <p>Disclosure to consumer reporting agencies:</p>
            <p> None.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p>Storage:</p>
            <p> DHS stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records are stored on servers, magnetic disc, tape, digital media, and CD-ROM.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
            <p>DHS may retrieve records by name or other personal identifier.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
            <p>DHS safeguards records in this system in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p>The WLS maintains a near real-time feed of the TSDB, and does not retain historical copies of the TSDB. The WLS is synchronized with the TSDB. When the FBI/TSC adds, modifies, or deletes data from TSDB, WLS duplicates these functions almost simultaneously, and that information is then passed to DHS and its authorized Component systems. DHS does not manipulate the data within TSDB feed received by WLS. The authorized DHS Component that is screening individuals will maintain, separate from WLS, a record of a match or possible match with TSDB and DHS will retain this information in accordance with the DHS Component specific SORNs identified in this notice.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p> Executive Director, Passenger Systems Program Directorate, Office of Information and Technology, U.S. Customs and Border Protection, 7400 Fullerton Rd, Springfield, VA 22153.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act because it is a law enforcement system. However, DHS and its Components will consider individual requests to determine whether or not information may be released. Thus, individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Headquarters or component Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "contacts." If an individual believes more than one component maintains Privacy Act records concerning him or her the individual may submit the request to the Chief Privacy Officer and Chief FOIA Officer, Department of Homeland Security, 245 Murray Drive SW, Building 410, STOP-0655, Washington, D.C. 20528.</p>
            <p>When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief FOIA Officer at http://www.dhs.gov/foia or 1-866-431-0486. In addition, you should:</p>
            <p>• Explain why you believe the Department would have information on you;</p>
            <p>• Identify which Component(s) of the Department you believe may have the information about you;</p>
            <p>•Specify when you believe the records would have been created; and</p>
            <p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
            <p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his or her records.</p>
            <p>Without the above information, the Component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            <p>In addition, if individuals are uncertain what agency handles the information, they may seek redress through the DHS Traveler Inquiry Redress Program (DHS TRIP), 72 FR 2294, Jan. 18, 2007. Individuals who believe they have been improperly denied entry, refused boarding for transportation, or identified for additional screening by DHS may submit a redress request through DHS TRIP. The DHS TRIP is a single point of contact for individuals who have inquiries or seek resolution regarding difficulties they experienced during their travel screening at transportation hubs such as airports and train stations or crossing U.S. borders. Redress requests should be sent to: DHS Traveler Redress Inquiry Program, 601 South 12th Street, TSA-901, Arlington, VA 20598 or online at http://www.dhs.gov/trip and at http://www.dhs.gov.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p>See "Notification procedure" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p> See "Notification procedure" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p>Records are received from the FBI’s Terrorist Screening Center, specifically records covered by DOJ/FBI-019, "Terrorist Screening Records Center System," 72 FR 77846 (Dec. 14, 2011).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p>The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(5), (e)(8); and (g) pursuant to 5 U.S.C. 552a(j)(2).</p>
        </xhtmlContent>
    </subsection>
</section>


<section id="all31" toc="yes">
<systemNumber>/ALL-31</systemNumber>
<subsection type="systemName">Information Sharing Environment (ISE) Suspicious Activity Reporting (SAR) Initiative System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified, sensitive, and law enforcement sensitive.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the Department of Homeland Security (DHS) Headquarters on the DHS Nationwide Suspicious
Activity Report Initiative (NSI) Shared Space Server in Washington, DC.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include:
</p><p>• DHS employees and contractors who have submitted ISE-SAR data to the NSI Shared.
</p><p>• DHS employees and contractors who use the NSI Shared Space for conducting research and analysis with a
potential terrorism nexus.
</p><p>• Federal, State, local, Tribal, territorial and private sector officials whose agency or organization is
part of the NSI and have submitted a ISE-SAR that meets the ISE-SAR Functional Standard and whose information
DHS personnel have a need to know for the performance of their official duties.
</p><p>• Federal, State, local, Tribal, territorial, and private sector officials whose agency or organization is
an NSI participant and who use the NSI Shared Space for conducting research and analysis with a potential terrorism
nexus.
</p><p>• Individuals whose behavior is reasonably indicative of pre-operational planning related to terrorism or
other criminal activity associated with terrorism.
</p><p>• Witnesses who have observed individuals whose behavior reasonably is indicative of pre-operational
planning related to terrorism or other criminal activity associated with terrorism.
</p><p>• Individuals who have a material relationship to the activity or behavior reported in an ISE-SAR
(e.g., the owner of a particular vehicle that was observed in a SAR, where it is unclear whether the person was actually
driving the vehicle).
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>As described in the ISE-SAR Functional Standard Version 1.5 published in May 2009, the below information
related to individuals may be maintained in this system. The ISE-SAR Functional Standard identifies privacy fields,
which are also noted below.
</p><p>• Aircraft descriptions, including:
</p><p>• Aircraft engine quality.
</p><p>• Aircraft fuselage color.
</p><p>• Aircraft wing color.
</p><p>• Aircraft ID (privacy field).
</p><p>• Aircraft make code.
</p><p>• Aircraft model code.
</p><p>• Aircraft style code .
</p><p>• Aircraft tail number (privacy field).
</p><p>• Attachment:
</p><p>• Attachment type text.
</p><p>• Binary image.
</p><p>• Capture date.
</p><p>• Description text.
</p><p>• Format type text.
</p><p>• Attachment URI.
</p><p>• Attachment privacy field indicator.
</p><p>• Contact information for the submitter of the ISE-SAR:
</p><p>• Person first name.
</p><p>• Person last name.
</p><p>• Person middle initial/name.
</p><p>• E-mail address.
</p><p>• Organization/Affiliation, such as DHS.
</p><p>• Full telephone number.
</p><p>• Driver License:
</p><p>• Expiration date (privacy field).
</p><p>• Expiration year.
</p><p>• Issuing authority text.
</p><p>• Driver license number (privacy field).
</p><p>• Driver license endorsements, such as Hazardous Materials, Commercial Driver’s License, Motorcycle.
</p><p>• Follow-up Action:
</p><p>• Activity date.
</p><p>• Activity time.
</p><p>• Assigned by text.
</p><p>• Assigned to text.
</p><p>• Disposition text.
</p><p>• Status text.
</p><p>• Location:
</p><p>• Location description (privacy field).
</p><p>• Location Address:
</p><p>• Building description.
</p><p>• County name.
</p><p>• Country name.
</p><p>• Cross street description.
</p><p>• Floor identifier.
</p><p>• International Civil Aviation Organization (ICAO) airfield code for departure.
</p><p>• ICAO airfield code for planned destination.
</p><p>• ICAO for actual destination.
</p><p>• ICAO airfield for alternate.
</p><p>• Mile marker text.
</p><p>• Municipality name.
</p><p>• Postal code.
</p><p>• State name.
</p><p>• Street name.
</p><p>• Street number (privacy field).
</p><p>• Street post directional.
</p><p>• Street pre directional.
</p><p>• Street type.
</p><p>• Unit ID (privacy field).
</p><p>• Location Coordinates:
</p><p>• Altitude.
</p><p>• Coordinate datum.
</p><p>• Latitude degree.
</p><p>• Latitude minute.
</p><p>• Latitude second.
</p><p>• Longitude degree.
</p><p>• Longitude minute.
</p><p>• Longitude second.
</p><p>• Conveyance track/intent.
</p><p>• Observer:
</p><p>• Observer type text.
</p><p>• Person employer ID (privacy field).
</p><p>• Owning organization:
</p><p>• Organization item.
</p><p>• Organization description.
</p><p>• Organization ID (privacy field).
</p><p>• Organization Local ID.
</p><p>• Other Identifier:
</p><p>• Person identification number (PID) (privacy field).
</p><p>• PID effective date (privacy field).
</p><p>• PID effective year.
</p><p>• PID expiration date (privacy field).
</p><p>• PID expiration year.
</p><p>• PID issuing authority text.
</p><p>• PID type code.
</p><p>• Passport:
</p><p>• Passport ID (privacy field).
</p><p>• Expiration date (privacy field).
</p><p>• Expiration year.
</p><p>• Issuing country code.
</p><p>• Person:
</p><p>• AFIS FBI number (privacy field).
</p><p>• Age.
</p><p>• Age unit code.
</p><p>• Date of birth (privacy field).
</p><p>• Year of birth.
</p><p>• Ethnicity code.
</p><p>• Maximum age.
</p><p>• Minimum age.
</p><p>• State identifier (privacy field).
</p><p>• Tax identification number (privacy field).
</p><p>• Person Name:
</p><p>• First name (privacy field).
</p><p>• Last name (privacy field).
</p><p>• Middle name (privacy field).
</p><p>• Full name (privacy field).
</p><p>• Moniker (privacy field).
</p><p>• Name suffix.
</p><p>• Name type.
</p><p>• Physical descriptors:
</p><p>• Build description.
</p><p>• Eye color code.
</p><p>• Eye color text.
</p><p>• Hair color code.
</p><p>• Hair color text.
</p><p>• Person eyewear text.
</p><p>• Person facial hair text.
</p><p>• Person height.
</p><p>• Person height unit code.
</p><p>• Person maximum height.
</p><p>• Person minimum height.
</p><p>• Person maximum weight.
</p><p>• Person minimum weight.
</p><p>• Person sex code.
</p><p>• Person weight.
</p><p>• Person weight unit code.
</p><p>• Race code.
</p><p>• Skin tone code.
</p><p>• Clothing description text.
</p><p>• Physical feature:
</p><p>• Feature description.
</p><p>• Feature type code.
</p><p>• Location description.
</p><p>• Registration:
</p><p>• Registration authority code.
</p><p>• Registration number (privacy field).
</p><p>• Registration type.
</p><p>• Registration year.
</p><p>• ISE-SAR Submission:
</p><p>• Additional details indicator.
</p><p>• Data entry date.
</p><p>• Dissemination code.
</p><p>• Fusion center contact first name.
</p><p>• Fusion center contact last name.
</p><p>• Fusion center contact e-mail address.
</p><p>• Fusion center contact telephone number.
</p><p>• Message type indicator.
</p><p>• Privacy purge data.
</p><p>• Privacy purge review date.
</p><p>• Submitting ISE-SAR Record ID.
</p><p>• ISE-SAR submission date.
</p><p>• ISE-SAR title.
</p><p>• ISE-SAR version.
</p><p>• Source agency case ID.
</p><p>• Source agency record reference name.
</p><p>• Source agency record status code.
</p><p>• Privacy information exists indicator.
</p><p>• Sensitive Information Details:
</p><p>• Classification label.
</p><p>• Classification reason text.
</p><p>• Sensitivity level.
</p><p>• Tearlined indicator (information that indicates the report does not contain classified
information).
</p><p>• Source Organization:
</p><p>• Organization name.
</p><p>• Organization ORI.
</p><p>• System ID.
</p><p>• Fusion center submission date.
</p><p>• Source agency contact first name.
</p><p>• Source agency contact last name.
</p><p>• Source agency contact e-mail address.
</p><p>• Source agency contact phone number.
</p><p>• Suspicious Activity Report:
</p><p>• Community description.
</p><p>• Community URI.
</p><p>• LEXS version.
</p><p>• Message date/time.
</p><p>• Sequence number.
</p><p>• Source reliability code.
</p><p>• Content validity code.
</p><p>• Nature of source-code.
</p><p>• Nature of source-text.
</p><p>• Submitting organization:
</p><p>• Organization name.
</p><p>• Organization ID.
</p><p>• Organization ORI.
</p><p>• System ID.
</p><p>• Suspicious Activity:
</p><p>• Activity end date.
</p><p>• Activity end time.
</p><p>• Activity start date.
</p><p>• Activity start time.
</p><p>• Observation description text.
</p><p>• Observation end date.
</p><p>• Observation end time.
</p><p>• Observation start date.
</p><p>• Observation start time.
</p><p>• Threat type code.
</p><p>• Threat type detail text.
</p><p>• Suspicious activity code.
</p><p>• Weather condition details.
</p><p>• Target:
</p><p>• Critical infrastructure indicator.
</p><p>• Infrastructure sector code.
</p><p>• Infrastructure tier text.
</p><p>• Structure type code.
</p><p>• Target type text.
</p><p>• Structure type text.
</p><p>• Target description text.
</p><p>• Vehicle:
</p><p>• Color code.
</p><p>• Description.
</p><p>• Make name.
</p><p>• Model name.
</p><p>• Style code.
</p><p>• Vehicle year.
</p><p>• Vehicle identification number (privacy field).
</p><p>• US DOT number (privacy field).
</p><p>• Vehicle description.
</p><p>• Related ISE-SAR:
</p><p>• Fusion center ID.
</p><p>• Fusion center ISE-SAR Record ID.
</p><p>• Relations description text.
</p><p>• Vessel:
</p><p>• Vessel official Coast Guard number identification (privacy field).
</p><p>• Vessel ID (privacy field).
</p><p>• Vessel ID issuing authority.
</p><p>• Vessel IMO number identification (privacy field).
</p><p>• Vessel MMSI identification.
</p><p>• Vessel make.
</p><p>• Vessel model.
</p><p>• Vessel model year.
</p><p>• Vessel name.
</p><p>• Vessel hailing port.
</p><p>• Vessel national flag.
</p><p>• Vessel overall length.
</p><p>• Vessel overall length measure.
</p><p>• Vessel serial number (privacy field).
</p><p>• Vessel type code.
</p><p>• Vessel propulsion text.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>The Homeland Security Act of 2002, as amended; and the Intelligence Reform and Terrorism Prevention Act of 2004,
as amended; the National Security Act of 1947, as amended; Executive Order 13388.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The ISE-SAR Functional Standard is designed to support the sharing, specifically through the NSI, of
information about suspicious activities that have a potential terrorism nexus throughout the ISE. The NSI participants
include DHS; the Department of Justice; other Federal agencies carrying out counterterrorism mission function; State,
local, and Tribal entities, including law enforcement agencies, represented at State, regional, major urban area fusion
centers; and the private sector to the extent authorized by applicable law. In addition to providing specific indicators
of possible terrorism-related crimes, ISE-SARs can be used to look for patterns and trends by analyzing information
at a broader level than would typically be recognized within a single jurisdiction, State, or territory. Standardized and
consistent sharing of suspicious activity information regarding potential terrorist threats and possible criminal
activity associated with terrorism among State and major urban area fusion centers and Federal agencies is vital to
assessing, deterring, preventing, or prosecuting those involved in criminal activities associated with terrorism.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body, when it is necessary to the
litigation and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individuals that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, Tribal, local, international, or foreign law enforcement agency or other
appropriate public or private sector organization who is a participant in the Nationwide SAR Initiative and authorized
access through the NSI Shared Space for the purpose of supporting an authorized law enforcement, counterterrorism,
national security, or homeland security function.
</p><p>H. To Federal government counterterrorism agencies where DHS becomes aware of an indication of a threat or potential
threat to national or international security, and where such use is to assist in anti-terrorism efforts.
</p><p>I. To an organization or individual in either the public or private sector, either foreign or domestic, where there is
a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to
the extent the information is relevant to the protection of life, property or other vital interests of a data subject and
disclosure is proper and consistent with the official duties of the person making the disclosure.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically. The records are stored on magnetic disc, tape, digital media,
and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Much of the data within this system does not pertain to an individual; rather, the information pertains to
locations, geographic areas, facilities, and other things or objects not related to individuals. However, personal
information may be captured. Personal data may be retrieved by name, Social Security number, any privacy fields noted
under Categories of Records, and other identifiers listed under the Categories of Records section.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>DHS is in the process of developing a retention schedule for DHS ISE-SAR data. This retention schedule will
be based upon the underlying retention schedules of the information identified in existing components’ retention
schedules. DHS components maintain the authority to withdraw and/or edit any and all ISE-SAR data that they have
entered into the NSI Shared Space in accordance with their respective policies. The NSI Shared Space does not have any
internal retention mandates independent of the retention policies of the DHS components that enter their information into
the NSI Shared Space.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Ronald Athmann (202) 447-4332, Office of Intelligence and Analysis, Department of Homeland Security,
Washington, DC 20528.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment
procedures of the Privacy Act because it is a law enforcement system. However, DHS will consider individual requests to
determine whether or not information may be released. Thus, individuals seeking notification of and access to any record
contained in this system of records, or seeking to contest its content, may submit a request in writing to the
Headquarters or component’s FOIA Officer, whose contact information can be found at <i>http://www.dhs.gov/foia</i> under
"contacts." If an individual believes more than one component maintains Privacy Act records concerning him or
her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer,
Department of Homeland Security, 245 Murray Drive, SW., Building 410, STOP-0655, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records, your
request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, <i>http://www.dhs.gov</i> or 1
-866-431-0486. In addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created;
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records; and
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are obtained from ISE-SARs submitted by Federal, State, local, Tribal, and territorial agencies and
private sector organizations who are NSI participants. The respective mission sets of DHS components are varied and
entail coverage across multiple sectors. DHS components use a standardized technical approach across DHS to incorporate
SAR data into the NSI Shared Space. DHS personnel, trained in the ISE-SAR program, will review component SARs and
submit only those SAR data that meet the ISE-SAR Functional Standard to the NSI Shared Space.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act,
subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H),
(e)(4)(I), (e)(5), (e)(8), and (e)(12); (f); (g)(1); and (h) of the Privacy Act pursuant to 5 U.S.C. 552a(j)(2).
Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy
Act, subject to the limitation set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) of
the Privacy Act pursuant to 5 U.S.C. 552a(k)(2), and (k)(3).
</p></xhtmlContent></subsection></section>
<section id="all32" toc="yes">
<systemNumber>/ALL-032</systemNumber>
<subsection type="systemName">Official Passport Application and Maintenance Records System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Sensitive but Unclassified and Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at DHS and Component Headquarters in Washington, DC and field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>DHS employees and former employees, including political appointees, civilian, and military personnel (and
dependents and family members that accompany military members assigned outside the continental United States) assigned or
detailed to the Department, individuals who are formally or informally associated with the Department, including advisory
committee members, employees of other agencies and departments in the federal government, and other individuals in the
private and public sector who are on official business with the Department, who in their official capacity, are applying
for an official passport or updating their official passport records where a copy is maintained by the Department.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>• Official passport books and passport cards, applications for official passport books and official
passport cards, maintenance records in support of official passport books and official passport cards, and applications
for additional visa pages, amendments, extensions, replacements, and/or renewals of official passport books or cards
(including all information and materials submitted as part of or with all such applications) including, but not limited
to:
</p><p>• Name, date of birth, social security number, contact information, and address;
</p><p>• Applications for registration at American Diplomatic and Consular Posts as U.S. citizens or for issuance
of Cards of Identity and Registration as U.S. Citizens;
</p><p>• Consular Reports of Birth Abroad of United States citizens;
</p><p>• Certificates of Witness to Marriage;
</p><p>• Certificates of Loss of United States Nationality;
</p><p>• Oaths of Repatriation;
</p><p>• Consular Certificates of Repatriation;
</p><p>• Reports of Death of an American Citizen Abroad;
</p><p>• Cards of Identity and Registration as U.S. citizens; and
</p><p>• Miscellaneous materials, which are documents and/or records maintained separately, if not in the
application, including but not limited to the following types of documents:
</p><p>• Birth and baptismal certificates;
</p><p>• Medical, personal, and financial reports; and/or
</p><p>• Records of lost and stolen passports.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; 44 U.S.C. 3101; and 6 U.S.C. 112.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to collect and maintain a copy of an official passport application or maintenance
record on DHS employees and former employees, including political appointees, civilian, and military personnel (and
dependents and family members that accompany military members assigned outside the continental United States) assigned or
detailed to the Department, individuals who are formally or informally associated with the Department, including advisory
committee members, employees of other agencies and departments in the federal government, and other individuals in the
private and public sector who are on official business with the Department, who in their official capacity, are applying
for an official passport or updating their official passport records where a copy is maintained by the Department.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (DOJ), including U.S. Attorney Offices, or other federal agency conducting litigation
or in proceedings before any court, adjudicative or administrative body, when it is necessary to the litigation and one
of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The U.S. or any agency thereof, is a party to the litigation or has an interest in such litigation, and DHS
determines that the records are both relevant and necessary to the litigation and the use of such records is compatible
with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration (NARA) or other federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. DHS has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or
property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or
programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the compromised
information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To appropriate foreign government authorities for administrative purposes relating to foreign travel in order to
facilitate official travel for the individual traveling.
</p><p>I. To the Department of State when employees and former employees, including political appointees, civilian, and
military personnel (and dependents and family members that accompany military members assigned outside the continental
United States) assigned or detailed to the Department, individuals who are formally or informally associated with the
Department, including advisory committee members, employees of other agencies and departments in the federal government,
and other individuals in the private and public sector who are on official business with the Department, who in their
official capacity, are applying for an official passport or updating their official passport records where a copy is
maintained by DHS in order to receive an official passport.
</p><p>J. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to
opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection
with criminal law proceedings or in response to a subpoena from a court of competent jurisdiction.
</p><p>K. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by any of the <i>Category of Records Listed</i> above.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records within this system of records are maintained and disposed of in accordance with NARA approved General
Records Schedule (GRS) 9 Item 5, Sections a-c. Application files including documents relating to the issuance of
official passports, including requests for passports, transmittal letters, receipts, and copies of travel authorizations
should be destroyed when 3 years old or upon separation of the employee, whichever is sooner in accordance with N1-
GRS-91-1, item 5a. Annual reports concerning official passports including reports to the DOS concerning the
number of official passports issued and related matters should be destroyed when 1 year old in accordance with N1-
GRS-91-1, item 5b. Passport registers including registers and lists of agency personnel who have official
passports should be destroyed when superseded or obsolete in accordance with N1-GRS-98-2, item 9.
Official passports should be returned to the DOS upon expiration or upon the separation of the employee.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Program Manager for Passport Processing (202-282-8020), Service Center, Office of the Chief
Administrative Officer, Department of Homeland Security, Washington, DC 20528.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to the headquarters or component FOIA Officer, whose contact
information can be found at <i>http://www.dhs.gov/foia</i> under "contacts." If an individual believes more
than one component maintains Privacy Act records concerning him or her the individual may submit the request to the Chief
Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive, SW.,
Building 410, STOP-0655, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, <i>http://www.dhs.gov</i> or 1
-866-431-0486. In addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created;
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records; and
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are obtained from Department employees and contractors.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
    <section id="all33" toc="yes">
        <systemNumber>/ALL-033</systemNumber>
        <subsection type="systemName">Reasonable Accommodations Records System of Records.</subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at the DHS Headquarters in Washington, D.C., Component Headquarters offices, and field offices.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>DHS Disability Employment Program Manager, (202) 357-1264, Office for Civil Rights and Civil Liberties, U.S. Department of Homeland Security, Washington, D.C. 20528.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>Sections 501, 503, 504, and 508 of the Rehabilitation Act of 1973 and Americans with Disabilities Act (ADA) Amendments Act of 2008; Title VII of the Civil Rights Act of 1964, as amended, 42 U.S.C. 2000e; 29 U.S.C. 791, as amended, Employment of Individuals with Disabilities; Section 202(d) of the E-Government Act of 2002, Accessibility to Persons with Disabilities; 29 CFR Part 1605.2, Reasonable accommodation without undue hardship as required by section 701(j) of Title VII of the Civil Rights Act of 1964; 29 CFR Part 1614.203, Rehabilitation Act; 29 CFR Part 1630, Regulations to Implement the Equal Employment Provisions of the Americans with Disabilities Act; 36 CFR Part 1194, Electronic and Information Technology Accessibility Standards; 6 CFR Part 15, Enforcement of Nondiscrimination on the Basis of Disability in Programs or Activities Conducted by the Department of Homeland Security; Executive Order 13164, Establishing Procedures To Facilitate The Provision Of Reasonable Accommodation; 5 U.S.C. chapters 11 and 79, and in discharging the functions directed under Executive Order 13991, Protecting the Federal Workforce and Requiring Mask-Wearing (Jan. 20, 2021), and 5 U.S.C. chapters 33 and 63; and Executive Order 12196, Occupational Safety and Health Program for Federal Employees (Feb. 26, 1980).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to allow the Department to collect and maintain records on applicants for employment as well as employees who request or receive a reasonable accommodation by the Department as required by the Rehabilitation Act of 1973, as amended, 29 U.S.C. 791, and/or Title VII of the Civil Rights Act of 1964, as amended, 42 U.S.C. 2000e. This includes reasonable accommodations requested on both medical condition/disability and religious grounds. This system of records also allows DHS to track and report the processing of requests for reasonable accommodation Department-wide to comply with applicable law and regulations, to inform and determine appropriate workplace accommodations for particular employees, and to preserve and maintain the confidentiality of medical and religious information while promoting the safety of federal workplaces and the health of the federal workforce consistent with the above-referenced authorities.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>Categories of individuals covered by this system include applicants for employment and employees, and under certain circumstances federal contractors, who request or receive reasonable accommodations under the Rehabilitation Act of 1973, as amended, and/or Title VII of the Civil Rights Act, as amended, 42 U.S.C. 2000e. This also includes authorized individuals or representatives (e.g., family member, attorney) who file requests for reasonable accommodation on behalf of an applicant for employment or employee, as well as former employees who requested or received reasonable accommodation during their employment with the Department.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>Records in this system include the name of the individual seeking accommodations; the requester’s reasonable accommodation request and supporting documentation; the requestor’s status (i.e., applicant, contractor, or current employee); the date the accommodation request was initiated; the requestor’s job position (i.e., occupational series, grade level, and agency component), work/duty location, and job duties; the nature/type of accommodation(s) sought; the amount of time taken to process the request; whether the request was granted or denied and, if denied, the reason for the denial; and the sources of technical, physical, or other assistance consulted in trying to identify possible reasonable accommodations.</p>
                <p> Also, for accommodations based on religion, the records will include information on how complying with a particular work requirement would substantially burden the requestor’s exercise of a sincerely held religious belief, practice or observance, how long the belief has been held, the reason for seeking a religious accommodation, and other information specific to the requested accommodation to determine whether DHS is legally required to grant the request. For reasonable accommodations requests specifically related to public health mitigation measures such as PPE, physical distancing, immunization requirements, testing, travel, and quarantine requirements, this system will also include information that individuals are requested to submit regarding how complying with such mitigation measures would substantially burden an individual’s religious exercise or conflict with their sincerely held religious beliefs, practices, or observances.</p>
                <p> For accommodations based on a medical condition/disability, the records will include information such as the nature of the disability/medical condition, the functional limitations caused by the disability/medical condition, how the requested accommodation would address the functional limitations, medical documentation of the disability/medical condition, and other information specific to the requested accommodation to determine whether DHS is legally required to grant the request. For reasonable accommodations requests specifically related to public health mitigation measures such as PPE, physical distancing, immunization requirements, testing, travel, and quarantine requirements, this system will also include information that individuals are requested to submit regarding how the medical condition/disability prevents the individual from complying with such public health and safety mitigation measures.</p>
                <p> Additional information collected to process reasonable accommodation requests includes the name, title, email address, and phone number of the requestor (or their representative); the requestor’s operating administration, pay grade, or band; supervisor information; and other information collected from requestors to make a determination regarding a specific medical and/or religious accommodation request.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>Information is obtained from DHS employees and applicants and/or their medical practitioners, and in certain circumstances federal contractors, or authorized individuals acting on behalf of employees, applicants, and federal contractors who are requesting or have received medical/disability and/or religious accommodations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agency conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation or proceeding and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. sec. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p> I. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection with criminal law proceedings, when it is relevant and necessary to the litigation or proceeding.</p>
                <p> J.  To appropriate third parties contracted by the Department to investigate a complaint or appeal filed by an employee or applicant, or to facilitate and conduct mediation or other alternative dispute resolution (ADR) procedures or programs.</p>
                <p> K. To the Department of Defense (DOD) for purposes of procuring assistive technologies and services through the Computer/Electronic Accommodation Program in response to a request for reasonable accommodation.</p>
                <p> L. To the Merit Systems Protection Board (MSPB), the Federal Labor Relations Authority (FLRA), Equal Employment Opportunity Commission (EEOC), Office of Special Counsel (OSC), Office of Personnel Management (OPM), or another appropriate federal agency or entity when needed by that agency or entity to evaluate, process, adjudicate, and/or arbitrate a claim or appeal filed by a DHS employee or applicant arising out of or relating to the employee’s or applicant’s request for reasonable accommodation.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>DHS may retrieve records by name of requester, employing component or directorate, or any unique identifying number assigned to the request, if applicable.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>Records will be held in accordance with National Archives and Records Administration, General Records Schedule 2.3, Employee Relations Records, item 20, Reasonable accommodation case files. These records include individual employee files created, received, and maintained by reasonable accommodation, diversity/disability programs, employee relations coordinators, supervisors, administrators, or Human Resource specialists containing records of requests for reasonable accommodation and/or assistive technology devices and services that have been requested for or by an employee. This includes requests, approvals and denials, notice of procedures for informal dispute resolution or appeal processes, forms, correspondence, records of oral conversations, policy guidance documents, medical records, supporting notes, and documentation. These records are temporary and will be destroyed three (3) years after employee separation from the agency or all appeals are concluded, whichever is later. However, longer retention is authorized if required for business use.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p>DHS safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Component Privacy Officer and Component Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655, or electronically at https://www.dhs.gov/dhs-foia-privacy-act-request-submission-form. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about the individual be available under the Freedom of Information Act.</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. An individual may obtain more information about this process at http://www.dhs.gov/foia. In addition, the individual should, whenever possible:</p>
                •	<p>Explain why he or she believes the Department would have information being requested;</p>
                •	<p>Identify which component(s) of the Department he or she believes may have the information;</p>
                •	<p>Specify when the individual believes the records would have been created; and</p>
                •	<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                <p>Without the above information, DHS may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered Judicial Redress Act records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>None.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>76 Fed. Reg. 41274 (July 13, 2011).</p>
            </xhtmlContent>
        </subsection>
    </section>

    <section id="all35" toc="yes">
<systemNumber>/ALL-035</systemNumber>
<subsection type="systemName">DHS/ALL-035 Common Entity Index Prototype (CEI Prototype). </subsection>
<subsection type="securityClassification"><xhtmlContent><p>Sensitive and unclassified. </p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the DHS Headquarters in Washington, DC, DHS data centers in Stennis, Mississippi,
and in locations where DHS and its components conduct business.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include:
</p><p>(1) foreign nationals who may seek to enter the United States by air or sea under the Visa Waiver Program;
</p><p>(2) prospective, current, and former non-immigrants to the United States on an F-1, M-1, or
J-1 class of admission and their dependents who have been admitted under an F-2, M-2, or
J-2 class of admission (collectively, F/M/J non-immigrants);
</p><p>(3) a proxy, parent or guardian of an F/M/J nonimmigrant; and
</p><p>(4) aliens or other individuals designated by DHS/Transportation Security Administration (TSA), including
lawful permanent residents (LPR), who apply for flight training or recurrent training.
</p><p>F nonimmigrants are foreign students pursuing a full course of study in a college, university, seminary,
conservatory, academic high school, private elementary school, other academic institution, or language training
program in the United States (U.S.) that Student and Exchange Visitor Program (SEVP) has certified to enroll
foreign students. M nonimmigrants are foreign students pursuing a full course of study in a vocational or other
recognized nonacademic institution (e.g., technical school) in the U.S. that SEVP has certified to enroll
foreign students. J nonimmigrants are foreign nationals selected by a sponsor that the Department of State
(DOS) has designated to participate in an exchange visitor program in the U.S.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>(1) Correlation created by the Common Entity Index Prototype includes
</p><p>• Identity information;
</p><p>• Meta Data related to the
</p><p>• source system name,
</p><p>• system identification number to tie the biographic information back to the source system record,
and
</p><p>• date the record was ingested into the CEI Prototype.
</p><p>(2) Source system data elements:
</p><p>• Full Name;
</p><p>• Alias(es);
</p><p>• Gender;
</p><p>• Date of Birth;
</p><p>• Country of Birth;
</p><p>• Country of Citizenship;
</p><p>• Phone Number;
</p><p>• Physical Address;
</p><p>• Email Address;
</p><p>• Fingerprint Identification Number; and
</p><p>• Document Type, Number, Date, and Location of Issuance for the following types of government
issued documents:
</p><p>• Passport;
</p><p>• Driver’s License;
</p><p>• Electronic System for Travel Authorization (ESTA);
</p><p>• Student and Exchange Visitor Information System (SEVIS) ;
</p><p>• Alien Registration; and
</p><p>• Visa.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>Homeland Security Act, 6 U.S.C. 343; Clinger-Cohen Act of 1996, Public Law 104-106, codified at 40
U.S.C. 11101, et. seq.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this prototype is to determine the feasibility of establishing a centralized index of select
biographic information that will allow DHS to provide a consolidated and correlated identity, thereby
facilitating and improving DHS’s ability to carry out its national security, homeland security, law
enforcement, and benefits missions.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a
portion of the records or information contained in this system may be disclosed outside DHS as a routine use
pursuant to 5 U.S.C. 552a(b)(3) as follows, except, to the extent any of the data contained in the CEI
Prototype relates to refugees, asylum seekers, and asylees, such information may not be disclosed outside DHS
as a routine use pursuant to 5 U.S.C. 552a(b)(3), but is subject, as a matter of policy, to the confidentiality
provisions of 8 CFR 208.6.
</p><p>A. To the Department of Justice (DOJ), including U.S. Attorney Offices, or other federal agencies conducting
litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or
necessary to the litigation and one of the following is a party to the litigation or has an interest in such
litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee or former employee of DHS in his/her official capacity;
</p><p>3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to
represent the employee; or
</p><p>4. The United States or any agency thereof.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that
congressional office made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to
records management inspections being conducted under the authority of 44 U.S.C. &amp;amp;amp;amp;amp;#167;&amp;amp;amp;amp;amp;#167; 2904 and
2906.
</p><p>D. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of
records has been compromised; and
</p><p>2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity
theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or
integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity)
that rely upon the compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in
connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or
remedy such harm.
</p><p>E. To contractors and their agents, grantees, experts, consultants, and others performing or working on a
contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an
agency function related to this system of records. Individuals provided information under this routine use are
subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers
and employees.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically in secure facilities in a locked drawer behind a locked
door. The records may be stored on magnetic disc, tape, or digital media.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by name or any other unique identifier assigned to the individual.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all
applicable DHS automated systems security and access policies. Strict controls have been imposed to minimize
the risk of compromising the information that is being stored. Access to the computer system containing the
records in this system is limited to those individuals who have a need to know the information for the
performance of their official duties and who have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>The CEI Prototype ingests data from source systems, and correlates the data into a CEI Prototype identity.
Ingested data is retained in CEI Prototype for no longer than the record retention requirements of the source
systems. The CEI Prototype creates a correlated identity that is dynamic not static. The ingested data elements
that make up that identity will be subject to the records retention schedules of the source systems from which
they came. By design, the deletion or correction of these elements at the appropriate time will affect the
correlated record. For example, if a student updates his/her contact information, the correlation will be
updated.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Executive Director, DHS Information Sharing Environment Office, Department of Homeland Security, Washington,
DC 20528.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking
to contest its content, may submit a request in writing to the Headquarters FOIA Officer, whose contact
information can be found on the Department’s official Web site at <i>http://www.dhs.gov/foia</i>
under "Contacts." The individual may submit the request to the Chief Privacy Officer and Chief
Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive, SW., Building 410,
STOP-0655, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records,
your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify
your identity, meaning that you must provide your full name, current address, and date and place of birth. You
must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law
that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific
form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of
Information Act Officer, on the Department’s official Web site at <i>http://www.dhs.gov/foia</i> or by
calling toll free 1-866-431-0486. In addition, you should:
</p><p>• Explain why you believe the Department would have information on you; and
</p><p>• Specify when you believe the records would have been created.
</p><p>If seeking records pertaining to another living individual, include a statement from that individual
certifying his/her agreement for you to access his/her records.
</p><p>Without the above information, DHS may not be able to conduct an effective search, and your request may be
denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Initially, DHS will use the following source data sets to populate CEI Prototype: (1) CBP’s ESTA, covered by
the DHS/CBP-009--Electronic System for Travel Authorization (ESTA) SORN (July 30, 2012, 77 FR
44642); (2) ICE’s SEVIS, covered by the DHS/ICE-001--Student and Exchange Visitor Information System
SORN (January 5, 2010, 75 FR 412); and (3) TSA’s AFS, covered by the DHS/TSA-002--Transportation
Security Threat Assessment System SORN (May 19, 2010, 75 FR 28046). If additional data sets are added to CEI
Prototype, this SORN will be updated. If deployed for operational use, additional data sources may be used. DHS
will update this SORN or issue a new SORN prior to the operational use of the system.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The records maintained in the CEI Prototype are the non-exempt portions of the records in the source systems
because the information ingested into the CEI Prototype is the information provided directly by the individual
for the requested benefit. When a record received from another system has been exempted in that source system
under
</p><p>5 U.S.C. 552a(j)(2) or (k)(1), (k)(2), or (k)(5), DHS will claim the same exemptions for those records that
are claimed for the original primary systems of records from which they originated.
</p></xhtmlContent></subsection></section>
<section id="all36" toc="yes">
<systemNumber>/ALL-036</systemNumber>
<subsection type="systemName">DHS/ALL--036 Board for Correction of Military Records System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified, Sensitive.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the DHS Headquarters in Washington, DC.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Current and former members of the USCG and USCG Reserve who have filed applications for relief before the
Board, or their representatives; civilian employees of DHS serving as the Chair; members of the BCMR; or the
staff of the BCMR.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>• Name, rank, and service number or social security number (SSN) of the applicant and the name of
his/her representative, if any;
</p><p>• Phone numbers, mailing, and email addresses of the applicant and his/her representative, if
any;
</p><p>• Application for Correction of Military Record (DD Form 149) and all written arguments and
evidence submitted by or on behalf of the applicant;
</p><p>• Docket number and type of application;
</p><p>• Copies of documents maintained by the Coast Guard in the applicant’s Personnel Data Record,
such as performance evaluations, medal citations, written counseling, disciplinary records, discharge papers,
and other military records relevant to the requested correction;
</p><p>• Copies of the applicant’s medical records, if applicable to the requested correction, from the
Coast Guard and Department of Veterans Affairs;
</p><p>• Copies of applicable investigations;
</p><p>• Advisory opinions of the Coast Guard, including any attached documentary evidence or
affidavits;
</p><p>• Transcripts of any hearing held by the Board;
</p><p>• Decisional documents of the Board and of the General Counsel acting under delegated authority
to approve, disapprove, or remand the decision of the Board;
</p><p>• Coast Guard requests for amendment or clarification of Board decisions and the Board’s
decisions in response to such requests;
</p><p>• Copies of court decisions related to the application; and
</p><p>• Correspondence between the Chair or staff and the applicant, the applicant’s representative or
congressional representative, or the Coast Guard concerning an application.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>10 U.S.C. &amp;amp;amp;amp;amp;#167; 1552.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of the BCMR system of records is to allow current and former USCG military personnel, or their
authorized representatives, to submit applications to the BCMR for correction of their military records; to
allow the Chair, members of the Board, and staff to review the records before deciding whether the requested
corrections are warranted; to allow the General Counsel and his or her staff to review the records before
deciding whether to approve, disapprove, or remand the Board’s decisions; and to allow the Coast Guard to
review the records before deciding whether to recommend that the Board grant or deny relief in each case and to
implement the Board’s orders. The system stores the complete record of each proceeding, including the decision
issued or other final disposition made.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a
portion of the records or information contained in this system may be disclosed outside DHS as a routine use
pursuant to 5 U.S.C. 552a(b)(3) as follows:
</p><p>A. To the Department of Justice (DOJ), including U.S. Attorney Offices, or other federal agency conducting
litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or
necessary to the litigation and one of the following is a party to the litigation or has an interest in such
litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee or former employee of DHS in his/her official capacity;
</p><p>3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to
represent the employee; or
</p><p>4. The United States or any agency thereof.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that
congressional office made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to
records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by
law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of
records has been compromised;
</p><p>2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity
theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or
integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity)
that rely upon the compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in
connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or
remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a
contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an
agency function related to this system of records. Individuals provided information under this routine use are
subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers
and employees.
</p><p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or
other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing
a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information,
indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations
and such disclosure is proper and consistent with the official duties of the person making the disclosure.
</p><p>H. To the Department of Veterans Affairs (DVA) when the BCMR determines it has the need for an applicant’s
medical records possessed by the DVA. DHS requests medical records from DVA using an applicant’s name and
social security number.
</p><p>I. To courts, magistrates, administrative tribunals, opposing counsel, parties, and witnesses, in the course
of civil, or criminal, or administrative proceedings (including discovery, presentation of evidence, and
settlement negotiations) when DHS determines that use of such records is relevant and necessary to the
litigation before a court or adjudicative body and any of the following is a party to or has an interest in the
litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity when the government has agreed to represent the
employee; or
</p><p>4. The United States, when DHS determines that litigation is likely to affect DHS or any of its components.
</p><p>J. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with
counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure
is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability
of DHS’s officers, employees, or individuals covered by the system, except to the extent it is determined that
release of the specific information in the context of a particular case would constitute an unwarranted
invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind
a locked door. The records may be stored on magnetic disc, tape, digital media.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved individually by name in alphabetical sequence or by docket number.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all
applicable DHS automated systems security and access policies. Strict controls have been imposed to minimize
the risk of compromising the information that is being stored. Access to the computer system containing the
records in this system is limited to those individuals who have a need to know the information for the
performance of their official duties and who have appropriate clearances or permissions. Files are kept in the
Office of the General Counsel.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records are retained locally for three years, after which records are then sent to NARA and destroyed after
40 years.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Chair, Board for Correction of Military Records, Office the General Counsel, Mail Stop #0485, 245 Murray
Drive SW., Washington, DC 20518.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking
to contest its content, may submit a request in writing to the Chief Privacy Officer and Chief Freedom of
Information Act Officer whose contact information can be found at <i>http://www.dhs.gov/foia</i> under
"Contacts." If an individual believes more than one component maintains Privacy Act records
concerning him or her, the individual may also submit the request to the Chief Privacy Officer and Chief
Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive SW., Building 410,
STOP-0655, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records,
your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify
your identity, meaning that you must provide your full name, current address, and date and place of birth. You
must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law
that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific
form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of
Information Act Officer, <i>http://www.dhs.gov/foia</i> or 1-866-431-0486. In
addition, you should:
</p><p>• Explain why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created; and
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component
agency may have responsive records.
</p><p>If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without the above information, the Department may not be able to conduct an effective search, and your
request may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are obtained from the individual, his or her official military personnel file, other USCG
records/reports, or the United States Department of Veterans Affairs.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="all37" toc="yes">
<systemNumber>/ALL-037</systemNumber>
<subsection type="systemName"> DHS/ALL-037 E-Authentication Records System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent>
<p> Sensitive but unclassified.</p>
</xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent>
<p> Records are maintained at several Headquarters locations and in component offices of DHS, in both Washington, D.C., and field locations or by a third-party identity service provider.  Records related to identity proofing required for levels of assurance (LOA) 2 and above are also maintained by the third-party identity service provider in accordance with retention requirements identified in the National Institute of Standards and Technology (NIST) <i>Special Publication 800-63 Electronic Authentication Guideline</i> for the applicable LOA.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent>
<p>Categories of individuals in this system of records include members of the public, external stakeholders, and federal employees or contractors seeking electronic access to DHS programs and applications.  This includes anyone attempting to authenticate his or her identity for the purpose of obtaining a credential to access a DHS program or application electronically, including when the program or application uses a third-party identity service provider to perform some or all credential management functions (e.g., prove identity, manage authentication tokens, authenticate users).</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p>• Attributes DHS or a third-party identity service provider collects necessary to perform identity proofing at the required level of assurance. Attributes are only retained in this system of records if it is necessary for the program to manage the credential.  Examples of attributes collected for identity proofing information include:</p>
<p>• Name (last, first, middle, and maiden);</p>
<p>• Date of birth;</p>
<p>• Place of birth;</p>
<p>• Financial or utility account number;</p>
<p>• Address of residence;</p>
<p>• Social Security number (SSN) – full or partial (may be optional depending on the application);</p>
<p>• Telephone number – (may be optional depending on the application); and</p>
<p>• Country of Citizenship.</p>
<p>• Assertions and assertion references from a third-party identity service provider  such as:</p>
<p>• Transaction ID;</p>
<p>• Pass/fail indicator;</p>
<p>• Date/time of the transaction;</p>
<p>• Codes associated with the transaction;</p>
<p>• Information DHS or third-parties collect necessary to register, issue, and maintain the credential (e.g., to administer multi-factor authentication) including verified attributes the identity service provider maintains or passes to DHS after a user successfully passes identity proofing such as:</p>
<p>• Name;</p>
<p>• E-mail addresses;</p>
<p>• User ID;</p>
<p>• Passwords;</p>
<p>•  Phone numbers (primary, alternate, mobile, home, work, landline);</p>
<p>• Two-factor authentication preference (SMS text message, e-mail, phone number for interactive voice response); </p>
<p>• Self-generated security questions and answers; </p>
<p>• Level of access;</p>
<p>•  Credential registration information DHS collects manually that is necessary to perform manual identity verification in cases in which an individual cannot electronically prove his or her identity.  Note that some identity proofing information (e.g., copies of government-issued photo identification) is retained in this system of records only if it is necessary for DHS to manage the credential.  </p>
<p>• Other program-specific attribute information DHS or the identity service provider collects directly on behalf of DHS may include:</p>
<p>• Citizenship;</p>
<p>•  Accepted Terms of Service (Y/N);</p>
<p>• Employment information such as job title, job role, organization;</p>
<p>• Business and affiliations;</p>
<p>•  Faculty positions held;</p>
<p>•  Home addresses;</p>
<p>•  Business addresses;</p>
<p>•  Justification/nomination for access to DHS computers, networks, or systems;</p>
<p>•  Supervisor/nominator’s name, job title, organization, phone numbers, email address;</p>
<p>•  Verification of training requirements or other prerequisite requirements for access to DHS computers, networks, or systems;</p>
<p>• Government-issued identity document type and expiration date;</p>
<p>•  Records on access to DHS computers, networks, online programs, and applications including user ID and passwords;</p>
<p>•  Registration numbers or IDs associated with DHS Information Technology (IT) resources;</p>
<p>• Date and time of access;</p>
<p>• Logs of activity interacting with DHS IT resources;</p>
<p>• Internet Protocol (IP) address of access;</p>
<p>• Logs of internet activity; and </p>
<p>• Records on the authentication of the access request, names, phone numbers of other contacts, and positions or business/organizational affiliations and titles of individuals who can verify that the individual seeking access has a need to access the system, as well as other contact information provided to the Department or that is derived from other sources to facilitate authorized access to DHS IT resources. </p>
</xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p> 44 U.S.C.  3101; EO 9397 (SSN), as amended by EO 13487; 44 U.S.C.  3534;</p>
<p>Illegal Immigration Reform and Immigrant Responsibility Act of 1996 (IIRIRA), Public Law (Pub. L.) 104-208, September 30, 1996, Note Section 404.  Additional programmatic authorities may apply to maintenance of the credential. </p>
</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p>This system collects information in order to authenticate an individual’s identity for the purpose of obtaining a credential to electronically access a DHS program or application.   This system includes DHS programs or applications that use a third-party identity service provider to provide any of the following credential services: registration, including identity proofing, issuance, authentication, authorization, and maintenance.  This system collects information that allows DHS to track the use of programs and applications for system maintenance and troubleshooting.   The system also enables DHS to allow an individual to reuse a credential received when applicable and available.</p>
</xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p> In addition to those disclosures generally permitted under 5 U.S.C. § 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. § 552a(b)(3), as follows:</p>
<p> A.  To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
<p>  1. DHS or any component thereof;</p>
<p>  2. Any employee or former employee of DHS in his/her official capacity;</p>
<p>  3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
<p>  4. The U.S. or any agency thereof. </p>
<p> B.  To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
<p> C.  To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C.  2904 and 2906.</p>
<p> D.  To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
<p> E.  To appropriate agencies, entities, and persons when:</p>
<p> 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; </p>
<p> 2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
<p> 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p> F.  To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records.  Individuals provided information under this routine use, are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
<p>G.   To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
<p> H.  To sponsors, employers, contractors, facility operators, grantees, experts, and consultants in connection with establishing, maintaining, or managing an access account for an individual or maintaining appropriate points of contact. </p>
<p> I.  To relying parties approved by the National Information Exchange Federation (NIEF) Trust Framework Provider for the purpose of providing federated access to systems when the user has been provided with appropriate notice and the opportunity to consent.  Attributes provided to the relying party are limited: to 1) making authorization decisions; 2) dynamically provisioning accounts; and 3) performing audit logging.</p>
<p> J.  To international, federal, state and local, tribal, private and/or corporate entities for the purpose of the regular exchange of business contact information in order to facilitate collaboration for official business.  </p>
<p> K. To a trusted third-party identity service provider under contract with DHS or certified by the Federal Identity Management Credential and Access Management initiative for the purpose of authenticating an individual seeking a credential with DHS.  The information may be included in the individual’s credit record as a "soft inquiry" that does not impact the individual’s credit score when the identity service provider is a credit bureau or uses a credit bureau to conduct identity proofing. The "soft inquiry" is not viewable by third parties. </p>
<p> L.   To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
<p>Disclosure to consumer reporting agencies:</p>
<p> None.   </p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>Storage:</p>
<p> Records in this system are on paper or in digital or other electronic form.  Digital and other electronic images are stored on a storage area network in a secured environment.  Records, whether paper or electronic, are stored at the DHS Headquarters, at the component level, or at the third-party identity service provider’s physical or cloud location.  </p>
</xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p> Information is retrieved, sorted, or searched by an identification number assigned by computer, by SSN (if maintained by the program), by facility, by business affiliation, by e-mail address, or by the name of the individual, or other data fields previously identified in this SORN.  Note that when DHS uses a third-party identity service provider for identity proofing, data elements collected by the third party on DHS’s behalf are not retained by DHS unless specifically required by the program or application.</p>
</xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p> Information in this system is safeguarded in accordance with applicable laws, rules and policies, including the DHS IT Security Program Handbook and DHS Information Security Program Policy and Handbook.  DHS uses trusted identity service providers including those certified through the Trust Framework Adoption Process by Federal Identity Credential and Access Management (FICAM).  The DHS/ALL-037 E-Authentication Records system of records security protocols also meet multiple NIST Security Standards from Authentication to Certification and Accreditation.   </p>
<p> Records in the DHS/ALL-037 E-Authentication Records system of records will be maintained in a secure, password-protected, electronic system that uses security hardware and software including: multiple firewalls, active intruder detection, and role-based access controls.  Additional safeguards vary by component and program.  All records are protected from unauthorized access through appropriate administrative, physical, and technical safeguards.  These safeguards include restricting access to authorized personnel who have a "need to know," using locks and password protection identification features.  Classified information is appropriately stored in accordance with applicable requirements.  DHS file areas are locked after normal duty hours and the facilities are protected from the outside by security personnel.</p>
</xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p> Records are securely retained and disposed of in accordance with the NARA’s General Records Schedule (GRS) 24, section 6, "User Identification, Profiles, Authorizations, and Password Files."  Inactive records are destroyed or deleted six years after the user account is terminated or password is altered, or when no longer needed for investigative or security purposes, whichever is later.</p>
<p> In addition, in accordance with NIST SP-800-63-2, a record of the registration, history, and status of each token and credential (including revocation) is maintained by the credential service provider (CSP) or its representative.  The record retention period of data for Level 2 and 3 credentials is seven years and six months beyond the expiration or revocation (whichever is later).  The minimum record retention period for Level 4 credential data is ten years and six months beyond the expiration or revocations of the credential.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent>
<p> The System Manager is the Chief Information Officer (CIO), Department of Homeland Security, Washington, D.C. 20528.  </p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p> Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Headquarters or component’s FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia under "contacts."  If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Privacy Office, Department of Homeland Security, 245 Murray Drive, S.W., Building 410, STOP-0655, Washington, D.C. 20528.</p>
<p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR Part 5.  You must first verify your identity, meaning that you must provide your full name, current address and date and place of birth.  You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C.  1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization.  While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov or 1-866-431-0486.  In addition you should:</p>
<p>• Explain why you believe the Department would have information on you;</p>
<p>• Identify which component(s) of the Department you believe may have the information about you;</p>
<p>• Specify when you believe the records would have been created; and</p>
<p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
<p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
<p>Without the above information the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
</xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p> Information contained in this system is obtained from affected individuals, organizations, facilities, trusted third-party identity service providers (which may use commercial identity verification information not accessed or maintained by DHS to perform knowledge-based authentication), public source data, other government agencies, or information already in other DHS records systems.  </p>
</xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p> None.
</p></xhtmlContent></subsection></section>

 <section id="all38" toc="yes">
<systemNumber>/ALL-038</systemNumber>
     <subsection type="systemName">
         Department of Homeland Security (DHS) DHS/ALL-038 Insider Threat Program System of Records
     </subsection>
     <subsection type="securityClassification">
         <xhtmlContent>
             <p>Unclassified and Classified.</p>
             </xhtmlContent>
             </subsection>
             <subsection type="systemLocation">
                 <xhtmlContent>
                     <p> Records are maintained at several DHS Headquarters and Component locations in Washington, D.C. and field offices.</p>
                 </xhtmlContent>
             </subsection>
             <subsection type="systemManager">
                 <xhtmlContent>
                     <p>Program Manager, Insider Threat Operations Center (202-447-5010), Office of the Chief Security Officer, Department of Homeland Security, Washington, D.C. 20528.</p>
                 </xhtmlContent>
             </subsection>
             <subsection type="authorityForMaintenance">
                 <xhtmlContent>
                     <p>Intelligence Reform and Terrorism Prevention Act of 2004, Public Law 108-458; Intelligence Authorization Act for FY 2010, Public Law 111-259; Atomic Energy Act of 1954, 60 Stat. 755, August 1, 1946; Under Secretary for Management, Title 6 U.S.C. 341(a)(6); Investigation of Crimes Involving Government Officers and Employees, Title 28 U.S.C. 535; Law Enforcement Authority of Secretary of Homeland Security for Protection of Public Property, Title 40 U.S.C. 1315; Coordination of Counterintelligence Activities, Title 50 U.S.C. 3381; Executive Order 10450, Security Requirements for Government Employment, 18 Fed. Reg. 2,489 (April 17, 1953); Executive Order 12333, United States Intelligence Activities, 46 Fed. Reg. 59,941 (December 4, 1981), reprinted as amended in 73 Fed. Reg. 45,325 (July 30, 2008); Executive Order 12829, National Industrial Security Program, 58 Fed. Reg. 3,479 (January 06, 1993), reprinted as amended in part in 80 Fed. Reg. 60,271 (September 30, 2015); Executive Order 12968, Access to Classified Information, 60 Fed. Reg. 40,245 (August 2, 1995); Executive Order 13467, Reforming Processes Related to Suitability for Government Employment, Fitness for Contractor Employees, and Eligibility for Access to Classified National Security Information, 73 Fed. Reg. 38,103 (June 30, 2008), reprinted as amended in part in 82 Fed. Reg. 8115 (January 17, 2017); Executive Order 13488, Granting Reciprocity on Excepted Service and Federal Contractor Employee Fitness and Reinvestigating Individuals in Positions of Public Trust, 74 Fed. Reg. 4,111 (January 16, 2009), reprinted as amended in part in 82 FR 8115 (January 17, 2017); Executive Order 13526, Classified National Security Information, 75 Fed. Reg. 707 (December 29, 2009); Executive Order 13549, Classified National Security Information Programs for State, Local, Tribal, and Private Sector Entities, 75 Fed. Reg. 51,609 (August 18, 2010), reprinted as amended in 80 Fed. Reg. 60,271 (September 30, 2015); Executive Order 13587, Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information, 76 Fed. Reg. 63,811 (October 7, 2011); and Presidential Memorandum National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs (November 21, 2012).</p>
                 </xhtmlContent>
             </subsection>
             <subsection type="purpose">
                 <xhtmlContent>
                     <p>The purpose of this system is to detect, deter, and mitigate insider threats. DHS will use the system to facilitate management of insider threat inquiries; identify and track potential insider threats to DHS; manage referrals of potential insider threats to and from internal and external partners; provide authorized assistance to lawful administrative, civil, counterintelligence, and criminal investigations; and generate statistical reports and meet other insider threat reporting requirements.</p>
                 </xhtmlContent>
             </subsection>
             <subsection type="categoriesOfIndividuals">
                 <xhtmlContent>
                     <p>The categories of individuals covered by this system are DHS "insiders," as defined above, which include present and former DHS employees, contractors, detailees, assignees, interns, visitors, and guests. In addition, persons who report concerns, witnesses, relatives, and individuals with other relevant personal associations with a DHS insider are covered by the system of records notice.</p>
                 </xhtmlContent>
             </subsection>
             <subsection type="categoriesOfRecords">
                 <xhtmlContent>
                     <p> The system may collect the following types of information:</p>
                     <p>•Information potentially relevant to resolving possible insider threats and lawful DHS security investigations, including authorized physical, personnel, and communications security investigations, and information systems security analysis and reporting. Such information may include:</p>
                     <p>•Individual’s name and alias(es);</p>
                     <p>•Date and place of birth;</p>
                     <p>•Social Security number;</p>
                     <p>•Address;</p>
                     <p>•Open source information, including publicly available social media information;</p>
                     <p>•Personal and official email addresses;</p>
                     <p>•Citizenship;</p>
                     <p>•Personal and official phone numbers;</p>
                     <p>•Driver license number(s);</p>
                     <p>•Vehicle Identification Number(s);</p>
                     <p>•License plate number(s);</p>
                     <p>•Ethnicity and race;</p>
                     <p>•Current Employment and Performance Information;</p>
                     <p>•Work history;</p>
                     <p>•Education history;</p>
                     <p>•Contract information;</p>
                     <p>•Information on family members, dependents, relatives and other personal associations;</p>
                     <p>•Passport number(s);</p>
                     <p>•DHS-held Travel records;</p>
                     <p>•Gender;</p>
                     <p>•Hair and eye color;</p>
                     <p>•Biometric data;</p>
                     <p>•Other physical or distinguishing attributes of an individual;</p>
                     <p>•Medical information;</p>
                     <p>•Access control pass, credential number, or other identifying number(s);</p>
                     <p>•Media obtained through authorized procedures, such as CCTV footage; and</p>
                     <p>•Any other information provided to obtain access to DHS facilities or information systems.</p>
                     <p>•Records relating to the management and operation of the DHS physical, personnel, and communications security programs, including:</p>
                     <p>•Completed standard form questionnaires issued by the Office of Personnel Management;</p>
                     <p>•Background investigative reports and supporting documentation, including criminal background, medical, and financial data;</p>
                     <p>•Current and former clearance status(s);</p>
                     <p>•Other information related to an individual’s eligibility for access to classified information;</p>
                     <p>•Criminal history records;</p>
                     <p>•Polygraph examination results;</p>
                     <p>•Logs of computer activities on all DHS IT systems or any IT systems accessed by DHS personnel;</p>
                     <p>•Nondisclosure agreements;</p>
                     <p>•Document control registries;</p>
                     <p>•Courier authorization requests;</p>
                     <p>•Derivative classification unique identifiers;</p>
                     <p>•Requests for access to sensitive compartmented information (SCI);</p>
                     <p>•Records reflecting personal and official foreign travel;</p>
                     <p>•Facility access records;</p>
                     <p>•Records of contacts with foreign persons; and</p>
                     <p>•Briefing/debriefing statements for special programs, sensitive positions, and other related information and documents required in connection with personnel security clearance determinations.</p>
                     <p>•Reports of investigations or inquiries regarding security violations or misconduct, including:</p>
                     <p>•Individuals’ statements or affidavits and correspondence;</p>
                     <p>•Incident reports;</p>
                     <p>•Drug test results;</p>
                     <p>•Investigative records of a criminal, civil, or administrative nature;</p>
                     <p>•Letters, emails, memoranda, and reports;</p>
                     <p>•Exhibits, evidence, statements, and affidavits;</p>
                     <p>•Inquiries relating to suspected security violations;</p>
                     <p>•Recommended remedial actions for possible security violations; and</p>
                     <p>•Personnel files containing information about misconduct and adverse actions.</p>
                     <p>•Any information related to the management and operation of the DHS ITP, including:</p>
                     <p>•Documentation pertaining to fact-finding or analytical efforts by ITP personnel to identify insider threats to DHS resources, personnel, property, facilities, or information;</p>
                     <p>•Records of information technology events and other information that could reveal potential insider threat activities;</p>
                     <p>•Intelligence reports and database query results relating to individuals covered by this system;</p>
                     <p>•Information obtained from the Intelligence Community, law enforcement partners, and from other agencies or organizations about individuals and/or organizations known or reasonably suspected of being engaged in conduct constituting, preparing for, aiding, or relating to an insider threat;</p>
                     <p>•Information provided by subjects and individual members of the public; and</p>
                     <p>•Information provided by individuals who report known or suspected insider threats.</p>
                 </xhtmlContent>
             </subsection>
             <subsection type="recordSourceCategories">
                 <xhtmlContent>
                     <p>Records are obtained from (1) software that monitors DHS users’ activity on U.S. Government computer networks; (2) information supplied by individuals to the Department or by the individual’s employer; (3) information provided to the Department to gain access to DHS facilities, information, equipment, networks, or systems; (4) publicly available information obtained from open source platforms, including publicly available social media; (5) any departmental records for which the ITP has been given authorized access; and (6) any federal, state, tribal, local government, or private sector records for which the ITP has been given authorized access. The Insider Threat Operations Center (ITOC) also receives tips and leads by other means, such as email or telephone. The ITOC may receive a tip from any party, including members of the public.</p>
                 </xhtmlContent>
             </subsection>
             <subsection type="routineUsesOfRecords">
                 <xhtmlContent>
                     <p> In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                     <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agency conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                     <p>1. DHS or any component thereof;</p>
                     <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                     <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                     <p>4. The United States or any agency thereof.</p>
                     <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                     <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. sec. 2904 and 2906.</p>
                     <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                     <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                     <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                     <p>G. To an appropriate Federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                     <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                     <p>I. To an appropriate Federal, state, local, tribal, territorial, foreign, or international agency, if the information is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, delegation or designation of authority, or other benefit, or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant, delegation or designation of authority, or other benefit and disclosure is appropriate to the proper performance of the official duties of the person making the request.</p>
                     <p>J. To a prospective or current employer that has, or is likely to have, access to any government facility, information, equipment, network, or system, to the extent necessary to determine the employment eligibility of an individual, based on actions taken by the Department pursuant to an insider threat inquiry involving the individual.</p>
                     <p>K. To third parties during the course of an investigation to the extent necessary to obtain information pertinent to the investigation, provided disclosure is appropriate to the proper performance of the official duties of the individual making the disclosure.</p>
                     <p>L. To a public or professional licensing organization when such information indicates, either by itself or in combination with other information, a violation or potential violation of professional standards, or reflects on the moral, educational, or professional qualifications of an individual who is licensed or who is seeking to become licensed.</p>
                     <p>M. To another federal agency in order to conduct or support authorized counterintelligence activities, as defined by 50 U.S.C. 3003(3).</p>
                     <p>N. To any Federal, state, local, tribal, territorial, foreign, or multinational government or agency, or appropriate private sector individuals and organizations lawfully engaged in national security or homeland defense for that entity’s official responsibilities, including responsibilities to counter, deter, prevent, prepare for, respond to, threats to national or homeland security, including an act of terrorism or espionage.</p>
                     <p>O. To a Federal, state, local, tribal, or territorial government or agency lawfully engaged in the collection of intelligence (including national intelligence, foreign intelligence, and counterintelligence), counterterrorism, homeland security, law enforcement or law enforcement intelligence, and other information, when disclosure is undertaken for intelligence, counterterrorism, homeland security, or related law enforcement purposes, as authorized by U.S. Law or Executive Order.</p>
                     <p>P. To any individual, organization, or entity, as appropriate, to notify them of a serious threat to homeland security and/or a potential insider threat for the purpose of guarding them against or responding to such a threat, or when there is a reason to believe that the recipient is or could become the target of a particular threat, to the extent the information is relevant to the protection of life, health, or property.</p>
                     <p>Q. To members of the U.S. House Committee on Oversight and Reform and the Senate Homeland Security and Governmental Affairs Committee pursuant to a written request under 5 U.S.C. 2954, after consultation with the Chief Privacy Officer and the General Counsel.</p>
                     <p>R. To a federal agency or entity that has information relevant to an allegation or investigation regarding an insider threat for purposes of obtaining guidance, additional information, or advice from such federal agency or entity regarding the handling of an insider threat matter, or to a federal agency or entity that was consulted during the processing of the allegation or investigation but that did not ultimately have relevant information.</p>
                     <p>S. To a former DHS employee, DHS contractor, or individual sponsored by DHS for a security clearance for purposes of responding to an official inquiry by federal, state, local, tribal, or territorial government agencies or professional licensing authorities; or facilitating communications with a former employee that may be relevant and necessary for personnel-related or other official purposes when DHS requires information or consultation assistance from the former employee regarding a matter within that person’s former area of  responsibility.</p>
                     <p>T. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
                 </xhtmlContent>
             </subsection>
             <subsection type="policiesAndPractices">
                 <xhtmlContent>
                     <p>DHS/ALL-038 Insider Threat Program stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
                 </xhtmlContent>
             </subsection>
             <subsection type="retrievability">
                 <xhtmlContent>
                     <p>DHS may retrieve records by first and last name, Social Security number, date of birth, phone number, other unique individual identifiers, and other types of information by key word search.</p>
                 </xhtmlContent>
             </subsection>
             <subsection type="retentionAndDisposal">
                 <xhtmlContent>
                     <p>In accordance with General Records Schedule 5.6: Security Records (July 2017), Insider Threat (a) records pertaining to an "insider threat inquiry" are destroyed 25 years after the close of the inquiry; (b) records containing "insider threat information" are destroyed when 25 years old; (c) insider threat user activity monitoring (UAM) data is destroyed no sooner than 5 years after the inquiry has been opened, but longer retention is authorized if required for business use; and (d) insider threat administrative and operations records are destroyed when 7 years old.</p>
                 </xhtmlContent>
             </subsection>
             <subsection type="safeguards">
                 <xhtmlContent>
                 </xhtmlContent>
             </subsection>
             <subsection type="recordAccessProcedures">
                 <xhtmlContent>
                     <p>As described below, this system of records is exempt from the notification, access, and amendment provisions of the Privacy Act, and the Judicial Redress Act if applicable. However, DHS will consider individual requests to determine whether or not information may be released. Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and Headquarters FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provides a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                     <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under Title 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                     <p>•Explain why he or she believes the Department would have information being requested;</p>
                     <p>•Identify which component(s) of the Department he or she believes may have the information;</p>
                     <p>•Specify when the individual believes the records would have been created; and</p>
                     <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                     <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                     <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
                 </xhtmlContent>
             </subsection>
             <subsection type="contestingRecordProcedures">
                 <xhtmlContent>
                     <p>For records covered by the Privacy Act or Judicial Redress Act-covered records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
                 </xhtmlContent>
             </subsection>
             <subsection type="notificationProcedure">
                 <xhtmlContent>
                     <p>See "Record Access Procedures" above.</p>
                 </xhtmlContent>
             </subsection>
             <subsection type="exemptionsClaimed">
                 <xhtmlContent>
                     <p> The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2) has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. § 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8), (e)(12); (f); and (g)(1). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5), has exempted this system from the following provisions of the Privacy Act, 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). When this system receives a record from another system exempted in that source system under Title 5 U.S.C. 552a(j)(2), 5 U.S.C. § 552a(k)(1), (k)(2), and (k)(5), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.</p>
                 </xhtmlContent>
             </subsection>
             <subsection type="history">
                 <xhtmlContent>
                     <p>81 Fed. Reg. 9,871 (February 26, 2016)</p>

                 </xhtmlContent></subsection></section>

    <section id="all39" toc="yes">
        <systemNumber>/ALL-039</systemNumber>
        <subsection type="systemName">
            Department of Homeland Security (DHS)/ALL-039 Foreign Access Management System of Records.
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified and Classified.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at the Department of Homeland Security Headquarters in Washington, D.C. and field offices. Electronic records are stored in the Integrated Security Management System (ISMS) as well as in a classified network database.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Director, Center for International Safety &amp;amp;amp;amp;amp;amp; Security, Office of the Chief Security Officer, Department of Homeland Security, 301 7th Street SW, D.C. 20024.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>5 U.S.C. 301; 40 U.S.C. 1315; 40 U.S.C. 11331; the Economy Act of 1932, as amended; the Counterintelligence Enhancement Act of 2002; the Intelligence Reform and Terrorism Prevention Act; E.O. 12977; E.O. 13286; E.O. 13549; Presidential Policy Directive/PPD-21, "Critical Infrastructure Security and Resilience" (February 12, 2013); DCI Directive 6/4, "Personnel Security Standards and Procedures Governing Eligibility for Access to Sensitive Compartmented Information (SCI)" (July 2, 1998); and Presidential Decision Directive (PDD)/NSC- 12, "Security Awareness and Reporting of Foreign Contacts" (August 5, 1993).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to perform screening for foreign nationals seeking access to DHS and partner USG agency personnel, information, facilities, programs, research, studies, and IT systems. This system is also used to screen foreign contacts and foreign visitors reported by DHS and partner USG agency employees who have met and/or befriended such contacts and visitors outside the scope of the employee’s official duties.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>Foreign nationals and foreign entities seeking access to USG personnel, information, facilities, programs, research, studies, and IT systems, including: U.S. citizens and lawful permanent residents (LPR) representing foreign interests; and foreign contacts and foreign visitors reported by DHS. These include, when requested, foreign visitors to fusion centers or tribal, territorial, state, and local government homeland security programs, and foreign contacts of USG employees who have met or befriended such contacts and visitors outside the scope of the employee’s official duties. Further, DHS or USG federal employees that sponsor foreign national access to USG or report foreign contacts outside the scope of their normal employment duties. Finally, LPRs providing construction or contractual services (e.g., food services, janitorial services)</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>For foreign nationals:</p>
                <p>•Full name;</p>
                <p>•Alias(es);</p>
                <p>•Gender;</p>
                <p>•Date of birth;</p>
                <p>•Place of birth;</p>
                <p>•City/country of residence;</p>
                <p>•Country of citizenship;</p>
                <p>•Passport information (country of issue, number, expiration date);</p>
                <p>•Passport copy;</p>
                <p>•Photograph;</p>
                <p>•Address;</p>
                <p>•Telephone number(s);</p>
                <p>•Email Address(es);</p>
                <p>•Country sponsoring the visit;</p>
                <p>•Stated reason for the visit;</p>
                <p>•DHS component sponsoring the visit;</p>
                <p>•Diplomatic identification information;</p>
                <p>•Organization represented, title, or position held;</p>
                <p>•Actual employment information (including job title and employer contact information);</p>
                <p>•Visa information (type, number, expiration date, and issuance location);</p>
                <p>•Foreign Access Management System number;</p>
                <p>•Alien registration number; and</p>
                <p>•Potential anomalous or derogatory information identified as part of screening and vetting results.</p>
                <p>For USG federal employees:</p>
                <p>•Full name;</p>
                <p>•Title;</p>
                <p>•Organization and component;</p>
                <p>•Phone number; and</p>
                <p>•Email address.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>DHS obtains information directly from the federal employee sponsor, and the DHS or USG employee providing the information to DHS for screening. DHS also obtains information from the other DHS and federal systems for vetting purposes, including:</p>
                <p>1. U.S. Customs and Border Protection (CBP) Advance Passenger Information System (APIS): DHS/CBP-005 APIS, 80 FR 13407 (March 13, 2015);</p>
                <p>2. CBP Arrival and Departure Information System (ADIS): DHS/CBP-021 ADIS, 80 FR 72081 (November 18, 2015);</p>
                <p>3. CBP Automated Targeting System (ATS): DHS/CBP-006 ATS, 77 FR 30297 (May 22, 2012);</p>
                <p>4. CBP TECS: DHS/CBP-011 TECS, 73 FR 77778 (December 19, 2008).</p>
                <p>5. U.S. Immigration and Customs Enforcement (ICE) Criminal Arrest Records and Immigration Enforcement Records (CARIER): DHS/ICE-011 CARIER, 81 FR 72080 (October 19, 2016); and</p>
                <p>6. ICE Student and Exchange Visitor Information System (SEVIS): DHS/ICE-001 SEVIS, 75 FR 412 (January 5, 2010).</p>
                <p>7. National Protection and Programs Directorate (NPPD) Office of Biometric Identity Management (OBIM) Automated Biometric Identification System (IDENT): DHS/US-VISIT-004 DHS IDENT, 72 FR 31080 (June 5, 2007);</p>
                <p>8. U.S. Citizen and Immigration Services (USCIS) Alien File, Index, and National File Tracking System (A-File): DHS/USCIS/ICE/CBP-001 A-File, 82 FR 43556 (September 18, 2017);</p>
                <p>9. USCIS Benefits Information System (BIS): DHS/USCIS-007 BIS, 81 FR 72069 (October 19, 2016);</p>
                <p> DHS also obtains information from intelligence community classified systems for screening and vetting.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agency conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. sec. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary and otherwise compatible with the purpose of collection to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records.</p>
                <p>H. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>I. To federal and foreign government intelligence or counterterrorism agencies or components when DHS becomes aware of an indication of a threat or potential threat to national or international security, or when such use is to conduct national intelligence and security investigations or assist in anti-terrorism efforts and disclosure is appropriate to the proper performance of the official duties of the person making the disclosure.</p>
                <p>J. To federal government intelligence or counterterrorism agencies or components to facilitate CISS screening checks.</p>
                <p>K. To other federal agencies to assist in their determination of whether to grant a requesting foreign national with access to that federal agency.</p>
                <p>L. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS is aware of a need to use relevant data for purposes of testing new technology.</p>
                <p>M. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p> Records may be retrieved by foreign contact or USG employee name, or other personal identifiers listed in the categories of records, above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>In accordance with NARA-approved retention schedule N1-563-09-1, DHS retains information collected on foreign visitors for screening in FAMS and in the Classified Local Area Network (C-LAN) access database for twenty years.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p>DHS safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act, and consequently those of the Judicial Redress Act if applicable. However, DHS will consider individual requests to determine whether or not information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and Chief Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief FOIA Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                <p>•Explain why you believe the Department would have information on him/her;</p>
                <p>•Identify which component(s) of the Department the individual believes may have the information about him/her;</p>
                <p>•Specify when the individual believes the records would have been created; and</p>
                <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If an individual’s request is seeking records pertaining to another living individual, the first individual must include a statement from the second individual certifying his/her agreement for the first individual to access his/her records.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered JRA records, see "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). When this system receives a record from another system exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>DHS/ALL-039 Foreign Access Management System of Records, 82 FR 34971 (July 27, 2017).</p>

            </xhtmlContent>
        </subsection>
    </section>

    <section id="all40" toc="yes">
        <systemNumber>/ALL-040</systemNumber>
        <subsection type="systemName">Department of Homeland Security (DHS)/ALL-040 Personnel Recovery Information.</subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified, Sensitive, For Official Use Only, Law enforcement-Sensitive.</p>
           </xhtmlContent> </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at the DHS Headquarters in Washington, D.C., component headquarters and field offices, and as component-specific systems. Electronic/Information Technology (IT) records are maintained within DHS systems that serve as data repositories of personnel data.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>For DHS Headquarters components, the System Manager is the Deputy Chief Freedom of Information Act (FOIA) Officer, Department of Homeland Security, Washington, D.C. 20528. For components of DHS, the System Manager can be found at http://www.dhs.gov/foia under "Contacts."</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>Authority for maintaining this system is in 6 U.S.C. sec. 236; 8 U.S.C. sec. 1103; 22 U.S.C. secs. 4801, 4802, and 4805; and Presidential Policy Directive (PPD)-30, Hostage Recovery Activities.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to permit DHS’s collection, use, maintenance, dissemination, and storage of information to: facilitate identification of DHS personnel (including employees and contractors) assigned overseas or on official travel abroad for whom DHS has the responsibility to recover or account; maintain situational awareness of the location of DHS personnel; and coordinate support services for personnel who have been abducted, detained, held hostage, declared missing, impacted by a terrorist attack, natural disaster, government takeover, aircraft/motor vehicle accident, or are otherwise isolated from friendly support.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>DHS personnel (including federal employees and contractors) and non-DHS Federal employees who are members of DHS-led task forces assigned overseas or on official travel outside the United States. Information will also be collected from family members, domestic partners, and emergency contacts of personnel assigned overseas or on official travel outside the United States.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>
                    <i>Mandatory fields include the following:</i>
                </p>
                <p>•Full Name;</p>
                <p>•Alias(es);</p>
                <p>•Business title/position title;</p>
                <p>•Gender;</p>
                <p>•Biometric (i.e., fingerprint data and facial photographic data) and other information (i.e., race, ethnicity, weight, height, eye color, hair color) collected to conduct background checks;</p>
                <p>•Foreign Travel Itinerary;</p>
                <p>•Foreign Language and Fluency Level;</p>
                <p>•Personnel Recovery Training and Year Received;</p>
                <p>•Other Pertinent Training;</p>
                <p>•Prior Military/Branch;</p>
                <p>•Assignment Reason Narrative;</p>
                <p>•Assignment Location;</p>
                <p>•Work Email Address;</p>
                <p>•Security clearance information;</p>
                <p>•Business Cellular International Mobile Station Equipment Identity (IMEI);</p>
                <p>•Business Phone Number;</p>
                <p>•Passport numbers and other travel documents (official or diplomatic, and personal), including expiration date;</p>
                <p>•Citizenship;</p>
                <p>•Emergency contact information (at post and at home);</p>
                <p>•Identity verification or security questions and responses;</p>
                <p>•Supervisor contact information; and</p>
                <p>•Emergency contact information.</p>
                <p>
                    <i>Optional fields include the following:</i>
                </p>
                <p>•Blood Type;</p>
                <p>•Scars;</p>
                <p>•Tattoos;</p>
                <p>•Disfigurement;</p>
                <p>•Medical Conditions;</p>
                <p>•Allergies;</p>
                <p>•Medication;</p>
                <p>•Personal Cellular Phone Number;</p>
                <p>•Personal Cellular IMEI;</p>
                <p>•Other Electronic Device Type;</p>
                <p>•Other Electronic Device IMEI;</p>
                <p>•Personal Email Address #1;</p>
                <p>•Personal Email Address #2;</p>
                <p>•Regional Security Officer (RSO) Name;</p>
                <p>•RSO Direct Phone;</p>
                <p>•RSO Cell Phone;</p>
                <p>•Marine Post One Phone;</p>
                <p>•Regional Embassy/Consulate;</p>
                <p>•Tracking Device IMEI;</p>
                <p>•Personnel Recovery Equipment;</p>
                <p>•Cellular –World;</p>
                <p>•Cellular – World IMEI;</p>
                <p>•Cellular – Local;</p>
                <p>•Cellular – Local IMEI;</p>
                <p>•Religious preference;</p>
                <p>•Sizing information (e.g., shirt size, pant size, hat size, shoe size);</p>
                <p>•Vehicle information;</p>
                <p>•Real-time location information;</p>
                <p>•Kit issuance; and</p>
                <p>•Information about family members and domestic partners of personnel assigned OCONUS (name, passport numbers and issuing country, contact information, date of birth, work location, school name and location, medical conditions, and photographs).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>Records are obtained from DHS personnel (including federal employees and contractors).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. sec. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when:</p>
                <p>1. DHS determines that information from this system of records is reasonably necessary and otherwise compatible with the purpose of collection to assist another federal recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach; or</p>
                <p>2. DHS suspects or has confirmed that there has been a breach of this system of records; and (a) DHS has determined that as a result of the suspected or confirmed breach, there is a risk of harm to individuals, harm to DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (b) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>G. To the Department of State (DOS) when necessary to coordinate U.S. Embassy or Consulate support services for the employee.</p>
                <p>H. To federal, state, and local governmental agencies or executive offices, and foreign governments, when disclosure is appropriate for proper planning or coordination of personnel recovery efforts or assistance, as described in PPD-30.</p>
                <p>I. To family members when the subject of the record is unable or unavailable to sign a waiver and is involved in an emergency situation, and the release is for the benefit of the subject.</p>
                <p>J. To members of Congress when the information is requested on behalf of a family member of the individual to whom access is authorized under routine use I.</p>
                <p>K. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS stores records in this system electronically or on paper in secure facilities at the DHS Headquarters in Washington, D.C., as well as component headquarters and field offices, in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>Records may be retrieved by an individual’s name, biometric information, employee ID number, and telephone number.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>For information used to account for personnel and maintain communication during emergencies, office dismissal, and closure situations, the Personnel Recovery Information system of records will retain records until superseded or obsolete, or upon separation or transfer of the employee, in accordance with NARA General Records Schedule 5.3, Item 20.</p>
                <p> For all other information in this system of records, the information will be maintained in accordance with NARA General Records Schedule 5.2, Item 10. This information is also retained until superseded or obsolete, or upon separation or transfer of the employee.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and Headquarters or component’s Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                <p>When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, you should:</p>
                <p>•Explain why you believe the Department would have information on you;</p>
                <p>•Identify which component(s) of the Department you believe may have the information about you;</p>
                <p>•Specify when you believe the records would have been created; and</p>
                <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered JRA records, see "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures."</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>None.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>DHS/ALL-040 is a new system of records and DHS has not published any prior notices that apply to the records.</p>
            </xhtmlContent>
        </subsection>
    </section>

    <section id="all41" toc="yes">
        <systemNumber>/ALL-041</systemNumber>
        <subsection type="systemName"> Department of Homeland Security (DHS)/ALL-041 External Biometric Records (EBR) System of Records.</subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
               
                    <p>Unclassified, Sensitive. The data may be retained on classified networks but this does not change the nature and character of the data until it is combined with classified information.</p>
                </xhtmlContent></subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at Data Center 1 at Stennis, Mississippi, Data Center 2 at Clarksville, Virginia, at the Office of Biometric Identity Management (OBIM) Headquarters in Washington, D.C., and field offices. The records are maintained in the Information Technology (IT) system, Automated Biometric Identification System (IDENT), also referred to as the Homeland Advanced Recognition Technology (HART).</p>
                <p>DHS replicates records from this operational IT system and maintains them in other IT systems connected on the DHS unclassified and classified networks.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>System Manager, IDENT Program Management Office, OBIM, U.S. Department of Homeland Security, Washington, D.C. 20528; email: OBIMprivacy.ice.dhs.gov.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>6 U.S.C. secs. 202 and 482; 8 U.S.C. secs. 1103, 1105, 1158, 1159, 1187, 1201, 1225, 1254a, 1254b, 1301-1305,  1324, 1357, 1360, 1365a, 1365b, 1372, 1379, 1440f, 1537, 1721, 1722, 1731, and 1732; 14 U.S.C. secs 89, 95; 19 U.S.C. sec. 1589a; 42 U.S.C. sec. 5197a; 44 U.S.C. sec. 3544; 46 U.S.C. sec. 70123; 49 U.S.C. secs. 114, 5103, 40103(b), 40113(a), 44903(b), 44936, 44939, and 46105; 5 CFR part 731; 5 CFR part 732; 32 CFR sec. 147.24; 8 CFR sec. 214.1; 8 CFR sec. 235.1; E.O. 12968 (60 FR 40245), 3 CFR, 1995 Comp. p. 1365.; 13764 (82 FR 8115)., Homeland Security Presidential Directive 12 (HSPD-12): Policy for a Common Identification Standard for Federal Employees and Contractors (Aug. 27, 2004); HSPD-11: Comprehensive Terrorist-Related Screening Procedures (Aug. 27, 2004); and National Security Presidential Directive/NSPD-59/HSPD-24: Biometrics for Identification and Screening to Enhance National Security (June 5, 2008).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to process and maintain biometric and associated biographic information from non-DHS entities, both foreign and domestic, for law enforcement, national security, immigration screening, border enforcement, intelligence, national defense, and background investigations relating to national security positions, credentialing, and certain positions of public trust, consistent with applicable DHS authorities. DHS may use and share these external biometric and associated biographic records for these same purposes, as permitted and approved by our partners, if applicable, pursuant to the agreement or arrangement.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>• Background checks and suitability screening;</p>
                <p>• National security;</p>
                <p>• Law enforcement operations (including individuals who are removed from a foreign country by a foreign partner government based on a criminal conviction);</p>
                <p>• Intelligence;</p>
                <p>• Border enforcement and immigration screening; and</p>
                <p>• National defense.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>Information collected by a non-DHS entity and maintained in this system includes:</p>
                <p>•  Biometric data, including:</p>
                <p>o Facial images;</p>
                <p>o Fingerprints;</p>
                <p>o Latent fingerprints;</p>
                <p>o Iris images;</p>
                <p>o Palm prints;</p>
                <p>o Voice;</p>
                <p>o Scars, marks, and tattoos;</p>
                <p>o DNA or DNA Profile; and</p>
                <p>o Other modalities.</p>
                <p>•  Biometric-associated biographic data including:</p>
                <p>o Full name (i.e., first, middle, last, nicknames, and aliases);</p>
                <p>o Date of birth (DOB);</p>
                <p>o Gender;</p>
                <p>o Personal physical details, such as height, weight, eye color, and hair color;</p>
                <p>o Signature;</p>
                <p>o Assigned number identifiers, such as, but not limited to, Alien Registration Number (A-Number), Social Security number (SSN), state identification number, civil record number, other agency system specific fingerprint record locator information, Federal Bureau of Investigation (FBI) Number (FNU)/Universal Control Number (UCN), Encounter Identification Number (EID), Finger Identification Number (FIN), DoD Biometric Identifier (DoD BID), Transaction Control Number (TCN), Global Unique Identifier (GUID), National Unique Identification Number (NUIN)), document information and identifiers (e.g., passport and visa data, document type, document number, country of issuance), when available; and</p>
                <p>o Identifiers for citizenship and nationality, including person-centric details, such as country of birth, country of citizenship, and nationality, when available.</p>
                <p>• Derogatory information (DI), if applicable, including, wants and warrants, Known or Suspected Terrorist (KST) designation, sexual offender registration, foreign criminal convictions, and immigration violations, when available;</p>
                <p>• Miscellaneous officer comment information, when available; and</p>
                <p>• Encounter data, including location and circumstance of each instance resulting in biometric collection.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>EBR SOR receives biometric and associated biographic information from non-DHS entities that may be used by DHS for a wide array of purposes, including those listed in the purpose(s) of the system stated above. EBR maintains records in accordance with the terms of the agreements or arrangements under which partners provide the external information to DHS. Records from external Federal partners include information from the following non-DHS systems of records, last published at:</p>
                <p>• JUSTICE/INTERPOL-001 INTERPOL-United States National Central Bureau (USNCB) Records System, 75 FR 27821 (May 18, 2010) [Note: records shared with DHS include: law enforcement, intelligence, and national security records];</p>
                <p>• JUSTICE/DOJ-005 Nationwide Joint Automated Booking System, 72 FR 3410 (Jan. 25, 2007), 71 FR 52821 (Sept. 7, 2006);</p>
                <p>• JUSTICE/FBI-009 Next Generation Identification (NGI) System of Records (pending DOJ release);</p>
                <p>• JUSTICE/FBI-019 Terrorist Screening Records System of Records, 76 FR 77847 (Dec. 14, 2011);</p>
                <p>• A0025-2 SAIS DoD Defense Biometric Services, 74 FR 48237 (Sept. 22, 2009);</p>
                <p>• A0025-2 PMG (DFBA) DoD Defense Biometric Identification Records System, 80 FR 8292 (Feb. 17, 2015);</p>
                <p>• STATE-39 Visa Records 60 FR 39469 (Oct. 25, 2012);</p>
                <p>• STATE-36, Security Records 80 FR 77691 (Dec. 15, 2015).</p>
                <p>EBR SOR receives biometric and associated biographic information from foreign partners consistent with various international information sharing and access agreements or arrangements on file with DHS Office of Policy, International Affairs.</p>
                <p>EBR SOR receives biometric and associated biographic information from State and local partners consistent with various law enforcement information sharing and access agreements or arrangements.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any Component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary and otherwise compatible with the purpose of collection to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>H. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>I. To an appropriate Federal, State, local, tribal, foreign, or international agency, if the information is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant or other benefit and when disclosure is appropriate to the proper performance of the official duties of the person making the request.</p>
                <p>J. To a Federal, State, or local agency, or other appropriate entities or individuals, or through established liaison channels to selected foreign governments, in order to provide intelligence, counterintelligence, or other information for the purposes of intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order (E.O.), or other applicable national security directive.</p>
                <p>K. To Federal and foreign government intelligence or counterterrorism agencies or Components when DHS reasonably believes there to be a threat or potential threat to national or international security for which the information may be useful in countering the threat or potential threat, or when disclosure supports the conduct of national intelligence and security investigations or assists in anti-terrorism efforts.</p>
                <p>L. To a foreign government to notify it concerning its citizens or residents who are incapacitated, unaccompanied minors, or deceased.</p>
                <p>M. To appropriate Federal, State, local, tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS identifies a need to use relevant data for purposes of testing new technology.</p>
                <p>N. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
         
                </xhtmlContent>
    </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS stores records in this system electronically in secure facilities protected through multi-layer security mechanisms and strategies that are physical, technical, administrative, and environmental in nature. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>Records may be retrieved by biometrics or select personal identifiers, including but not limited to names, identification numbers, dates of birth, nationality, document number, and address.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>Record Schedule DAA-0563-2013-0001 for DHS’s biometric and biographic records used for national security, law enforcement, immigration, and other functions consistent with DHS authorities has been approved by National Archives and Records Administration (NARA). EBR records include:</p>
                <p>1. Law Enforcement Records: Identification, investigation, apprehension, and/or removal of aliens unlawfully entering or present in the United States and facilitate legal entry of individuals into the United States, which must be destroyed or deleted 75 years after the end of the calendar year in which the data is gathered.</p>
                <p>2. Records related to the analysis of relationship patterns among individuals and organizations that are indicative of violations of the customs and immigration laws including possible terrorist threats from non-obvious relationships and specific leads and law enforcement intelligence for active and new investigations. These records must be destroyed or deleted 15 years after the end of calendar year of last use of individual’s data.</p>
                <p>The latent biometric retention schedule is currently in development with OBIM Headquarters and will be submitted thereafter to NARA for approval.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act, and consequently the Judicial Redress Act if applicable, because it is a law enforcement system. However, DHS will consider individual requests to determine whether or not information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts Information." If an individual believes more than one Component maintains Privacy Act records concerning him or herself, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about the individual may be available under the Freedom of Information Act.</p>
                <p>When seeking records about one from this system of records or any other Departmental system of records, the request must conform with the Privacy Act regulations set forth in 6 CFR part 5. The individual must first verify his or her identity, meaning that he or she must provide his or her full name, current address, and date and place of birth. The individual must sign the request, and the signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                <p>• Explain why he or she believe the Department would have information being requested;</p>
                <p>• Identify which Component(s) of the Department he or she believes may have the information;</p>
                <p>• Specify when you believe the records would have been created; and</p>
                <p>• Provide any other information that will help the FOIA staff determine which DHS Component agency may have responsive records;</p>
                <p>If the request is seeking records pertaining to another living individual, the person seeking the records must include a statement from the subject individual certifying his/her agreement for the requestor to access his or her records.</p>
                <p>Without the above information, the Component(s) may not be able to conduct an effective search, and the request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered JRA records, see "Record Access Procedures" above, and 6 CFR Part 5.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures."</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. sec. 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5), and (e)(8); (f); and (g)(1) through (5). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(k)(2) and (k)(5), has exempted this system from the following provisions of the Privacy Act, 5 U.S.C. sec. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H); and (f).</p>
                <p>Exemptions from these particular subsections are justified on a case-by-case basis determined at the time a request is made. When this system receives a record from another system exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claim any additional exemptions set forth here.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>Records in this System of Records were previously covered under DHS/US-VISIT-001 DHS Automated Biometric Identification System (IDENT), 72 FR 31080 (June 5, 2007).</p>
            </xhtmlContent>
        </subsection>
    </section>


    <section id="all42" toc="yes">
        <systemNumber>/ALL-042</systemNumber>
    <subsection type="systemName">
        <p>Department of Homeland Security (DHS)/ALL-042 Personnel Networking and Collaboration System of Records.</p>
    </subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p>Unclassified.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p>Records are maintained at the DHS Headquarters in Washington, D.C., and field offices.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p>For DHS Headquarters, the System Manager is the Deputy Chief Freedom of Information Act (FOIA) Officer, Department of Homeland Security, Washington, D.C. 20528. For components of DHS, the System Manager can be found at http://www.dhs.gov/foia under "Contacts."</p>
        </xhtmlContent>
    </subsection>
    <subsection type="authorityForMaintenance">
        <xhtmlContent>
            <p>Authority for maintaining this system is in 5 U.S.C. 301, 44 U.S.C. 3101; 44 U.S.C. 3534; Homeland Security Act of 2002, and as amended; Executive Order 13576 (June 13, 2011).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p>The purpose of this system is to permit DHS’s collection of biographical and professional information of current DHS employees, contractors, and grantees to facilitate connections and collaboration among individuals supporting the Department’s mission; aid in the identification of individuals within an organization; and to ensure efficient collaboration within the Department.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
            <p>Current DHS personnel, including employees, contractors, and grantees working in furtherance of the Department’s mission. Former DHS personnel information may be included until the information is disposed of in accordance with National Archives and Records Administration retention schedules. This system covers all individuals who are authorized to access DHS information technology resources, which may include any lawfully designated representative of private enterprises and federal, state, territorial, tribal, local, international, or foreign government agencies or entities, in furtherance of the DHS mission.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p>Categories of records in this system include:</p>
            <p>•  Individual’s name;</p>
            <p>•  Individual’s photograph;</p>
            <p>•  Position/Title;</p>
            <p>•  Organization/Component affiliation;</p>
            <p>•  Business phone numbers;</p>
            <p>•  Business email addresses;</p>
            <p>•  Work/Office addresses;</p>
            <p>•  Educational background/history and accomplishments;</p>
            <p>•  Professional background/work history and accomplishments;</p>
            <p>•  Individual’s military experience, if applicable; and</p>
            <p>•  Other relevant biographical information that the individual may voluntarily provide.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p>Records are voluntarily obtained from the individual employee, contractor, or grantee.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
            <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agency conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
            <p>1. DHS or any component thereof;</p>
            <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
            <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
            <p>4. The United States or any agency thereof.</p>
            <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
            <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. sec. 2904 and 2906.</p>
            <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
            <p>E. To appropriate agencies, entities, and persons when:</p>
            <p>1. DHS determines that information from this system of records is reasonably necessary and otherwise compatible with the purpose of collection to assist another federal recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach; or</p>
            <p>2. DHS suspects or has confirmed that there has been a breach of this system of records; and (a) DHS has determined that as a result of the suspected or confirmed breach, there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (b) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
            <p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p>DHS stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
            <p>Records may be retrieved by an individual’s name, component or affiliation, position or title, email address, or an Electronic Data Interchange Personal Identifier. The Electronic Data Interchange Personal Identifier is a unique number assigned to the Personal Identity Verification (PIV) card that uniquely identifies each user. Records are not retrievable by message content or information contained therein.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p>Records connected to social media that are not hosted on a DHS server are managed in accordance with General Records of the Department of Homeland Security Records Schedule Number DAA-0563-2013-0003. Information used to establish a profile on non-DHS information sharing and social media websites will be cut off at the end of the calendar year, and destroyed 5 years after the information has been superseded, or is obsolete. All other records covered by this SORN are managed in accordance with General Records Schedule (GRS) 5.1, item 010. Records accumulated by individual offices that relate to routine day-to-day administration and management of the office rather than the mission-specific activities for which the office exists should be destroyed when the business use ceases.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
            <p>DHS safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p>When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
            <p>•  Explain why he/she believes the Department would have information on him/her;</p>
            <p>•  Identify which component(s) of the Department the individual believes may have the information about him/her;</p>
            <p>•  Specify when the individual believes the records would have been created; and</p>
            <p>•  Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
            <p>If an individual’s request is seeking records pertaining to another living individual, the first individual must include a statement from the second individual certifying his/her agreement for the first individual to access his/her records.</p>
            <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p>For records covered by the Privacy Act, see "Record Access Procedures" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p>See "Record Access Procedures" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p>None.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="history">
        <xhtmlContent>
            <p>None.</p>
        </xhtmlContent>
    </subsection>
</section>
    <section id="all43" toc="yes">
        <systemNumber>/ALL-043</systemNumber>
        <subsection type="systemName">
            Department of Homeland Security (DHS)/ALL-043 Enterprise Biometric Administrative Records (EBAR) System of Records
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified. The data may be retained on classified networks but this does not change the nature and character of the data until it is combined with classified information.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at Data Center 1 at Stennis, Mississippi, Data Center 2 at Clarksville, Virginia, at the Office of Biometric Identity Management (OBIM) Headquarters in Washington, D.C., and field offices. The records are maintained in the Information Technology (IT) system, Automated Biometric Identification System (IDENT), and the successor Homeland Advanced Recognition Technology (HART). HART records will be maintained in the FedRAMP-approved Amazon Web Services U.S. cloud environment.</p>
                <p>DHS replicates records from this operational IT system and maintains them in other IT systems connected on the DHS unclassified and classified networks.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>System Manager, IDENT/HART Program Management Office, OBIM, U.S. Department of Homeland Security, Washington D.C. 20528; email OBIMprivacy@ice.dhs.gov.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>6 U.S.C. secs. 202 and 482; 8 U.S.C. secs., 1365a, 1365b, 1379, 1722, 1731, and 1732; 13764 (82 FR 8115), Homeland Security Presidential Directive 12 (HSPD-12): Policy for a Common Identification Standard for Federal Employees and Contractors (Aug. 27, 2004); HSPD-11: Comprehensive Terrorist-Related Screening Procedures (Aug. 27, 2004); and National Security Presidential Directive/NSPD-59/HSPD-24: Biometrics for Identification and Screening to Enhance National Security (June 5, 2008).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>This system will enable execution of administrative functions of the biometric repository such as redress operations, testing, training, data quality and integrity, utility, management reporting, planning and analysis, and other administrative uses.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>The unique records generated by EBAR include unique machine-generated identifiers (e.g., Encounter Identification Number (EID), fingerprint identification number (FIN), and Transaction Control Number (TCN)) that link individuals with their encounters, biometrics, records, and other data elements.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>The categories of records covered by the EBAR SOR are derived and created from biometric and associated biographic information received by DHS from non-DHS entities covered by the DHS/ALL-041 Enterprise Biometric Records System of Records, and DHS entities (e.g., U.S. Customs and Border Protection, U.S. Citizenship and Immigration Services, Federal Emergency Management Agency, Transportation Security Administration, U.S. Immigration and Customs Enforcement, U.S. Coast Guard) which are the original collectors of the biometrics and covered by their own system SORNs:</p>
                <p>•DHS/ALL-023 Department of Homeland Security Personnel Security Management, 75 FR 8088, (Feb. 23, 2010);</p>
                <p>•DHS/ALL-026 Department of Homeland Security Personal Identity Verification Management System, 74 FR 30301 (June 25, 2009);</p>
                <p>•DHS/CBP-002 Global Enrollment System, 78 FR 3441 (Jan. 16, 2013);</p>
                <p>•DHS/CBP-006 Automated Targeting System, 77 FR 30297 (May 22, 2012);</p>
                <p>•DHS/CBP-007 Border Crossing Information (BCI), 81 FR 89957 (Dec. 13, 2016);</p>
                <p>•DHS/CBP-010 Persons Engaged in International Trade in Customs and Border Protection Licensed/Regulated Activities, 73 FR 77753 (Dec. 19, 2008);</p>
                <p>•DHS/CBP-011 U.S. Customs and Border Protection TECS, 73 FR 77778 (Dec. 19, 2008);</p>
                <p>•DHS/CBP-021 Arrival and Departure Information System (ADIS), 80 FR 72081 (Nov. 18, 2015);</p>
                <p>•DHS/CBP-023 Border Patrol Enforcement Records System of Records (BPER), 81 FR 72601 (Oct. 20, 2016);</p>
                <p>•DHS/ICE-006 Intelligence Records System (IIRS), 75 FR 9233 (March 1, 2010);</p>
                <p>•DHS/ICE-007 Criminal History and Immigration Verification (CHIVe) System of Records, 83 FR 20844 (May 8, 2018);</p>
                <p>•DHS/ICE-009 External Investigations, 75 FR 404 (Jan. 5, 2010);</p>
                <p>•DHS/ICE-010 Confidential and Other Sources of Information, 78 FR 7798 (Feb. 4, 2013);</p>
                <p>•DHS/ICE-011 Criminal Arrest Records and Immigration Enforcement Records (CARIER) System of Records, 81 FR 72080 (October 19, 2016);</p>
                <p>•DHS/ICE-014 Homeland Security Investigations Forensic Laboratory, 81 FR 45523 (July 14, 2016);</p>
                <p>•DHS/TSA-001 Transportation Security Enforcement Record System, 83 FR 43888 (Aug. 28, 2018);</p>
                <p>•DHS/TSA-021 TSA Pre✓™ Applications Program, 78 FR 55274 (Sept. 10, 2013);</p>
                <p>•DHS/USCIS/ICE/CBP-001 Alien File, Index, and National File Tracking System of Records, 82 FR 43556 (Sept. 18, 2017);</p>
                <p>•DHS/USCIS-007 Benefits Information System, 81 FR 72069 (Oct. 19, 2016);</p>
                <p>•DHS/USCIS-018 Immigration Biometric and Background Check, 83 FR 36950 (July 31, 2018);</p>
                <p>•DHS/USCG-031 USCG Law Enforcement (ULE) System of Records, 81 FR 88697 (Dec. 8, 2016).</p>
                <p>Records from external Federal partners include information from the following non-DHS systems of records, last published at:</p>
                <p>•JUSTICE/INTERPOL-001 INTERPOL-United States National Central Bureau (USNCB) Records System, 75 FR 27821 (May 18, 2010) [Note: records shared with DHS include: law enforcement, intelligence, and national security records];</p>
                <p>•JUSTICE/DOJ-005 Nationwide Joint Automated Booking System, 72 FR 3410 (Jan. 25, 2007), 71 FR 52821 (Sept. 7, 2006);</p>
                <p>•JUSTICE/FBI-009 Next Generation Identification (NGI) System of Records, 82 FR 24151 (May 25, 2017);</p>
                <p>•JUSTICE/FBI-019 Terrorist Screening Records System of Records, 76 FR 77847 (Dec. 14, 2011);</p>
                <p>•A0025-2 SAIS DoD Defense Biometric Services, 74 FR 48237 (Sept. 22, 2009);</p>
                <p>•A0025-2 PMG (DFBA) DoD Defense Biometric Identification Records System, 80 FR 8292 (Feb. 17, 2015);</p>
                <p>•STATE-26 Passport Records, 76 FR 34966 (July 6, 2011);</p>
                <p>•STATE-36 Security Records, 83 FR 28058 (Jun. 15, 2018);</p>
                <p>•STATE-39 Visa Records, 83 FR 28062 (Jun 15, 2018).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To appropriate Federal, State, local, tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS identifies a need to use relevant data for purposes of testing new technology.</p>
                <p>J. To a Federal, state, tribal, local, international, or foreign government agency or entity in order to provide relevant information related to intelligence, counterintelligence, or counterterrorism activities authorized by U.S. law, Executive Order, or other applicable national security directive.</p>
                <p>K. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS stores records in this system electronically in secure facilities protected through multi-layer security mechanisms and strategies that are physical, technical, administrative, and environmental in nature. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>Records may be retrieved by select personal identifiers; primarily the FIN. The system also allows for queries based on other information in the system including but not limited to unique identification numbers.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>The transactional record systems retention schedule is currently in development with OBIM and will be submitted thereafter to NARA for approval.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>DHS will consider individual requests to determine whether or not information may be released. Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia under "FOIA Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about the individual maybe available under the Freedom of Information Act.</p>
                <p>When seeking records from this system of records or any other Departmental system of records, the request must conform with the Privacy Act regulations set forth in 6 CFR part 5. The individual must first verify his or her identity, meaning that he or she must provide his or her full name, current address, and date and place of birth. The individual must sign the request, and the signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                <p>•Explain why he or she believe the Department would have information being requested;</p>
                <p>•Identify which Component(s) of the Department he or she believes may have the information;</p>
                <p>•Specify when you believe the records would have been created; and</p>
                <p>•Provide any other information that will help the FOIA staff determine which DHS Component agency may have responsive records;</p>
                <p>If the request is seeking records pertaining to another living individual, the person seeking the records must include a statement from the subject individual certifying his/her agreement for the requestor to access his or her records.</p>
                <p>Without the above information, the Component(s) may not be able to conduct an effective search, and the request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered JRA records, see "Records Access Procedures" above, and 6 CFR part 5.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures."</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), and (e)(8); (f); and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5), has exempted this system from the following provisions of the Privacy Act, 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H); and (f).</p>
                <p>Exemptions from these particular subsections are justified on a case-by-case basis determined at the time a request is made. When this system receives a record from another system exempted in that source system under 5 U.S.C. 552a(j)(2), 5 U.S.C. § 552a(k)(1), (k)(2), and (k)(5), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claim any additional exemptions set forth here.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>Records in this System of Records were previously covered under DHS/US-VISIT-001 DHS Automated Biometric Identification System (IDENT), 72 Fed. Reg. 31080 (June 5, 2007) and DHS/NPPD/USVISIT-003 Technical Reconciliation Analysis Classification System (TRACS), 73 Fed. Reg. 116 (June 16, 2008).</p>
            </xhtmlContent>
        </subsection>
    </section>
    <section id="all44" toc="yes">
        <systemNumber>/ALL-044</systemNumber>
        <subsection type="systemName">
            Department of Homeland Security (DHS)/ALL-044 eRulemaking
                </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at the DHS Headquarters in Washington, D.C., and Component offices in DHS, in both Washington, D.C. and field offices. Records received through www.regulations.gov or uploaded to FDMS are retained at GSA Headquarters in Washington, D.C.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Associate General Counsel for Regulatory Affairs, dhsogcregulations@hq.dhs.gov, Department of Homeland Security, 2707 Martin Luther King Jr. Avenue, SE, Washington, D.C. 20528.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>Section 206(d) of the E-Government Act of 2002 (Pub. L. 107–347, 44 U.S.C. 3501 note); 5 U.S.C. § 553; 6 U.S.C. 101, et seq.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to permit members of the public to review and comment on DHS rulemakings and notices. DHS will use any submitted contact information to seek clarification of a comment, respond to a comment when warranted, and for such other needs as may be associated with the rule making or notice process.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>Any individual who provides personally identifiable information to DHS when commenting on a DHS rulemaking or notice and individuals mentioned or identified in the body of a comment.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p> Categories of records contained in eRulemaking include:</p>
                <p>•Name</p>
                <p>•Mailing Address</p>
                <p>•Email Address</p>
                <p>•Phone Number</p>
                <p>•Fax Number</p>
                <p>•Representative Name</p>
                <p>•Organization name</p>
                <p>•Additional information provided in the submitted comment and other supporting documentation provided in response to a DHS rulemaking or notice.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>DHS receives records from members of the public; representatives of Federal, state, or local governments; non-government organizations; and the private sector.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other Federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate Federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To the General Services Administration, as the system manager of FDMS, to provide technical or other administrative support.</p>
                <p>J. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS stores records in this system electronically or on paper in secure facilities. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>DHS may be retrieve records by keyword, document identification number, comment tracking number, document title, Code of Federal Regulation (CFR) (search for a specific title within the CFR), CFR citation (search for the part or parts within the CFR title being searched), document type, document sub type, date posted, and comment period end date.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>DHS retains records covered by the eRulemaking system in accordance with General Records Schedule (GRS) 4.2, Item 001, and 6.6, Item 30. Public comments received in response to a proposed SORN are destroyed three years after publication but may be kept longer if required for business use. Public comments received in response to a proposed rule are destroyed one year after publication of the final rule or decision to abandon publication but may be kept longer if required for business use.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p>The GSA information technology system that hosts regulations.gov and FDMS is in a facility protected by physical walls, security guards, and requires identification badges. Rooms housing the information technology system infrastructure are locked, as are the individual server racks. All security controls are reviewed on a periodic basis by external assessors. The controls themselves include measures for access control, security awareness training, audits, configuration management, contingency planning, incident response, and maintenance.</p>
                <p>Records in FDMS are maintained in a secure, password-protected electronic system that uses security hardware and software to include multiple firewalls, active intrusion detection, encryption, identification and authentication of users.</p>
                <p>DHS safeguards records maintained outside of FDMS and www.regulations.gov according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer or Component’s FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the JRA provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                <p>•Explain why he or she believes the Department would have information being requested;</p>
                <p>•Identify which component(s) of the Department he or she believes may have the information;</p>
                <p>•Specify when the individual believes the records would have been created; and</p>
                <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>None.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>None.</p>
            </xhtmlContent>
        </subsection>
    </section>
    <section id="all45" toc="yes">
        <systemNumber>/ALL-045</systemNumber>
        <subsection type="systemName">
            Department of Homeland Security (DHS)/ALL-045 Statistical Immigration Data Production and Reporting
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at the U.S. Citizenship and Immigration Services Headquarters on behalf of the Office of Immigration Statistics and at the Office of Immigration Statistics in Washington, D.C.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>The system manager is the Deputy Assistant Secretary, Office of Immigration Statistics, U.S. Department of Homeland Security, 2707 Martin Luther King Jr. Avenue SE, Washington, D.C., 20528.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>Section 103 of the Immigration and Nationality Act of 1965, as amended (8 U.S.C. 1103); Section 709 of the Homeland Security Act of 2002, as amended (6 U.S.C. 349(f)); Section 1092 of the National Defense Authorization Act for Fiscal Year 2017 (Pub. L. 114-328, Title X, Sec. 1092, December 23, 2016); 6 U.S.C. 223(f); Executive Order 13767, Border Security and Immigration Enforcement Improvements; and Executive Order 13768, Enhancing Public Safety in the Interior of the United States.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to support DHS/OIS in fulfilling its mandate to regularly prepare an extensive series of analytical and statistical reports on border security, immigration enforcement activities, refugee and asylum claims, and other immigration requests and events.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>Categories of individuals covered by this system include individuals and their dependents (and individuals acting on their behalf such as attorneys) interacting with the U.S. Government in its role of implementing and enforcing its immigration system and laws, including those who have applied for immigration requests or received immigration benefits, such as adjustment of status to lawful permanent resident, and those who are subject to immigration enforcement actions, including those arrested, detained, or removed from the United States for criminal or administrative violations of the Immigration and Nationality Act.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>•Alien Registration Number(s) (A-Number);</p>
                <p>•Receipt file number(s);</p>
                <p>•Full name and any aliases used;</p>
                <p>•Known or possible addresses;</p>
                <p>•United States destination address;</p>
                <p>•Phone numbers and email addresses;</p>
                <p>•Date of birth;</p>
                <p>•Place of birth (city, state, and country);</p>
                <p>•Countries of citizenship and nationality(ies);</p>
                <p>•Ethnic origin;</p>
                <p>•Languages spoken;</p>
                <p>•Religion;</p>
                <p>•Gender;</p>
                <p>•Marital and family status;</p>
                <p>•Place of marriage;</p>
                <p>•Government-issued identification (e.g., passport information, permanent resident card, Trusted Traveler Program card) and travel document information, such as document type, issuing country or entity, document number, and expiration date;</p>
                <p>•Arrival/Departure information (e.g., record number, expiration date, class of admission);</p>
                <p>•Federal Bureau of Investigation (FBI) Identification Number;</p>
                <p>•Fingerprint Identification Number or other biometric identifying numbers;</p>
                <p>•Digital fingerprints (i.e., numerical identification number);</p>
                <p>•Other unique identifying numbers (e.g., federal, state, local, and tribal identification numbers);</p>
                <p>•Detention data, including: location, facility, transportation information, identification numbers, book-in/book-out dates and times, custody recommendation, information about an alien’s release from custody on bond, recognizance, or supervision, information related to prosecutorial discretion determinations, and other alerts;</p>
                <p>•Immigration enforcement and court case-related data, including: descriptive information of events involving alleged law violations; arrests and charges; case number; status; record number; case category; proceedings and immigration judge decisions; schedule info; court appointments; bonds; motions; appeals; disposition; case agent; date initiated and completed;</p>
                <p>•Immigration status and history (e.g., citizenship/naturalization certificate number, removals, explanations);</p>
                <p>•Visa information;</p>
                <p>•Travel history;</p>
                <p>•Port(s) and clearance processing lane or location of crossing, secondary examination status, date(s) and time(s) of entry, status at entry(ies);</p>
                <p>•Carrier-related information, such as airline carrier code, flight number, vessel name and country of registry/flag, individual’s status on board the aircraft, and the location where passengers and crew members will undergo customs and immigration clearance by CBP;</p>
                <p>•Education history;</p>
                <p>•Occupation and employment history;</p>
                <p>•Professional accreditation information;</p>
                <p>•Criminal history;</p>
                <p>•Benefit case processing information, such as date applications were filed or received by USCIS, application/petition status, and fee receipt data;</p>
                <p>•Specific benefit eligibility information as required by the benefit being sought;</p>
                <p>•Claimed basis of eligibility for benefit(s) sought;</p>
                <p>•Notices and communications, including Appointment notices, Receipt notices, Requests for evidence, Notices of Intent to Deny (NOID), Decision notices and assessments, or proofs of benefit;</p>
                <p>•Information on preparers, representatives, and interpreters, including name, law firm/recognized organization, and physical and mailing addresses;</p>
                <p>•Electronic biographic information on individual applicants for admission to the United States as refugees, Special Immigrant Visa individuals electing resettlement benefits, and U.S.-based relatives, including: A-Number, name, date and place of birth, nationality, U.S. ties, resettlement agency, arrival date, relationship to principal applicant, and destination city and state; and</p>
                <p>•One-time person-level identifer created and used by OIS to link records across datasets each time the data are matched.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>Records are obtained from operational immigration Components within DHS, including U.S. Citizenship and Immigration Services (USCIS), U.S. Customs and Border Protection (CBP), U.S. Immigration and Customs Enforcement (ICE), as well as the Executive Office for Immigration Review (EOIR), within the Department of Justice (DOJ), and the Department of State (DOS). Source systems SORNs that cover these records in their native form include:</p>
                <p>•DHS/USCIS/ICE/CBP-001 Alien File, Index, and National File Tracking System of Records, 82 Fed. Reg. 43556 (September 18, 2017);</p>
                <p>•DHS/USCIS-010 Asylum Information and Pre-Screening System of Records, 80 Fed. Reg. 74781 (November 30, 2015);</p>
                <p>•DHS/USCIS-007 Benefits Information System, 84 Fed. Reg. 54622 (October 10, 2019);</p>
                <p>•DHS/CBP-007 Border Crossing Information, 81 Fed. Reg. 89957 (December 13, 2016);</p>
                <p>•DHS/CBP-023 Border Patrol Enforcement Records (BPER), 81 Fed. Reg. 72601 (October 20, 2016);</p>
                <p>•DHS/CBP-011 TECS, 73 Fed. Reg. 77778 (December 19, 2008);</p>
                <p>•DHS/ICE-011 Criminal Arrest Records and Immigration Enforcement Records (CARIER) System of Records, 81 Fed. Reg. 72080 (October 19, 2016);</p>
                <p>•EOIR-001 Records and Management Information System, 69 Fed. Reg. 26179 (May 11, 2004), and as amended by 82 Fed. Reg. 24147 (May 25, 2017); and</p>
                <p>•State-59 Refugee Case Records, 77 Fed. Reg. 5865 (February 6, 2012).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>H. To appropriate Federal Governmental agencies, with the approval of the Chief Privacy Officer, when OIS is aware of a need to use relevant data for purposes of testing new technology related to its own mission.</p>
                <p>I. To the Departments of Health and Human Services, Justice, Labor, and State, to support analytical, reporting, and statistical needs and mission related to immigration enforcement and benefits processing, provided that the records support DHS programs and activities that relate to the purpose(s) stated in this SORN, and that they will not be used in whole or in part in making any determination regarding an individual’s rights, benefits, or privileges under federal programs, and are not published publicly in any manner that identifies an individual.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/OIS stores records in this system electronically in secure facilities. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>OIS does not retrieve records by personal identifier for the purpose of making decisions about individuals. However, records are retrieved by a one-time person-level identifer created and used by OIS to link records across datasets each time the data are matched to ensure the data are correctly attributed to one individual across multiple datasets. The purpose of this is to enable OIS to examine large trends in groups or cohorts of those who interact with the immigration system. While these analyses will inform high-level strategic operational planning, data OIS possesses are not used directly for operational purposes, such as the vetting of an individual or the adjudication of a benefit. OIS data are strictly used for statistical analysis and reporting. However, records may be retrieved by any value or range of values of any field, including personal identifiers. Please see the categories of records section of this SORN for fields within this system of records.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>OIS has an established NARA-approved retention schedule, N1-563-09-3 (January 1, 2009), which classifies OIS records into several categories of records. Records containing PII that OIS uses to complete its statistical analyses and reporting fall into Section 6: "Research and background material used to produce the Yearbook of Immigration Statistics." The scheduled disposition provides for the data to be evaluated for remaining business need or destruction three years following the end of the fiscal year in which the yearbook is produced. However, the schedule authorizes longer retention periods if records are needed for business use beyond this period. Due to many tables in the Yearbook of Immigration Statistics and accompanying reports containing tabulations of ten years, the need in some cases for OIS to compare new records with records going back several decades, and the unknown nature of future requests and necessary future comparisons, a large portion of the data OIS maintains is kept for longer than three years.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>The Secretary of Homeland Security has exempted portions of this system from the notification, access, and amendment procedures of the Privacy Act, and the Judicial Redress Act if applicable. These exemptions apply to the extent that information in this system of records is recompiled or is created from information contained in other systems of records with appropriate exemptions in place. However, DHS/OIS will consider individual requests with the original data owner to determine whether or not information may be released. Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and Chief Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about an individual may be available under the Freedom of Information Act.</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                <p>•Explain why he or she believes the Department would have information being requested;</p>
                <p>•Identify which component(s) of DHS he or she believes may have the information;</p>
                <p>•Specify when the individual believes the records would have been created; and</p>
                <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If an individual’s request is seeking records pertaining to another living individual, the first individual must include a statement from the second individual certifying his/her agreement for the first individual to access his/her records.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered JRA records, see "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>Pursuant to 6 CFR Part 5, Appendix C, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(4), has exempted records created and aggregated by OIS in this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). When this system receives a record from another system exempted in that source system under 5 U.S.C. sec. 552a(j)(2) and (k)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>None.</p>
            </xhtmlContent>
        </subsection>
    </section>
    <section id="all46" toc="yes">
        <systemNumber>/ALL-046</systemNumber>
        <subsection type="systemName">
            U.S. Department of Homeland Security (DHS) DHS/ALL-046 Counterintelligence Program System of Records.
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified and Classified.</p>
            </xhtmlContent>
                </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p> Records are maintained at several DHS Headquarters and Component locations in Washington, D.C. and field offices.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Robert Hale, Assistant Director, Enterprise Program Management, (202) 447-3984, CI.Question@hq.dhs.gov, Counterintelligence Mission Center, Office of Intelligence and Analysis, U.S. Department of Homeland Security, Washington, D.C. 20528.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>Title II and Title VIII, section 892 of the Homeland Security Act of 2002, Public Law 107-296, 116 Stat. 2135 (Nov. 25, 2002), as amended (6 U.S.C. 121, et seq.); Executive Order 12333, United States Intelligence Activities, 46 Fed. Reg. 59941 (December 4, 1981), reprinted as amended in 73 Fed. Reg. 45325 (July 30, 2008); Executive Order 13526, Classified National Security Information, 75 Fed. Reg. 707 (January 5, 2010); Executive Order 13556, Controlled Unclassified Information, 75 Fed. Reg. 68675 (November 9, 2010); and Executive Order 13388, Further Strengthening the Sharing of Terrorism Information to Protect Americans, 70 Fed. Reg. 62023 (October 27, 2005).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p> The purpose of this system is to collect, store and maintain records related to, and in furtherance of, the counterintelligence collections and activities of the DHS CI Program. DHS will use this system to conduct administrative inquiries to identify, analyze, and neutralize foreign intelligence threats to DHS personnel, facilities, equipment, networks, information and activities; report on foreign contacts and travel, including briefings and debriefings; conduct counterintelligence investigative activities and produce intelligence on foreign intelligence entities; provide counterintelligence awareness training; and other activities relating to the DHS CI Program’s responsibilities.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                •	<p>Current and former DHS employees, contractors, consultants, detailees, interns, applicants for employment, and other individuals provided authorized access to DHS facilities, systems, or sensitive or classified information;</p>
                •	<p>Individuals who are known, reasonably believed to be, or are suspected of being, involved in or linked to:</p>
                •	<p>intelligence activities, or other individuals known or suspected of engaging in intelligence activities, on behalf of FIEs;</p>
                •	<p>officers or employees of, or otherwise acting for or on behalf of, a foreign government or element thereof, foreign organizations, or foreign persons;</p>
                •	<p>officers, employees, or members of an organization reasonably believed to be owned or controlled directly or indirectly by a foreign power; or</p>
                •	<p>clandestine intelligence activities, sabotage, assassinations, or international terrorist activities.</p>
                •	<p>Individuals reasonably believed to be targets, hostages, or victims of international terrorist organizations, transnational criminal organizations, or drug trafficking organizations;</p>
                •	<p>Individuals who are closely associated with the above categories (e.g., immediate family members, members of a household, business partners); and</p>
                •	<p>Individuals who voluntarily request assistance or information, through any means, from the DHS CI Program, or individuals who voluntarily provide information concerning any of the activities above, which may threaten or otherwise affect homeland security.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>The system may collect the following types of information if related to CI:</p>
                •	<p>Classified and unclassified intelligence (national intelligence, foreign intelligence, and counterintelligence), counterterrorism, homeland security, and related law enforcement information, including source records and the reporting and results of any analysis of this information, obtained from all agencies, components and organizations of the Federal government, including the IC; foreign governments, organizations or entities, and international organizations; State, local, tribal and territorial government agencies (including law enforcement agencies); and private sector entities;</p>
                •	<p>Information provided by record subjects and individual members of the public;</p>
                •	<p>Information obtained from the Terrorist Screening Center, the National Counterterrorism Center, or from other organizations about individuals known or reasonably suspected of being engaged in conduct constituting, preparing for, aiding, or relating to terrorism;</p>
                •	<p>Information obtained from the National Counterintelligence Security Center, the Federal Bureau of Investigation, or from other organizations about individuals known or reasonably suspected of being engaged in conduct associated with espionage, other intelligence activities, sabotage, or assassinations;</p>
                •	<p>Active and historical law enforcement investigative information;</p>
                •	<p>Information related to lawful DHS security investigations, including authorized physical, personnel, and communications security investigations, and information systems security analysis and reporting;</p>
                •	<p>Operational and administrative records, including correspondence records;</p>
                •	<p>Financial information, when relevant to an authorized intelligence, counterterrorism, homeland security, or related law enforcement activity;</p>
                •	<p>Public source data such as that contained in media, including periodicals, newspapers, broadcast transcripts, and other public reports and commercial databases;</p>
                •	<p>Publicly available social media handles and aliases, associated identifiable information, and search results; and</p>
                •	<p>Metadata, which may include but is not limited to transaction date, time, location, and frequency.</p>
                <p>Examples of information related to the "Categories of Individuals'' listed above may include:</p>
                •	<p>Individual’s name and alias(es);</p>
                •	<p>Date and place of birth;</p>
                •	<p>Gender;</p>
                •	<p>Country of citizenship;</p>
                •	<p>Country of nationality;</p>
                •	<p>Country of residence;</p>
                •	<p>A-Number(s);</p>
                •	<p>E-mail address;</p>
                •	<p>SSN;</p>
                •	<p>Vehicular information;</p>
                •	<p>Government issued identification information (i.e., passport, driver’s license),</p>
                o	<p>Document type;</p>
                o	<p>Issuing organization;</p>
                o	<p>Driver’s license;</p>
                o	<p>Document number; and</p>
                o	<p>Expiration date.</p>
                •	<p>Physical characteristics (height, weight, race, eye and hair color, ethnicity, identifying marks like tattoos or birthmarks);</p>
                •	<p>Biometric information (e.g., fingerprints, photographs) and other information used to conduct background and security checks;</p>
                •	<p>Physical and mailing addresses (to include U.S. and foreign);</p>
                •	<p>Phone and fax numbers (including mobile phone numbers);</p>
                •	<p>Records regarding organization membership(s) or affiliation(s);</p>
                •	<p>Employment history;</p>
                •	<p>Results from intelligence analysis related to counterintelligence;</p>
                •	<p>Background investigative reports and supporting documentation, including criminal background, medical, and financial data;</p>
                •	<p>Family relationships (e.g., parent, spouse, sibling, child, other dependents);</p>
                •	<p>Criminal history;</p>
                •	<p>Flight information;</p>
                •	<p>Border crossing information;</p>
                •	<p>Reports on foreign contacts;</p>
                •	<p>Records and information from government data systems or retrieved from commercial data providers in the course of intelligence research, analysis, and reporting;</p>
                •	<p>Immigration and visa information; and</p>
                •	<p>Investigative files containing allegations and complaints; witness statements; transcripts of electronic monitoring; subpoenas and legal opinions and advice; reports of investigation; reports of criminal, civil, and administrative actions taken as a result of the investigation; and other relevant evidence; handwriting exemplars, laboratory analyses of inks and papers; handwriting analyses; information, reports or opinions from the forensic examination of documentary and digital media evidence; polygraph case files; search warrants and search warrant returns; indictments; certified inventories of property held as evidence; sworn and unsworn witness statements; state, local, and foreign criminal investigative information and reports; names and telephone numbers of individuals intercepted by electronic, mechanical, or other device under the provisions of 18 U.S.C. sec. 2510 et seq compiled during the lawful course of a criminal or civil investigation.</p>
                <p>Records will also include those relating to:</p>
                •	<p>management and coordination of DHS counterintelligence systems and activities;</p>
                •	<p>analytical, operational, biographic, policy, management, training, administrative matters and operational support related to DHS counterintelligence, force protection, critical infrastructure protection, research and technology protection, threat analysis, counter-narcotics and risk assessments; and</p>
                •	<p>architecture and operation of DHS counterintelligence information systems.</p>
                •	<p>reports of investigation, collection, statements of individuals, affidavits, correspondence, and other documentation pertaining to investigative or analytical efforts by DHS and other U.S. government agencies to identify or counter foreign intelligence and international terrorist threats to DHS and to the United States.</p>
                •	<p>records maintained in ad hoc or temporary databases established to support certain investigations, task forces or analytical projects.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>Federal, state, local, territorial, tribal, or other domestic agencies, foreign agencies, multinational or non-governmental organizations, critical infrastructure owners and operators, private sector entities and organizations, individuals, commercial data providers, and public sources such as social media, news media outlets, and the Internet.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office with information from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate Federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To representatives of the Department of Justice and other U.S. Government entities, to the extent necessary to obtain their advice on any matter that is within their official responsibilities, authorities, and missions, in order to provide support to DHS’s CI Program and the purposes of this system.</p>
                <p>J. To any Federal, state, local, tribal, territorial, foreign, or multinational government or agency, or appropriate private sector individuals and organizations, with responsibilities relating to homeland security, including responsibilities to counter, deter, prevent, prepare for, respond to, or recover from a natural or manmade threat, including an act of terrorism, or to assist in or facilitate the coordination of homeland security threat awareness, assessment, analysis, deterrence, prevention, preemption, and response.</p>
                <p>K. To a Federal, state, local, tribal, or territorial government or agency lawfully engaged in the collection of intelligence (including national intelligence, foreign intelligence, and counterintelligence), counterterrorism, homeland security, law enforcement or law enforcement intelligence, and other information, when disclosure is undertaken for intelligence, counterterrorism, homeland security, or related law enforcement purposes, as authorized by U.S. Law or Executive Order, and in accordance with applicable disclosure policies.</p>
                <p>L. To any other agency within the Intelligence Community, as defined in Executive Order 12333, as amended, for the purpose of allowing that agency to determine whether the information is relevant and necessary to its mission-related responsibilities and in accordance with that agency’s classified or unclassified implementing procedures promulgated pursuant to such orders and directives, or any other statute, Executive Order or directive of general applicability.</p>
                <p>M. To a Federal, state, local, tribal, territorial, foreign, or multinational government or agency, or other entity, including, as appropriate, certain private sector individuals and organizations, when disclosure is in furtherance of the CI Program and DHS information sharing responsibilities under the Homeland Security Act of 2002, as amended, the Intelligence Reform and Terrorism Prevention Act of 2004, the National Security Act of 1947, as amended, Executive Order 12333, as amended, or any successor order, national security directive, intelligence community directive, other directive applicable to DHS, and any classified or unclassified implementing procedures promulgated pursuant to such orders and directives, or any other statute, Executive Order or directive of general applicability, and where such disclosure is otherwise compatible with the purpose for which the record was originally acquired or created by DHS.</p>
                <p>N. To an appropriate Federal, State, local, tribal, territorial, foreign, or international agency, if the information is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant or other benefit and when disclosure is appropriate to the proper performance of the official duties of the person making the request.</p>
                <p>O. To the President's Foreign Intelligence Advisory Board, the Intelligence Oversight Board, any successor organizations, and any intelligence oversight entities established by the President, when disclosure will assist these entities in the performance of their oversight functions.</p>
                <p>P. To foreign persons or foreign government agencies, international organizations, and multinational agencies or entities, under circumstances or for purposes mandated or imposed by Federal statute, treaty, or other international agreement or arrangement.</p>
                <p>Q. To any individual, organization, or entity, as appropriate, to notify them of a serious threat to homeland security for the purpose of guarding them against or responding to such a threat, or when there is a reason to believe that the recipient is or could become the target of a particular threat, to the extent the information is relevant to the protection of life, health, or property.</p>
                <p>R. To any Federal government agency when documents or other information obtained from that agency are used in compiling the particular record, the record is also relevant to the official responsibilities of that agency, and there otherwise exists a need for that agency to know the information in the performance of its official functions.</p>
                <p>S. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p> Records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>Records may be retrieved by an individual's name or other identifier, including unique identifying numbers assigned by DHS or other government agencies.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>Records are retained and disposed of in accordance with approved records retentions schedules. Records on U.S. Persons, as defined in Executive Order 12333, are retained so long as there is a mission need, in accordance with N1-563-09-7-1. If DHS determines that U.S. Person record meets the two-part test, as described in N1-563-09-7-1, the records must be reviewed annually to determine whether there is still a mission need to retain the information. The majority of the DHS CI Program has 180 days from the date U.S. Person information is first collected to determine whether it meets the two-part test.</p>
                <p>The exception is USCG, where, pursuant to COMDTINST M3820.12, "Coast Guard Intelligence Activities", USCG originators of intelligence products have 90 days from the date of collection of USPER data to determine whether the information may be permanently retained within the USCG authorized procedures. USCG is working to update this instruction, and under the new version, will be permitted up to 5 years to determine if the USPER data may be permanently retained. At the anniversary date (or any time beforehand) a record is first certified as U.S. Person information can be reviewed and certified that there is still a mission need to retain the information. The anniversary date will then be set for an additional year out. This can go on for as long as the information is deemed necessary for the mission. Once certification has been removed, such records are temporary and must be destroyed and deleted immediately upon removal of certification. Certified and categorized records reaching the expiration date without review/renewal one year from date of categorization are temporary and must be destroyed and deleted upon that one-year cutoff. Finally, uncategorized records that do not meet the required two-part test are temporary and must be destroyed and deleted within 180 days (90 days for USCG) from the date the information is collected.</p>
                <p>Interception, Monitoring and Recording of Wire and Oral Communication Records are retained in accordance with N1-563-08-5, and are temporary. Records are cutoff at the end of the calendar year in which the record was created, and are destroyed 10 years after cutoff.</p>
                <p>Clip Reports are non-records, and are destroyed or deleted when no longer needed for reference.</p>
                <p>Finished Intelligence Case Files are retained in accordance with N1-563-07-16-4, and are permanent. Records cutoff date is at the end of the calendar year in which the case is closed and are transferred to the National Archives for permanent retention 20 years after such cutoff date.</p>
                <p>Raw Reporting Files are retained in accordance with N1-563-07-16-3, and are temporary. Records cutoff date is at end of calendar year such records are collected and are destroyed or deleted 30 years after such cutoff date.</p>
                <p>Counterintelligence Case Files are retained in accordance with N1-563-08-4-1, and are temporary. Records cutoff date is the end of the fiscal year of when the case has been closed and are destroyed 20 years after such cutoff date.</p>
                <p>Non-Referral Files are retained in accordance with N1-563-08-4-3, and are temporary. Records are destroyed when 5 years old from first collected.</p>
                <p>Certification File records are retained in accordance with N1-563-08-11-1, and are temporary. Records cutoff date is the end of the calendar year in which certification was received. Records are to be destroyed when 10 years old or 10 years after completion of a specific training program or upon separation or transfer of employee, whichever is sooner.</p>
                <p>Mission-Related Training records are retained in accordance with N1-563-08-11-2, and are temporary. Records cutoff date is at the end of the calendar year in which course or material is superseded and are destroyed or deleted 30 years after cutoff date.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>As described below, this system of records is exempt from the notification, access, and amendment provisions of the Privacy Act, and the Judicial Redress Act if applicable. However, DHS will consider individual requests to determine whether or not information may be released. Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the FOIA Officer for the Office of Intelligence and Analysis, whose contact information can be found at http://www.dhs.gov/foia under "Contacts Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, U.S. Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provides a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under Title 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                •	<p>Explain why he or she believes the Department would have information being requested;</p>
                •	<p>Identify which component(s) of the Department he or she believes may have the information;</p>
                •	<p>Specify when the individual believes the records would have been created; and</p>
                •	<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p> For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8), (e)(12); (f); and (g)(1). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). When this system receives a record from another system exempted in that source system under Title 5 U.S.C. 552a(j)(2), 5 U.S.C. § 552a(k)(1), (k)(2), and (k)(5), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p> None.</p>
                <p>*****</p>
            </xhtmlContent>
        </subsection>
    </section>

    <section id="all47" toc="yes">    
<systemNumber>/ALL-047</systemNumber>
<subsection type="systemName">
            <p> U.S. Department of Homeland Security (DHS)/ALL-047 Records Related to DHS Personnel, Long-Term Trainees, Contractors, Mission Support Individuals, and Visitors During a Declared Public Health Emergency System of Records.</p>
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified.</p>
                </xhtmlContent>
    </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at the DHS Headquarters and Component offices in Washington, D.C. and field offices, and contractor-owned and operated facilities.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Chief, Medical Quality &amp;amp;amp;amp;amp;amp; Risk Reduction Branch, Workforce Health and Safety, Office of the Chief Human Capital Officer, U.S. Department of Homeland Security, OCHCOPrivacyOfficer@hq.dhs.gov.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>Section 319 of the Public Health Service (PHS) Act (42 U.S.C. sec. 274d); Coronavirus Aid, Relief, and Economic Security (CARES) Act, Pub. L. No. 116-136, Div. B., Title VIII, sec. 18115, 134 Stat. 574 (codified in 42 U.S.C. sec. 274d note); DHS Chief Medical Officer’s authorities pursuant to 6 U.S.C. sec. 350 and 6 U.S.C. sec. 597; 6 U.S.C. sec. 464; 21 U.S.C. sec. 360bbb-3; 40 U.S.C. sec. 1315; American with Disabilities Act, including 42 U.S.C. sec. 12112(d)(3)(B), 29 CFR 602.14, 1630.2(r), 1630.14(b)(1), (c)(1), (d)(4); Medical Examinations for Fitness for Duty Requirements, including 5 CFR Part 339; Workforce safety federal requirements, including the Occupational Safety and Health Act of 1970, Executive Order 12196, 5 U.S.C. sec. 7902; 29 U.S.C. Chapter 15 (e.g., 29 U.S.C. sec. 668), 29 CFR Part 1904, 29 CFR 1910.1020, and 29 CFR 1960.66; Genetic Information Nondiscrimination Act of 2008, 42 U.S.C. secs. 2000ff to ff-11, and 29 CFR Part 1635; and United States Coast Guard authorities, including 10 U.S.C. Subtitle A, Part II, Chapter 55, Medical and Dental Care, as applicable, 14 U.S.C. sec. 504(a)(17), 14 U.S.C. sec. 936, 14 U.S.C. sec. 3705, 42 U.S.C. sec. 253, 32 CFR Part 199, and 42 CFR 31.2 - 31.10.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to maintain records to protect the Department’s workforce and respond to a declared public health emergency. For instance, DHS may use the information collected to conduct contact tracing (i.e., the subsequent identification, monitoring, and support of a confirmed or probable case’s close contacts who have been exposed to, and possibly infected with, the disease or illness at or on buildings, grounds, and properties that are owned, leased, or used by DHS); institute preventative testing to permit entry to buildings, grounds, and properties that are owned, leased, or used by DHS to minimize exposure; and fulfill testing reporting requirements, to the extent permitted by law.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>Department personnel (including employees, detailees, interns, and volunteers), long-term trainees (such as Federal Law Enforcement Training Centers (FLETC) students), contractors, mission support individuals, and visitors (all other federal employees, applicants, and members of the public) at or on buildings, grounds, and properties that are owned, leased, or used by DHS who are suspected or confirmed to have a disease or illness that is the subject of a declared public health emergency, or may have been or could have been exposed to someone who is suspected or confirmed to have a disease or illness that is the subject of a declared public health emergency, or who must undergo preventative testing for a disease or illness that is the subject of a declared public health emergency as a requirement of federal, state, or local public health orders.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>For DHS personnel, long-term trainees, contractors, and mission support individuals, the following information may be collected:</p>
                <p>•  Individual’s full name;</p>
                <p>•  Preferred phone number(s);</p>
                <p>•  DHS duty location, facility, and specific work space accessed;</p>
                <p>•  Preferred email address(es);</p>
                <p>•  Individual’s supervisor’s name, address, and contact information, and/or the contractor’s supervisor/contracting officer representative name, address, and contact information;</p>
                <p>•  Date(s) and circumstances of the individual’s suspected or actual exposure to disease or illness including symptoms, as well as locations within DHS workplace where an individual may have contracted or been exposed to the disease or illness; and names and contact information of other employees, long-term trainees, contractors, mission support individuals, or visitors that the individual interacted with at or on a DHS workspace, facility, or grounds during time the individual was suspected to or had contracted the disease or illness;</p>
                <p>•  Current work status of the individual (e.g., administrative leave, sick leave, teleworking, in the office, deployed to the field) and affiliated leave status information;</p>
                <p>•  Other individual information directly related to the disease or illness (e.g., testing results/information, symptoms, treatments (e.g., vaccines), source of exposure);</p>
                <p>•  Other information for verification purposes when disclosed to third-parties; and</p>
                <p>•  Information collected in accordance with CARES Act reporting requirements or other HHS statutory, regulatory, and administrative reporting requirements.</p>
                <p>For visitors at or on buildings, grounds, and properties that are owned, leased, or used by DHS, the following information may be collected:</p>
                <p>•  Full name;</p>
                <p>•  Preferred phone number(s);</p>
                <p>•  Preferred email address(es);</p>
                <p>•  Date(s) and time(s) of entrance and exit from DHS workspaces, facilities, and grounds;</p>
                <p>•  Name(s) of all individuals encountered while in or at DHS workspaces, facilities, and grounds.</p>
                <p>•  Information indicating plans on entering a DHS workspace, facility, or grounds in the near future; and</p>
                <p>•  Other records covered by DHS/ALL-024 Facility and Perimeter Access Control and Visitor Management System of Records (75 FR 5609, February 3, 2010) that are relevant and necessary to achieve the purpose of this SORN.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>When permitted by applicable law, records may be obtained from DHS personnel, long-term trainees, contractors, mission support individuals, and visitors at or on buildings, grounds, and properties that are owned, leased, or used by DHS; their family members; federal, state, local, tribal, territorial, and foreign government agencies; employers and other entities and individuals who may provide relevant information on a suspected or confirmed disease or illness that is the subject of a declared public health emergency.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows, to the extent permitted by other applicable laws as described herein:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agency conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. sec. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the federal government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the federal government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>H. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, to the extent permitted by law, and in consultation with DHS legal counsel, for the purpose of protecting the vital interests of a data subject or other persons, including to assist such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to combat other significant public health threats; appropriate notice will be provided of any identified health risk.</p>
                <p>I. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS's officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
                </xhtmlContent>
    </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media. Medical information collected is maintained on separate forms and in separate medical files and are treated as a confidential medical record.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>DHS may retrieve records by any of the categories of records, including name, location, testing ID number, date of exposure, or work status.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>DHS is in the process of developing a records schedule for declared public health emergency records. However, to the extent applicable, to ensure compliance with Americans with Disabilities Act (ADA), the Rehabilitation Act, and the Genetic Information Nondiscrimination Act of 2008 (GINA), medical information must be "maintained on separate forms and in separate medical files and be treated as a confidential medical record." 42 U.S.C. sec. 12112(d)(3)(B); 42 U.S.C. sec 2000ff-5(a); 29 CFR 1630.14(b)(1), (c)(1), (d)(4)(i); and 29 CFR 1635.9(a). This means that medical information and documents must be stored separately from other personnel records. As such, the Department must keep medical records for at least one year from creation date. 29 CFR 1602.14. Further, any records compiled under this SORN and incorporated into an occupational individual medical case record pursuant to the OSH Act must be maintained in accordance with 5 CFR Part 293.511(b) and 29 CFR 1910.1020(d), and must be destroyed 30 years after employee separation or when the Official Personnel Folder (OPF) is destroyed, whichever is longer, in accordance with NARA General Records Schedule (GRS) 2.7, Item 60, and NARA records retention schedule DAA-GRS-2017-0010-0009, to the extent applicable. Visitor processing records are covered by GRS 5.6, Items 110 and 111, and must be destroyed when either two or five years old, depending on security level, but may be retained longer if required for business use, pursuant to DAA-GRS-2017-0006-0014 and -0015.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p>DHS safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer or the appropriate Headquarters or component’s FOIA Officer whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, U.S. Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                • 	<p>Explain why he or she believes the Department would have information being requested;</p>
                • 	<p>Identify which component(s) of the Department he or she believes may have the information;</p>
                • 	<p>Specify when the individual believes the records would have been created; and</p>
                • 	<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>None.</p>

                <p>HISTORY:</p>
                <p>85 Fed. Reg. 45914 (July 30, 2020).</p>
                           </xhtmlContent>
        </subsection>
    </section>



<section id="cbp1" toc="yes">
<systemNumber>/CBP-001</systemNumber>
<subsection type="systemName">Import Information System.</subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p> Unclassified. The data may be retained on the classified networks but this does not change the nature and character of the data until it is combined with classified information.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p> DHS/CBP maintains records in the operational information technology (IT) system at the DHS/CBP Headquarters in Washington, D.C. and field offices. DHS/CBP also replicates records from the operational system and maintains them on other unclassified and classified systems and networks.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
            <p> Categories of individuals in this system include members of the public involved in the importation of merchandise and international trade, such as importers, brokers, carriers, manufacturers, shippers, consignees, cartmen/lightermen, filers, sureties, facility operators, foreign trade zone operators, drivers/crew, attorneys/consultants, and agents, in addition to persons required to file Customs Declarations for international mail transactions (including sender and recipient).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p>
                Information maintained by ACE as part of the <i>user account creation process</i> includes:
            </p>
            <p>Account Information – Including Name of Company, Name of Company Officer, Title of Company Officer, Company Organization Structure, and Officer’s Date of Birth (optional). For Operators, this information must match the name on the company’s bond.</p>
            <p>o Account Owner Information – Name, Application Data, E-mail, Date of Birth, Country, Address, and Business Phone Number.</p>
            <p>o Legal Entity Information – Name, Application Data, E-mail, Country, Address, and Business Phone Number.</p>
            <p>o Point of Contact Information – Name, Application Data, E-mail, Country, Date of Birth, Address, and Business Phone Number.</p>
            <p>Business Activity Information – Depending on the account type being established, CBP requires the following identifying information to set up an ACE portal account. Users are limited to a single identification number for the portal account being requested with the exception of: importer, broker, filer, software vendor, service bureau, port authority, preparer, or surety agent, which can use up to three identifying numbers for each portal view:</p>
            <p>o Importer/Broker/Filer/Surety – Importer Record Number; Filer Code; Taxpayer Identification Number (TIN) [e.g., Internal Revenue Service (IRS) Employer Identification Number (EIN)/Social Security number (SSN)]; Surety Code.</p>
            <p>o Service Provider – Standard Carrier Alpha Code (SCAC) or Filer Code; EIN/SSN.</p>
            <p>o Operator – EIN/SSN; Bond Number; Facilities Information and Resources Management System (FIRMS) Code; Zone Number; Site Number. Operators must also note whether their background investigation has been completed by CBP, and whether their fingerprints are on file with CBP.</p>
            <p>o Cartman/Lighterman – Cartman/Lighterman Identification Number; Customhouse License (CHL) Number; Passport Number; Country of Issuance; Date of Expiration; U.S. Visa Number; Birth Certification Number; Permanent Resident Card Number; Certificate of Naturalization; Certificate of U.S. Citizenship; Re-entry Permit Number (I-327); Refugee Permit Number; Other Identification (such as Military Dependent’s Card, Temporary Resident Card, Voter Registration Card). A Cartman/Lighterman must also note whether his or her background investigation has been completed by CBP, and whether his or her fingerprints are on file with CBP.</p>
            <p>o Carriers – SCAC; Bond Numbers; Importer Record for Type 2 Bond (if applicable).</p>
            <p>o Drivers/Crew – Commercial Driver License (CDL) Number; State/Province of Issuance; Country; whether the Driver has an Enhanced CDL or is HAZMAT endorsed; Full Name; Date of Birth; Gender; Citizenship; Travel Documentation (and Country of Issuance) such as: Passport Number or Permanent Resident Card; or other type of identification including: SENTRI Card; NEXUS ; U.S. Visa (non-immigrant or immigrant); Permanent Resident Card; U.S. Alien Registration Card; U.S. Passport Card; DHS Refugee Travel Document; DHS Re-Entry Permit; U.S. Military ID Document; or U.S. Merchant Mariner Document.</p>
            <p>
                Information maintained by ACE as part of the <i>trade facilitation process</i> includes:
            </p>
            <p>Filer Information</p>
            <p>o Importer of Record Name and Address – The name and address, including the standard postal two-letter state or territory abbreviation, of the importer of record. The importer of record is defined as the owner or purchaser of the goods, or when designated by the owner, purchaser, or consignee, a licensed customs broker. The importer of record is the individual or firm liable for payment of all duties and meeting all statutory and regulatory requirements incurred as a result of importation, as described in 19 CFR. sec. 141.1(b).</p>
            <p>o Consignee Number – IRS EIN, SSN, or CBP-assigned number of the consignee. This number must reflect a valid identification number filed with CBP via the CBP Form 5106 or its electronic equivalent.</p>
            <p>o Importer Number – The IRS EIN, SSN, or CBP-assigned number of the importer of record.</p>
            <p>o Reference Number – The IRS EIN, SSN, or CBP-assigned number of the individual or firm to whom refunds, bills, or notices of extension or suspension of liquidation are to be sent (if other than the importer of record and only when a CBP Form 4811 is on file).</p>
            <p>o Ultimate Consignee Name and Address – The name and address of the individual or firm purchasing the merchandise or, if a consigned shipment, to whom the merchandise is consigned.</p>
            <p>o Broker/Filer Information – A broker or filer name, address, and phone number.</p>
            <p>o Broker/Importer File Number – A broker or importer internal file or reference number.</p>
            <p>o Bond Agent Information – Bond agent name, SSN or a surety-created identification, and surety name.</p>
            <p>o Declarant Name, Title, Signature, and Date – The name, job title, and signature of the owner, purchaser, or agent who signs the declaration. The month, day, and year when the declaration was signed.</p>
            <p>o Importer Business Description – Including the Importer Dun &amp;amp;amp;amp;amp;amp; Bradstreet (DUNS) Number and the North American Industry Classification System (NAICS) number for Importer Business.</p>
            <p>o Senior Officers of the Importing Company – Information pertaining to Senior Officers of the Importing Company with an importing or financial role in trade transactions: Position title; Name (First, Middle, Last); Business Phone; SSN (Optional); Passport Number (Optional); Passport Country of Issuance (Optional).</p>
            <p>o Additional Data Elements – Filers may, on their own initiative, provide additional or clarifying information on the form provided such additional information does not interfere with the reporting of those required data elements.</p>
            <p>•Supply Chain Information</p>
            <p>o Manufacturer Information:</p>
            <p>•Manufacturer (or supplier) name;</p>
            <p>•Manufacturer (or supplier) address;</p>
            <p>•Foreign manufacturer identification code and/or shipper identification code;</p>
            <p>•Foreign manufacturer name and/or shipper name; and</p>
            <p>•Foreign manufacturer address and/or shipper address.</p>
            <p>o Carrier Information:</p>
            <p>•Importing Carrier – For merchandise arriving in the United States by vessel, CBP records the name of the vessel that transported the merchandise from the foreign port of lading to the first U.S. port of unlading.</p>
            <p>Vessel Identifier Code;</p>
            <p>•Vessel Name;</p>
            <p>•Carrier Name;</p>
            <p>•Carrier Address;</p>
            <p>•Carrier codes (non-SSN) (Standard Carrier Agent Code (SCAC) for vessel carriers, International Air Transport Association (IATA) for air carriers);</p>
            <p>Department of Transportation (DOT) number,</p>
            <p>Tax Identification Number;</p>
            <p>DUNS;</p>
            <p>Organizational structure; and</p>
            <p>Insurance information including name of insurer, policy number, date of issuance, and amount.</p>
            <p>The carrier can create users and points of contact, and may also choose to store details associated with the driver and crew, conveyance, and equipment for purposes of expediting the creation of manifests.</p>
            <p>•Mode of Transport – The mode of transportation by which the imported merchandise entered the U.S. port of arrival from the last foreign country. The mode of transport may include vessel, rail, truck, air, or mail.</p>
            <p>•Export Date – The month, day, and year on which the carrier departed the last port (or airport, for merchandise exported by air) in the exporting country.</p>
            <p>o Liquidator identification (non-SSN);</p>
            <p>o Seller (full name and address or a widely accepted industry number such as a DUNS number);</p>
            <p>o Buyer (full name and address or a widely accepted industry number such as a DUNS number);</p>
            <p>o Ship to party name;</p>
            <p>o Consolidator (stuffer);</p>
            <p>o Foreign trade zone applicant identification number;</p>
            <p>o Country of origin;</p>
            <p>o Commodity Harmonized Tariff Schedule of the United States (HTSUS) number;</p>
            <p>o Booking party; and</p>
            <p>o Other identification information regarding the party to the transaction.</p>
            <p>Crewmember/Passenger Information</p>
            <p>o Carrier Information (including vessel flag and vessel name, date of arrival, and port of arrival (CBP Form 5129));</p>
            <p>o Person on arriving conveyance who is in charge;</p>
            <p>o Names of all crew members and passengers;</p>
            <p>o Date of birth of each crew member and passenger;</p>
            <p>o Commercial driver license (CDL)/driver license number for each crew member;</p>
            <p>o CDL state or province of issuance for each crew member;</p>
            <p>o CDL country of issuance for each crew member;</p>
            <p>o Travel document number for each crew member and passenger;</p>
            <p>o Travel document country of issuance for each crew member and passenger;</p>
            <p>o Travel document for state/province of issuance for each crew member and passenger;</p>
            <p>o Travel document type for each crew member and passenger;</p>
            <p>o Address for each crew member and passenger;</p>
            <p>o Gender of each crew member and passenger;</p>
            <p>o Nationality/citizenship of each crew member and passenger; and</p>
            <p>o HAZMAT endorsement for each crew member.</p>
            <p>Federal Employee Information (including CBP and PGA employees)</p>
            <p>o CBP employee names;</p>
            <p>o CBP employee hash identification, SSN, or other employee identification number; and</p>
            <p>o Federal Government employee names, work addresses, work phone numbers, and ACE identification if already an ACE-ITDS user.</p>
            <p>Manifest Information</p>
            <p>o Bill of Lading (B/L) or Air Waybill (AWB) Number – The number assigned on the manifest by the international carrier delivering the goods to the United States.</p>
            <p>o Immediate Transportation Number – The Immediate Transportation number obtained from the CBP Form 7512, the AWB number from the Transit Air Cargo Manifest (TACM), or Automated Manifest System (AMS) master in-bond (MIB) movement number.</p>
            <p>o Immediate Transportation Date – The month, day, and year obtained from the CBP Form 7512, TACM, or AMS MIB record. Note that Immediate Transportation date cannot be prior to import date.</p>
            <p>o Missing Documents – Codes that indicate which documents are not available at the time of filing the entry summary.</p>
            <p>o Foreign Port of Lading – The five digit numeric code listed in the "Schedule K" (Classification of Foreign Ports by Geographic Trade Area and Country) for the foreign port at which the merchandise was actually laden on the vessel that carried the merchandise to the United States. </p>
            <p>o U.S. Port of Unlading – The U.S. port code where the merchandise was unladen (or, delivered) from the importing vessel, aircraft, or train.</p>
            <p>o Location of Goods/General Order (GO) Number – Also known as a "container stuffing location," the pier or site where the goods are available for examination. For air shipments, this is the flight number.</p>
            <p>CBP Generated Records</p>
            <p>o Entry Number – The entry number is a CBP-assigned number that is unique to each Entry Summary (CBP Form 7501).</p>
            <p>o Entry Type – Entry type denotes which type of entry summary is being filed (i.e., consumption, information, and warehouse). The sub-entry type further defines the specific processing type within the entry category (i.e., free and dutiable, quota/visa, anti-dumping/countervailing duty, and appraisement). </p>
            <p>o Summary Date – The month, day, and year on which the entry summary is filed with CBP. The record copy of the entry summary will be time stamped by the filer at the time of presentation of the entry summary. Use of this field is optional for ABI statement entries. The time stamp will serve as the entry summary date. The filer will record the proper team number designation in the upper right portion of the form above this block (three-character team number code). </p>
            <p>o Port Code – The port is where the merchandise was entered under an entry or released under an immediate delivery permit. CBP relies on the U.S. port codes from Schedule D, Customs District and Port Codes, listed in Annex C of the Harmonized Tariff Schedule (HTS).</p>
            <p>o Entry Date – The month, day, and year on which the goods are released, except for immediate delivery, quota goods, or when the filer requests another date prior to release.  It is the responsibility of the filer to ensure that the entry date shown for entry/entry summaries is the date of presentation (i.e., the time stamp date). The entry date for a warehouse withdrawal is the date of withdrawal.</p>
            <p>o Manufacturer ID – This code identifies the manufacture/shipper of the merchandise by a CBP-constructed code. The manufacturer/shipper identification code is required for all entry summaries and entry/entry summaries, including informal entries, filed on the CBP Form 7501.</p>
            <p>o Notes – Notations and results of examinations and document review for cleared merchandise.</p>
            <p>o Trade violation statistics.</p>
            <p>o Protest and appeal decision case information.</p>
            <p>Surety and Bond Information</p>
            <p>o Surety Information – Full legal name of entity, address.</p>
            <p>o Surety Number – A three-digit numeric code that identifies the surety company on the Customs Bond. This code can be found in block 7 of the CBP Form 301, or is available through CBP’s automated system to ABI filers, via the importer bond query transaction.</p>
            <p>o Bond Type – A three-digit numeric code identifying the following type of bond: U.S. Government or entry types not requiring a bond; Continuous; or Single Transaction.</p>
            <p>o Additional Bond Information – All authorized users of bond, bond expiration date.</p>
            <p>•Merchandise-Specific Information</p>
            <p>o Line Number – A commodity from one country, covered by a line which includes a net quantity, entered value, HTS number, charges, rate of duty and tax.</p>
            <p>o Description of Merchandise – A description of the articles in sufficient detail (i.e., gross weight, manifest quantity, net quantity in HTS units, U.S. dollar value, all other charges, costs, and expenses incurred while bringing the merchandise from alongside the carrier at the port of exportation in the country of exportation and placing it alongside the carrier at the first U.S. port of entry).</p>
            <p>o License Numbers – For merchandise subject to agriculture licensing.</p>
            <p>o Country of Origin – The country of origin is the country of manufacture, production, or growth of any article. When merchandise is invoiced in or exported from a country other than that in which it originated, the actual country of origin shall be specified rather than the country of invoice or exportation.</p>
            <p>o Import Date – The month, day, and year on which the importing vessel transporting the merchandise from the foreign country arrived within the limits of the U.S. port with the intent to unlade.</p>
            <p>o Exporting Country – The country of which the merchandise was last part of the commerce and from which the merchandise was shipped to the United States.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="authorityForMaintenance">
        <xhtmlContent>
            <p> 19 U.S.C. secs. 66, 1431, 1448, 1481, 1484, 1505, 1514, 1624, and 2071 note; 26 U.S.C. sec. 6109(d); 31 U.S.C. sec. 7701(c); sec. 203 of the Security and Accountability for Every (SAFE) Port Act of 2006 and sec. 343(a) of the Trade Act of 2002, as amended by the Maritime Transportation Security Act of 2002; title 19 of the Code of Federal Regulations, including 19 CFR 24.5, 149.3, 101.9, and 103.31(e).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p> This system of records allows DHS/CBP to collect and maintain records on all commercial goods imported into the United States, along with carrier, broker, importer, and other ACE-ITDS Portal user account and manifest information. The purpose of this system of records is to track, control, and process all commercial goods imported into the United States. This facilitates the flow of legitimate shipments, and assists DHS/CBP in securing U.S. borders and targeting illicit goods. The IIS covers two principle information technology systems: the Automated Commercial System (ACS) and ACE-ITDS. The Automated Commercial System employs multiple modules to receive data transmissions from a variety of parties involved in international commercial transactions and provides DHS/CBP with the capability to track both the transport transactions and the financial transactions associated with the movement of merchandise through international commerce. The ACE-ITDS modernizes and enhances trade processing with features that will consolidate and automate border processing. The ACE-ITDS serves three sets of core stakeholders: the internal DHS/CBP users, PGAs, and the trade community in the movement of merchandise through international commerce.</p>
            <p> DHS/CBP maintains a replica of some or all of the data in the operating system on other unclassified and classified systems and networks to allow for analysis and vetting consistent with the above stated purposes and this published notice.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p> In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
            <p> A. To the Department of Justice (DOJ), including Offices of the United States Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
            <p>  1. DHS or any Component thereof;</p>
            <p>  2. Any employee or former employee of DHS in his or her official capacity;</p>
            <p>  3. Any employee or former employee of DHS in his or her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
            <p>  4. The United States or any agency thereof.</p>
            <p> B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
            <p> C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. sec. 2904 and 2906.</p>
            <p> D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
            <p> E. To appropriate agencies, entities, and persons when:</p>
            <p> 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;</p>
            <p> 2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
            <p> 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
            <p> F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            <p>G.  To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a statute, rule, regulation, order, license, or treaty when DHS determines that the information would assist in the enforcement of civil or criminal laws.</p>
            <p>H. To a federal, state, or local agency, or other appropriate entity or individual, or through established liaison channels to selected foreign governments, in order to provide intelligence, counterintelligence, or other information for the purposes of intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order, or other applicable national security directive.</p>
            <p>I. To the Department of Commerce, United States Census Bureau for statistical analysis of foreign trade data.</p>
            <p>J. To a federal agency, pursuant to an International Trade Data System Memorandum of Understanding, consistent with the receiving agency’s legal authority to collect information pertaining to and/or regulate transactions in international trade.</p>
            <p>K. To a federal, state, local, tribal, territorial, foreign, or international agency, maintaining civil, criminal, or other relevant enforcement information or other pertinent information, which has requested information relevant or necessary to the requesting agency’s hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or other benefit;</p>
            <p>L. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations, in response to a subpoena, or in connection with criminal law proceedings;</p>
            <p>M. To third parties during the course of an investigation to the extent necessary to obtain information pertinent to the investigation;</p>
            <p>N. To the Department of Justice, Offices of the United States Attorneys or a consumer reporting agency as defined by the Fair Credit Reporting Act, address or physical location information concerning the debtor, for further collection action on any delinquent debt when circumstances warrant;</p>
            <p>O. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations when DHS is aware of a need to use relevant data for purposes of testing new technology and systems designed to enhance national security or identify other violations of law;</p>
            <p>P. To a former employee of DHS, in accordance with applicable regulations, for purposes of responding to an official inquiry by a federal, state, or local government entity or professional licensing authority; or facilitating communications with a former employee that may be necessary for personnel-related or other official purposes when the Department requires information or consultation assistance from the former employee regarding a matter within that person’s former area of responsibility;</p>
            <p>Q. To an organization or individual in either the public or private sector, either foreign or domestic, when there is a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to the extent the information is relevant to the protection of life or property;</p>
            <p>R. To paid subscribers, in accordance with applicable regulations, for the purpose of providing access to manifest information as set forth in 19 U.S.C. sec. 1431;</p>
            <p>S. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
            <p>Disclosure to consumer reporting agencies:</p>
            <p> CBP may disclose, pursuant to 5 U.S.C. sec. 552a(b)(12), to consumer reporting agencies in accordance with the provision of 15 U.S.C. sec. 1681, et seq. or the Federal Claims Collection Act of 1966 as amended (31 U.S.C. sec. 3701, et seq.). The purpose of this disclosure is to aid in the collection of outstanding debts owed to the Federal Government, typically, to provide an incentive for debtors to repay delinquent Federal Government debts by making these part of their credit records.</p>
            <p> Disclosure of records is limited to the individual’s name, address, EIN/SSN, and other information necessary to establish the individual’s identity; the amount, status, and history of the claim; and the agency or program under which the claim arose. The disclosure will be made only after the procedural requirements of 31 U.S.C. sec. 3711(e) have been followed.</p>
            <p>To the U.S. Department of the Treasury when disclosure of the information is relevant to review payment and award eligibility through the Do Not Pay Working System for the purposes of identifying, preventing, or recouping improper payments to an applicant for, or recipient of, Federal funds, including funds disbursed by a state (meaning a state of the United States, the District of Columbia, a territory or possession of the United States, or a federally recognized Indian tribe) in a state-administered, federally funded program.</p>    
        </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p>Storage:</p>
            <p> DHS/CBP stores records in this system, as well as on other unclassified and classified systems and networks, electronically, or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, digital media, and CD-ROM.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
            <p> DHS/CBP retrieves records by file identification codes, name, or other personal identifier.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
            <p> DHS/CBP safeguards records in this system in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS/CBP imposes strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions. The systems maintain a real-time auditing function of individuals who access them. Additional safeguards may vary by Component and program.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p> The Importer Security Filing form is retained for fifteen years from date of submission unless it becomes linked to law enforcement action. All other import records contained within IIS are maintained for a period of six years from the date of entry.</p>
            <p> Some records are retained online in a system database, while others may be retained in hard copy in ports of entry, as appropriate. Personally identifiable information collected in IIS as part of the regulation of incoming cargo will be retained in accordance with the U.S. Customs Records Schedules approved by the National Archive and Records Administration for the forms on which the data is submitted. This means that cargo, crew, driver, and passenger information collected from a manifest presented in connection with the arrival of a vessel, vehicle, or aircraft will be retained for six years.</p>
            <p> Information collected in connection with the submission of a Postal Declaration for a mail importation will be retained for a maximum of six years and three months (as set forth pursuant to NARA Authority N1-36-86-1, U.S. Customs Records Schedule, Schedule 9 Entry Processing, Items 4 and 5).</p>
            <p> Records replicated on other DHS or CBP unclassified and classified systems and networks will follow the same retention schedule.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p> Director, Integrated Logistic Support, Cargo Systems Program Office, Office of Information Technology, U.S. Customs and Border Protection, 1801 North Beauregard Street, Alexandria, Virginia 22311.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p> ACE-ITDS portal users may log in to ACE-ITDS to change their profile information and make permissible amendments or corrections to their records. Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the DHS/CBP Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts." If an individual believes more than one Component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief FOIA Officer, Department of Homeland Security, 245 Murray Drive, S.W., Building 410, STOP-0655, Washington, D.C. 20528.</p>
            <p> An individual seeking records about him or herself from this system of records or any other Departmental system of records, must submit a request that conforms with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. Although no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief FOIA Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, you should:</p>
            <p>Explain why you believe the Department would have information on you;</p>
            <p>•Identify which Component(s) of the Department you believe may have the information about you;</p>
            <p>•Specify when you believe the records would have been created; and</p>
            <p>• Provide any other information that will help the FOIA staff determine which DHS Component agency may have responsive records; and</p>
            <p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his or her agreement for you to access his or her records.</p>
            <p>Without the above information, the Component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            <p> In processing Privacy Act requests for related to information in this system, CBP will review the records in the operational system, and coordinate review of records that were replicated on other unclassified and classified systems and networks.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p> See "Notification procedure" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p> See "Notification procedure" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p> DHS/CBP collects information from authorized DHS/CBP or other Federal agency forms, related documents, or electronic submissions from individuals and/or companies incidental to the conduct of foreign trade and required to administer the transportation and trade laws and regulations of the United States.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p> DHS/CBP will not assert any exemptions with regard to information provided by or on behalf of an individual, when requested by or on behalf of the data subject. However, this data may be shared with law enforcement and/or intelligence agencies pursuant to the routine uses identified in the IIS SORN. The Privacy Act requires DHS to maintain an accounting of such disclosures made pursuant to all routine uses. Disclosing the fact that a law enforcement and/or intelligence agency has sought particular records may affect ongoing law enforcement activity. As such, DHS will claim exemption pursuant to 5 U.S.C. sec. 552a(j)(2) from secs. (c)(3), (e)(8), and (g)(1) of the Privacy Act, and pursuant to 5 U.S.C. sec. 552a(k)(2) from sec. (c)(3) of the Privacy Act, from providing an individual the accounting of disclosures, as necessary and appropriate to protect this information.</p>
</xhtmlContent></subsection></section>
    <section id="cbp3" toc="yes">
        <systemNumber>/CBP-003</systemNumber>
        <subsection type="systemName">003 Credit/Debit Card Data System.</subsection>
                <subsection type="securityClassification">
                <xhtmlContent>
                    <p> Unclassified.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="systemLocation">
                <xhtmlContent>
                    <p> Records are maintained in the Automated Commercial System at the CBP Headquarters in Washington, DC and field offices.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="categoriesOfIndividuals">
                <xhtmlContent>
                    <p> Categories of individuals covered by this system include any individuals that provide credit or debit card information as a means of payment to CBP.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="categoriesOfRecords">
                <xhtmlContent>
                    <p> Categories of records in this system include: • Individual’s Name; • Address; • Billing Name; • Billing Address; • Credit or Debit Card Number; • Card Expiration Date; • Charge Amount; • Authorization Number; and • Tracking numbers.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="authorityForMaintenance">
                <xhtmlContent>
                    <p> The Homeland Security Act of 2002, Public Law 107–296; 5 U.S.C. 301; 8 U.S.C. 1101, et seq.; 19 U.S.C. 1, et seq.; Section 711 of the Implementing Recommendations of the 9/11 Commission Act of 2007 (9/11 Act), (Pub. L. 110–53); and the Travel Promotion Act (Pub. L. 111–145). PURPOSE(S): emcdonald on DSK5VPTVN1PROD with NOTICES The purpose of this system is to provide payment processing and recordkeeping of credit and debit card transactions with CBP.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="purpose">
                <xhtmlContent>
                    <p> The purpose of this system is to provide payment processing and recordkeeping of credit and debit card transactions with CBP. </p>
                </xhtmlContent>
            </subsection>
            <subsection type="routineUsesOfRecords">
                <xhtmlContent>
                    <p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows: A. To the Department of Justice (including United States Attorney Offices) or other federal agency conducting litigation or in proceedings before any court, adjudicative or administrative body, when it is relevant and necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation: 1. DHS or any component thereof; 2. any employee of DHS in his/her official capacity; 3. any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or 4. the United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and DHS determines that the records are both relevant and necessary to the litigation and the use of such records is compatible with the purpose for which DHS collected the records. B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains. C. To the National Archives and Records Administration or other Federal government agencies pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906. D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function. E. To appropriate agencies, entities, and persons when: 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; 2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the compromised information; and 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm. F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees. G. To an appropriate federal, state, local, foreign, international or tribal law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure. H. To the Department of Treasury’s Pay.gov, banks, and credit and debit card processors, for payment processing and payment reconciliation purposes.
                    </p>
                </xhtmlContent>
            </subsection>
<p>Disclosure to consumer reporting agencies: None.</p>
<p>Storage: Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a locked door. The records are stored on magnetic disc, tape, digital media, and CD–ROM.</p>
            <subsection type="retrievability">
                <xhtmlContent>
                    <p> Records may be retrieved by any of the data elements listed in categories of records, above.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="safeguards">
                <xhtmlContent>
                    <p> Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="retentionAndDisposal">
                <xhtmlContent>
                    <p> Payment information will be maintained in this system for nine months in an active state to reconcile accounts and six years and three months in an archived state in conformance with NARA General Schedule 6 Item 1 Financial Records management requirements. The nine month active status is necessary to handle reconciliation issues (including chargeback requests and retrievals). CBP must respond to these issues within 10 to 15 days or lose the payment.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="systemManager">
                <xhtmlContent>
                    <p> Director, Office of Automated Systems, U.S. Customs and Border Protection Headquarters, 1300 Pennsylvania Avenue NW., Washington, DC 20229.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="notificationProcedure">
                <xhtmlContent>
                    <p>
                        The Secretary of Homeland Security has exempted portions of this system from the notification, access, and amendment procedures of the Privacy Act because it is a law enforcement system. However, CBP will consider individual requests to determine whether or not information may be released. Thus, Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Headquarters or component’s FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia under "contacts.’’ If an individual believes more than one component maintains Privacy Act records concerning him or her the individual may submit the request to the Chief Privacy Officer, Department of Homeland Security, 245 Murray Drive SW., Building 410, STOP–0655, Washington, DC 20528. emcdonald on DSK5VPTVN1PROD with NOTICES When seeking records about yourself from this system of records or any other Departmental system of records your request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity, meaning that you must provide your full name, current address and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Director, Disclosure and FOIA, http://www.dhs.gov or 1–(866) 431– 0486. In addition you should provide the following:

                        • An explanation of why you believe the Department would have information on you,

                        • Identify which component(s) of the Department you believe may have the information about you,

                        • Specify when you believe the records would have been created,

                        • Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records,

                        • If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records. Without this bulleted information the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.
                    </p>
                </xhtmlContent>
            </subsection>
            <subsection type="recordAccessProcedures">
                <xhtmlContent>
                    <p> See "Notification procedure’’ above.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="contestingRecordProcedures">
                <xhtmlContent>
                    <p> See "Notification procedure’’ above.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="recordSourceCategories">
                <xhtmlContent>
                    <p> Records are obtained from individuals directly in the course of collecting payment for various purposes, including services, applications, fees, and duties, among others.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="exemptionsClaimed">
                <xhtmlContent>
                    <p> No exemption shall be asserted with respect to information maintained in the system as it relates to data submitted by or on behalf of a person who provided payment information. Information in the system may be shared with law enforcement and/or intelligence agencies pursuant to the above routine uses. The Privacy Act requires DHS maintain an accounting of the disclosures made pursuant to all routines uses. Disclosing the fact that a law enforcement or intelligence agencies has sought particular records may affect ongoing law enforcement or intelligence activity. As such, pursuant to 5 U.S.C. 552 a (j)(2) and (k)(2), DHS will claim exemption from (c)(3), (d), (e)(8), and (g) of the Privacy Act of 1974, as amended, as is necessary and appropriate to protect this information.</p>
                </xhtmlContent>
            </subsection>
        </section>

    <section id="cbp4" toc="yes">
<systemNumber>/CBP-004</systemNumber>
<subsection type="systemName">Unclassified, sensitive. </subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the U.S. Customs and Border Protection Headquarters in Washington, DC and field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>The individuals included in the system include the owners of the trademark, trade name, or copyright; former owners of
the trademark, trade name, or copyright; agents or representatives applying on behalf of the intellectual property right
owners; contact persons; individuals authorized to use the trademark, trade name, or copyright; and other individuals who
are alleged to have infringed on the trademark, trade name, or copyright. For trade names, the system may include
individuals who are not associated with or related to the trade name applicant, but who have actual knowledge and state
that the applicant used the trade name, that the applicant is the only one who may use the trade name, and that the trade
name is not identical or confusingly similar to another trademark or trade name used in connection with the same class or
kind of merchandise. <i>See</i> 19 CFR 133.13. For copyrights, the names of the performers in the copyrighted work
may be included. The photographs may include an individual modeling the trademark or copyrighted work, or an individual
depicted in the copyrighted work.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>The categories of records in the system include, but are not limited to:
</p><p>• Full name (first, middle, and last).
</p><p>• Address (country, city, state and zip code).
</p><p>• Telephone number.
</p><p>• Fax number.
</p><p>• Email address.
</p><p>• Citizenship.
</p><p>• Relationship to trademark, copyright, or trade name owner.
</p><p>• USPTO or U.S. Copyright Office registration number.
</p><p>• Description of registered trademark or registered copyright.
</p><p>• Date of issuance of trademark or copyright registration.
</p><p>• Country of manufacture of goods bearing the genuine trademark, or genuine copies or phonorecords of the
protected work.
</p><p>• Names of all parties authorized to use the trademark, trade name, or copyright, and the nature of the
relationship to the owner.
</p><p>• Names of any parties, foreign or domestic, who use or claim the trademark, trade name, or copyright, and
a description of those uses or claims.
</p><p>• Filing date of trademark registration.
</p><p>• If the trademark being registered is a standard character mark.
</p><p>• Date of expiration of the USPTO registration.
</p><p>• Supplemental information concerning the trademark (e.g., type of mark or design code category).
</p><p>• International class of goods covered by the USPTO registration and the specific products entitled to
protection.
</p><p>• Title of copyrighted work.
</p><p>• Foreign title of the copyrighted work.
</p><p>• IPRR tracking number.
</p><p>• Pay.gov payment tracking number.
</p><p>• Up to five digital images of the protected mark or copyrighted work.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>The authority for this system derives from section 42 of the Lanham Act (Trademark Act of 1946), as amended, 15 U.S.C.
1124; sections 101 and 602 through 603 of the Copyright Act of 1976, as amended, 17 U.S.C. 101, 602-603; and
sections 526, 595a, and 624 of the Tariff Act of 1930, as amended, 19 U.S.C. 1526, 1595a, and 1624; the Independent
Offices Appropriations Act, 1952, 31 U.S.C. 9701; and regulations at 19 CFR 133.3, 133.13, and 133.33.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to collect and maintain information on valid trademarks, trade names, and copyrights, to
enable CBP officials to identify at the border merchandise that infringes on registered trademarks, registered
copyrights, or trade names. IPRRSS collection encompasses three separate systems. The Intellectual Property Rights e-
Recordation (IPRR) system allows intellectual property owners to submit applications for trademark and copyright
recordations. The IPRR system shares information with two other CBP intellectual property search systems: The public
Intellectual Property Rights Search (IPRS) system, and the Intellectual Property Rights Internal Search (IPRiS) system.
IPRS provides a web-based search engine for the public to research trademark, trade name, and copyright recordations.
IPRiS is used to assist CBP and Immigration and Customs Enforcement (ICE) in enforcing copyrights, trademarks, and trade
names.
</p><p>The Pay.gov tracking number (associated with the payment information provided to Pay.gov and stored in
DHS/CBP-003 Credit/Debit Card Data System (CDCDS)) will be used to process application fees and to reconcile issues
regarding payment between CDCDS and Pay.gov. Payment information, such as credit card numbers or account information,
will not be used for determining recordation in IPRS or IPRiS, and is stored in a separate system (CDCDS) from the IPRR
application data.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of
the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (DOJ), including U.S. Attorney Offices, or other federal agency conducting litigation
or in proceedings before any court, adjudicative or administrative body, when it is necessary or relevant to the
litigation and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made pursuant to a written Privacy Act waiver at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but
only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. DHS has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or
property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or
programs (whether maintained by DHS or another agency or entity) or harm to the individuals that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To appropriate federal, state, tribal, local, or foreign governmental agencies or multilateral governmental
organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a
statute, rule, regulation, order, or license, where CBP believes the information would assist enforcement of applicable
civil or criminal laws.
</p><p>H. To the U.S. Copyright Office or U.S. Patent and Trademark Office, to confirm that the applicant has a registered
copyright or a registered trademark.
</p><p>I. To Pay.gov, for payment processing and payment reconciliation purposes.
</p><p>J. To members of the public, through IPRS, a portion of the intellectual property rights information, such as the
name, address, and phone number of the intellectual property right owner and the owner’s representative; and a
description of the recorded trademark, trade name, or copyright. The intellectual property right owner consents to
disclosing this portion of information in IPRS upon application for recordation, and the public information in IPRS does
not include trade secrets, business proprietary information, or information about enforcement.
</p><p>K. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a locked
door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Authorized CBP officials may retrieve information in IPRiS by the data elements supplied by the applicant. The public
may search the non-confidential records in IPRS by keyword and Boolean operators, and may limit the search by title,
product, description, owner, contact name, firm name, recordation number, or agency registration number; the public may
also filter the search by trademarks, copyrights, trade names, exclusion orders, or whether the recordation has expired.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable DHS
automated systems security and access policies. Strict controls have been imposed to minimize the risk of compromising
the information that is being stored. Access to the computer system containing the records in this system is limited to
those individuals who have a need to know the information for the performance of their official duties and who have
appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>CBP will retain expired recordations, which have not been renewed, for seven years after the date of expiration. NARA
guidelines for retention and archiving of data will apply to IPRR, IPRS, and IPRiS; CBP is in negotiation with NARA for
approval of the IPRRSS data retention and archiving plan.
</p><p>Payment information is not stored in IPRR, IPRiS or IPRS, but is forwarded to Pay.gov and stored in CBP’s financial
processing system, CDCDS, pursuant to the DHS/CBP-003, CDCDS system of records notice.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Director, Office of Automated Systems, U.S. Customs and Border Protection, 1300 Pennsylvania Avenue NW., Washington,
DC 20229.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted portions of this system of records from the notification, access, and
amendment procedures of the Privacy Act because the records may be used for law enforcement purposes. No exemption shall
be asserted with respect to information maintained in the systems as it relates to data submitted by or on behalf of the
owner of the trademark, trade name, or copyright, except with respect to information about individuals who are alleged to
have infringed on the trademark, trade name, or copyright. DHS/CBP will consider individual requests to determine whether
or not information may be released. Thus, individuals seeking notification of and access to any record contained in this
system of records, or seeking to contest its content, may submit a request in writing to the CBP FOIA Officer whose
contact information can be found at <i>http://www.dhs.gov/foia</i> under "contacts." If an individual
believes more than one component maintains Privacy Act records concerning him or her the individual may submit the
request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245
Murray Drive SW., Building 410, STOP-0655, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, <i>http://www.dhs.gov
</i> or 1-866-431-0486. In addition you should:
</p><p>• Explain why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created; and
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records.
</p><p>If your request seeks records pertaining to another living individual, you must also include a statement from that
individual certifying his/her agreement for you to access his/her records. Without the information specified above, the
component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or
lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are obtained primarily from the individual submitting the application for recordation of the trademark, trade
name, or copyright. If the applicant provides a registered trademark number, the USPTO Web site will provide
automatically supplemental information concerning the trademark, the USPTO registration number, the international class
of goods covered by the registration and the specific products entitled to protection, the date the owner filed the
registration application, and the date it issued the trademark registration. If the applicant provides a registered
copyright, the U.S. Copyright Office Web site will provide automatically the title of the copyrighted work, the U.S.
Copyright Office registration number, the date it issued the copyright registration, and the name of the copyright owner.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>CBP will not assert any exemptions with respect to information in the systems submitted by the intellectual property
right owner or the owner’s representative, except with respect to information about individuals who are alleged to have
infringed on the trademark, trade name, or copyright. Information in the system pertaining to persons alleged to have
infringed on an intellectual property right may be shared with national security, law enforcement, or intelligence
agencies pursuant to the above routine uses. The Privacy Act requires DHS to maintain an accounting of the disclosures
made pursuant to all routines uses. Disclosing the fact that national security, law enforcement or intelligence agencies
have sought particular records may affect ongoing national security, law enforcement, or intelligence activity. As such,
pursuant to 5 U.S.C. 552a(j)(2), DHS will claim exemption from subsections (c)(3), (e)(8), and (g) of the Privacy Act of
1974, as amended, as necessary and appropriate to protect this information. In addition, because the system may contain
information or records about the unauthorized use of intellectual property rights and disclosure of that information
could impede law enforcement investigations, DHS will claim, pursuant to 5 U.S.C. 552a(k)(2), exemption from subsections
(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) of the Privacy Act of 1974, as necessary and appropriate to
protect this information.
</p></xhtmlContent></subsection></section>
<section id="cbp2" toc="yes">
<systemNumber>/CBP-002</systemNumber>

    <subsection type="systemName">
        Department of Homeland Security (DHS)/U.S. Customs and Border Protection (CBP)-002 Trusted and Registered Traveler Programs (TRTP)
    </subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p>Unclassified.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p>Records are maintained at the CBP Headquarters in Washington, D.C. and field offices. CBP maintains records in the Trusted Traveler Programs (TTP) information technology system, as well as other applications that support trusted traveler and registered traveler application and program management. CBP may also maintain these records in various CBP law enforcement systems for participant screening.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p>Trusted Traveler Program Manager, Office of Field Operations, and Executive Director, Passenger Systems Program Directorate, Office of Information and Technology, U.S. Customs and Border Protection, 1300 Pennsylvania Ave., NW, Washington, D.C. 20229.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="authorityForMaintenance">
        <xhtmlContent>
            <p>Section 7208 of the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA), as amended, 8 U.S.C. 1365b(k); Section 215 of the Immigration and Nationality Act, as amended, 8 U.S.C. 1185; Section 402 of the Homeland Security Act of 2002, as amended, 6 U.S.C. 202; Section 404 of the Enhanced Border Security and Visa Reform Act of 2002, 8 U.S.C. 1753; Section 433 of the Tariff Act of 1930, as amended, 19 U.S.C. 1433; 31 U.S.C. 9701; and Parts 103 and 235 of Title 8 of the Code of Federal Regulations (See, especially, 8 C.F.R. §§ 103.2, 103.7, 103.16, 235.1, 235.2, 235.7, and 235.12).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p>The purpose of this system is to assess on an ongoing basis applicants’ eligibility for enrollment in trusted traveler and registered traveler programs.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p>TRTP collects the following information on trusted travelers:</p>
            <p>Biographic application data, including:</p>
            <p>•Full name;</p>
            <p>•Alias(es);</p>
            <p>•Date of birth;</p>
            <p>•Place of birth;</p>
            <p>•Language preference;</p>
            <p>•Gender;</p>
            <p>•Current and former addresses;</p>
            <p>•Telephone numbers;</p>
            <p>•IP address;</p>
            <p>•Country of citizenship;</p>
            <p>•Alien registration number (if applicable);</p>
            <p>•Employment history (if available);</p>
            <p>•PASS ID or Trusted Traveler membership number;</p>
            <p>•Countries visited in the last five years;</p>
            <p>•Criminal history (provided by applicant);</p>
            <p>•Parental or Legal Guardian permission (if 18 years or younger);</p>
            <p>•Driver’s license number;</p>
            <p>•Issuing state or province of the applicant’s Driver’s License;</p>
            <p>•Trusted Traveler Program System (TTP) user name and password (password is maintained in an encrypted format); and</p>
            <p>•Answers to security questions to reset password.</p>
            <p>Vehicle or Vessel information, as appropriate, including:</p>
            <p>•Flag and home port (where the vessel is foreign flagged);</p>
            <p>•Name, registration number, and registration issuing state or province of the applicant’s vessel;</p>
            <p>•Make and model, year, color, Vehicle Identification Number (VIN), and license plate number of the vehicle; and</p>
            <p>•Owner name, gender, and date of birth.</p>
            <p>Biometric data, including:</p>
            <p>•Fingerprints (collected and stored through the DHS Automated Biometric Identification System (IDENT) for future identity verification);</p>
            <p>•Fingerprint Identification Number (FIN);</p>
            <p>•Height;</p>
            <p>•Eye color; and</p>
            <p>•Facial photographs.</p>
            <p>Information added by DHS/CBP:</p>
            <p>•Criminal history information, as well as responsive information from other law enforcement databases that support the DHS/CBP membership decision;</p>
            <p>•Law enforcement risk assessment worksheet;</p>
            <p>•Pay.gov tracking number;</p>
            <p>•Program membership decision in the form of a "pass/fail;" and</p>
            <p>•Foreign government membership decisions in the form of a "pass/fail."</p>
            <p>The following information is collected on registered pleasure boat travelers:</p>
            <p>•Full name;</p>
            <p>•Gender;</p>
            <p>•Date of birth;</p>
            <p>•Place of birth;</p>
            <p>•Country of citizenship;</p>
            <p>•Address;</p>
            <p>•Contact telephone number;</p>
            <p>•Alternate telephone number;</p>
            <p>•Contact email address;</p>
            <p>•Password;</p>
            <p>•Document type and number (e.g., U.S. Passport, Permanent Resident Card, Birth Certificate), place of issue, and expiration date of document; and</p>
            <p>•Vessel information including registration number, hull ID number, decal number, registered name, location where vessel is registered, and vessel description (e.g., length, type, manufacturer, model, year, hull colors).</p>
            <p>The following information is collected about Decal and Transponder Online Procurement System (DTOPS) registered travelers:</p>
            <p>•Account name;</p>
            <p>•Physical address;</p>
            <p>•Shipping address;</p>
            <p>•Pay.gov tracking number;</p>
            <p>•Free and Secure Trade (FAST) ID, if the conveyance’s owner is Customs Trade Partnership Against Terrorism (C-TPAT)/FAST approved;</p>
            <p>•Conveyance model year;</p>
            <p>•Conveyance manufacturer name;</p>
            <p>•Conveyance identification numbers and information, which are specific to the type of conveyance (e.g., local registration number, an aircraft’s tail number, Coast Guard ID number, vessel name);</p>
            <p>•Contact name;</p>
            <p>•Contact telephone number; and</p>
            <p>•Contact email address.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p>TRTP records are obtained from the individual and from external law enforcement systems. DHS/CBP may use a number of DHS/CBP databases during the vetting process before individuals will be enrolled and accepted in any trusted traveler program. These databases include the Automated Targeting System (ATS), which contains historical and enforcement data on travelers, and provides a gateway to other sources of data. These other external sources include the Terrorist Screening Database, FBI criminal history, and National Crime and Information Center outstanding wants/warrants, vehicle and driver’s license-related data contained in the International Justice and Public Safety Network’s National Law Enforcement Telecommunications System (Nlets) system, and Department of State alien records, lookouts, and status indicators. Vetting results are also based on checks of the FBI’s Integrated Automated Fingerprint Identification System for criminal history and IDENT for immigration related records. Trusted traveler applicants from partnering foreign countries will have membership determinations recorded in TRTP that are received by DHS/CBP from their home country’s government.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
            <p>A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other federal agencies conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
            <p>1. DHS or any component thereof;</p>
            <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
            <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
            <p>4. The United States or any agency thereof.</p>
            <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
            <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
            <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
            <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
            <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
            <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
            <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to</p>
            <p>the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            <p>I. To foreign governments, at the request of the individual, for the purpose of applying to that country’s trusted traveler program.</p>
            <p>J. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency for the purpose of determining an individual’s eligibility for membership in a trusted traveler or registered traveler program.</p>
            <p>K. To federal and foreign government intelligence or counterterrorism agencies or components when DHS becomes aware of an indication of a threat or potential threat to national or international security, or to assist in anti-terrorism efforts.</p>
            <p>L. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation, provided disclosure is appropriate in the proper performance of the official duties of the officer making the disclosure.</p>
            <p>M. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS is aware of a need to use relevant data, which relate to the purpose(s) stated in this SORN, for purposes of testing new technology.</p>
            <p>N. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p>DHS/CBP stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
            <p>Records may be retrieved by any of the personal identifiers listed in the categories of records above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p>CBP is proposing to NARA the following retention schedules: Trusted traveler data is retained for the duration of an individual’s active membership plus three years after an individual’s membership is no longer active, either as a result of expiration without renewal at the end of a five-year term, as a result of abandonment, or as a result of CBP termination. DTOPS master file data is retained for twelve years after the account, decal, transponder, or VIN is inactive or deactivated.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act, and the Judicial Redress Act if applicable, because it is a law enforcement system. However, DHS/CBP will consider individual requests to determine whether information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and CBP’s FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about the individual may be available under the Freedom of Information Act.</p>
            <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
            <p>•Explain why he or she believes the Department would have information being requested;</p>
            <p>•Identify which component(s) of the Department he or she believes may have the information;</p>
            <p>•Specify when the individual believes the records would have been created; and</p>
            <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
            <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
            <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p>For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to CBP. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
            <p>Regardless of whether the Privacy Act or JRA applies, travelers who believe that records in this system maintain incorrect or inaccurate information may direct inquiries to the CBP Info Center, 1300 Pennsylvania Avenue, N.W., Washington, D.C. 20229. Travelers may also contact the DHS Traveler Redress Inquiry Program (DHS TRIP), 601 South 12th Street, TSA-901, Arlington, VA 22202-4220 or online at www.dhs.gov/dhs-trip if they have experienced a travel-related screening difficulty, including those they believe may be related to incorrect or inaccurate information retained in their record(s).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p>See "Record Access Procedures" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2) seeks to exempt the law enforcement related records, including information from other law enforcement databases that support the DHS/CBP membership decision, and the law enforcement risk assessment worksheet that have been created during the background check and vetting process, from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), and (e)(8); (f); and (g)(1). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2), seeks to exempt records created during the background check and vetting process from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H),(e)(4)(I); and (f).</p>
            <p> Also, the Privacy Act requires DHS maintain an accounting of such disclosures made pursuant to all routine uses. However, disclosing the fact that CBP has disclosed records covered by this SORN to an external law enforcement and/or intelligence agency may negatively affect and interfere with ongoing law enforcement, intelligence, or national security activity. As such, pursuant to 5 U.S.C. 552a(j)(2) and (k)(2), DHS will claim an exemption from (c)(3), (e)(8), and (g)(1) of the Privacy Act, as is necessary and appropriate to protect this information.</p>
            <p> In addition, when a record contains information from other exempt systems of records, DHS/CBP will claim the same exemptions for that record as are claimed for the original systems of records and will claim any additional exemptions that this notice delineates.</p>
            <p> Finally, in its discretion, CBP may not assert any exemptions with regard to accessing or amending an individual’s application data in a trusted or registered traveler program or accessing their final membership determination in the trusted traveler programs.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="history">
        <xhtmlContent>
            <p>DHS/CBP-002 Global Enrollment System, 78 FR 3441 (January 18, 2013); DHS/CBP-002 Global Enrollment System of Records, 71 FR 20708 (April 21, 2006).</p>
        </xhtmlContent></subsection></section>
<section id="cbp5" toc="yes">
<systemNumber>/CBP-005</systemNumber>
<subsection type="systemName">Advanced Passenger Information System (APIS).
</subsection>
<subsection type="securityClassification"><xhtmlContent>
<p>Unclassified. The data may be retained on the classified networks but this does not change the nature and character of the data until it is combined with classified information.  </p>
</xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent>
<p> Records are maintained in the operational system at CBP Headquarters in Washington, D.C. and at CBP field offices. Records are replicated from the operational system and maintained on the DHS unclassified and classified networks.  This computer database is located at CBP National Data Center (NDC) in Washington, D.C.  Computer terminals are located at customhouses, border ports of entry, airport inspection facilities under the jurisdiction of DHS, and other locations at which DHS authorized personnel may be posted to facilitate DHS’s mission.  Terminals may also be located at appropriate facilities for other participating government agencies. </p>
</xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent>
<p> Categories of individuals covered by this notice includes passengers who arrive and depart the United States by air, sea, rail, and bus, including those in transit through the United States or beginning or concluding a portion of their international travel by flying domestically within the United States; crew members who arrive and depart the United States by air, sea, rail, and bus, including those in transit through the United States or beginning or concluding a portion of their international travel by flying domestically within the United States; and crew members on aircraft that fly over the United States. </p>
</xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p>The records in the database include the following information: </p>
<p>Complete name;</p>
<p>Date of birth;</p>
<p>Gender;</p>
<p>Country of citizenship;</p>
<p>Passport/alien registration number and country of issuance;</p>
<p>Passport expiration date; </p>
<p>Country of residence; </p>
<p>Status on board the aircraft;</p>
<p>Travel document type;</p>
<p>United States destination address (for all private aircraft passengers and crew, and commercial air, rail, bus, and vessel passengers except for U.S. citizens, lawful permanent residents, crew, and those in transit);</p>
<p>Place of birth and address of permanent residence (commercial flight crew only);</p>
<p>Pilot certificate number and country of issuance (flight crew only, if applicable);</p>
<p>PNR locator number;</p>
<p>Primary inspection lane, ID inspector; and</p>
<p>Records containing the results of comparisons of individuals to information maintained in CBP’s law enforcement databases, as well as information from the TSDB, information on individuals with outstanding wants or warrants, and information from other government agencies regarding high risk parties.</p>
<p>In addition, air and sea carriers or operators covered by the APIS rules, and rail and bus carriers, to the extent voluntarily applicable, transmit or provide, respectively, to CBP the following information:  </p>
<p>Airline carrier code; </p>
<p>Flight number; </p>
<p>Vessel name; </p>
<p>Vessel country of registry/flag; </p>
<p>International Maritime Organization number or other official number of the vessel; </p>
<p>Voyage number; </p>
<p>Date of arrival/departure; </p>
<p>Foreign airport/port where the passengers and crew members began their air/sea transportation to the United States; </p>
<p>For passengers and crew members destined for the United States, the location where the passengers and crew members will undergo customs and immigration clearance by CBP; </p>
<p>For passengers and crew members that are transiting through (and crew on flights flying over) the United States and not clearing CBP, the foreign airport/port of ultimate destination; and</p>
<p>For passengers and crew departing the United States, the final foreign airport/port of arrival.</p>
<p>Other information stored in this system of records includes:</p>
<p>Aircraft registration number provided by pilots of private air craft;</p>
<p>Type of aircraft, call sign (if available); </p>
<p>CBP issued decal number (if available); </p>
<p>Place of last departure (ICAO airport code, when available); </p>
<p>Date and time of aircraft arrival; </p>
<p>Estimated time and location of crossing U.S. border/coastline; </p>
<p>Name of intended airport of first landing.</p><p>As listed in 19 CFR 122.24, if applicable, unless an exemption has been granted under 19 CFR 122.25, or the aircraft was inspected by CBP Officers in the U.S. Virgin Islands.</p>
<p>Owner/lessee name (first, last, and middle, if available, or business entity name); </p>
<p>Owner/lessee address (number and street, city, state, zip code, country, telephone number, fax number, and email address, pilot/private aircraft pilot name (last, first, and middle, if available)); </p>
<p>Pilot license number, pilot street address (number and street, city, state, zip code, country, telephone number, fax number, and email address); </p>
<p>Pilot license country of issuance, operator name (for individuals:  last, first, and middle, if available, or name of business entity, if available); </p>
<p>Operator street address (number and street, city, state, zip code, country, telephone number, fax number, and email address); </p>
<p>Aircraft color(s); </p>
<p>Complete itinerary (foreign airport landings within 24 hours prior to landing in the United States); </p>
<p>24-hour Emergency point of contact (e.g., broker, dispatcher, repair shop, or other third party who is knowledgeable about this particular flight) name (first, last, and middle (if available) and telephone number; and  </p>
<p>Incident to the transmission of required information via eAPIS, records will also incorporate the pilot’s email address. </p>
</xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p>The Aviation and Transportation Security Act of 2001, Pub. L. 107-71; the Enhanced Border Security and Visa Reform Act of 2002, Pub. L. 107-173; the Intelligence Reform and Terrorism Prevention Act of 2004, Pub. L. 108-458; and the Tariff Act of 1930, Pub. L. 71-361, as amended, including 19 U.S.C. 58b, 66, 1431, 1433, 1436, 1448, 1459, 1590, 1594, 1623, 1624, 1644, and 1644a.</p>
</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p> The purpose of the collection is to screen passengers and crew arriving in, transiting through, and departing from (and in the case of crew, overflying) the United States to identify those passengers and crew who may pose a risk to border, aviation, vessel, rail, bus, or public security, may be a terrorist or suspected terrorist or affiliated with or suspected of being affiliated with terrorists, may be inadmissible, may be a person of interest, or may otherwise be engaged in activity in violation of U.S. law, or the subject of wants or warrants.</p>
<p> APIS allows CBP to more effectively and efficiently facilitate the entry of legitimate travelers into the United States and the departure of legitimate travelers from the United States.  As travelers prepare to depart for or from the United States, DHS officers, using APIS, can quickly cross-reference the results of the advanced research that has been conducted through CBP’s law enforcement databases, as well as using information from the TSDB, information on individuals with outstanding wants or warrants, and information from other government agencies regarding high risk parties, confirm the accuracy of that information by comparison of it with information obtained from the traveler and from the carriers, and make immediate determinations with regard to the traveler’s security risk, admissibility, and other determinations bearing on CBP’s inspectional and screening processes.</p>
<p> DHS maintains a replica of some or all of the data in the operating system on the unclassified and classified DHS networks to allow for analysis and vetting consistent with the above stated purposes and this published notice.</p>
</xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows: </p>
<p> A.  To the Department of Justice (DOJ), including Offices of the United States Attorneys or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
<p>  1. DHS or any component thereof;</p>
<p>  2. Any employee or former employee of DHS in his/her official capacity;</p>
<p>  3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
<p>  4. The United State or any agency thereof.</p>
<p> B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
<p> C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906. </p>
<p> D. To an agency or organization for the purposes of performing audit or oversight operations as authorized by law but only such information as is necessary and relevant to such audit or oversight function. </p>
<p> E.  To appropriate agencies, entities, and persons when:</p>
<p> 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; </p>
<p> 2. The Department has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
<p> 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p> F.  To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records.  Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
<p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure. </p>
<p> H.  To a federal, state, or local agency, or other appropriate entity or individual, or through established liaison channels to selected foreign governments, in order to provide intelligence, counterintelligence, or other information for the purposes of intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order, or other applicable national security directive.</p>
<p>I.  To a federal, state, tribal, local, or foreign government agency or organization, or international organization, lawfully engaged in collecting law enforcement intelligence information, whether civil or criminal, or charged with investigating, prosecuting, enforcing or implementing civil or criminal laws, related rules, regulations, or orders, to enable these entities to carry out their law enforcement responsibilities, including the collection of law enforcement intelligence. </p>
<p> J.  To federal and foreign government intelligence or counterterrorism agencies or components when DHS reasonably believes there to be a threat or potential threat to national or international security for which the information may be useful in countering the threat or potential threat, when DHS reasonably believes such use is to assist in anti-terrorism efforts, and disclosure is appropriate to the proper performance of the official duties of the person making the disclosure. </p>
<p> K.  To an organization or individual in either the public or private sector, either foreign or domestic, when there is a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to the extent the information is relevant to the protection of life, property, or other vital interests of a data subject and disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
<p> L.  To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, for the purpose of protecting the vital interests of a data subject or other persons, including to assist such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or for combating other significant public health threats; appropriate notice will be provided of any identified health threat or risk.</p>
<p> M. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations, or in response to a subpoena, or in connection with criminal law proceedings. </p>
<p> N. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation, provided disclosure is appropriate in the proper performance of the official duties of the officer making the disclosure. </p>
<p> O. To an appropriate federal, state, local, tribal, territorial, foreign, or international agency, if the information is relevant and necessary to a requesting agency's decision concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant, or other benefit and when disclosure is appropriate to the proper performance of the official duties of the person making the request.</p>
<p> P.   To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations when CBP is aware of a need to utilize relevant data for purposes of testing new technology and systems designed to enhance border security or identify other violations of law.</p>
<p>Q. To the carrier that submitted traveler, passenger, or crew information to CBP, but only to the extent that CBP provides a message indicating that the individual is "cleared" or "not cleared" to board the aircraft or depart on the vessel in response to the initial transmission of information (including, when applicable, the individual’s Electronic System for Travel Authorization (ESTA) status as discussed in the DHS/CBP-009 ESTA SORN (79 FR 65414, published November 3, 2014), or is identified as a "selectee".</p>
<p>R. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
<p>Disclosure to consumer reporting agencies:  </p>
<p>None.</p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>Storage:</p>
<p>     DHS/CBP stores records in this system electronically in the operational system as well as on the unclassified and classified network or on paper in secure facilities in a locked drawer behind a locked door.  DHS/CBP stores records on magnetic disc, tape, digital media, and CD-ROM. The data is stored electronically at the CBP Data Center for current data and offsite at an alternative data storage facility for historical logs and system backups. </p>
</xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p>     DHS/CBP retrieves data by name or other unique personal identifier from an electronic database.  </p>
</xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p>DHS/CBP safeguards records in this system in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies.  Strict controls have been imposed to minimize the risk of compromising the information that is being stored.  Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions. In addition, the system manager has the capability to maintain system back-ups for the purpose of supporting continuity of operations and the discrete need to isolate and copy specific data access transactions for the purpose of conducting security incident investigations.</p>
<p>All communication links with the CBP data center are encrypted. The databases are fully certified and accredited in accordance with the requirements of the Federal Information Security Management Act (FISMA).</p>
<p>Although separate notice is being provided for APIS, it continues to operate within the TECS information technology system architecture; therefore APIS’s technical infrastructure is covered by the approved TECS Certification and Accreditation under National Institute of Standards and Technology standards.  The last certification was in December 2014.</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p> Information collected in APIS is maintained in this system for a period of no more than twelve months from the date of collection at which time the data is erased from APIS.  As part of the vetting and CBP clearance (immigration and customs screening and inspection) of a traveler, information from APIS is copied to the BCI system, a subsystem of TECS.  Additionally, for individuals subject to CBP requirements, a copy of certain APIS data is transferred to the ADIS for effective and efficient processing of foreign nationals.  More information about ADIS records can be found in the DHS/National Protection and Programs Directorate-001 ADIS SORN (78 FR 31955, published May 28, 2013).  Different retention periods apply for APIS data contained in those systems.</p>
<p>Records replicated on the unclassified and classified networks will follow the same retention schedule.</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent>
<p>Director, Office of Automated Systems, U.S. Customs and Border Protection Headquarters, 1300 Pennsylvania Avenue, N.W., Washington, D.C. 20229.</p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p> DHS allows persons (including foreign nationals) to seek administrative access under the Privacy Act to information maintained in APIS.  Persons may only seek access to APIS data that has been provided by the carrier and of which they are the subject.  To determine whether APIS contains records relating to you, write to the CBP Customer Service Center, OPA, U.S. Customs and Border Protection, 90 K Street, N.E., Washington, D.C. 20229 (phone: 877-CBP-5511).    </p>
<p>In processing requests for access to information in this system, CBP reviews not only the records in the operational system but also the records that were replicated on the unclassified and classified networks, and provides appropriate access to the information based on this notice.</p>
<p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the CBP Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "contacts."  If an individual believes more than one component maintains Privacy Act records concerning him or her the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive, S.W., Building 410, STOP-0655, Washington, D.C. 20528.</p>
<p> When seeking records about yourself from this system of records or any other Departmental system of records your request must conform with the Privacy Act regulations set forth in 6 CFR part 5.  You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth.  You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization.  While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov or 1-866-431-0486.  In addition you should:</p>
<p>Explain why you believe the Department would have information on you;</p>
<p>Identify which component(s) of the Department you believe may have the information about you;</p>
<p>Specify when you believe the records would have been created; and</p>
<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
<p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
<p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
</xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p> See notification procedure.  In addition, if individuals are uncertain what agency handles the information, they may seek redress through the DHS Traveler Redress Program (TRIP).  For more information please see the DHS/ALL-005 DHS Redress and Response System of Records (72 FR 2294, published January 18, 2007).  Individuals who believe they have been improperly denied entry, refused boarding for transportation, or identified for additional screening by CBP may submit a redress request through TRIP.  TRIP is a single point of contact for individuals who have inquiries or seek resolution regarding difficulties they experienced during their travel screening at transportation hubs such as airports, seaports, and train stations or at U.S. land borders.  Travelers can request correction of errors stored in other DHS databases through one application through TRIP.  Redress requests should be sent to:  DHS Traveler Redress Inquiry Program (TRIP), 601 South 12th Street, TSA-901, Arlington, VA 22202-4220 or online at www.dhs.gov/trip. </p>
</xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p>Individuals may seek redress and/or contest a record through several different means that will be handled in the same fashion.  If the individual is aware the information is specifically handled by CBP, requests may be sent directly to CBP Customer Service Center, OPA, U.S. Customs and Border Protection, 90 K Street, N.E., Washington, D.C. 20229 (phone: 877-CBP-5511).  If the individual is uncertain what agency is responsible for maintaining the information, redress requests may be sent to DHS TRIP at DHS Traveler Redress Inquiry Program (TRIP), 601 South 12th Street, TSA-901, Arlington, VA 22202-4220 or online at www.dhs.gov/trip.</p>
</xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p>   The system contains data received from private and commercial aircraft pilots, operators/carriers, and vessel carriers regarding passengers and crewmembers who arrive in, depart from, transit through or overfly (in the case of flight crew only) the United States on private aircraft, air, or, vessel carriers covered by APIS regulations.  The system also contains data to the extent voluntarily submitted by rail and bus carriers regarding passengers and crewmembers who arrive in, and/or depart from the United States.  During physical processing at the border, primary inspection lane and ID inspector are added to APIS, and the APIS information is verified using the travel documents.  Additionally, records contain the results of comparisons of individuals to information maintained in CBP law enforcement databases, as well as information from the TSDB, </p>
<p>information on individuals with outstanding wants or warrants, and information from other government agencies regarding high risk parties.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent>
<p>     No exemption shall be asserted with respect to information maintained in the system that is collected from a person and submitted by that person’s air or vessel carrier if that person, or his or her agent, seeks access or amendment of such information.</p>
<p>This system, however, may contain records or information recompiled from or created from information contained in other systems of records that are exempt from certain provision of the Privacy Act.  This system may also contain accountings of disclosures made with respect to information maintained in the system.  For these records or information only, in accordance with 5 U.S.C. 552a (j)(2) and (k)(2), DHS will also claim the original exemptions for these records or information from subsections (c)(3) and (4); (d)(1), (2), (3), and (4); (e)(1), (2), (3), (4)(G) through (I), (5), and (8); (f); and (g) of the Privacy Act of 1974, as amended, as necessary and appropriate to protect such information.
</p></xhtmlContent></subsection></section>

<section id="cbp6" toc="yes">
<systemNumber>/CBP-006</systemNumber>
<subsection type="systemName">U.S. Customs and Border Protection Automated Targeting System.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified, sensitive, classified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the CBP Headquarters in Washington, DC, and can be accessed from field offices and from
locations abroad where ATS users are stationed.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>ATS handles information relating to the following individuals:
</p><p>A. Persons, including operators, crew, and passengers, who seek to, or do in fact, enter, exit, or transit through the
United States or through other locations where CBP maintains an enforcement or operational presence by land, air, or sea.
</p><p>B. Crew members traveling on commercial aircraft that fly over the United States.
</p><p>C. Persons who engage in any form of trade or other commercial transaction related to the importation or exportation
of merchandise, including those required to submit an Importer Security Filing.
</p><p>D. Persons who are employed in any capacity related to the transit of merchandise intended to cross the United States
border.
</p><p>E. Persons who serve as booking agents, brokers, or other persons who provide information on behalf of persons seeking
to enter, exit, or transit through the United States, or on behalf of persons seeking to import, export or ship
merchandise through the United States.
</p><p>F. Owners of vehicles that cross the border.
</p><p>G. Persons whose data was received by the Department as the result of memoranda of understanding or other information
sharing agreement or arrangement because the information is relevant to the border security mission of the Department.
</p><p>H. Persons who were identified in a narrative report, prepared by an officer or agent, as being related to or
associated with other persons who are alleged to be involved in, who are suspected of, or who have been arrested for
violations of the laws enforced or administered by DHS.
</p><p>I. Persons who may pose a threat to the United States.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>ATS contains various types of data to support its targeting missions, incorporating information germane to the
identification of individuals, including, but not limited to:
</p><p>• Name
</p><p>• Addresses (home, work, and/or destination, as appropriate)
</p><p>• Telephone and fax numbers
</p><p>• Tax ID number (e.g., Employer Identification Number (EIN) or Social Security Number (SSN), where
available)
</p><p>• Date and place of birth
</p><p>• Gender
</p><p>• Nationality
</p><p>• Country of Residence
</p><p>• Citizenship
</p><p>• Alias
</p><p>• Physical characteristics, including biometrics where available (e.g., height, weight, race, eye and hair
color, scars, tattoos, marks, fingerprints)
</p><p>• Familial relationships and other contact information
</p><p>• Property information
</p><p>• Occupation and employment information
</p><p>• Biographical and biometric information from or associated with online immigrant and non-immigrant visa
applications, including (as available):
</p><p>• U.S. sponsor’s name, address, and phone number
</p><p>• U.S. contact name, address, and phone number
</p><p>• Employer name, address, and phone number
</p><p>• Email address, IP Address, applicant ID
</p><p>• Marital Status
</p><p>• Alien number
</p><p>• Social Security Number
</p><p>• Tax Identification Number
</p><p>• Organization Name
</p><p>• U.S. Status
</p><p>• Income information for Joint Sponsors
</p><p>• Education, military experience, relationship information
</p><p>• Responses to vetting questions pertaining to admissibility or eligibility
</p><p>• Information from documents used to verify the identity of individuals (<i>e.g.,</i> driver’s license,
passport, visa, alien registration, citizenship card, border crossing card, birth certificate, certificate of
naturalization, re-entry permit, military card) including the:
</p><p>• type
</p><p>• number
</p><p>• date of issuance
</p><p>• place of issuance
</p><p>The system contains travel information pertaining to individuals, including:
</p><p>• The combination of license plate, Department of Motor Vehicle (DMV) registration data and biographical
data associated with a border crossing
</p><p>• Information derived from an ESTA application including responses to vetting questions pertaining to
admissibility (where applicable)
</p><p>• Travel itinerary
</p><p>• Date of arrival or departure, and means of conveyance with associated identification (<i>e.g.,</i> Vehicle
Identification Number, year, make, model, registration)
</p><p>• Passenger Name Record (PNR):
</p><p>1. PNR record locator code
</p><p>2. Date of reservation/issue of ticket
</p><p>3. Date(s) of intended travel
</p><p>4. Name(s)
</p><p>5. Available frequent flier and benefit information (<i>i.e.,</i> free tickets, upgrades)
</p><p>6. Other names on PNR, including number of travelers on PNR
</p><p>7. All available contact information (including originator of reservation)
</p><p>8. All available payment/billing information (<i>e.g.,</i> credit card number)
</p><p>9. Travel itinerary for specific PNR
</p><p>10. Travel agency/travel agent
</p><p>11. Code share information (<i>e.g.,</i> when one air carrier sells seats on another air carrier’s flight)
</p><p>12. Split/divided information (<i>e.g.,</i> when one PNR contains a reference to another PNR)
</p><p>13. Travel status of passenger (including confirmations and check-in status)
</p><p>14. Ticketing information, including ticket number, one way tickets and Automated Ticket Fare Quote (ATFQ) fields
</p><p>15. Baggage information
</p><p>16. Seat information, including seat number
</p><p>17. General remarks including Other Service Indicated (OSI), Special Service Indicated (SSI) and Supplemental Service
Request (SSR) information
</p><p>18. Any collected APIS information (<i>e.g.,</i> Advance Passenger Information (API)) that is initially captured by an
air carrier within its PNR, such as passport number, date of birth and gender)
</p><p>19. All historical changes to the PNR listed in numbers 1 to 18
</p><p>Note:</p><p>Not all air carriers maintain the same sets of information for PNR, and a particular individual’s PNR likely
will not include information for all possible categories. In addition, PNR does not routinely include information that
could directly indicate the racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union
membership, health, or sex life of the individual. To the extent PNR does include terms that reveal such personal
matters, DHS employs an automated system that filters certain of these terms and only uses this information in
exceptional circumstances where the life of an individual could be imperiled or seriously impaired.
</p><p>The system contains information collected for the importation or exportation of cargo and/or property, including:
</p><p>• Bill of lading
</p><p>• Commodity type
</p><p>• License number and license country for Office of Defense Trade Controls registrants
</p><p>• Inspection and examination results
</p><p>The system contains Importer Security Filing (ISF) information, which must contain the following items, in addition to
the Vessel Stow Plan (VSP) and the Container Status Message (CSM):
</p><p>• Manufacturer (or supplier)
</p><p>• Seller (<i>i.e.,</i> full name and address or widely accepted business number such as a Data Universal
Numbering System (DUNS) number)
</p><p>• Buyer (<i>i.e.,</i> full name and address)
</p><p>• Ship to party (full name and/or business name and address)
</p><p>• Container stuffing location
</p><p>• Consolidator (stuffer)
</p><p>• Importer of record number/Foreign Trade Zone applicant identification number
</p><p>• Consignee number(s)
</p><p>• Country of origin
</p><p>• Commodity: Harmonized Tariff Schedule of the United States (HTSUS) number
</p><p>Alternatively, for shipments consisting entirely of Freight Remaining on Board (FROB) or shipments consisting of goods
intended to move through the United States, ISF Importers, or their agents, must submit the following five elements,
unless an element is specifically exempted:
</p><p>• Booking party (<i>i.e.,</i> name and address)
</p><p>• Foreign port of unlading
</p><p>• Place of delivery
</p><p>• Ship to party
</p><p>• Commodity HTSUS number
</p><p>The system contains assessments and other information obtained in accordance with the terms of memoranda of
understanding or other arrangement because the information is relevant to the border security mission of the Department.
</p><p>The system also contains information created by CBP, including:
</p><p>• Admissibility determinations
</p><p>• Results of Cargo Enforcement Exams
</p><p>• Law enforcement or intelligence information regarding an individual
</p><p>• Risk-based rules developed by analysts to assess and identify high-risk cargo, conveyances, or travelers
that should be subject to further scrutiny or examination
</p><p>• Assessments resulting from the rules, with a record of which rules were used to develop the assessment
</p><p>• Operational and analytical reports and/or projects developed that may include public source information
and/or classified information obtained by users/analysts for reference or incorporation into the report or project.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>ATS derives its authority from 19 U.S.C. 482, 1461, 1496, 1581, 1582; 8 U.S.C. 1357; 49 U.S.C. 44909; the
Enhanced Border Security and Visa Reform Act of 2002 (EBSVRA) (Pub. L. 107-173); the Trade Act of 2002 (Pub. L. 107
-210); the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA) (Pub.L. 108-458); and the
Security and Accountability for Every Port Act of 2006 (SAFE Port Act) (Pub. L. 109-347).
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>PURPOSES FOR PNR IN ATS: PNR may be used,
</p><p>(1). To prevent, detect, investigate, and prosecute:
</p><p>a. Terrorist offenses and related crimes, including
</p><p>i. Conduct that--
</p><p>1. involves a violent act or an act dangerous to human life, property, or infrastructure; and
</p><p>2. appears to be intended to--
</p><p>a. intimidate or coerce a civilian population;
</p><p>b. influence the policy of a government by intimidation or coercion; or
</p><p>c. affect the conduct of a government by mass destruction, assassination, kidnapping, or hostage-taking.
</p><p>ii. Activities constituting an offense within the scope of and as defined in applicable international conventions and
protocols relating to terrorism;
</p><p>iii. Providing or collecting funds, by any means, directly or indirectly, with the intention that they should be used
or in the knowledge that they are to be used, in full or in part, in order to carry out any of the acts described in
subparagraphs (i) or (ii);
</p><p>iv. Attempting to commit any of the acts described in subparagraphs (i), (ii), or (iii);
</p><p>v. Participating as an accomplice in the commission of any of the acts described in subparagraphs (i), (ii), or (iii);
</p><p>vi. Organizing or directing others to commit any of the acts described in subparagraphs (i), (ii), or (iii);
</p><p>vii. Contributing in any other way to the commission of any of the acts described in subparagraphs (i), (ii), or
(iii);
</p><p>viii. Threatening to commit an act described in subparagraph (i) under circumstances which indicate that the threat is
credible;
</p><p>b. Other crimes that are punishable by a sentence of imprisonment of three years or more and that are transnational in
nature;
</p><p>A crime is considered as transnational in nature in particular if:
</p><p>i. It is committed in more than one country;
</p><p>ii. It is committed in one country but a substantial part of its preparation, planning, direction or control takes
place in another country;
</p><p>iii. It is committed in one country but involves an organized criminal group that engages in criminal activities in
more than one country;
</p><p>iv. It is committed in one country but has substantial effects in another country; or
</p><p>v. It is committed in one country and the offender is in or intends to travel to another country;
</p><p>(2) on a case-by-case basis where necessary in view of a serious threat and for the protection of vital interests of
any individual or if ordered by a court;
</p><p>(3) to identify persons who would be subject to closer questioning or examination upon arrival to or departure from
the United States or who may require further examination.
</p><p>(4) for domestic law enforcement, judicial powers, or proceedings, where violations of law or indications thereof are
detected in the course of the use and processing of PNR.
</p><p>PURPOSES OF ATS (EXCEPT for PNR):
</p><p>ATS uses all other data for purposes listed above as well as below:
</p><p>(a) To perform targeting of individuals who may pose a risk to border security or public safety, may be a terrorist or
suspected terrorist, or may otherwise be engaged in activity in violation of U.S. law;
</p><p>(b) To perform a risk-based assessment of conveyances and cargo to focus CBP’s resources for inspection and
examination and enhance CBP’s ability to identify potential violations of U.S. law, possible terrorist threats, and other
threats to border security; and
</p><p>(c) To otherwise assist in the enforcement of the laws enforced or administered by DHS, including those related to
counterterrorism.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>Information ingested into this system from another source system is to be handled consistent with the published
system of records notice for the source system and will continue to be governed by the routine uses for that source
system. The routine uses below apply only to records that are maintained as official records in ATS (<i>i.e.,</i> records
which are maintained in ATS that are not covered by other originating systems of record, including: PNR; Importer
Security Filings; Cargo Enforcement Exams; the combination of license plate, Department of Motor Vehicle (DMV)
registration data and biographical data associated with a border crossing; law enforcement and/or intelligence data,
reports, and projects developed by CBP analysts that may include public source information and/or classified information;
and information obtained through memoranda of understanding or other arrangements because the information is relevant to
the border security mission of the Department). With respect to PNR, DHS only discloses information to those authorities
who intend to use the information consistent with the purposes identified above, and have sufficient capability to
protect and safeguard the information. In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the
Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a
routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body, when it is necessary or relevant to
the litigation and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. any employee of DHS in his/her official capacity;
</p><p>3. any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. the United States or any agency thereof.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made pursuant to a written Privacy Act waiver at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or General Services Administration pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but
only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. DHS has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or
property interests, of identity theft or fraud, or of harm to the security or integrity of this system or of harm to
other systems or programs (whether maintained by DHS or another agency or entity) or harm to the individuals that rely
upon the compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for the federal government when necessary to accomplish an
agency function related to this system of records. Individuals provided information under this routine use are subject to
the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To appropriate federal, state, tribal, local, or foreign governmental agencies or multilateral governmental
organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a
statute, rule, regulation, order, or license, where CBP believes the information would assist enforcement of applicable
civil or criminal laws;
</p><p>H. To federal and foreign government intelligence or counterterrorism agencies or components where DHS becomes aware
of an indication of a threat or potential threat to national or international security, or to assist in anti-terrorism
efforts;
</p><p>I. To an organization or person in either the public or private sector, either foreign or domestic, where there is a
reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, or
where the information is relevant to the protection of life, property, or other vital interests of a person;
</p><p>J. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental
organizations for the purpose of protecting the vital interests of a data subject or other persons, including to assist
such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to
combat other significant public health threats; appropriate notice will be provided of any identified health threat or
risk;
</p><p>K. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to
opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations, or in response to
a subpoena, or in connection with criminal law proceedings;
</p><p>L. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information
pertinent to the investigation, provided disclosure is appropriate in the proper performance of the official duties of
the officer making the disclosure;
</p><p>M. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental
organizations where CBP is aware of a need to utilize relevant data for purposes of testing new technology and systems
designed to enhance ATS;
</p><p>N. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by any of the data elements described in "Categories of Records," including
by name or personal identifier from an electronic database.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Official Records in this system (Passenger Name Records (PNR); Importer Security Filings (10+2 documentation);
results of Cargo Enforcement Exams; the combination of license plate, Department of Motor Vehicle registration data, and
biographical data associated with a border crossing; law enforcement and/or intelligence data, reports, and projects
developed by CBP analysts that may include public source information and/or classified information; and information
obtained through memoranda of understanding or other arrangements because the information is relevant to the border
security mission of the Department will be retained and disposed of in accordance with a records schedule approved by the
National Archives and Records Administration on April 12, 2008. ATS collects information directly, ingests information
from various systems, and accesses other systems without ingesting the data. To the extent information is ingested from
other systems, data is retained in ATS in accordance with the record retention requirements of those systems, or the
retention period for ATS, whichever is shortest.
</p><p>The retention period for the official records maintained in ATS will not exceed fifteen years, after which time the
records will be deleted, except as noted below. The retention period for PNR will be subject to the following further
access restrictions: ATS users with PNR access will have access to PNR in an active database for up to five years, during
which time the PNR will be depersonalized following the first six months retention. After this initial five-year
retention, the PNR data will be transferred to a dormant database for a period of up to ten years. PNR data in dormant
status will be subject to additional controls including the requirement of obtaining access approval from a senior DHS
official designated by the Secretary of Homeland Security. Furthermore, PNR in the dormant database may only be
repersonalized in connection with a law enforcement operation and only in response to an identifiable case, threat, or
risk. Such limited access and use for older PNR strikes a reasonable balance between protecting this information and
allowing CBP to continue to identify potential high-risk travelers. Notwithstanding the foregoing, information maintained
only in ATS that is linked to active law enforcement lookout records, CBP matches to enforcement activities, and/or
investigations or cases (<i>i.e.,</i> specific and credible threats; flights, individuals, and routes of concern; or
other defined sets of circumstances) will remain accessible for the life of the law enforcement matter to support that
activity and other enforcement activities that may become related.
</p><p>The justification for a fifteen-year retention period for the official records is based on CBP’s law enforcement and
security functions at the border. This retention period is based on CBP’s historical encounters with suspected terrorists
and other criminals, as well as the broader expertise of the law enforcement and intelligence communities. It is well
known, for example, that potential terrorists may make multiple visits to the United States in advance of performing an
attack. It is over the course of time and multiple visits that a potential risk becomes clear. Travel records, including
historical records, are essential in assisting CBP Officers with their risk-based assessment of travel indicators and
identifying potential links between known and previously unidentified terrorist facilitators. Analyzing these records for
these purposes allows CBP to continue to effectively identify suspect travel patterns and irregularities.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Executive Director, Automation and Targeting Division, Office of Intelligence and Investigative Liaison, U.S.
Customs and Border Protection, and Director, Targeting and Analysis, Systems Program Office, Office of Information and
Technology, U.S. Customs and Border Protection, both of whom are located at 1300 Pennsylvania Avenue NW., Washington, DC
20229.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the notification, access, amendment, and certain
accounting procedures of the Privacy Act because it is a law enforcement system. These exemptions also apply to the
extent that information in this system of records is recompiled or is created from information contained in other systems
of records with appropriate exemptions in place. To the extent that a record is exempted in a source system, the
exemption will continue to apply. Despite the exemptions taken on this system of records, CBP and DHS are not exempting
the following records from the access and amendment provisions of the Privacy Act: passenger name records (PNR) collected
by CBP pursuant to its statutory authority, 49 U.S.C. 44909, as implemented by 19 CFR 122.49d; Importer Security Filing
(10+2 documentation) information; and any records that were ingested by ATS where the source system of records already
provides access and/or amendment under the Privacy Act. Individuals seeking notification of and access to records
contained in this system of records, or seeking to contest its content, may submit a request in writing to the
Headquarters or CBP FOIA Officer, whose contact information can be found at <i>http://www.dhs.gov/foi</i>a under "
contacts." If an individual believes more than one component maintains Privacy Act records concerning him or her
the individual may submit the request to the Chief Privacy Officer, Department of Homeland Security, 245 Murray Drive
SW., Building 410, STOP-0655, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Identify which component(s) of the Department you believe may have the information about you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records, and
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are ingested from other DHS and federal systems, and from foreign governments (in accordance with the
terms of international agreements and arrangements), including but not limited to ACE, ACS, AES, APIS, BCI, CEAC
(including Forms DS-160 and DS-260), ENFORCE, ESTA, GES, NIIS, NSEERS, SEACATS, SEVIS, TECS, TSDB-WLS,
Social Security Administration’s Death Master File, and WebIDENT, Additionally, PNR is obtained from travel reservation
systems of commercial carriers. Information from Importer Security Filings is received from importers and ocean carriers.
Records are accessed from BPETS, CCD, eGIS, NCIC, and Nlets. Also, the results of queries in the FBI’s Interstate
Identification Index (III), the National Insurance Crime Bureau’s (NICB’s) private database of stolen vehicles, and
commercial data aggregators are stored in ATS. Lastly, records are also developed from analysis created by users as a
result of their use of the system.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>Pursuant to 6 CFR Part 5, Appendix C, certain records and information in this system are exempt from 5 U.S.C.
552a(c)(3) and (4); (d)(1), (2), (3), and (4); (e)(1), (2), (3), (4)(G) through (I), (e)(5), and (8); (f), and (g) of the
Privacy Act pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system
from the following provisions of the Privacy Act, pursuant to 5 U.S.C. 552a (k)(1) and (k)(2): 5 U.S.C. 552a(c)(3); (d)
(1), (d)(2), (d)(3), and (d)(4); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).
</p><p>Despite the exemptions taken on this system of records, CBP and DHS are not exempting the following records from the
access and amendment provisions of the Privacy Act: passenger name records (PNR) collected by CBP pursuant to its
statutory authority, 49 U.S.C. 44909, as implemented by 19 CFR 122.49d; Importer Security Filing (10+2 documentation)
information; and any records that were ingested by ATS where the source system of records already provides access and/or
amendment under the Privacy Act. A traveler may obtain access to his or her PNR, but records concerning the targeting
rules, the responses to rules, case events, law enforcement and/or intelligence data, reports, and projects developed by
CBP analysts that may include public source information and/or classified information, information obtained through
memoranda of understanding or other arrangements because the information is relevant to the border security mission of
the Department, or records exempted from access by the system from which ATS ingested or accessed the information will
not be accessible to the individual.
</p></xhtmlContent></subsection></section>



<section id="cbp7" toc="yes">
<systemNumber>/CBP-007</systemNumber>
<subsection type="systemName">Border Crossing Information (BCI).

</subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p> Unclassified, Sensitive, For Official Use Only (FOUO), and Law Enforcement-Sensitive (LES). The data may be retained on classified networks, but this does not change the nature and character of the data until it is combined with classified information.</p>
        </xhtmlContent> </subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p> DHS/CBP currently maintains records in information technology (IT) systems at DHS/CBP Headquarters in Washington, D.C. and at field offices. Computer terminals are located at customhouses, border ports of entry, airport inspection facilities under the jurisdiction of DHS/CBP, and other locations at which DHS/CBP authorized personnel may be posted to facilitate DHS’s mission. Terminals may also be located at appropriate facilities for other participating government agencies. Records are replicated from the operational IT system and maintained on DHS unclassified and classified networks.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
            <p> Individuals with records stored in BCI include U.S. citizens, lawful permanent residents (LPR), and immigrant and non-immigrant aliens who lawfully cross the U.S. border by air, land, or sea, regardless of method of transportation or conveyance.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p> DHS/CBP collects and stores the following records in the BCI system as border crossing information:</p>
            <p>• Full name (last, first, and, if available, middle);</p>
            <p>• Date of birth;</p>
            <p>• Gender;</p>
            <p>• Travel document type and number (e.g., passport information, permanent resident card, Trusted Traveler Program card);</p>
            <p>• Issuing country or entity and expiration date;</p>
            <p>• Photograph (when available);</p>
            <p>• Country of citizenship;</p>
            <p>• Tattoos;</p>
            <p>• Scars;</p>
            <p>• Marks;</p>
            <p>• Palm prints;</p>
            <p>• Digital fingerprints;</p>
            <p>• Digital iris scans;</p>
            <p>• Radio Frequency Identification (RFID) tag number(s) (if land or sea border crossing);</p>
            <p>• Date and time of crossing;</p>
            <p>• Lane for clearance processing;</p>
            <p>• Location of crossing;</p>
            <p>• Responses to certain CBP inspection-related questions;</p>
            <p>• Secondary Examination Status; and</p>
            <p>• For land border crossings only, license plate number or Vehicle Identification Number (VIN) (if no plate exists).</p>
            <p> CBP maintains in BCI information derived from an associated APIS transmission (when applicable), as well as any results of APIS information compared against CBP or partner data, which may include:</p>
            <p>• Full name (last, first, and, if available, middle);</p>
            <p>• Date of birth;</p>
            <p>• Gender;</p>
            <p>• Country of citizenship;</p>
            <p>• Passport/alien registration number and country of issuance;</p>
            <p>• Passport expiration date;</p>
            <p>• Country of residence;</p>
            <p>• Status on board the aircraft;</p>
            <p>• Travel document type;</p>
            <p>• U.S. destination address (for all private aircraft passengers and crew, and commercial air, rail, bus, and vessel passengers except for U.S. Citizens, LPRs, crew, and those in transit);</p>
            <p>• Place of birth and address of permanent residence (commercial flight crew only);</p>
            <p>• Pilot certificate number and country of issuance (flight crew only, if applicable);</p>
            <p>• Passenger Name Record (PNR) locator number;</p>
            <p>• Primary inspection lane;</p>
            <p>• ID inspector;</p>
            <p>• Records containing the results of comparisons of individuals to information maintained in CBP’s law enforcement databases as well as information from the Terrorist Screening Database (TSDB);</p>
            <p>• Information on individuals with outstanding wants or warrants; and</p>
            <p>• Information from other government agencies regarding high risk parties.</p>
            <p> CBP collects records under the Entry/Exit Program with Canada, such as border crossing data from the Canada Border Services Agency (CBSA), including:</p>
            <p>• Full name (last, first, and if available, middle);</p>
            <p>• Date of Birth;</p>
            <p>• Nationality (citizenship);</p>
            <p>• Gender;</p>
            <p>• Document Type;</p>
            <p>• Document Number;</p>
            <p>• Document Country of Issuance;</p>
            <p>• Port of entry location (Port code);</p>
            <p>• Date of entry; and</p>
            <p>• Time of entry.</p>
            <p>In addition, air and sea carriers or operators covered by the APIS rules and rail and bus carriers (to the extent voluntarily applicable) also transmit or provide the following information to CBP for retention in BCI:</p>
            <p>• Airline carrier code;</p>
            <p>• Flight number;</p>
            <p>• Vessel name;</p>
            <p>• Vessel country of registry/flag;</p>
            <p>• International Maritime Organization number or other official number of the vessel;</p>
            <p>• Voyage number;</p>
            <p>• Date of arrival/departure;</p>
            <p>• Foreign airport/port where the passengers and crew members began their air/sea transportation to the United States;</p>
            <p>• For passengers and crew members destined for the United States:</p>
            <p>o The location where the passengers and crew members will undergo customs and immigration clearance by CBP.</p>
            <p>• For passengers and crew members who are transiting through (and crew on flights over flying) the United States and not clearing CBP:</p>
            <p>o The foreign airport/port of ultimate destination; and</p>
            <p>o Status on board (whether an individual is crew or non-crew).</p>
            <p>• For passengers and crew departing the United States:</p>
            <p>o Final foreign airport/port of arrival.</p>
            <p>Other information also stored in this system of records includes:</p>
            <p>• Aircraft registration number provided by pilots of private aircraft;</p>
            <p>• Type of aircraft;</p>
            <p>• Call sign (if available);</p>
            <p>• CBP issued decal number (if available);</p>
            <p>• Place of last departure (e.g., ICAO airport code, when available);</p>
            <p>• Date and time of aircraft arrival;</p>
            <p>• Estimated time and location of crossing U.S. border or coastline;</p>
            <p>• Name of intended airport of first landing, if applicable;</p>
            <p>• Owner or lessee name (first, last, and middle, if available, or business entity name);</p>
            <p>• Owner or lessee contact information (address, city, state, zip code, country, telephone number, fax number, and email address, pilot, or private aircraft pilot name);</p>
            <p>• Pilot information (license number, street address (number and street, city state, zip code, country), telephone number, fax number, and email address);</p>
            <p>• Pilot license country of issuance;</p>
            <p>• Operator name (for individuals: last, first, and middle, if available; or name of business entity, if available);</p>
            <p>• Operator street address (number and street, city, state, zip code, country, telephone number, fax number, and email address);</p>
            <p>• Aircraft color(s);</p>
            <p>• Complete itinerary (foreign airport landings within 24 hours prior to landing in the United States);</p>
            <p>• 24-hour emergency point of contact information (e.g., broker, dispatcher, repair shop, or other third party who is knowledgeable about this particular flight):</p>
            <p>o Full name (last, first, and middle (if available)) and telephone number; and</p>
            <p>• Incident to the transmission of required information via eAPIS (for general aviation itineraries, pilot, and passenger manifests), records will also incorporate the pilot’s email address.</p>
            <p> To the extent private aircraft operators and carriers may transmit APIS, similar information may also be recorded in BCI by CBP with regard to such travel. CBP also collects the license plate number of the conveyance (or VIN number when no plate exists) in the land border environment for both arrival and departure (when departure information is available).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="authorityForMaintenance">
        <xhtmlContent>
            <p> Authority for BCI is provided by the Enhanced Border Security and Visa Entry Reform Act of 2002 (Pub. L. 107-173, 116 Stat. 543 (2002)); the Aviation and Transportation Security Act of 2001 (Pub. L. 107-71, 115 Stat. 597); the Intelligence Reform and Terrorism Prevention Act of 2004 (Pub. L. 108-458, 118 Stat. 3638 (2004)); the Immigration and Nationality Act, as amended, (8 U.S.C. 1185,1354, 1365a and 1365b); and the Tariff Act of 1930, as amended, (19 U.S.C. 1322-1683g, including 19 U.S.C. 66, 1433, 1454, 1485, 1624 and 2071).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p> DHS/CBP collects and maintains this information to vet and inspect persons arriving in or departing from the United States; to determine identity, citizenship, and admissibility; and to identify persons who: (1) may be (or are suspected of being) a terrorist or having affiliations to terrorist organizations; (2) have active warrants for criminal activity; (3) are currently inadmissible or have been previously removed from the United States; or (4) have been otherwise identified as potential security risks or raise a law enforcement concern. For immigrant and non-immigrant aliens, the information is also collected and maintained to ensure information related to a particular border crossing is available for providing any applicable benefits related to immigration or other enforcement purposes. Lastly, DHS/CBP maintains information in BCI to retain a historical record of persons crossing the border to facilitate law enforcement, counterterrorism, and benefits processing.</p>
            <p> DHS/CBP maintains a replica of some or all of the data in the operating system on DHS unclassified and classified networks to allow for analysis and vetting consistent with the above stated purposes and this published notice.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p> In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
            <p> A. To the Department of Justice (DOJ), including Offices of the United States Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
            <p>  1. DHS or any Component thereof;</p>
            <p>  2. Any employee or former employee of DHS in his/her official capacity;</p>
            <p>  3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
            <p>  4. The United States or any agency thereof.</p>
            <p> B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
            <p> C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
            <p> D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
            <p> E. To appropriate agencies, entities, and persons when:</p>
            <p> 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;</p>
            <p> 2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
            <p> 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
            <p> F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
            <p>H. To appropriate federal, state, tribal, local, or foreign governmental agencies or multilateral governmental organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a statute, rule, regulation, order, or license, when DHS believes the information would assist enforcement of applicable civil or criminal laws.</p>
            <p>I. To the CBSA for law enforcement and immigration purposes, as well as to facilitate cross-border travel when an individual enters the United States from Canada.</p>
            <p>J. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations when DHS reasonably believes there to be a threat (or potential threat) to national or international security for which the information may be relevant in countering the threat (or potential threat).</p>
            <p>K. To a federal, state, tribal, or local agency, other appropriate entity or individual, or foreign governments, in order to provide relevant information related to intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, E.O., or other applicable national security directive.</p>
            <p> L. To an organization or individual in either the public or private sector (foreign or domestic) when there is a reason to believe that the recipient is (or could become) the target of a particular terrorist activity or conspiracy, or when the information is relevant and necessary to the protection of life or property.</p>
            <p> M. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations for the purposes of protecting the vital interests of the data subject or other persons, including to assist such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease, to combat other significant public health threats, or to provide appropriate notice of any identified health threat or risk.</p>
            <p> N. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations, or in connection with criminal law proceedings.</p>
            <p> O. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation.</p>
            <p> P. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations when DHS is aware of a need to use relevant data for purposes of testing new technology.</p>
            <p> Q. To an appropriate federal, state, local, tribal, foreign, or international agency, if the information is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant or other benefit and when disclosure is appropriate to the proper performance of the official duties of the person making the request.</p>
            <p> R. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
            <p>Disclosure to consumer reporting agencies:</p>
            <p> None.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p>Storage:</p>
            <p> DHS/CBP stores records in this system electronically in the operational IT system, including on DHS unclassified and classified networks, or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, digital media, and CD-ROM.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
            <p> DHS/CBP retrieves records by name or other personal identifiers listed in the categories of records, above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
            <p> DHS/CBP safeguards records in this system in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies. Strict controls are imposed to minimize the risk of compromising the information that is being stored. DHS/CBP limits access to BCI to those individuals who have a need to know the information for the performance of their official duties and who also have appropriate clearances or permissions.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p> DHS/CBP is working with NARA to develop the appropriate retention schedule based on the information below. For persons DHS/CBP determines to be U.S. citizens and LPRs, information in BCI that is related to a particular border crossing is maintained for 15 years from the date when the traveler entered, was admitted to or paroled into, or departed the United States, at which time it is deleted from BCI. For non-immigrant aliens, the information will be maintained for 75 years from the date of admission or parole into or departure from the United States in order to ensure that the information related to a particular border crossing is available for providing any applicable benefits related to immigration or for other law enforcement purposes.</p>
            <p> Information related to border crossings prior to a change in status will follow the 75 year retention period for non-immigrant aliens who become U.S. citizens or LPRs following a border crossing that leads to the creation of a record in BCI. All information regarding border crossing by such persons following their change in status will follow the 15 year retention period applicable to U.S. citizens and LPRs. For all travelers, however, BCI records linked to active law enforcement lookout records, DHS/CBP matches to enforcement activities, or investigations or cases remain accessible for the life of the primary records of the law enforcement activities to which the BCI records may relate, to the extent retention for such purposes exceeds the normal retention period for such data in BCI.</p>
            <p>Records replicated on the unclassified and classified networks for analysis and vetting will follow the same retention schedule.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p> Director, Traveler Entry Programs, U.S. Customs and Border Protection Headquarters, 1300 Pennsylvania Avenue, N.W., Washington, D.C. 20229.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p> DHS/CBP allows persons (including foreign nationals) to seek administrative access under the Privacy Act to information maintained in BCI. However, the Secretary of DHS exempted portions of this system from the notification, access, and amendment procedures of the Privacy Act because it is a law enforcement system. Nonetheless, DHS/CBP will consider individual requests to determine whether or not information may be released. Thus, individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the DHS Chief Freedom of Information Act (FOIA) Officer or CBP FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts." If an individual believes more than one Component maintains Privacy Act records that concern him or her, the individual may submit the request to the Chief Privacy Officer and Chief FOIA Officer, Department of Homeland Security, 245 Murray Lane S.W., Building 410, STOP-0655, Washington, D.C. 20528.</p>
            <p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. Although no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief FOIA Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, you should:</p>
            <p>• Explain why you believe the Department would have information on you;</p>
            <p>• Identify which Component(s) of the Department you believe may have the information about you;</p>
            <p>• Specify when you believe the records would have been created; and</p>
            <p>• Provide any other information that will help the FOIA staff determine which DHS Component agency may have responsive records.</p>
            <p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
            <p>Without the above information, CBP may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            <p> In processing requests for access to information in this system, CBP will review the records in the operational system and coordinate with DHS to address access to records on the DHS unclassified and classified networks.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p> See "Notification procedure" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p> See "Notification procedure" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p> DHS/CBP collects information from individuals who arrive in, depart from, or transit through the United States. This system also collects information from carriers that operate vessels, vehicles (including buses), aircraft, or trains that enter or exit the United States, including private aircraft operators. Lastly, BCI receives border crossing information from CBSA.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p> No exemption shall be asserted with respect to information maintained in the system that is collected from a person at the time of crossing and submitted by that person’s air, sea, bus, or rail carriers if that person, or his or her agent, seeks access or amendment of such information.</p>
            <p> The Privacy Act, however, requires DHS to maintain an accounting of the disclosures made pursuant to all routines uses. Disclosing the fact that a law enforcement or intelligence agency has sought particular records may affect ongoing law enforcement activities. The Secretary of DHS, pursuant to 5 U.S.C. 552a(j)(2), exempted this system from the following provisions of the Privacy Act: Sections (c)(3), (e)(8), and (g) of the Privacy Act of 1974, as amended, as is necessary and appropriate to protect this information. Further, DHS has exempted sec. (c)(3) of the Privacy Act of 1974, as amended, pursuant to 5 U.S.C. 552a(k)(2) as is necessary and appropriate to protect this information.</p>
            <p> Additionally, this system contains records or information recompiled from or created from information contained in other systems of records that are exempt from certain provision of the Privacy Act. This system also contains accountings of disclosures made with respect to information maintained in the system. For these records or information only, in accordance with 5 U.S.C. 552a(j)(2) and (k)(2), DHS will also claim the original exemptions for these records or information from subsecs. (c)(3) and (4); (d)(1), (2), (3), and (4); (e)(1), (2), (3), (4)(G) through (I), (5), and (8); (f); and (g) of the Privacy Act of 1974, as amended, as necessary and appropriate to protect such information.</p>
        </xhtmlContent>
    </subsection>
</section>




<section id="cbp8" toc="yes">
<systemNumber>/CBP-008</systemNumber>
<subsection type="systemName">Non-Federal Entity Data System (NEDS).

</subsection>
<subsection type="systemLocation"><xhtmlContent><p>These datasets are located at the U.S. Customs and Border Protection (CBP) National Data Center. Computer terminals receiving the data are located at customhouses, border ports of entry, airport inspection facilities under the jurisdiction of the Department of Homeland Security and other locations at which DHS authorized personnel may be posted to facilitate DHS’s mission. Terminals may also be located at appropriate facilities for other participating government agencies, which have obtained system access pursuant to a Memorandum of Understanding.

</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Individuals covered by NEDS consist of persons, including U.S. Citizens and Canadian Citizens who have been issued Enhanced Driver’s Licenses (EDL) or certain other travel documents by participating authorities, such as certain States, Native American Tribes, and Canadian Provinces and Territories, where the issuing authority has chosen to provide CBP with advance information from their databases regarding the EDL or other travel document. Individuals holding travel documents issued by authorities that do not provide CBP with a copy of this information (or only provide CBP with real-time access to document-specific information in their databases at the time such document is presented for border crossing purposes) are not covered by NEDS, as the information underlying their travel document has not been provided in advance to CBP.

</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>NEDS will contain the following information, to the extent provided to CBP by the participating document-issuing authority:

</p><p>• Full Name (first, middle, and last)

</p><p>• Date of birth

</p><p>• Gender

</p><p>• Citizenship

</p><p>• Digital Image (Photograph)

</p><p>• Travel document type, e.g. Enhanced Driver’s License (EDL)

</p><p>• Issuing jurisdiction

</p><p>• Expiration date

</p><p>• Optical character read (OCR) identifier

</p><p>• RFID tag number(s)

</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>The legal authority for NEDS is the Enhanced Border Security and Visa Reform Act of 2002, Pub. L. 107-173, 116 Stat. 543 (2002), Aviation and Transportation Security Act of 2001, Pub. L. 107-71, 115 Stat. 597 (2001), Intelligence Reform and Terrorism Prevention Act of 2004, Pub. L. 108-458, 118 Stat. 3638 (2004), The Immigration and Nationality Act, 8 U.S.C. 1185 and 1354, and The Tariff Act of 1930, as amended, 19 U.S.C. 66, 1433, 1459, 1624 and 2071, as well as the memoranda of understanding/agreement entered into with participating issuing authorities who are providing the data with which NEDS is populated.

</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>CBP collects this information to expedite CBP processing upon an individual’s arrival in and, in certain instances, prior to the individual’s departure from the United States. This information will allow CBP, upon presentation of the travel document at the border, to electronically verify identity and citizenship, determine admissibility and perform law enforcement queries to identify security risks to the United States. This information is maintained in accordance with this system of records notice and applicable memoranda of understanding/agreement with the issuing authorities.

</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>The use of this information is limited, principally to the verification of travel document information used to denote identity and citizenship so as to determine admissibility to the United States. To the extent data derived from NEDS is subsequently transferred to other systems of record (e.g., upon presentment of a travel document in conjunction with a border crossing), that data may be used in a manner consistent with the system of records notice published for the receiving system of records.

</p><p>In consideration of privacy, CBP has limited the sharing of NEDS data to the statutory disclosures permitted under 5 U.S.C. 552a(b) of the Privacy Act, and has chosen not to publish routine uses pursuant to 5 U.S.C. 522a(b)(3). This provides an individual possessing an approved travel document, such as EDL, whose data is shared with CBP prior to crossing the border with a similar level of privacy protection as the individual whose data is shared with CBP at the time of such crossing.

</p><p>Disclosure to consumer reporting agencies:

</p><p>None.

</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>STORAGE:

</p><p>The data is stored electronically at the CBP Data Center for current data and offsite at an alternative data storage facility for historical logs and system backups.

</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>The data is retrievable by name, optical character recognition identifier, RFID tag number, or personal identifier from an electronic set of data.

</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>All NEDS records are protected from unauthorized access through appropriate administrative, physical, and technical safeguards. These safeguards include all of the following: Restricting access to those with a "need to know"; using locks, alarm devices, and passwords; compartmentalizing databases; auditing software; and encrypting data communications.

</p><p>NEDS information is secured in full compliance with the requirements of the DHS IT Security Program Handbook. This handbook establishes a comprehensive program, consistent with federal law and policy, to provide complete information security, including directives on roles and responsibilities, management policies, operational policies, and application rules, which will be applied to component systems, communications between component systems, and at interfaces between component systems and external systems.

</p><p>One aspect of the DHS comprehensive program to provide information security involves the establishment of rules of behavior for each major application, including NEDS. These rules of behavior require users to be adequately trained regarding the security of their systems. These rules also require a periodic assessment of technical, administrative and managerial controls to enhance data integrity and accountability. System users must sign statements acknowledging that they have been trained and understand the security aspects of their systems. System users must also complete annual privacy awareness training to maintain current access.

</p><p>NEDS transactions are tracked and can be monitored. This allows for oversight and audit capabilities to ensure that the data is being handled consistent with all applicable federal laws and regulations regarding privacy and data integrity. Data exchange, which will take place over an encrypted network between CBP and other DHS components that may be authorized to have access to NEDS data, is limited and confined only to those entities that have a need for the data in the performance of official duties.








</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>NEDS data is subject to a retention requirement. The information collected and maintained in NEDS is used for border crossing purposes and is retained in NEDS for the duration of the validity of the travel document, that is from the date of issuance by the issuing authority until the date of expiration on the document, or, to the extent more restrictive, in accordance with the terms of any memorandum of understanding/agreement between CBP and the issuing authority. Information contained in NEDS will be retained and updated as information is provided by the issuing authority, so as to ensure timeliness, relevancy, accuracy, and completeness.

</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Director, Office of Automated Systems, U.S. Customs and Border Protection Headquarters, 1300 Pennsylvania Avenue, NW., Washington, DC 20229.

</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>DHS allows persons (including foreign nationals) to seek administrative access under the Privacy Act to information maintained in NEDS. To determine whether NEDS contains records relating to you, write to the CBP Customer Service Center (Rosslyn VA), 1300 Pennsylvania Avenue, NW., Washington, DC 20229; Telephone (877) 227-5511; or through the "Questions" tab at <i>http://www.cbp.gov.xp.cgov/travel/customerservice.</i>

</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Requests for notification or access must be in writing and should be addressed to the CBP Customer Service Center (Rosslyn, VA), 1300 Pennsylvania Avenue, NW., Washington, DC 20229; Telephone (877) 227-5511; or through the "Questions" tab at <i>http://www.cbp.gov.xp.cgov/travel/customerservice.</i> Requests should conform to the requirements of 6 CFR part 5, Subpart B, which provides the rules for requesting access to Privacy Act records maintained by DHS and can be found at <i>http://www.dhs.gov.</i> The envelope and letter should be clearly marked "Privacy Act Access Request." The request should include a general description of the records sought and must include the requester’s full name, current address, and date and place of birth. The request must be signed and either notarized or submitted under penalty of perjury.

</p><p>While DHS provides this mechanism for seeking notification and access to such information, requesters are encouraged in the first instance to contact the authority which issued the travel document to request access to this information, as DHS may nonetheless be required to coordinate any release with such authorities.

</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Requests to amend records must be in writing and should be addressed to the CBP Customer Service Center (Rosslyn, VA), 1300 Pennsylvania Avenue, NW., Washington, DC 20229; Telephone (877) 227-5511; or through the "Questions" tab at <i>http://www.cbp.gov.xp.cgov/travel/customerservice.</i> Requests should conform to the requirements of 6 CFR part 5, subpart B, which provides the rules for requesting access to Privacy Act records maintained by DHS and can be found at <i>http://www.dhs.gov/foia.</i> The envelope and letter should be clearly marked "Privacy Act Access Request." The request should include a general description of the records sought and must include the requester’s full name, current address, and date and place of birth. The request must be signed and either notarized or submitted under penalty of perjury.

</p><p>If individuals are uncertain what agency handles the information, they may seek redress through the DHS Traveler Redress Program ("TRIP") (See 72 FR 2294, dated January 18, 2007). TRIP is a single point of contact for individuals who have inquiries or seek resolution regarding difficulties they experienced during their travel screening at transportation hubs--such as, airports, seaports and train stations or at U.S. land borders. Through TRIP, a traveler can request correction of erroneous information stored in other DHS databases through one application. Redress requests should be sent to: DHS Traveler Redress Inquiry Program (TRIP), 601 South 12th Street, TSA-901, Arlington, VA 22202-4220 or online at <i>http://www.dhs.gov/trip.</i>

</p><p>Additionally, while DHS provides this mechanism for contesting records, requesters are encouraged in the first instance to contact the authority which issued the travel document to request access to this information, as DHS may nonetheless be required to coordinate any requests with such authorities.

</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>The system contains certain data received on individuals who have chosen to obtain a travel document that is designated by the Secretary of Homeland Security as denoting identity and citizenship for purposes of entering the United States and has been issued by an authority which has provided CBP with advance information from its relevant travel document database.

</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>



    <section id="cbp9" toc="yes">
        <systemNumber>/CBP-009</systemNumber>
        <subsection type="systemName">
            Department of Homeland Security (DHS)/U.S. Customs and Border Protection (CBP)-009 Electronic System for Travel Authorization (ESTA) System of Records.System (ESTA)
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified and classified. The data may be retained on classified networks, but this does not change the nature and character of the data until it is combined with classified information.</p>
                    </xhtmlContent>
                    </subsection>
                <subsection type="systemLocation">
                    <xhtmlContent>
                        <p>Records are maintained at the DHS/CBP Headquarters in Washington, D.C., and field offices. Records are replicated from the operational system and maintained on the DHS unclassified and classified networks to allow for analysis and vetting consistent with the stated uses, purposes, and routine uses published in this notice.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="systemManager">
                    <xhtmlContent>
                        <p>Director, ESTA Program Management Office, esta@cbp.dhs.gov, U.S. Customs and Border Protection Headquarters, 1300 Pennsylvania Avenue NW, Washington, D.C., 20229.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="authorityForMaintenance">
                    <xhtmlContent>
                        <p>Title IV of the Homeland Security Act of 2002, 6 U.S.C. 201 et seq., the Immigration and Naturalization Act, as amended, including 8 U.S.C. 1187(a)(11) and (h)(3), and implementing regulations contained in 8 CFR part 217; the Travel Promotion Act of 2009, Public Law 111-145, 22 U.S.C. 2131.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="purpose">
                    <xhtmlContent>
                        <p>The purpose of this system is to collect and maintain a record of applicants who want to travel to the United States under the VWP, and to determine whether applicants are eligible to travel to and enter the United States under the VWP. The information provided through ESTA, including information about other persons included on the ESTA application, is vetted against various security and law enforcement databases to identify those applicants who pose a security risk to the United States and to inform CBP’s decision to approve or deny the applicant’s ESTA application.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="categoriesOfIndividuals">
                    <xhtmlContent>
                    </xhtmlContent>
                </subsection>
                <subsection type="categoriesOfRecords">
                    <xhtmlContent>
                        <p>An ESTA application includes:</p>
                        •	<p>Full name (first, middle, and last);</p>
                        •	<p>Other names or aliases, if available;</p>
                        •	<p>Date of birth;</p>
                        •	<p>Country of birth;</p>
                        •	<p>Gender;</p>
                        •	<p>Email address;</p>
                        •	<p>Visa numbers, Laissez-Passer numbers, or Identity card numbers;</p>
                        •	<p>Social media identifiers, such as username(s) and platforms used;</p>
                        •	<p>Publicly available information from social media websites or platforms;</p>
                        •	<p>Telephone number (home, mobile, work, other);</p>
                        •	<p>Home address (address, apartment number, city, state/region);</p>
                        •	<p>Internet protocol (IP) address;</p>
                        •	<p>ESTA application number;</p>
                        •	<p>Global Entry Program Number;</p>
                        •	<p>Country of residence;</p>
                        •	<p>Passport information;</p>
                        •	<p>Department of Treasury Pay.gov payment tracking number information;</p>
                        •	<p>Countries of citizenship and nationality;</p>
                        •	<p>National identification number, if available;</p>
                        •	<p>Address while visiting the United States;</p>
                        •	<p>Emergency point of contact information;</p>
                        •	<p>U.S. Point of Contact information;</p>
                        •	<p>Parents’ names;</p>
                        •	<p>Current and previous employer information; and,</p>
                        •	<p>Photograph(s).</p>
                        <p>The categories of records in ESTA also include responses to questions related to the following:</p>
                        o	<p>History of mental or physical disorders, drug abuse or addiction,  and current communicable diseases,  fevers, and respiratory illnesses;</p>
                        o	<p>Past arrests, criminal convictions, or illegal drug violations;</p>
                        o	<p>Previous engagement in terrorist activities, espionage, sabotage, or genocide;</p>
                        o	<p>History of fraud or misrepresentation;</p>
                        o	<p>Previous unauthorized employment in the United States;</p>
                        o	<p>Past denial of visa, or refusal or withdrawal of application for admission at a U.S. port of entry;</p>
                        o	<p>Previous overstay of authorized admission period in the United States;</p>
                        o	<p>Travel history and information relating to prior travel to or presence in Iraq or Syria, a country designated as a state sponsor of terrorism, or another country or area of concern;  and,</p>
                        o	<p>Citizenship and nationality information, with additional detail required for nationals of certain identified countries of concern.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="recordSourceCategories">
                    <xhtmlContent>
                        <p>DHS/CBP obtains records from applicants or representatives (e.g., friend, relative, travel industry professional), through the online ESTA application available at https://esta.cbp.dhs.gov/esta/ or a mobile application. As part of the vetting process, DHS/CBP may also use information obtained from publicly available sources, including social media, and law enforcement and national security records from appropriate federal, state, local, international, tribal, or foreign governmental agencies or multilateral governmental organizations to assist in determining ESTA eligibility. This information is stored separate from information collected as part of the ESTA application.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="recordSourceCategories">
                    <xhtmlContent>
                        <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                        <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agency conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                        <p>1. DHS or any component thereof;</p>
                        <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                        <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                        <p>4. The United States or any agency thereof.</p>
                        <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                        <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. sec. 2904 and 2906.</p>
                        <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                        <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                        <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                        <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, where CBP believes the information would assist enforcement of applicable civil or criminal laws and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                        <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                        <p>I. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations for the purpose of protecting the vital health interests of a data subject or other persons (e.g., to assist such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to combat other significant public health threats; appropriate notice will be provided of any identified health threat or risk).</p>
                        <p>J. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS is aware of a need to use relevant data, that relate to the purpose(s) stated in this SORN, for purposes of testing new technology.</p>
                        <p>K. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation, provided disclosure is appropriate in the proper performance of the official duties of the officer making the disclosure.</p>
                        <p>L. To a federal, state, tribal, local, international, or foreign government agency or entity for the purpose of consulting with that agency or entity: (1) to assist in making a determination regarding redress for an individual in connection or program; (2) for the purpose of verifying the identity of an individual seeking redress in connection with the operations of a DHS Component or program; or (3) for the purpose of verifying the accuracy of information submitted by an individual who has requested such redress on behalf of another individual.</p>
                        <p>M. To a federal, state, tribal, local, international, or foreign government agency or entity in order to provide relevant information related to intelligence, counterintelligence, or counterterrorism activities authorized by U.S. law, Executive Order, or other applicable national security directive.</p>
                        <p>N. To the Department of State in the processing of petitions or applications for benefits under the Immigration and Nationality Act, and all other immigration and nationality laws including treaties and reciprocal agreements.</p>
                        <p>O. To an organization or individual in either the public or private sector, either foreign or domestic, when there is a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to the extent the information is relevant to the protection of life or property.</p>
                        <p>P. To the carrier transporting an individual to the United States, prior to travel, in response to a request from the carrier, to verify an individual’s travel authorization status.</p>
                        <p>Q. To the Department of Treasury’s Pay.gov, for payment processing and payment reconciliation purposes.</p>
                        <p>R. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations, or in connection with criminal law proceedings.</p>
                        <p>S. To the Department of Treasury's Office of Foreign Assets Control (OFAC) for inclusion on the publicly issued List of Specially Designated Nationals and Blocked Persons (SDN List) of individuals and entities whose property and interests in property are blocked or otherwise affected by one or more OFAC economic sanctions programs, as well as information identifying certain property of individuals and entities subject to OFAC economic sanctions programs.</p>
                        <p>T. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="policiesAndPractices">
                    <xhtmlContent>
                        <p>DHS/CBP stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="retrievability">
                    <xhtmlContent>
                    </xhtmlContent>
                </subsection>
                <subsection type="retentionAndDisposal">
                    <xhtmlContent>
                        <p>The retention of ESTA records is covered by National Archives and Records Administration DAA-0568-2019-0006. Application information submitted to ESTA, including the photographs, is retained for 15 years. DHS/CBP ingests ESTA application data into other DHS/CBP systems for vetting purposes and is stored in accordance with those system’s respective retention periods. For example, ESTA information is ingested into the Automated Targeting System (ATS) and is retained for 15 years and is also ingested into TECS where it is retained for 75 years, consistent with those systems’ retention schedules. These retention periods are based on DHS/CBP’s historical encounters with suspected terrorists and other criminals, as well as the broader expertise of the law enforcement and intelligence communities. It is well known, for example, that potential terrorists may make multiple visits to the United States in advance of performing an attack. It is over the course of time and multiple visits that a potential risk becomes clear. Travel records, including historical records, are essential in assisting DHS/CBP officers with their risk-based assessment of travel indicators and identifying potential links between known and previously unidentified terrorist facilitators. Analyzing the records for these purposes allows DHS/CBP to continue to effectively identify suspect travel patterns and irregularities. If the record is linked to active law enforcement lookout records, DHS/CBP matches to enforcement activities, and/or investigations or cases (i.e., specific and credible threats; flights, travelers, and routes of concern; or other defined sets of circumstances), the record will remain accessible for the life of the law enforcement matter to support that activity and other enforcement activities that may become related.</p>
                        <p> Payment information is not stored in ESTA but is forwarded to Pay.gov and stored in DHS/CBP’s financial processing system, Credit/Debit Card Data system, pursuant to the DHS/CBP-003 Credit/Debit Card Data System of Records Notice, 76 FR 67755 (November 2, 2011). When a VWP traveler’s ESTA data is used for purposes of processing his or her application for admission to the United States, the ESTA data will be used to create a corresponding admission record in the DHS/CBP-016 Non-Immigrant Information System (NIIS), 80 FR 13398 (March 13, 2015). This corresponding admission record will be retained in accordance with the NIIS retention schedule, which is 75 years.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="safeguards">
                    <xhtmlContent>
                    </xhtmlContent>
                </subsection>
                <subsection type="recordAccessProcedures">
                    <xhtmlContent>
                        <p>Applicants may access their ESTA information to view and amend their applications by providing their ESTA number, birth date, and passport number. Once they have provided their ESTA number, birth date, and passport number, applicants may view their ESTA status (authorized to travel, not authorized to travel, pending) and submit limited updates to their travel itinerary information. If an applicant does not know his or her application number, he or she can provide his or her name, passport number, date of birth, and passport issuing country to retrieve his or her application number.</p>
                        <p>In addition, ESTA applicants and other individuals whose information is included on ESTA applications may submit requests and receive information maintained in this system as it relates to data submitted by or on behalf of a person who travels to the United States and crosses the border, as well as, for ESTA applicants, the resulting determination (authorized to travel, pending, or not authorized to travel). However, the Secretary of Homeland Security has exempted portions of this system from certain provisions of the Privacy Act related to providing the accounting of disclosures to individuals because it is a law enforcement system. DHS/CBP will, however, consider individual requests to determine whether information may be released. In processing requests for access to information in this system, DHS/CBP will review the records in the operational system and coordinate with DHS to ensure that records that were replicated on the unclassified and classified networks, are reviewed, and based on this notice provide appropriate access to the information.</p>
                        <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and Headquarters Freedom of Information Act (FOIA) Officer whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655, or electronically at https://www.dhs.gov/freedom-information-act-foia. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                        <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. An individual may obtain more information about this process at http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                        •	<p>Explain why he or she believes the Department would have information being requested;</p>
                        •	<p>Identify which component(s) of the Department he or she believes may have the information;</p>
                        •	<p>Specify when the individual believes the records would have been created; and</p>
                        •	<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
                        <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                        <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="contestingRecordProcedures">
                    <xhtmlContent>
                        <p>See "Record Access Procedures" above.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="notificationProcedure">
                    <xhtmlContent>
                        <p>See "Record Access Procedures" above.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="exemptionsClaimed">
                    <xhtmlContent>
                        <p>Pursuant to 6 CFR Part 5, Appendix C, when this system receives a record from another system exempted in that source system under 5 U.S.C. 552a(j) or (k), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here. For instance, as part of the vetting process, this system may incorporate records from CBP’s ATS, and all of the exemptions for CBP’s Automated Targeting System SORN, described and referenced herein, carry forward and will be claimed by DHS/CBP. As such, law enforcement and other derogatory information covered in this system are exempt from 5 U.S.C. 552a(c)(3) and (4); (d)(1), (2), (3), and (4); (e)(1), (2), (3), (4)(G) through (I), (e)(5), and (8); (f); and (g) of the Privacy Act pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, pursuant to 5 U.S.C. 552a(k)(1) and (k)(2): 5 U.S.C. 552a(c)(3); (d)(1), (d)(2), (d)(3), and (d)(4); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).</p>
                        <p>DHS/CBP is not taking any exemption from subsection (d) with respect to information maintained in the system as it relates to data submitted by or on behalf of a person, as part of the application process, who travels to visit the United States and crosses the border, nor shall an exemption be asserted with respect to the resulting determination (authorized to travel, pending, or not authorized to travel). However, pursuant to 5 U.S.C. 552a(j)(2), DHS/CBP plans to exempt such information in this system from sections (c)(3), (e)(8), and (g) of the Privacy Act of 1974, as amended, as is necessary and appropriate to protect this information. Further, DHS will claim exemption from section (c)(3) of the Privacy Act of 1974, as amended, pursuant to 5 U.S.C. 552a(k)(2) as is necessary and appropriate to protect this information. CBP will not disclose the fact that a law enforcement or intelligence agency has sought particular records because it may affect ongoing law enforcement activities.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="history">
                    <xhtmlContent>
                        <p>84 FR 30746 (June 27, 2019); 81 FR 60713 (September 2, 2016); 81 FR 39680 (June 17, 2016); 81 FR 8979 (February 23, 2016); 79 FR 65414 (November 4, 2014); 77 FR 44642 (July 30, 2012); 76 FR 67751 (November 2, 2011); 73 FR 32720 (June 10, 2008).</p>
                    </xhtmlContent>
                </subsection>
            </section>




            <section id="cbp9" toc="yes">
<systemNumber>/CBP-009</systemNumber>
<subsection type="systemName">U.S. Customs and Border Protection--009 Nonimmigrant Information System.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>This computer database is located at the U.S. Customs and Border Protection (CBP) National Data Center. Computer
terminals are located at customhouses, border ports of entry, airport inspection facilities under the jurisdiction of the
Department of Homeland Security and other locations at which DHS authorized personnel may be posted to facilitate DHS’s
mission. Terminals may also be located at appropriate facilities for other participating government agencies that have
obtained system access pursuant to a Memorandum of Understanding.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system are nonimmigrant aliens entering and departing the U.S.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>NIIS is a dataset residing on the CBP Information Technology (IT) platform and in paper form. It contains arrival
and departure information collected from foreign nationals entering and departing the U.S. on such forms as the I-
94, I-94W, or through interviews with CBP officers. This information consists of the following data elements, where
applicable:
</p><p>• Full Name (first, middle, and last);
</p><p>• Date of birth;
</p><p>• E-mail address, as required;
</p><p>• Travel document type (e.g., passport information, permanent resident card, etc.), number, issuance date,
expiration date and issuing country;
</p><p>• Country of citizenship;
</p><p>• Date of crossing both into and out of the U.S.;
</p><p>• Scanned images linked through the platform;
</p><p>• Airline and flight number;
</p><p>• City of embarkation;
</p><p>• Address while visiting the U.S.;
</p><p>• Admission number received during entry into the U.S.;
</p><p>• Whether the individual has a communicable disease, physical or mental disorder, or is a drug abuser or
addict;
</p><p>• Whether the individual has been arrested or convicted for a moral turpitude crime, drugs, or has been
sentenced for a period longer than five years;
</p><p>• Whether the individual has engaged in espionage, sabotage, terrorism, or Nazi activity between 1933 and
1945;
</p><p>• Whether the individual is seeking work in the U.S.;
</p><p>• Whether the individual has been excluded or deported, or attempted to obtain a visa or enter the U.S. by
fraud or misrepresentation;
</p><p>• Whether the individual has ever detained, retained, or withheld custody of a child from a U.S. citizen
granted custody of the child;
</p><p>• Whether the individual has ever been denied a U.S. visa or entry into the U.S., or had a visa cancelled
(if yes, when and where);
</p><p>• Whether the individual has ever asserted immunity from prosecution; and
</p><p>• Any change of address while in the U.S.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; the Federal Records Act, 44 U.S.C. 3101; The legal authority for NIIS comes from 8 U.S.C. 1103, 8
U.S.C. 1184, Intelligence Reform and Terrorism Prevention Act of 2004, Public Law 108-458, The Immigration and
Nationality Act, 8 U.S.C. 1354, and the Homeland Security Act of 2002, Public Law 107-296.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>NIIS is a repository of records for persons arriving in or departing from the U.S. as nonimmigrant visitors and
is used for entry screening, admissibility, and benefits purposes. The system provides a central repository of contact
information for such aliens while in the U.S. and also captures arrival and departure information for determination of
future admissibility.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice or other Federal agency conducting litigation or in proceedings before any court,
adjudicative or administrative body, when it is necessary to the litigation and one of the following is a party to the
litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The U.S. or any agency thereof, is a party to the litigation or has an interest in such litigation, and DHS
determines that the records are both relevant and necessary to the litigation and the use of such records is compatible
with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To appropriate Federal, State, local, tribal, or foreign governmental agencies or multilateral governmental
organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a
statute, rule, regulation, order, license, or treaty where DHS determines that the information would assist in the
enforcement of civil or criminal laws.
</p><p>H. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to
opposing counsel or witnesses in the course of civil or criminal discovery, litigation, or settlement negotiations, or in
response to a subpoena from a court of competent jurisdiction.
</p><p>I. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information
pertinent to the investigation, provided disclosure is appropriate to the proper performance of the official duties of
the officer making the disclosure.
</p><p>J. To an organization or individual in either the public or private sector, either foreign or domestic, where there is
a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to
the extent the information is relevant to the protection of life or property and disclosure is appropriate to the proper
performance of the official duties of the person making the disclosure.
</p><p>K. To an appropriate Federal, State, local, tribal, foreign, or international agency, if the information is relevant
and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or issuance of a
security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS
decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an
investigation of an employee, the letting of a contract, or the issuance of a license, grant or other benefit and when
disclosure is appropriate to the proper performance of the official duties of the person making the request.
</p><p>L. To appropriate Federal, State, local, tribal, or foreign governmental agencies or multilateral governmental
organizations, for purposes of assisting such agencies or organizations in preventing exposure to or transmission of a
communicable or quarantinable disease or for combating other significant public health threats.
</p><p>M. To Federal and foreign government intelligence or counterterrorism agencies or components where CBP becomes aware
of an indication of a threat or potential threat to national or international security, or where such use is to assist in
anti-terrorism efforts and disclosure is appropriate to the proper performance of the official duties of the person
making the disclosure.
</p><p>N. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>O. To appropriate Federal, State, local, tribal, or foreign governmental agencies or multilateral governmental
organizations where DHS is aware of a need to utilize relevant data for purposes of testing new technology and systems
designed to enhance national security or identify other violations of law
</p><p>DISCLOSURE TO CONSUMER REPORTING AGENCIES:</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>The data is stored electronically at the CBP and DHS Data Center for current data and offsite at an alternative
data storage facility for historical logs, system backups and in paper form.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>These records may be searched on a variety of data elements including name, addresses, place and date of entry or
departure, or country of citizenship as listed in the travel documents used at the time of entry to the U.S. An admission
number, issued at each entry to the U.S. to track the particular admission, may also be used to identify a database
record.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>All NIIS records are protected from unauthorized access through appropriate administrative, physical, and
technical safeguards. These safeguards include all of the following: restricting access to those with a "need to
know"; using locks, alarm devices, and passwords; compartmentalizing databases; auditing software; and encrypting
data communications.
</p><p>NIIS information is secured in full compliance with the requirements of the DHS IT Security Program Handbook. This
handbook establishes a comprehensive program, consistent with federal law and policy, to provide complete information
security, including directives on roles and responsibilities, management policies, operational policies, and application
rules, which will be applied to component systems, communications between component systems, and at interfaces between
component systems and external systems.
</p><p>One aspect of the DHS comprehensive program to provide information security involves the establishment of rules of
behavior for each major application, including NIIS. These rules of behavior require users to be adequately trained
regarding the security of their systems. These rules also require a periodic assessment of technical, administrative and
managerial controls to enhance data integrity and accountability. System users must sign statements acknowledging that
they have been trained and understand the security aspects of their systems. System users must also complete annual
privacy awareness training to maintain current access.
</p><p>NIIS transactions are tracked and can be monitored. This allows for oversight and audit capabilities to ensure that
the data is being handled consistent with all applicable federal laws and regulations regarding privacy and data
integrity.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>NIIS data is subject to a retention requirement. The information collected and maintained in NIIS is used for
entry screening, admissibility, and benefits purposes and is retained for seventy five (75) years from the date obtained.
However, NIIS records that are linked to active law enforcement lookout records, CBP matches to enforcement activities,
and/or investigations or cases will remain accessible for the life of the law enforcement activities to which they may
become related. The current disposition for paper copy is 180 days from date of departure.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Assistant Commissioner, Office of Information Technology, U.S. Customs and Border Protection Headquarters, 1300
Pennsylvania Avenue, NW., Washington, DC 20229.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to CBP’s FOIA Officer, 1300 Pennsylvania Avenue, NW., Mint Annex,
Washington, DC 20229.
</p><p>When seeking records about yourself from this system of records or any other CBP system of records your request must
conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you
must provide your full name, current address and date and place of birth. You must sign your request, and your signature
must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of
perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from
the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In addition you should
provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information CBP may not be able to conduct an effective search, and your request may be denied
due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>The system contains certain data received on individuals, passengers and crewmembers that arrive in, depart from,
or transit through the U.S. This system also contains information collected from carriers that operate vessels, vehicles,
aircraft and/or trains that enter or exit the U.S. and from the individuals upon crossing the U.S. border.
</p><p>Basic information is obtained from individuals, the individual’s attorney/representative, CBP officials, and other
federal, state, local, and foreign agencies.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>No exemption shall be asserted with respect to information maintained in the system that is collected from a
person or submitted on behalf of a person, if that person, or his or her agent, seeks access or amendment of such
information.
</p><p>This system, however, may contain information related to an ongoing law enforcement investigation because the
information regarding a person’s travel and border crossing was disclosed to appropriate law enforcement in conformance
with the above routine uses. As such pursuant to 5 U.S.C. 552 a (j)(2) and (k)(2), DHS will claim exemption from (c)(3),
(e)(8), and (g) of the Privacy Act of 1974, as amended, as is necessary and appropriate to protect this information.   
       
</p></xhtmlContent></subsection></section>
    
    
    
<section id="cbp10" toc="yes">
<systemNumber>/CBP-010</systemNumber>
<subsection type="systemName">Persons Engaged in International Trade in Customs and Border Protection Licensed/Regulated Activities.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the U.S. Customs and Border Protection Headquarters in Washington, DC and in field
offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include importers, brokers, carriers, sureties; officers/owners,
employees, associates of customs bonded carriers, drivers of motor vehicles, licensed cartmen, licensed lightermen,
individuals and firms who have applied for or hold a license as a bonded cartman or lighterman, individuals employed by
cartmen or lightermen, present and past container station operators and warehouse proprietors and their employees,
including those who require an investigation, licensed customs brokers, employees of customs brokers, individuals or
firms who have applied for a broker’s license, airport and airline employees with access to the CBP controlled area of a
terminal, and employees of vessel agents.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system may include:
</p><p>• Individual’s name;
</p><p>• Social security number;
</p><p>• Date and place of birth;
</p><p>• Addresses and notification of change of address;
</p><p>• Personal characteristics;
</p><p>• Photograph or other biometrics;
</p><p>• History of past employment;
</p><p>• Previous five years residences,
</p><p>• Alias;
</p><p>• Citizenship;
</p><p>• Military records;
</p><p>• Criminal record other than traffic violations;
</p><p>• Use of narcotic drugs;
</p><p>• Organization’s name;
</p><p>• Copies of bonds, entries, bills, and data center listings;
</p><p>• Location of business records;
</p><p>• Status reports of individuals’ application including issuance, denial or renewal;
</p><p>• Copies of incoming and outgoing correspondence relating to persons engaged in international trade in CBP
licensed/regulated activities;
</p><p>• Requests for written approval to employ persons who have been convicted of a felony;
</p><p>• Applications for cartmen/lightermen licenses and identification cards;
</p><p>• Applications and approvals/denials of bonds to act as container station operator or warehouse proprietor;
</p><p>• Reports of investigations;
</p><p>• Fingerprint cards;
</p><p>• Information regarding proposed administrative disciplinary action against customs brokers for violation of
the regulations governing the conduct of their business; and
</p><p>• Determinations as to whether CBP issued or did not issue a particular license or permit and the type of
license or permit.
</p><p><i>Authority for maintenance of the system:</i>
</p><p>5 U.S.C. 301; the Federal Records Act, 44 U.S.C. 3101; Executive Order 9373; 19 U.S.C. 1484, 1485, 1498, 1499, 1509,
1551, 1551a, 1555, 1556, 1565, 1624, and 1641; 19 CFR parts 19, 111, 112, 113, 141, 142, 148, and 163..
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to collect and maintain records on persons engaged in international trade in CBP
licensed/regulated activities. These records include identifying information as well as the results of background checks
or official vetting performed to ensure that CBP’s approval of the individuals’ right to perform the licensed or
regulated activity is appropriate.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice or other Federal agency conducting litigation or in proceedings before any court,
adjudicative or administrative body, when it is necessary to the litigation and one of the following is a party to the
litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS or any component in his/her official capacity;
</p><p>3. Any employee of DHS or any component in his/her individual capacity where DOJ or DHS has agreed to represent the
employee; or
</p><p>4. The U.S. or any agency thereof, is a party to the litigation or has an interest in such litigation, and DHS or CBP
determines that the records are both relevant and necessary to the litigation and the use of such records is compatible
with the purpose for which DHS or CBP collected the records.
</p><p>B. To a congressional office in response to an inquiry from that congressional office made at the request of the
individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS or CBP suspects or has confirmed that the security or confidentiality of information in the system of records
has been compromised;
</p><p>2. DHS or CBP has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS, CBP, or another agency or entity) or harm to the individual who relies
upon the compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS or CBP’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS or CBP, when necessary to accomplish an agency
function related to this system of records. Individuals provided information under this routine use are subject to the
same Privacy Act requirements and limitations on disclosure as are applicable to DHS/CBP officers and employees.
</p><p>G. To appropriate Federal, State, local, tribal, or foreign governmental agencies or multilateral governmental
organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a
statute, rule, regulation, order, license, or treaty where DHS determines that the information would assist in the
enforcement of civil or criminal laws.
</p><p>H. To an appropriate Federal, State, local, tribal, foreign, or international agency, if the information is relevant
and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or issuance of a
security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS
decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an
investigation of an employee, the letting of a contract, or the issuance of a license, grant or other benefit and
disclosure is appropriate to the proper performance of the official duties of the person making the request.
</p><p>I. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to
opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection
with criminal law proceedings or in response to a subpoena form a court of competent jurisdiction.
</p><p>J. To third parties during the course of a law enforcement investigation or background check to the extent necessary
to obtain information pertinent to the investigation, provided disclosure is appropriate to the proper performance of the
official duties of the officer making the disclosure.
</p><p>K. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records are retrieved by individual’s name or organization’s name.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated system security access policies. Strict controls have been imposed to minimize the risk of compromising the
information that is being stored. Access to the computer system containing the records in this system is limited to those
individuals who have a need to know the information for the performance of their official duties and who have appropriate
clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>• Carrier records are retained by CBP for six years after the death of the licensee or revocation in
accordance with the CBP, Records Control Manual, Schedule 6, Custody of Merchandise, Item 2.
</p><p>• Broker files and records of broker’s employees are retained by CBP for six years after the death of the
licensee or revocation in accordance with the CBP, Records Control Manual, Schedule 6, Custody of Merchandise, Item 2.
These files are periodically updated and removed to an inactive file, as necessary.
</p><p>• Cartmen and lightermen files are reviewed annually at which time cancelled identification cards are
removed. Closed CBP Form 3078s (Application for Identification Card) may also be removed, but normally are held for
approximately three years in case a new application is received from the same company or transferred to another company
after investigation.
</p><p>• Container station operator files are disposed of in accordance with the CBP Records Control Manual,
Schedule 6, Custody of Merchandise Records, Item 10.
</p><p>• Records on warehouse proprietor and vessel agent employees are maintained by the organization for the
duration of the individual’s employment and retained by CBP for six years after the death of the licensee or revocation
in accordance with the CBP, Records Control Manual, Schedule 6, Custody of Merchandise, Item 2.
</p><p>• Records on drivers are maintained in an active file until revoked or cancelled. After revocation or
cancellation, the information folder is placed in an inactive file for five years, and then disposed of in accordance
with the General Services Administration Disposal Manual.
</p><p>• Information on proprietor bonded warehouse operators and employees is retained on file until Customs
bonded operations cease and are discontinued, and then maintained in an inactive file for three years. Final disposition
is in accordance with the General Services Administration Disposal Manual.
</p><p>• Files on brokers, carriers, and sureties are maintained for six years after death of licensee or
revocation in accordance with the CBP Records Control Manual. In accordance with the Records Control Manual, Schedule 9
Entry Processing, files on importers are maintained in connection with the respective entry of merchandise for eight
years after liquidation of the entry, which is the final determination of classification and duty relating to the
imported merchandise by CBP.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Executive Director, Commercial Targeting and Enforcement, Office of International Trade, U.S. Customs and Border
Protection, Customs and Border Protection Headquarters, 1300 Pennsylvania Avenue, NW., Mint Annex, Washington, DC 20229.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from certain aspects of the notification, access, and
amendment requirements of the Privacy Act. CBP will review each request to determine whether or not notification, access,
or amendment should be provided. Individuals seeking notification of and access to any record contained in this system of
records, or seeking to contest its content, may submit a request in writing to CBP’s FOIA Officer, 1300 Pennsylvania
Avenue, NW., Mint Annex, Washington, DC 20229.
</p><p>When seeking records about yourself from this system of records or any other CBP system of records your request must
conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you
must provide your full name, current address and date and place of birth. You must sign your request, and your signature
must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of
perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from
the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In addition you should
provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information CBP may not be able to conduct an effective search, and your request may be denied
due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are obtained by authorized Customs forms or electronic formats from individuals and/or companies
incidental to the conduct of foreign trade and required by the Customs Service in administering the tariff laws and
regulations of the United States. Individuals; organizations; DHS/CBP; correspondence; investigation reports and
supporting materials; applications for bonds and licenses, and other DHS/CBP memoranda.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system pursuant to exemption 5 U.S.C. 552a(j)(2) of the
Privacy Act, portions of this system are exempt from 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G),
(e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f), and (g). Additionally, the Secretary has exempted this system pursuant to 5
U.S.C. 552a(k)(2) of the Privacy Act from subsections (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f).
</p></xhtmlContent></subsection></section>
<section id="cbp11" toc="yes">
<systemNumber>/CBP-011</systemNumber>
<subsection type="systemName">DHS/CBP-011 TECS.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified; Law Enforcement Sensitive.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>This computer database is located at the U.S. Customs and Border Protection National Data Center in the
Washington DC area. TECS will be migrated to other DHS Datacenters. Computer terminals are located at CBP sites and ports
throughout the United States and at CBP Headquarters, Washington, DC, as well as appropriate facilities under the
jurisdiction of the U.S. Department of Homeland Security (DHS) and other locations at which officers of DHS may be posted
or operate to facilitate DHS’s mission of homeland security. Terminals may also be located at appropriate facilities for
other participating government agencies pursuant to agreement.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>• Violators or suspected violators of laws enforced or administered by DHS (some of whom have been
apprehended by officers of DHS);
</p><p>• Individuals who are suspected of, or who have been arrested for, thefts from international commerce;
</p><p>• Convicted violators of laws enforced or administered by DHS and/or drug laws in the United States and
foreign countries;
</p><p>• Persons with outstanding warrants--Federal or state;
</p><p>• Victims of any violation of the laws enforced or administered by DHS;
</p><p>• Owners, operators and/or passengers of vehicles, vessels or aircraft traveling across U.S. borders or
through other locations where CBP maintains an enforcement or operational presence;
</p><p>• Persons traveling across U.S. borders or through other locations where CBP maintains an enforcement or
operational presence and who are determined to be related to a law enforcement context;
</p><p>• Persons identified by Center for Disease Control (CDC), U.S. Health and Human Services as "No Boards
" because of a highly contagious communicable disease through the Advance Passenger Information System in
connection with trying to board an aircraft to travel internationally;
</p><p>• Individuals who have been issued a CBP detention or warning;
</p><p>• Individuals who may pose a threat to the United States; and
</p><p>• Individuals who have been given access to TECS for authorized purposes.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Various types of information from a variety of Federal, state, local, and foreign sources, which contribute to
effective law enforcement and counterterrorism efforts, may be maintained in this system of records. Records include, but
are not limited to, records pertaining to known or suspected violators, wanted persons, persons of interest for law
enforcement and counterterrorism purposes, reference information, regulatory and compliance data. Information about
individuals includes, but is not limited to full name, alias, date of birth, address, physical description, various
identification numbers (e.g., social security number, alien number, I-94 number, seizure number), details and
circumstances of a search, arrest, or seizure, case information such as merchandise and values, methods of theft.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>Section 5 U.S.C. 301; Homeland Security Act of 2002, Pub. L. 107-296; the Tariff Act of 1930, as amended;
Title 18, United States Code, Chapter 27; the Immigration and Nationality Act.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to track individuals who have violated or are suspected of violating a law or
regulation that is enforced or administered by CBP, to provide a record of any inspections conducted at the border by
CBP, to determine admissibility into the United States, and to record information regarding individuals, firms, and
organizations to whom DHS/CBP has issued detentions and warnings. Additionally, this system of records covers individuals
who have been given access to TECS for authorized purposes.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice or other Federal agency conducting litigation or in proceedings before any court,
adjudicative or administrative body, when it is necessary to the litigation and one of the following is a party to the
litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS or any component in his/her official capacity;
</p><p>3. Any employee of DHS or any component in his/her individual capacity where DOJ or DHS has agreed to represent the
employee; or
</p><p>4. The U.S. or any agency thereof, is a party to the litigation or has an interest in such litigation, and DHS or CBP
determines that the records are both relevant and necessary to the litigation and the use of such records is compatible
with the purpose for which DHS or CBP collected the records.
</p><p>B. To a congressional office in response to an inquiry from that congressional office made at the request of the
individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS or CBP suspects or has confirmed that the security or confidentiality of information in the system of records
has been compromised;
</p><p>2. DHS or CBP has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS, CBP, or another agency or entity) or harm to the individual who relies
upon the compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS or CBP’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS or CBP, when necessary to accomplish an agency
function related to this system of records. Individuals provided information under this routine use are subject to the
same Privacy Act requirements and limitations on disclosure as are applicable to DHS/CBP officers and employees.
</p><p>G. To appropriate Federal, State, local, tribal, or foreign governmental agencies or multilateral governmental
organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a
statute, rule, regulation, order, license, or treaty where DHS determines that the information would assist in the
enforcement of civil or criminal laws.
</p><p>H. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to
opposing counsel or witnesses in the course of civil or criminal discovery, litigation, or settlement negotiations, or in
response to a subpoena from a court of competent jurisdiction.
</p><p>I. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information
pertinent to the investigation, provided disclosure is appropriate to the proper performance of the official duties of
the officer making the disclosure.
</p><p>J. To an organization or individual in either the public or private sector, either foreign or domestic, where there is
a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to
the extent the information is relevant to the protection of life or property and disclosure is appropriate to the proper
performance of the official duties of the person making the disclosure.
</p><p>K. To an appropriate Federal, State, local, tribal, foreign, or international agency, if the information is relevant
and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or issuance of a
security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS
decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an
investigation of an employee, the letting of a contract, or the issuance of a license, grant or other benefit and when
disclosure is appropriate to the proper performance of the official duties of the person making the request.
</p><p>L. To appropriate Federal, State, local, tribal, or foreign governmental agencies or multilateral governmental
organizations, for purposes of assisting such agencies or organizations in preventing exposure to or transmission of a
communicable or quarantinable disease or for combating other significant public health threats.
</p><p>M. To Federal and foreign government intelligence or counterterrorism agencies or components where CBP becomes aware
of an indication of a threat or potential threat to national or international security, or where such use is to assist in
anti-terrorism efforts and disclosure is appropriate in the proper performance of the official duties of the person
making the disclosure;
</p><p>N. To the news media and the public, with the approval of the DHS Chief Privacy Officer in consultation with counsel,
as appropriate, when there exists a legitimate public interest in the disclosure of the information or when disclosure is
necessary to preserve confidence in the integrity of CBP or is necessary to demonstrate the accountability of CBP’s
officers, employees, or individuals covered by the system, except to the extent it is determined that release of the
specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>O. To a Federal, State, or local agency, or other appropriate entity or individual, or through established liaison
channels to selected foreign governments, in order to provide intelligence, counterintelligence, or other information for
the purposes of intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order,
or other applicable national security directive.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>The data is stored electronically at the National Data Center and other DHS Data Centers for current data and
offsite at an alternative data storage facility for historical logs and system backups.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>The data is retrievable by name, address, unique identifiers or in association with an enforcement report or
other system document.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>All records are protected from unauthorized access through appropriate administrative, physical, and technical
safeguards. These safeguards include all of the following: restricting access to those with a "need to know";
using locks, alarm devices, and passwords; compartmentalizing databases; auditing software; and encrypting data
communications.
</p><p>TECS also monitors source systems for changes to the source data. The system manager, in addition, has the capability
to maintain system back-ups for the purpose of supporting continuity of operations and the discrete need to isolate and
copy specific data access transactions for the purpose of conducting security incident investigations. TECS information
is secured in full compliance with the requirements of the DHS IT Security Program Handbook. This handbook establishes a
comprehensive information security program.
</p><p>Access to TECS is controlled through a security subsystem, which is used to grant access to TECS information on a
"need-to-know" basis.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>The majority of information collected in TECS is used for law enforcement and counterterrorism purposes. Records
in the system will be retained and disposed of in accordance with a records schedule to be approved by the National
Archives and Records Administration.
</p><p>The retention period for information maintained in TECS is seventy-five (75) years from the date of the collection of
the information or for the life of the law enforcement matter to support that activity and other enforcement activities
that may become related. TECS collects information directly from authorized users.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Assistant Commissioner, Office of Information Technology, Passenger Systems Program Office, U.S. Customs and
Border Protection Headquarters, 1300 Pennsylvania Avenue, NW., Washington, DC 20229.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment
procedures of the Privacy Act because it is a law enforcement system. However, CBP will consider individual requests to
determine whether or not information may be released. Thus, individuals seeking notification of and access to any record
contained in this system of records, or seeking to contest its content, may submit a request in writing to CBP’s FOIA
Officer, 1300 Pennsylvania Avenue, NW., Washington, DC 20229.
</p><p>When seeking records about yourself from this system of records or any other CBP system of records your request must
conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you
must provide your full name, current address and date and place of birth. You must sign your request, and your signature
must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of
perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from
the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In addition you should
provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information CBP may not be able to conduct an effective search, and your request may be denied
due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>This system contains investigatory material compiled for law enforcement and counterterrorism purposes whose
sources need not be reported.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>Pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act, portions of this system are exempt from 5 U.S.C.
552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f), and (g).
Pursuant to 5 U.S.C. 552a(k)(2), this system is exempt from the following provisions of the Privacy Act, subject to the
limitations set forth in those subsections: 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f).
In addition, to the extent a record contains information from other exempt systems of records, CBP will rely on the
exemptions claimed for those systems.
</p></xhtmlContent></subsection></section>
<section id="cbp12" toc="yes">
<systemNumber>/CBP-012</systemNumber>
<subsection type="systemName">U.S. Customs and Border Protection--012 Closed Circuit Television System.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the U.S. Customs and Border Protection Headquarters in Washington, D.C. and in field
offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include individuals involved in incidents or disturbances
related to a DHS/CBP inspection while attempting to enter the U.S.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Individual’s name;
</p><p>• Date of Birth;
</p><p>• Citizenship;
</p><p>• Port of entry;
</p><p>• Method of entry, including vehicle information;
</p><p>• Date of entry;
</p><p>• Time of entry;
</p><p>• Search records, including the incident that required a secondary inspection, and items found during the
inspection; and
</p><p>• Audio-video cassette recording of the persons being escorted into, inside, and out of the secondary areas
of the port of entry.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; and the Federal Records Act, 44 U.S.C. 3101; 41 CFR Part 102; Homeland Security Act of 2002, Public
Law 107-296, Section 1512, 116 Stat. 2310 (November 25, 2002); the immigration laws, including 8 U.S.C. 1222-
1225 and 1357; the customs laws, including 19 U.S.C. 2, 482, 1433, 1434, 1459, 1461, 1484, 1499, 1581, 1582; 6 U.S.C 202,
231; the agriculture laws, including 7 U.S.C. 8303, 8304, 8307.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to record individuals who are sent to secondary when attempting to enter the U.S.,
or who are involved in an incident or disturbance while within CBP controlled space at the border. This record system
will allow DHS/CBP to videotape persons being escorted within a port of entry.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice or other Federal agency conducting litigation or in proceedings before any court,
adjudicative or administrative body, when it is necessary to the litigation and one of the following is a party to the
litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS or any component in his/her official capacity;
</p><p>3. Any employee of DHS or any component in his/her individual capacity where DOJ or DHS has agreed to represent the
employee; or
</p><p>4. The U.S. or any agency thereof, is a party to the litigation or has an interest in such litigation, and DHS or CBP
determines that the records are both relevant and necessary to the litigation and the use of such records is compatible
with the purpose for which DHS or CBP collected the records.
</p><p>B. To a congressional office in response to an inquiry from that congressional office made at the request of the
individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS or CBP suspects or has confirmed that the security or confidentiality of information in the system of records
has been compromised;
</p><p>2. DHS or CBP has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS, CBP, or another agency or entity) or harm to the individual who relies
upon the compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS or CBP’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS or CBP, when necessary to accomplish an agency
function related to this system of records. Individuals provided information under this routine use are subject to the
same Privacy Act requirements and limitations on disclosure as are applicable to DHS/CBP officers and employees.
</p><p>G. To appropriate Federal, State, local, tribal, or foreign governmental agencies or multilateral governmental
organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a
statute, rule, regulation, order, license, or treaty where DHS determines that the information would assist in the
enforcement of civil or criminal laws.
</p><p>H. To a Federal, State, or local agency, or other appropriate entity or individual, or through established liaison
channels to selected foreign governments, in order to provide intelligence, counterintelligence, or other information for
the purposes of intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order,
or other applicable national security directive.
</p><p>I. To appropriate Federal, State, local, tribal, or foreign governmental agencies or multilateral governmental
organizations where DHS is aware of a need to utilize relevant data for purposes of testing new technology and systems
designed to enhance national security or identify other violations of law.
</p><p>J. To an appropriate Federal, State, local, tribal, foreign, or international agency, if the information is relevant
and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or issuance of a
security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS
or component decision concerning the hiring or retention of an employee, the issuance of a security clearance, the
reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant or other
benefit when disclosure is appropriate to the proper performance of the official duties of the person making the request.
</p><p>K. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to
opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection
with criminal law proceedings or in response to a subpoena from a court of competent jurisdiction.
</p><p>L. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information
pertinent to the investigation, provided disclosure is appropriate to the proper performance of the official duties of
the officer making the disclosure.
</p><p>M. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or any component or is necessary to demonstrate the accountability of DHS or
a component’s officers, employees, or individuals covered by the system, except to the extent it is determined that
release of the specific information in the context of a particular case would constitute an unwarranted invasion of
personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records are retrieved by individual’s name or date and time of the recording.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to this computer system containing the records in this system
is limited to those individuals who have a need to know the information for the performance of their official duties and
who have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>All recordings with incidents are retained for six months. Those on which some action may be taken are retained
for one year or until the close of the case. The electronic media used to make recording can be reused. Therefore, after
the above stated retention period, CBP may reuse the electronic media and thus erase the previous recording.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Port Directors, U.S. Customs and Border Protection, U.S. Customs and Border Protection Headquarters, 1300
Pennsylvania Avenue, NW., Mint Annex, Washington, DC 20229.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from certain aspects of the notification, access, and
amendment requirements of the Privacy Act. CBP will review each request to determine whether or not notification, access,
or amendment should be provided. Individuals seeking notification of and access to any record contained in this system of
records, or seeking to contest its content, may submit a request in writing to CBP’s FOIA Officer, 1300 Pennsylvania
Avenue, NW., Mint Annex, Washington, DC 20229.
</p><p>When seeking records about yourself from this system of records or any other CBP system of records your request must
conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity, meaning that you
must provide your full name, current address and date and place of birth. You must sign your request, and your signature
must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of
perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from
the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In addition you should
provide the following:
</p><p>• An explanation of why you believe CBP would have information on you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual verifying that individual’s identity and certifying his/her agreement for you to access his/her
records.
</p><p>Without this bulleted information CBP may not be able to conduct an effective search, and your request may be denied
due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Audio-video recording of persons being escorted within the port of entry.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>Pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act, portions of this system are exempt from 5 U.S.C.
552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f), and (g).
Pursuant to 5 U.S.C. 552a(k)(2), this system is exempt from the following provisions of the Privacy Act, subject to the
limitations set forth in those subsections: 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f).
</p></xhtmlContent></subsection></section>
<section id="cbp13" toc="yes">
<systemNumber>/CBP-013</systemNumber>
<subsection type="systemName">Seized Assets and Case Tracking System (SEACATS).
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>This computer database is located at the U.S. Customs and Border Protection National Data Center in the
Washington, DC area. Computer terminals are located at CBP sites and ports throughout the United States and at CBP
Headquarters, Washington, DC as well as appropriate facilities under the jurisdiction of the U.S. Department of Homeland
Security (DHS) and other locations at which officers of DHS may be posted or operate to facilitate DHS’s mission of
homeland security. Terminals may also be located at appropriate facilities for other participating government agencies
pursuant to agreement. Records are maintained at the U.S. Customs and Border Protection Headquarters in Washington, DC
and in field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include current and former violators and alleged or otherwise
suspected violators of Custom, immigration, agriculture or other laws and regulations administered or enforced by
DHS/CBP, and related parties involved in, or affected by, an inquiry concerning the violation of Customs, immigration,
agriculture or other law enforced or administered by DHS/CBP. This system includes:
</p><p>• Persons who are believed to be involved in activities which constitute, or may develop into, possible
violation of Customs, immigration, agriculture or other laws administered or enforcement by DHS/CBP.
</p><p>• Persons who smuggle, or are suspected of smuggling, merchandise or contraband, including narcotics and
other illegal drugs, into the U.S.;
</p><p>• Vessels, aircraft and other conveyances that have been used in connection or with or found in violation of
Customs, immigration, agriculture or other laws and regulations enforced or administered by DHS/CBP;
</p><p>• Individuals and businesses fined, penalized, or forced to forfeit merchandise because of violations of
Customs, immigration, agriculture and/or other laws administered or enforced by DHS/CBP;
</p><p>• Individuals and businesses who have filed false invoices, documents, or statements that result in a
violation of Customs, immigration, agriculture or other laws and regulations administered or enforced by DHS/CBP;
</p><p>• Individuals and businesses who have filed supplemental petitions for relief from fines, penalties, and
forfeitures assessed for violations of the laws and regulations administered or enforced by DHS/CBP;
</p><p>• Owners, claimants, and other interested parties to seized property;
</p><p>• Purchasers of forfeited property;
</p><p>• Individuals to whom prohibited merchandise is addressed; and
</p><p>• Individuals who assist in the enforcement of customs, navigation, immigration, agriculture and other laws
administered or enforced by DHS/CBP.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system may include:
</p><p>• Individual’s name;
</p><p>• Business name;
</p><p>• Aliases;
</p><p>• Social security number;
</p><p>• Physical description of the individual;
</p><p>• Addresses;
</p><p>• Telephone numbers;
</p><p>• Occupation;
</p><p>• Violator’s previous record;
</p><p>• Driver’s license;
</p><p>• Passport number;
</p><p>• Entry documentation;
</p><p>• Personal identifying number, such as informant number;
</p><p>• Case number or seizure number;
</p><p>• Vessel name, including registration number;
</p><p>• Aircraft name and tail number;
</p><p>• License Plate Number;
</p><p>• Type of violation/suspected violation;
</p><p>• Description of violation/alleged violation, including circumstances surrounding the violation/alleged
violation, including section of law violated or alleged to have been violated;
</p><p>• Date and place of violation/alleged violation;
</p><p>• On-site disposition actions, such as whether a seizure was made, an item was detained, or inspection
occurred;
</p><p>• Sender of the seized or detained goods;
</p><p>• Intended recipient of the seized or detained goods;
</p><p>• Parties entitled to legal notice or who are legally liable;
</p><p>• Bond information;
</p><p>• Notices;
</p><p>• Investigative reports and disposition of fines, penalties, and forfeitures;
</p><p>• Memoranda;
</p><p>• Petitions and supplemental petitions;
</p><p>• Recommendations pertaining to litigation;
</p><p>• Referrals to Department of Justice;
</p><p>• Notes from officers related to a DHS/CBP action;
</p><p>• Case information pertaining to violation;
</p><p>• Actions taken by DHS/CBP;
</p><p>• Documents relating to the internal review and consideration of the request for relief and decision
thereon;
</p><p>• Property description;
</p><p>• Estimated foreign value of merchandise;
</p><p>• Duty;
</p><p>• Domestic value of merchandise;
</p><p>• CBP Port code;
</p><p>• Delivery to seizure clerk; and
</p><p>• Applicants for awards of compensation and determination of such applications.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; the Federal Records Act, 44 U.S.C. 3101; the immigration laws, including 8 U.S.C. 1221, 1321-
1328, 8 CFR parts 270, 274, 280; the Customs laws, including 18 U.S.C. 542, 545 and 19 U.S.C. 66, 1436, 1497, 1509, 1592,
1593a, 1594, 1595a, 1618, 1619, 1624, 1703 and, 19 CFR parts 1623, 171 and 172; the agriculture laws, including 7 U.S.C.
8303, 8304, 8307; Executive Order 9373.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to (1) document individuals and businesses who violated, or are alleged to have
violated, Custom, immigration, agriculture and other laws and regulations enforced or administered by DHS/CBP; (2)
collect and maintain records on fines, penalties, and forfeitures; and (3) collect and maintain records of individuals
who have provided assistance with respect to identifying or locating individuals who have or are alleged to have violated
Customs, immigration, agriculture and other laws and regulations enforced or administered by DHS/CBP.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice or other Federal agency conducting litigation or in proceedings before any court,
adjudicative or administrative body, when it is necessary to the litigation and one of the following is a party to the
litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS or any component in his/her official capacity;
</p><p>3. Any employee of DHS or any component in his/her individual capacity where DOJ or DHS has agreed to represent the
employee; or
</p><p>4. The U.S. or any agency thereof, is a party to the litigation or has an interest in such litigation, and DHS or CBP
determines that the records are both relevant and necessary to the litigation and the use of such records is compatible
with the purpose for which DHS or CBP collected the records.
</p><p>B. To a congressional office in response to an inquiry from that congressional office made at the request of the
individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS or CBP suspects or has confirmed that the security or confidentiality of information in the system of records
has been compromised;
</p><p>2. DHS or CBP has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS, CBP, or another agency or entity) or harm to the individual who relies
upon the compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS or CBP’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS or CBP, when necessary to accomplish an agency
function related to this system of records. Individuals provided information under this routine use are subject to the
same Privacy Act requirements and limitations on disclosure as are applicable to DHS/CBP officers and employees.
</p><p>G. To appropriate Federal, State, local, tribal, or foreign governmental agencies or multilateral governmental
organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a
statute, rule, regulation, order, license, or treaty where DHS determines that the information would assist in the
enforcement of civil or criminal laws.
</p><p>H. To an appropriate Federal, State, local, tribal, foreign, or international agency, if the information is relevant
and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or issuance of a
security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS
decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an
investigation of an employee, the letting of a contract, or the issuance of a license, grant or other benefit and
disclosure is appropriate to the proper performance of the official duties of the person making the request.
</p><p>I. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to
opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection
with criminal law proceedings or in response to a subpoena from a court of competent jurisdiction.
</p><p>J. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information
pertinent to the investigation, provided disclosure is appropriate to the proper performance of the official duties of
the officer making the disclosure.
</p><p>K. To a consumer reporting agency in accordance with section 3711(3) of Title 31.
</p><p>L. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or any component is necessary to demonstrate the accountability of DHS or a
component’s officers, employees, or individuals covered by the system, except to the extent it is determined that release
of the specific information in the context of a particular case would constitute an unwarranted invasion of personal
privacy.
</p><p>M. To appropriate Federal, State, local, tribal, or foreign governmental agencies or multilateral governmental
organizations where DHS is aware of a need to utilize relevant data for purposes of testing new technology and systems
designed to enhance national security or identify other violations of law.
</p><p>N. To a Federal, State, or local agency, or other appropriate entity or individual, or through established liaison
channels to selected foreign governments, in order to provide intelligence, counterintelligence, or other information for
the purposes of intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order,
or other applicable national security directive.
</p><p>Disclosure to consumer reporting agencies:
</p><p>Yes, when appropriate and in accordance with section 3711(3) of Title 31.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records are retrieved by individual’s name; business name; vessel name; aircraft name; case number; year and CBP
port code; identification codes; identifying number; date of violation; type of violation; name of the person to which
seized items are addressed; case or seizure number by fiscal year; and phone number.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated system security access policies. Strict controls have been imposed to minimize the risk of compromising the
information that is being stored. Access to the computer system containing the records in this system is limited to those
individuals who have a need to know the information for the performance of their official duties and who have appropriate
clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records related to a law enforcement action; or that are linked to an alleged violation of law or regulation, or
are matches or suspected matches to enforcement activities, investigations or cases (i.e., administrative penalty actions
or criminal prosecutions), will remain accessible until the conclusion of the law enforcement matter and any other
enforcement matters or related investigative, administrative, or judicial action to which it becomes associated plus five
years. Records associated with a law enforcement matter, where all applicable statutes of limitation have expired prior
to the conclusion of the matter, will be retained for two years following the expiration of the applicable statute of
limitations.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Customs and Border Protection, Customs and Border Protection Headquarters, 1300 Pennsylvania Avenue, NW.,
Washington, DC 20229.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from notification, access, and amendment because of
the law enforcement nature of the information. However, CBP will review requests on a case by case and release
information as appropriate. Individuals seeking notification of and access to any record contained in this system of
records, or seeking to contest its content, may submit a request in writing to CBP’s FOIA Officer, 1300 Pennsylvania
Avenue, NW., Mint Annex, Washington, DC 20229. Specific FOIA contact information can be found at <i>
http://www.dhs.gov/foia</i> under "contacts."
</p><p>When seeking records about yourself from this system of records or any other CBP system of records your request must
conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you
must provide your full name, current address and date and place of birth. You must sign your request, and your signature
must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of
perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from
the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In addition you should
provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information CBP may not be able to conduct an effective search, and your request may be denied
due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Individuals, including individuals petitioning for relief of fines, penalties, and forfeitures; DHS/CBP
employees, including DHS/CBP employees who prepare Customs Form 5955a (Notice of Penalty or liquidated Damages Incurred
and Demand for Payment) and Customs Form 151 (Search/Arrest/Seizure Report) at the time and place where the violation
occurred; Information and representations supplied by importers, brokers and other agents pursuant to the entry and
processing of merchandise or in the clearing of individuals or baggage through Customs. Also included is information
gathered pursuant to DHS/CBP investigations of suspected or actual violations of Customs, immigration, agriculture and
other laws enforced or administered by DHS/CBP, regulations, recommendations, and information supplied by other agencies;
Port Director of CBP who has jurisdiction over fines, penalties, and forfeitures; penalty notices; Search/Arrest/Seizure
Reports transmitted to the Fines, Penalties, and Forfeitures Office by ports and stations within the area; and mail
shipments.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>Pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act, portions of this system are exempt from 5 U.S.C.
552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f), and (g).
Pursuant to 5 U.S.C. 552a(k)(2), this system is exempt from the following provisions of the Privacy Act, subject to the
limitations set forth in those subsections: 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f).
In addition, to the extent a record contains information from other exempt systems of records, CBP will rely on the
exemptions claimed for those systems.
</p></xhtmlContent></subsection></section>
<section id="cbp14" toc="yes">
<systemNumber>/CBP-014</systemNumber>
    <subsection type="securityClassification">
        <xhtmlContent>
        <p>Unclassified.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p>Records are maintained in the Regulatory Audit Management Information System (RAMIS) located at the U.S. Customs and Border Protection Headquarters in Washington, D.C. and field offices.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
            <p>Categories of individuals covered by this system include importers and other parties engaged in international trade activities that are the subject of a regulatory audit or are identified in and related to the scope of an audit report.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p>Categories of individuals covered by this system include:</p>
            <p>•Individual’s name, including names of officers of customs broker firms or other business entities engaged in international trade and identified as a subject of an audit or related to the scope of an audit;</p>
            <p>•Importer of Record (IR) Number;</p>
            <p>•Dun and Bradstreet, Inc. DUN numbers;</p>
            <p>•Business records associated with the audit;</p>
            <p>•Email address;</p>
            <p>•Phone number;</p>
            <p>•Employer Identification Number (EIN) or Social Security number (SSN), also known as Federal Taxpayer Identifying Number;</p>
            <p>•Audit reports of subject accounts and records;</p>
            <p>•Correspondence with the subject of the audits and related parties:</p>
            <p>•Congressional inquiries concerning customs brokers or other audit subjects and disposition made of such inquiries; and</p>
            <p>•License and permit numbers and dates issued and district or port covered.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="authorityForMaintenance">
        <xhtmlContent>
            <p>6 U.S.C. 115(a)(1) and 213(b)(2); 19 U.S.C. ch. 4; 19 U.S.C. 1508, 1509, 1592, and 1641; 19 CFR parts 24.5, 111, 143, 149.3, 163; 31 U.S.C. 3729; and E.O. 9397, as amended by E.O. 13478.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p>The purpose of this system is to collect and maintain records on the regulatory audits of customs brokers, licensed by CBP pursuant to 19 U.S.C. 1641, to act as agents for importers in the entry of merchandise and payment of duties and fees, and other persons or business entities engaged in international trade.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
            <p>A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other Federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
            <p>1. DHS or any Component thereof;</p>
            <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
            <p>3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
            <p>4. The United States or any agency thereof.</p>
            <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
            <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
            <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
            <p>E. To appropriate agencies, entities, and persons when:</p>
            <p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;</p>
            <p>2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
            <p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
            <p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            <p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
            <p>H. To an appropriate Federal, State, local, tribal, foreign, or international agency, if the information is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant or other benefit and disclosure is appropriate to the proper performance of the official duties of the person making the request.</p>
            <p>I. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection with criminal law proceedings or in response to a subpoena from a court of competent jurisdiction.</p>
            <p>J. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
            <p>Disclosure to consumer reporting agencies</p>
            <p>None.</p>
            </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p>Storage:</p>
            <p>DHS/CBP stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
            <p>DHS/CBP may retrieve records by name or other (alphanumeric) personal identifier.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
            <p>DHS/CBP safeguards records in this system according in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS/CBP has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p>DHS/CBP maintains regulatory audit records in accordance with N1-36-86-1 approved by NARA on November 9, 1989. CBP maintains regulatory reports and company findings on-site for one year and then transfers the records to the Federal Records Center (FRC), which destroys the records after ten (10) years. CBP maintains regulatory audit subject records on-site for one year and transfers the files to the FRC, which destroys the records after three years.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p>Executive Director, Regulatory Audit, U.S. Customs and Border Protection, 1717 H Street – 6th Floor, Washington, D.C. 20229.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the DHS Chief Freedom of Information Act (FOIA) Officer or CBP’s FO IA Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts." If an individual believes more than one Component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive SW, Building 410, STOP-0655, Washington, D.C. 20528.</p>
            <p>When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Office at http://www.dhs.gov/foia or 1-866-431-0486. In addition, you should:</p>
            <p>•Explain why you believe the Department would have information on you;</p>
            <p>•Identify which Component(s) of the Department you believe may have the information about you;</p>
            <p>•Specify when you believe the records would have been created; and</p>
            <p>•Provide any other information that will help the FOIA staff determine which DHS Component agency may have responsive records.</p>
            <p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his or her records.</p>
            <p>Without the above information, the Component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p>See "Notification procedure" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p>See "Notification procedure" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p>The information contained in this system of records originates in connection with customs broker audits and audits of other persons engaged in international commerce conducted by the regulatory audit staffs. The audits may be supplemented with information furnished by the Office of the Chief Counsel or its field offices, Office of International Trade - Regulations and Rulings, and the Office of Investigations, U.S. Immigration and Customs Enforcement. These audits include examination of records pertaining to brokers and importers (including their clients), and other persons engaged in international trade activities.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p>DHS/CBP is not requesting an exemption with respect to information maintained in the system as it relates to data submitted by or on behalf of a subject of an audit. Information in the system may be shared pursuant to the exceptions under the Privacy Act (5 U.S.C. 552a(b)) and the above routine uses. The Privacy Act requires DHS to maintain an accounting of the disclosures made pursuant to all routines uses. Disclosing the fact that a law enforcement or intelligence agency has sought particular records may affect ongoing law enforcement activity. Therefore, pursuant to 5 U.S.C. 552a(k)(2), DHS will claim exemption from sec. (c)(3) of the Privacy Act of 1974, as amended, as is necessary and appropriate to protect this information.</p>
        </xhtmlContent>
    </subsection>
</section>

<section id="cbp16" toc="yes">
<systemNumber>/CBP-016</systemNumber>
<subsection type="systemName">DHS/CBP-016 Nonimmigrant and Immigrant Information System.
</subsection>
<subsection type="securityClassification"><xhtmlContent>
<p> Unclassified. The data may be retained on the classified networks but this does not change the nature and character of the data until it is combined with classified information.</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent>
<p>Records are maintained in the operational system at CBP Headquarters in Washington, D.C. and at CBP field offices. Records are replicated from the operational system and maintained on the DHS unclassified and classified networks.  This computer database is located at the U.S. Customs and Border Protection (CBP) National Data Center.  Computer terminals are located at customhouses, border ports of entry, airport inspection facilities under the jurisdiction of the Department of Homeland Security and other locations at which DHS authorized personnel may be posted to facilitate DHS’s mission.  Terminals may also be located at appropriate facilities for other participating government agencies that have obtained system access pursuant to a Memorandum of Understanding.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent>
<p>Categories of individuals covered by this system are nonimmigrant aliens entering and departing the United States.</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p>The Nonimmigrant and Immigrant Information System (NIIS) is a dataset residing on the CBP Information Technology (IT) platform and in paper form.  It contains arrival and departure information collected from foreign nationals entering and departing the United States on such forms as the I-94 and I-94W, or through interviews with CBP officers.  This information consists of the following data elements, as applicable:  </p>
<p>Full Name (first, middle, and last);</p>
<p>Date of birth;</p>
<p>Email address, as required;</p>
<p>Travel document type (e.g., passport information, permanent resident card), number, issuance date, expiration date and issuing country;</p>
<p>Country of citizenship; </p>
<p>Date of crossing both into and out of the United States;</p>
<p>Scanned images linked through the platform;</p>
<p>Airline and flight number;</p>
<p>City of embarkation;</p>
<p>Address while visiting the United States;</p>
<p>Admission number received during entry into the United States;</p>
<p>Whether the individual has a communicable disease, physical or mental disorder, or is a drug abuser or addict;</p>
<p>Whether the individual has been arrested or convicted for a moral turpitude crime, drugs, or has been sentenced for a period longer than five years;</p>
<p>Whether the individual has engaged in espionage, sabotage, terrorism, or Nazi activity between 1933 and 1945;</p>
<p>Whether the individual is seeking work in the United States;</p>
<p>Whether the individual has been excluded or deported, or attempted to obtain a visa or enter the United States by fraud or misrepresentation;</p>
<p>Whether the individual has ever detained, retained, or withheld custody of a child from a U.S. citizen granted custody of the child;</p>
<p>Whether the individual has ever been denied a U.S. visa or entry into the U.S., or had a visa cancelled (if yes, when and where);</p>
<p>Whether the individual has ever asserted immunity from prosecution; and</p>
<p>Any change of address while in the United States.</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p>The legal authority for NIIS comes from the Immigration and Nationality Act, 8 U.S.C. 1103, 1184, 1354; the Intelligence Reform and Terrorism Prevention Act of 2004, Public Law 108-458; the Homeland Security Act of 2002, Public Law 107-296; 5 U.S.C. 301; and the Federal Records Act, 44 U.S.C. 3101.</p>
</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p> NIIS is a repository of records for persons arriving in or departing from the United States as nonimmigrant visitors and is used for entry screening, admissibility, and benefits purposes.  The system provides a central repository of contact information for such aliens while in the United States and also captures arrival and departure information for determination of future admissibility. </p>
<p> DHS maintains a replica of some or all of the data in the operating system on the unclassified and classified DHS networks to allow for analysis and vetting consistent with the above stated purposes and this published notice.</p>
</xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows: </p>
<p> A.  To the Department of Justice (DOJ), including Offices of the United States Attorney or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
<p>  1. DHS or any component thereof;</p>
<p>  2. Any employee or former employee of DHS in his/her official capacity;</p>
<p>  3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
<p>  4.  The United States or any agency thereof.</p>
<p> B.  To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
<p> C.  To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. §§ 2904 and 2906.</p>
<p> D.  To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
<p> E.  To appropriate agencies, entities, and persons when:</p>
<p> 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; </p>
<p> 2. The Department has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and </p>
<p> 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p> F.  To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records.  Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
<p> G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
<p>H.  To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations, or in response to a subpoena, or in connection with criminal law proceedings.</p>
<p>I. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation, provided disclosure is appropriate to the proper performance of the official duties of the officer making the disclosure.</p>
<p>J. To an organization or individual in either the public or private sector, either foreign or domestic, when there is a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to the extent the information is relevant to the protection of life or property.</p>
<p> K. To an appropriate federal, state, local, tribal, foreign, or international agency, if the information is relevant and necessary to a requesting agency's decision concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant, or other benefit and when disclosure is appropriate to the proper performance of the official duties of the person making the request.</p>
<p> L. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, for the purpose of protecting the vital interests of a data subject or other persons, (e.g., to assist such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to combat other significant public health threats; appropriate notice will be provided of any identified health threat or risk).</p>
<p> M. To federal and foreign government intelligence or counterterrorism agencies or components when CBP becomes aware of an indication of a threat or potential threat to national or international security, or when such use is to assist in anti-terrorism efforts and disclosure is appropriate to the proper performance of the official duties of the person making the disclosure.</p>
<p> N.  To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations when DHS is aware of a need to use relevant data for purposes of testing new technology and systems designed to enhance national security or identify other violations of law.</p>
<p>O.  To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent it is determined the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
<p>Disclosure to consumer reporting agencies:</p>
<p>None.</p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>Storage:</p>
<p>DHS/CBP stores records in this system electronically in the operational system as well as on the unclassified and classified network or on paper in secure facilities in a locked drawer behind a locked door. DHS/CBP stores the records on magnetic disc, tape, digital media, and CD-ROM.  The data is stored electronically at the CBP and DHS Data Center for current data and offsite at an alternative data storage facility for historical logs, system backups, and in paper form. </p>
</xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p>     These records may be searched on a variety of data elements including name, addresses, place and date of entry or departure, or country of citizenship as listed in the travel documents used at the time of entry to the United States. An admission number, issued at each entry to the United States to track the particular admission, may also be used to identify a database record.</p>
</xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p>All NIIS records are protected from unauthorized access through appropriate administrative, physical, and technical safeguards.  These safeguards include all of the following: restricting access to those with a "need to know"; using locks, alarm devices, and passwords; compartmentalizing databases; auditing software; and encrypting data communications.  </p>
<p>NIIS information is secured in full compliance with the requirements of the DHS IT Security Program Handbook.  This handbook establishes a comprehensive program, consistent with federal law and policy, to provide complete information security, including directives on roles and responsibilities, management policies, operational policies, and application rules, which will be applied to component systems, communications between component systems, and at interfaces between component systems and external systems.</p>
<p>One aspect of the DHS comprehensive program to provide information security involves the establishment of rules of behavior for each major application, including NIIS.  These rules of behavior require users to be adequately trained regarding the security of their systems.  These rules also require a periodic assessment of technical, administrative, and managerial controls to enhance data integrity and accountability.  System users must sign statements acknowledging that they have been trained and understand the security aspects of their systems.  System users must also complete annual privacy awareness training to maintain current access.</p>
<p>NIIS transactions are tracked and can be monitored.  This allows for oversight and audit capabilities to ensure that the data is being handled consistent with all applicable federal laws and regulations regarding privacy and data integrity. </p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p>NIIS data is subject to a retention requirement.  The information collected and maintained in NIIS is used for entry screening, admissibility, and benefits purposes and is retained for seventy-five (75) years from the date obtained.  However, NIIS records that are linked to active law enforcement lookout records, CBP matches to enforcement activities, and/or investigations or cases will remain accessible for the life of the law enforcement activities to which they may become related.  The current disposition for paper copy is 180 days from date of departure. Records replicated on the unclassified and classified networks will follow the same retention schedule.</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent>
<p>Assistant Commissioner, Office of Information Technology, U.S. Customs and Border Protection Headquarters, 1300 Pennsylvania Avenue, NW, Washington, D.C. 20229.</p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to CBP’s FOIA Officer, 1300 Pennsylvania Avenue, NW, Washington, D.C. 20229.  </p>
<p> When seeking records about yourself from this system of records or any other CBP system of records your request must conform with the Privacy Act regulations set forth in 6 CFR Part 5.  You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth.  You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization.  While no specific form is required, you may obtain forms for this purpose from the Director, Disclosure and FOIA, http://www.dhs.gov or 1-866-431-0486.  In addition you should:</p>
<p>Explain why you believe the Department would have information on you;</p>
<p>Identify which component(s) of the Department you believe may have the information about you;</p>
<p>Specify when you believe the records would have been created; and</p>
<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
<p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
<p>Without this bulleted information CBP may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
<p>In processing requests for access to information in this system, CBP will review not only the records in the operational system but also the records that were replicated on the unclassified and classified networks, and based on this notice provide appropriate access to the information.</p>
</xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p>See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p>See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p>The system contains certain data received on individuals, passengers and crewmembers that arrive in, depart from, or transit through the United States.  This system also contains information collected from carriers that operate vessels, vehicles, aircraft, and/or trains that enter or exit the United States and from the individuals upon crossing the U.S. border.</p>
<p>Basic information is obtained from individuals, the individual's attorney/representative, CBP officials, and other federal, state, local, and foreign agencies.</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent>
<p> No exemption shall be asserted with respect to information maintained in the system that is collected from a person or submitted on behalf of a person, if that person, or his or her agent, seeks access or amendment of such information.</p>
<p> This system, however, may contain information related to an ongoing law enforcement investigation because the information regarding a person’s travel and border crossing was disclosed to appropriate law enforcement in conformance with the above routine uses.  As such pursuant to 5 U.S.C. 552a(j)(2) and (k)(2), DHS will claim exemption from (c)(3); (e)(8); and (g) of the Privacy Act of 1974, as amended, as is necessary and appropriate to protect this information.
</p></xhtmlContent></subsection></section>



<section id="cbp18" toc="yes">
<systemNumber>/CBP-018</systemNumber>
    <subsection type="systemName">
        <p>U.S. Department of Homeland Security (DHS)/U.S. Customs and Border Protection (CBP)-018 Customs Trade Partnership Against Terrorism (CTPAT) System of Records.</p>
    </subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p>Unclassified, Sensitive Security Information, law enforcement sensitive.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p>Records are maintained at CBP Headquarters in Washington, D.C. and field offices, in the CTPAT Portal, and in a CBP collaborative intranet.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p>CTPAT Director, U.S. Customs and Border Protection, 1300 Pennsylvania Avenue NW, Washington, D.C. 20229; (202) 344-3969. For CTPAT in general, contact Industry.Partnership@cbp.dhs.gov. For CTPAT Trade Compliance, contact ctpattradecompliance@cbp.dhs.gov.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="authorityForMaintenance">
        <xhtmlContent>
            <p>This system and program are authorized by 6 U.S.C. sec. 901 note (Security and Accountability for Every Port Act of 2006 (SAFE Port Act)), including 6 U.S.C. secs. 961-973. Pilot programs enhancing secure supply chain practices related to CTPAT are also authorized by Presidential Policy Directive/PPD-8, "National Preparedness" (March 30, 2011).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p>The purpose of this system is to verify the identity of CTPAT partners, determine enrollment level, and provide identifiable "low risk" entities with fewer random checks and facilitated processing. The information will be cross-referenced with data maintained in CBP’s other cargo and enforcement databases and will be shared with other law enforcement systems, agencies or foreign entities, as appropriate, when related to ongoing investigations or operations. Information will be used to analyze, measure, monitor, report, and enhance business supply chains to permit facilitated processing of CTPAT partner shipments by CBP.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
            <p>Individuals, including Points of Contact, owners, and others associated with prospective, ineligible, current, or former CTPAT business entities; individuals associated with the supply chain of such CTPAT business entities; and individuals associated with business entities in foreign governments’ secure supply chain programs that have been recognized by CBP, through harmonization, a mutual recognition arrangement (MRA), or comparable arrangement, as being compatible with the CTPAT Program.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p>At the application level, information is collected from the applicant about itself and those members of its international supply chain. Pre-set fields of business-identifying information within the company profile portion of the online application include:</p>
            <p>•	Business Entity Type;</p>
            <p>•	Application Exception Token;</p>
            <p>•	Legal Business Name;</p>
            <p>•	Other Name(s) by which the Business is known (i.e., "Doing Business As"), if applicable;</p>
            <p>•	Business Telephone;</p>
            <p>•	Business Fax;</p>
            <p>•	Business Website Address;</p>
            <p>•	Business History;</p>
            <p>•	Physical Address(es);</p>
            <p>•	Mailing Address(es);</p>
            <p>•	Owner Type (e.g., Corporation\Partnership\Sole Proprietor);</p>
            <p>•	Years in Business;</p>
            <p>•	Number of Employees;</p>
            <p>•	Business Points of Contacts;</p>
            <p>•	First Name;</p>
            <p>•	Last Name;</p>
            <p>•	Date of Birth;</p>
            <p>•	Country of Birth;</p>
            <p>•	Country of Citizenship;</p>
            <p>•	Travel Document number (e.g., visa or passport number);</p>
            <p>•	Alien Registration Number</p>
            <p>•	Naturalization number;</p>
            <p>•	Driver’s license information (e.g., state and country of issuance, number, date of issuance/expiration);</p>
            <p>•	Trusted Traveler membership type and number (e.g., FAST/NEXUS/SENTRI/Global Entry ID);</p>
            <p>•	Registro Federal de Contribuventes (RFC) Persona Fisica (needed for Mexican Foreign Manufacturers, Highway Carriers, and Long Haul Carriers Only);</p>
            <p>•	Title;</p>
            <p>•	Email Address (also used to log in to the Security Link Portal);</p>
            <p>•	Password;</p>
            <p>•	Telephone Number;</p>
            <p>•	Contact Type;</p>
            <p>•	U.S. Social Security numbers;</p>
            <p>•	Internal Revenue Service Business Identification Numbers;</p>
            <p>•	Customs assigned identification numbers (e.g., Importers of Record (IOR) number; Manufacturer Identification Numbers (MID) and Broker/Filer codes);</p>
            <p>•	Issue Papers, including information regarding whether the applicant is eligible for CTPAT membership or source record numbers for such information;</p>
            <p>•	Narrative description of supply chain security procedures for applicant and other entities in applicant’s supply chain;</p>
            <p>•	Validation supporting documentation (e.g., bills of lading; audits—internal and external; proof of background checks; contractual obligations; via a letter from a senior business partner officer attesting to compliance; statements demonstrating compliance with CTPAT security criteria or an equivalent World Customs Organization accredited security program administered by a foreign customs authority; importer security questionnaire); and</p>
            <p>•	Account Status.</p>
            <p>•    Information received from and confirmed to countries with which CBP has a Mutual Recognition Arrangement (MRA) includes:</p>
            <p>•	Legal Business Name;</p>
            <p>•	Other Name(s) by which the Business is known (i.e., "Doing Business As"), if applicable;</p>
            <p>•	Company Type;</p>
            <p>•	Date Partner Certified;</p>
            <p>•	Account Status;</p>
            <p>•	Vetting Status;</p>
            <p>•	Date Validation Completed;</p>
            <p>•	CBP Supply Chain Security Specialist (SCSS) Name;</p>
            <p>•	Office Assigned Name;</p>
            <p>•	Mutual Recognition Country;</p>
            <p>•	Business identifying numbers, e.g.:</p>
            <p>o	Standard Carrier Alpha Code (SCAC);</p>
            <p>o	IOR; and</p>
            <p>o	MID.</p>
            <p>•    By Applicant request, information received from, and forwarded to, foreign secure supply chain programs pursuant to a harmonization program may include:</p>
            <p>•    Legal Name;</p>
            <p>•	Doing Business As;</p>
            <p>•	Telephone Number;</p>
            <p>•	Fax Number;</p>
            <p>•	Web site;</p>
            <p>•	Owner Type;</p>
            <p>•	Business Start Date;</p>
            <p>•	Number of Employees;</p>
            <p>•	Brief Company History;</p>
            <p>•	Primary Address (Type, Name, Country, Street Address, City, State/Province, Zip/Postal Code);</p>
            <p>•	Mailing Address (Type, Name, Country, Street Address, City, State/Province, Zip/Postal Code);</p>
            <p>Primary Contact:</p>
            <p>o	Email Address;</p>
            <p>o	Type;</p>
            <p>o	Salutation;</p>
            <p>o	First Name;</p>
            <p>o	Last Name;</p>
            <p>o	Date of Birth;</p>
            <p>o	Title; and</p>
            <p>o	Telephone Number.</p>
            <p>•	Partner Notifications;</p>
            <p>•	Number of Entries;</p>
            <p>•	U.S. Department of Transportation (DOT) Issued Number;</p>
            <p>•	U.S. National Motor Freight Traffic Association Issued;</p>
            <p>•	SCAC;</p>
            <p>•	Dun &amp; Bradstreet Number;</p>
            <p>•	Services Offered;</p>
            <p>•	Driver Sources;</p>
            <p>•	Entries related to harmonization country;</p>
            <p>•	Account Status;</p>
            <p>•	Vetting Status;</p>
            <p>•	Minimum Security Requirements/Security Profile Status;</p>
            <p>•	Validation Status; and</p>
            <p>•	Harmonization Status.</p>
            <p>The CTPAT Security Profile includes:</p>
            <p>•	Account Number;</p>
            <p>•	Risking Status;</p>
            <p>•	Minimum Security Requirements (MSR) Status;</p>
            <p>•	Validation Type;</p>
            <p>•	Validation Closed Date;</p>
            <p>•	Validation Status;</p>
            <p>•	Validation Type Verification (Government Contact);</p>
            <p>•	Verification Type Start Date;</p>
            <p>•	Verification Type: (phone, visit, mutual recognition);</p>
            <p>•	Verification Visit address;</p>
            <p>•	Business Type; and</p>
            <p>•	Harmonization Host Program.</p>
            <p>The records pertaining to the Trade Compliance Application Process:</p>
            <p>•	Trade Compliance Questionnaire:</p>
            <p>o	Company name;</p>
            <p>o	Business address;</p>
            <p>o	Phone number;</p>
            <p>o	Company Website;</p>
            <p>o	Company type—public or private;</p>
            <p>o	Company contact: name, date of birth, title, phone number and email address; and</p>
            <p>o	Responses pertaining to Forced Labor.</p>
            <p>•	Memorandum of Understanding; and</p>
            <p>•	Annual Notification Letter (ANL);</p>
            <p>o	Company Information: Organizational and/or Personnel Changes;</p>
            <p>o	Import Activity Change records;</p>
            <p>o	Internal Control Adjustments and Change records;</p>
            <p>o	Risk Assessment Results;</p>
            <p>o	Periodic Testing Results; and</p>
            <p>o	Prior Disclosures.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p>Records are obtained from the CTPAT applicant business; from CBP systems, including TECS, the Automated Targeting System (ATS), the Automated Commercial Environment (ACE); and from public sources. Information is also collected by the SCSS from the CTPAT applicant and other businesses during the course of validating the business’s supply chain and from foreign governments and multilateral governmental organizations with which CBP has entered into MRAs or other arrangements. To the extent a CTPAT partner applies for the CTPAT Trade Compliance program, CBP regulatory audit personnel collect information from the applicant as part of the Application Review Meeting.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p>In addition to those disclosures generally permitted under 5 U.S.C. 5 sec. 52a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
            <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agencies conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
            <p>1. DHS or any component thereof;</p>
            <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
            <p>3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
            <p>4. The United States or any agency thereof.</p>
            <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
            <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
            <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
            <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the federal government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
            <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
            <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
            <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            <p> I. To appropriate foreign governmental agencies or multilateral governmental organizations pursuant to an arrangement between CBP and a foreign government or multilateral governmental organization regarding supply chain security.</p>
            <p> J. To an appropriate federal, state, local, territorial, tribal, or foreign governmental agencies or multilateral governmental organizations or other appropriate authority or entity when necessary to vet a CTPAT applicant or validate a CTPAT partner.</p>
            <p> K. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations when DHS reasonably believes there to be a threat or potential threat to national or international security for which the information may be relevant in countering the threat or potential threat.</p>
            <p>  L. To a federal, state, tribal, or local agency, or other appropriate entity or individual, or foreign governments, in order to provide relevant information related to intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order, or other applicable national security directive.</p>
            <p> M. To an organization or individual in either the public or private sector, either foreign or domestic, when there is a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, or when the information is relevant and necessary to the protection of life or property.</p>
            <p> N. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation.</p>
            <p> O. To an appropriate federal, state, local, tribal, foreign, or international agency, if the information is relevant to a requesting agency’s decision concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or other benefit, or if the information is relevant to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant or other benefit.</p>
            <p>P. To a federal, state, local, tribal, or foreign governmental agency or multilateral governmental organization for the purpose of consulting with that agency or entity: (1) to assist in making a determination regarding redress for an individual in connection with the operations of a DHS component or program; (2) for the purpose of verifying the identity of an individual seeking redress in connection with the operations of a DHS component or program; or (3) for the purpose of verifying the accuracy of information submitted by an individual who has requested such redress on behalf of another individual.</p>
            <p> Q. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations for the purpose of protecting the vital health interests of a data subject or other persons (e.g., to assist such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to combat other significant public health threats; appropriate notice will be provided of any identified health threat or risk).</p>
            <p> R. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p>DHS/CBP stores records in this system of records electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
            <p> Records may be retrieved by any of the information listed in the categories of records above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p>The following records retention schedule for CTPAT is pending approval by NARA: information stored in CTPAT will be retained for the period during which the application is pending decision by CBP and for the period of active membership of the business entity, plus 20 years after membership has ended in the Program. Where information regarding the possible ineligibility of an applicant for CTPAT membership is found, it will be retained in the CTPAT system for 20 years from the date of denial to assist with future vetting, or consistent with the applicable retention period for the system of records from which such information was derived, whichever is longer.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
            <p>DHS/CBP safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS/CBP has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p> The CTPAT Portal provides access to those applicants or partners who have submitted information in the portal. The CTPAT partner interface allows participants to access and change the information they have provided at any time by accessing their business identifying information and CTPAT profile through secure login procedures. CTPAT partners access the CTPAT Portal via https://ctpat.cbp.dhs.gov.</p>
            <p>CTPAT partners have the ability to communicate with their assigned SCSS if they believe CBP has acted upon inaccurate or erroneously provided information. If this method is unsuccessful and CTPAT facilitated processing is denied or removed, the entity may make written inquiry regarding such denial or removal. The applicant should provide as much identifying information as possible regarding the business, in order to identify the record at issue. CTPAT participants may provide CBP with additional information to ensure that the information maintained by CBP is accurate and complete. The submitter will receive a written response to each inquiry. If CTPAT partnership is suspended or removed, the business may appeal this decision to CBP HQ, to the attention of the Executive Director, Cargo and Conveyance Security, U.S. Customs and Border Protection, 1300 Pennsylvania Avenue NW, Room 2.2A, Washington, D.C. 20229.</p>
            <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act, and the Judicial Redress Act if applicable, because it is a law enforcement system. However, DHS/CBP will consider individual requests to determine whether information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and CBP Freedom of Information Act Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, U.S. Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
            <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
            <p>•  ●Explain why he or she believes the Department would have information being requested;</p>
            <p>•  ●Identify which component(s) of the Department he or she believes may have the information;</p>
            <p>•  ●Specify when the individual believes the records would have been created; and</p>
            <p>•  ●Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
            <p>If an individual’s request is seeking records pertaining to another living individual, the first individual must include a statement from the second individual certifying his/her agreement for the first individual to access his/her records.</p>
            <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p>For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p>See "Record Access Procedures" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p>No exemption shall be asserted with respect to information requested from and provided by the CTPAT Program applicant including company profile, supply chain information, and other information provided during the application and validation process. CBP will not assert any exemptions for an individual’s application data and final membership determination in response to an access request from that individual. However, the Privacy Act requires DHS to maintain an accounting of the disclosures made pursuant to all routines uses. Disclosing the fact that a law enforcement agency has sought particular records may affect ongoing law enforcement activities. As such, pursuant to 5 U.S.C. sec. 552a(j)(2), DHS will claim exemption from sections (c)(3), (e)(8), and (g) of the Privacy Act of 1974, as amended, as is necessary and appropriate to protect this information. Further, DHS will claim exemption from section (c)(3) of the Privacy Act of 1974, as amended, pursuant to 5 U.S.C. sec. 552a(k)(2) as is necessary and appropriate to protect this information.</p>
            <p>Pursuant to exemption 5 U.S.C. sec. 552a(j)(2) of the Privacy Act, all other CTPAT Program data, including information regarding the possible ineligibility of an applicant for CTPAT membership discovered during the vetting process and any resulting issue papers, are exempt from 5 U.S.C. secs. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), and (e)(8); (f); and (g). Pursuant to 5 U.S.C. sec. 552a(k)(2), information regarding the possible ineligibility of an applicant for CTPAT Program membership discovered during the vetting process and any resulting issue papers are exempt from 5 U.S.C. secs. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). In addition, to the extent a record contains information from other exempt systems of records, CBP will rely on the exemptions claimed for those systems.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="history">
        <xhtmlContent>
            <p>78 FR 15962 (March 13, 2013).</p>
        </xhtmlContent></subsection></section>
<section id="cbp19" toc="yes">
<systemNumber>/CBP-019</systemNumber>
<subsection type="systemName">DHS/U.S. Customs and Border Protection--019 Air and Marine Operations Surveillance System (AMOSS).
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified, sensitive, and law enforcement sensitive. </p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the Air and Marine Operations Center (AMOC) in Riverside, California.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>AMOSS contains information on aircraft owners who have registered their aircraft with the Federal Aviation
Administration (FAA), as well as airport managers. AMOSS contains information about individuals suspected of
violating the law or presenting a threat to the United States. AMOSS also contains information about
individuals mentioned in tips from members of the public who call in to report suspicious activity to a tip
line or from law enforcement, as well as contact information for those members of the public or law
enforcement.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>The records in AMOSS are comprised of the following information:
</p><p>FAA DATA:
</p><p>• Aircraft registration (ownership) information on U.S. registered aircraft, including registrant
name and address, aircraft type, and aircraft identification numbers;
</p><p>• Airport information, including manager name and contact information;
</p><p>• Runway information;
</p><p>• Flight plan/route information;
</p><p>• Special use airspace identification; and
</p><p>• Navigation aids identification.
</p><p>EVENT AND OPERATIONS DATA:
</p><p>• Watch log records of operational activities on the floor of the AMOC;
</p><p>• Event tracking log information on suspects, including: Names, addresses, phone numbers, drivers
licenses, Social Security Numbers, TECS case numbers, information identifying conveyances (including vehicle
type, tail numbers, license plate numbers, etc.) and remarks by Detection Enforcement Officers (DEO);
</p><p>• Event tracking log information on members of the public who call in to a tip line, including:
Names, and phone numbers.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>The collection of information in AMOSS is authorized by the following authorities: 6 U.S.C. 202; the Tariff
Act of 1930, as amended, including 19 U.S.C. 1590; 19 U.S.C. 2075(b)(2)(B)(3); the Immigration and Nationality
Act ("INA"), 8 U.S.C. 1101, <i>et seq.,</i> including 8 U.S.C. 1103, 1225, and 1324; the
Illegal Immigration Reform and Immigrant Responsibility Act of 1996, Public Law 104-208, Division C;
Presidential Directive 47/Homeland Security Presidential Directive 16 (NSPD-47/HSPD-16); and DHS
Delegation No. 7010.3 (May 11, 2006).
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>Information in AMOSS is used to assist CBP in identifying aircraft, vessels, or vehicles illegally entering
or attempting to enter the United States, making suspicious movements, or otherwise participating in the
smuggling or transshipment of narcotics, illegal contraband, illegal aliens, illegal currency, terrorist
activities, or other suspected or confirmed violations of U.S. customs and/or immigration laws. Information in
AMOSS is also used to assist other foreign, federal, state, and local agencies for law enforcement and general
aviation security purposes.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a
portion of the records or information contained in this system may be disclosed outside DHS as a routine use
pursuant to 5 U.S.C. 552a(b)(3) as follows:
</p><p>A. To the Department of Justice (DOJ), including U.S. Attorney Offices, or other federal agency conducting
litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or
necessary to the litigation and one of the following is a party to the litigation or has an interest in such
litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee or former employee of DHS in his/her official capacity;
</p><p>3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to
represent the employee; or
</p><p>4. The United States or any agency thereof.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that
congressional office made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to
records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by
law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of
records has been compromised;
</p><p>2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity
theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or
integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity)
that rely upon the compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in
connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or
remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a
contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an
agency function related to this system of records. Individuals provided information under this routine use are
subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers
and employees.
</p><p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or
other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing
a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information,
indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations
and such disclosure is proper and consistent with the official duties of the person making the disclosure.
</p><p>H. To federal and foreign government intelligence or counterterrorism agencies or components when DHS
becomes aware of an indication of a threat or potential threat to national or international security, or to
assist in anti-terrorism efforts.
</p><p>I. To an organization or person in either the public or private sector, either foreign or domestic, when
there is a reason to believe that the recipient is or could become the target of a particular terrorist
activity or conspiracy, or when the information is relevant to the protection of life, property, or other vital
interests of a person.
</p><p>J. To third parties during the course of a law enforcement investigation to the extent necessary to obtain
information pertinent to the investigation.
</p><p>K. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including
disclosures to opposing counsel or witnesses in the course of civil or criminal discovery, litigation, or
settlement negotiations, or in response to a subpoena from a court of competent jurisdiction.
</p><p>L. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral
governmental organizations when CBP is aware of a need to use relevant data for purposes of testing new
technology and systems designed to enhance border security or identify other violations of law.
</p><p>M. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with
counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure
is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability
of DHS’s officers, employees, or individuals covered by the system, except to the extent it is determined that
release of the specific information in the context of a particular case would constitute an unwarranted
invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind
a locked door. The records are stored on magnetic disc, tape, digital media and DVD/CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by name or other (alphanumeric) personal identifier.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all
applicable DHS automated systems security and access policies. Strict controls have been imposed to minimize
the risk of compromising the information that is being stored. Access to the computer system containing the
records in this system is limited to those individuals who have a need to know the information for the
performance of their official duties and who have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>CBP has established a 15-year retention schedule beginning on the last date of the record entry or update,
and plans to submit this schedule to NARA for approval.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Director, Information Systems, U.S. Customs and Border Protection, Office of Air and Marine, Air and Marine
Operations Center, Riverside, California.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted portions of AMOSS from the notification, access, and
amendment procedures of the Privacy Act because it is a law enforcement system. CBP will, however, consider
individual requests to determine whether or not information may be released. Moreover, no exemption shall be
asserted with respect to information maintained in the system as it relates to aircraft data collected from the
FAA, aside from the accounting of disclosures with law enforcement and/or intelligence agencies pursuant to the
routine uses in this SORN. Thus, individuals seeking notification of and access to any record contained in this
system of records, or seeking to contest its content, may submit a request in writing to the CBP FOIA Officer,
whose contact information can be found at <i>http://www.dhs.gov/foia</i> under "contacts."
If an individual believes more than one component maintains Privacy Act records concerning him or her the
individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer,
Department of Homeland Security, 245 Murray Drive SW., Building 410, STOP-0655, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records
your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify
your identity, meaning that you must provide your full name, current address, and date and place of birth. You
must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law
that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific
form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of
Information Act Officer, <i>http://www.dhs.gov</i> or 1-866-431-0486. In addition you
should:
</p><p>• Explain why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created; and
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component
agency may have responsive records.
</p><p>If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your
request may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records containing PII are obtained from the following sources:
</p><p>(1) Aircraft registration and owner information from the publicly available FAA Registration Database;
</p><p>(2) Airport manager contact information, which is contained in a larger download of airport and aeronautical
navigation data obtained from the FAA National Flight Data Center;
</p><p>(3) Suspect information entered into the AMOC watch or event track logs received from other CBP personnel or
law enforcement agencies; and
</p><p>(4) Information from members of the public who call in to report suspicious activity to a tip line.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>No exemption shall be asserted with respect to aircraft data collected from the FAA that is maintained in
AMOSS. However, this FAA data may be shared with law enforcement and/or intelligence agencies pursuant to the
above routine uses. The Privacy Act requires DHS maintain an accounting of the disclosures made pursuant to all
routine uses. Disclosing the fact that a law enforcement or intelligence agency has sought particular records
may affect ongoing law enforcement or intelligence activity. As such, pursuant to 5 U.S.C. 552a(j)(2), DHS will
claim an exemption from subsections (c)(3); (e)(8); and (g)(1) of the Privacy Act of 1974, as amended, as is
necessary and appropriate to protect this information. Further, DHS will claim exemption from subsection (c)(3)
of the Privacy Act of 1974, as amended, pursuant to 5 U.S.C. 552a(k)(2) as is necessary and appropriate to
protect this information.
</p><p>The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted all other AMOSS data (non-
FAA source data) from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1),
(e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), and (e)(8); (f); and (g). Additionally, the Secretary
of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2), has exempted this non-FAA source data in AMOSS from the
following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and
(f). When a record received from another system has been exempted in that source system under 5 U.S.C. 552a(j)
(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of
records from which they originated and claims any additional exemptions set forth here.
</p></xhtmlContent></subsection></section>
    
<section id="cbp20" toc="yes">
<systemNumber>/CBP-020</systemNumber>
<subsection type="systemName"> DHS/CBP-020 Export Information System (EIS) System. </subsection>

<subsection type="securityClassification"><xhtmlContent>
<p> Unclassified.</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent>
<p> Records are maintained at the CBP Headquarters in Washington, D.C., and field offices.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent>
<p> The categories of individuals covered by the system are DHS or CBP employees and individuals who process and ensure the compliance of goods exported from the United States. Those individuals who process and ensure the compliance of exported goods include: the filer or transmitter of the information; the exporter or U.S. Principal Party in Interest (USPPI); the freight forwarder, or other U.S. authorized agent filing for the USPPI; the shipper; the intermediate consignee, who is the agent for the exporter in the foreign country; the ultimate consignee, who is the person, party, or designee located abroad that will receive the export shipment; and individuals related to the specific commodity (e.g., for hazardous material, an emergency point of contact).</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p> EIS contains records that include the following information:</p>
<p>Information about the filer, exporter, USPPI, ultimate consignee, or authorized U.S. agent, which may include: </p>
<p>Full name;</p>
<p>Tax Identification Number (TIN) or other trade identifiers;</p>
<p>Telephone numbers;</p>
<p>Email addresses;</p>
<p>Addresses and zip codes;</p>
<p>Certificate or license numbers (including licenses issued by various federal agencies);</p>
<p>Signatures; and</p>
<p>License certifier or other registration numbers.</p>
<p>Information about the DHS/CBP employee annotating the record or ensuring compliance with export control regulations, which may include: </p>
<p>Full Name;</p>
<p>Identification number or badge number.</p>
<p>Shipment information:</p>
<p>Mode of transportation; </p>
<p>Carrier;</p>
<p>Origin, port of export, port of unlading, and destination;</p>
<p>Date of export; and</p>
<p>Hazardous material indicator.</p>
<p>Commodity information:</p>
<p>Description, which may include the make, model, serial number, caliber, manufacturer, or hazardous material description;</p>
<p>Quantity;</p>
<p>Value;</p>
<p>Weight;</p>
<p>License, certification document, export license, or Kimberly Process Certificate numbers; &amp;amp;amp;amp;amp;#8321;</p>
    <p>
        &amp;amp;amp;amp;amp;#8321;A Kimberly Process Certificate number is a control number issued on each Kimberly Diamond Process certificate pursuant to the Clean Diamond Trade Act (2003), Pub. L. 108-19, 117 Stat. 631, 19 U.S.C.  3901-3913.
    </p>
<p>Vehicle title numbers;</p>
<p>Vehicle identification number (VIN);</p>
<p>Certificate or license registrant’s number; and</p>
<p>Hazardous material emergency contact name and telephone number.</p>
</xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p>Pursuant to 19 U.S.C. 482, 1467, 1581(a) and the Security and Accountability for Every (SAFE) Port Act of 2006, Pub. L. 109-347, 120 Stat. 1884 (Oct. 13, 2006); CBP has the authority to board vessels or vehicles and conduct searches of cargo; pursuant to 46 U.S.C. 60105, vessels must obtain clearance from CBP prior to departing from the United States for a foreign port or place; and pursuant to 19 U.S.C. 1431, CBP collects and reviews data for outbound cargo in EIS to ensure compliance with laws CBP is charged with enforcing. Subsection (a) of Section 343 of the Trade Act of 2002 mandated that the Secretary of Homeland Security (formerly the Secretary of Treasury) collect cargo information "through an electronic data interchange system," prior to the departure of the cargo from the United States. See 19 U.S.C. 2071 note and 19 C.F.R. 192.14.  EIS includes the data collected in AES/ACE and from paper forms and documents, as CBP moves from paper to an entirely electronic collection process.</p>
<p>The export laws CBP enforces include:</p>
<p>The Tariff Act of 1930, as amended, 19 U.S.C. Chapter 4;</p>
<p>13 U.S.C. 301-307 (Collection and Publication of Foreign Commerce and Trade Statistics) of 1962, Pub. L. 87-826, 76 Stat. 951, as amended; </p>
<p>The Prosecutorial Remedies and Other Tools to End the Exploitation of Children Today (PROTECT) Act of 2003, Pub. L. 108-21, 117 Stat. 650, as amended, 18 U.S.C. 2251-2256; and 18 U.S.C. §§ 1461, 1463, 1465, and 1466 (relating to obscenity and child pornography);</p>
<p>The Anti Car Theft Act of 1992, Pub. L. 102-519, 106 Stat. 3384, 19 U.S.C.    1646b, 1646c; </p>
<p>The Clean Diamond Trade Act (2003), Pub. L. 108-19, 117 Stat. 631, 19 U.S.C. 3901-3913; </p>
<p>The Federal Food, Drug, and Cosmetic Act (1938), Pub. L. 75-717, 52 Stat. 1040, as amended, 21 U.S.C. 301-399;</p>
<p>The Controlled Substances Import and Export Act (1970), Pub. L. 91-513, 84 Stat. 1236, as amended, 21 U.S.C. 953;</p>
<p>The Arms Export Control Act of 1979, Pub. L. 90-629, 82 Stat. 1320, as amended, 22 U.S.C. 2778, 2780, and 2781; </p>
<p>The Currency and Foreign Transactions Reporting Act of 1970 (commonly referred to as the Bank Secrecy Act), Pub. L. 91-508, 84 Stat. 1122, as amended, 31 U.S.C. 5311, et seq.;</p>
<p>The Atomic Energy Act of 1954, Pub. L. 83-703, 68 Stat. 919, as amended, 42 U.S.C. 2011, 2077, 2122, 2131, 2138, 2155-2157;</p>
<p>The Trading With the Enemy Act of 1917, Pub. L. 65-91, 40 Stat. 411, as amended, 50 U.S.C. App. 1-44;</p>
<p>The International Emergency Economic Powers Act (1977), Pub. L. 95-223, 91 Stat. 1628, as amended, 50 U.S.C. §§ 1701-1706;</p>
<p>The Export Administration Regulations, 15 C.F.R. Parts 730-744</p>
<p>The Lanham Act (Trademark Act of 1946), Pub. L. 79-489, 60 Stat. 427, as amended, 15 U.S.C. § 1051, et seq.; and</p>
<p>The Endangered Species Act of 1973, Pub. L. 93-205, 87 Stat. 884, as amended, 16 U.S.C. § 1531, et seq.</p>
</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p> The purpose of EIS is to be the central point through which CBP collects and maintains export data and related records to facilitate DHS’s law enforcement and border security missions. DHS uses EIS as a tool to further its mission to ensure the safety and security of cargo, prevent smuggling, and enforce export and other applicable U.S. laws.  </p>
</xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p> Consistent with the purposes noted above, or as otherwise authorized by law, and in addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows: </p>
<p> A. To the Department of Justice (DOJ), including Offices of the U.S. Attorney, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
<p>  1. DHS or any Component thereof;</p>
<p>  2. Any employee or former employee of DHS in his or her official capacity;</p>
<p>  3. Any employee or former employee of DHS in his or her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
<p>  4. The United States or any agency thereof.</p>
<p> B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made pursuant to a written Privacy Act waiver at the request of the individual to whom the record pertains.</p>
<p> C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
<p> D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
<p> E. To appropriate agencies, entities, and persons when:</p>
<p> 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; </p>
<p> 2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
<p> 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p> F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals who are provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
<p>G.  To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing a statute, rule, regulation, order, license, or treaty when DHS believes the information would assist the enforcement of civil or criminal laws. </p>
<p>H.  To the Department of Commerce, U.S. Census Bureau to fulfill its statutory mandate of collecting international trade statistics.</p>
<p>I. To federal agencies, pursuant to the International Trade Data System Memorandum of Understanding, consistent with the receiving agency’s legal authority to collect information pertaining to or regulating transactions to ensure cargo safety and security, or to prevent smuggling. </p>
<p>J. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations when DHS reasonably believes there to be a threat or potential threat to national or international security and for which the information may be relevant in countering the threat or potential threat.</p>
<p>K. To a federal, state, tribal, or local agency, or other appropriate entity or individual, or foreign governments, in order to provide relevant information related to intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order, or other applicable national security directive.</p>
<p>L. To an organization or individual in either the public or private sector, either foreign or domestic, when there is a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, or when the information is relevant and necessary to the protection of life or property.</p>
<p>M. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations, in response to a subpoena, or in connection with criminal law proceedings;</p>
<p>N. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation.</p>
<p>O. To a former employee of DHS, in accordance with applicable regulations, for purposes of responding to an official inquiry by a federal, state, or local government entity or professional licensing authority; or facilitating communications with a former employee that may be necessary for personnel-related or other official purposes when DHS requires information or consultation assistance from the former employee regarding a matter within that person’s former area of responsibility;</p>
<p>P. To an appropriate federal, state, local, tribal, foreign, or international agency, if the information is relevant to a requesting agency's decision concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or other benefit, or if the information is relevant to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant, or other benefit.</p>
<p>Q. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations for the purpose of protecting the vital health interests of a data subject or other persons (e.g., to assist such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to combat other significant public health threats). Appropriate notice will be provided of any identified health threat or risk.</p>
<p>R.  To the public, certain outbound manifest information, including the name and address of the shipper; general character, size, weight, and description of the cargo; the name of the vessel or carrier; the port of exit; the port of destination; and country of destination; and which may be made public pursuant to 19 U.S.C. 1431, 46 U.S.C. 60105, and 19 C.F.R. 103.31.</p>
<p>S.  To organizations engaged in theft prevention activities regarding certain outbound manifest information regarding vehicles, as authorized pursuant to 19 U.S.C. 1627a.</p>
<p>T.  To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
<p>Disclosure to consumer reporting agencies: </p>
<p> None. </p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>Storage:</p>
<p> CBP stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, digital media, and CD-ROM.</p>
</xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p> CBP retrieves records by name, address, telephone number, search terms, or TIN.</p>
</xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p> CBP safeguards records in this system in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies. CBP imposes strict controls to minimize the risk of compromising the information it stores. CBP limits access to the computer system containing the records in this system to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.   </p>
</xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p> CBP retains EIS data, including AES/ACE data, in an active status for five years. The data is retained for an additional ten years to meet any requirements of a controlling U.S. Government agency for licensed shipments or for law enforcement purposes. The data is archived after five years and deleted after the additional ten year period, in conformance with the EIS retention procedures. CBP retains information beyond fifteen years when specific EIS data is needed for the duration of a law enforcement investigation or judicial proceeding, when the investigation or proceeding continues beyond fifteen years.</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p> Chief, Export Control Branch, Office of Field Operations, U.S. Customs and Border Protection Headquarters, 1300 Pennsylvania Avenue NW, Washington, D.C. 20229.</p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p> The Secretary of Homeland Security has exempted this system from the notification, access, accounting, and amendment procedures of the Privacy Act because it is a law enforcement system. However, DHS/CBP will consider individual requests to determine whether or not information may be released. Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Headquarters or component’s Freedom of Information Act Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief FOIA Officer, Department of Homeland Security, 245 Murray Drive, S.W., Building 410, STOP-0655, Washington, D.C. 20528.</p>
<p> When individuals seek records about themselves from this system of records or any other Departmental system of records, their requests must conform with the Privacy Act regulations set forth in 6 C.F.R. Part 5. They must first verify their identities, meaning that they must provide their full names, current addresses, and dates and places of birth. They must sign their requests, and each of their signatures must either be notarized or be submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, they may obtain forms for this purpose from the Chief Privacy Officer and Chief FOIA Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, they should:</p>
<p>Explain why the Department would have information about them;</p>
<p>Identify which component(s) of the Department would have the information;</p>
<p>Specify when the records would have been created; and </p>
<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
<p>If the individuals’ requests seek records pertaining to another living person, they must include a statement from that individual certifying his/her agreement for them to have access to his/her records. </p>
<p>Without the above information the component(s) may not be able to conduct an effective search and a request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
</xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p>CBP obtains records from individuals who participate in exporting goods from the United States and other federal agencies, as required to administer the export laws of the United States.</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent>
<p>  DHS/CBP is not requesting an exemption with respect to information maintained in the system as it relates to data submitted by or on behalf of an individual. Information in the system may be shared pursuant to the exceptions under the Privacy Act (5 U.S.C. 552a(b)) and the above routine uses. The Privacy Act requires DHS to maintain an accounting of the disclosures made pursuant to all routines uses. Disclosing the fact that a law enforcement or intelligence agency has sought particular records may affect ongoing law enforcement activity. Therefore, pursuant to 5 U.S.C. 552a(j)(2), DHS will claim exemption from sections (c)(3), (e)(8), and (g)(1) of the Privacy Act of 1974, as amended, as is necessary and appropriate to protect this information. In addition, pursuant to 5 U.S.C. § 552a(k)(2), DHS will claim exemption from section (c)(3) of the Privacy Act of 1974, as amended, as is necessary and appropriate to protect this information.</p></xhtmlContent></subsection></section>
<section id="cbp21" toc="yes">
<systemNumber>/CBP-21</systemNumber>
    <subsection type="systemName">Arrival and Departure Information System (ADIS).</subsection>
    <subsection type="securityClassification"><xhtmlContent>
<p> Unclassified.</p></xhtmlContent></subsection>
<subsection type="systemLocation">
        <xhtmlContent>
            <p> CBP maintains ADIS data at DHS/CBP Headquarters in Washington, D.C., DHS/CBP data centers in Mississippi and Virginia, and in field offices that receive access to limited data. </p>
        </xhtmlContent>
    </subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent>
<p> Categories of individuals consist of aliens who have applied for entry, entered, or departed from the United States at any time. Although this system primarily consists of records pertaining to alien immigrants (including lawful permanent residents) and non-immigrants, some of these individuals may change status and become United States citizens.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p> Information contained in this system of records includes, but is not limited to:</p>
<p> •Biographic data, such as:</p>
<p> • Name; </p>
<p> • Date of birth; </p>
<p> • Nationality; </p>
<p> • Social Security number (SSN), when available; and</p>
<p> • Other personal descriptive data. </p>
<p> • Biometric indicator data, which includes, but is not limited to:</p>
<p> • Fingerprint identification numbers (FIN);&amp;amp;amp;amp;amp;#185; and</p>
<p>&amp;amp;amp;amp;amp;#185; Currently, DHS assigns a Fingerprint identification number (FIN) to collected iris images.</p>
<p> • Encounter identification numbers (EID).</p>
<p> • System-generated identification numbers: ADIS holds data from other DHS and federal agency systems, and identifies/points to the source systems of these records. </p>
<p> • Encounter data, such as: </p>
<p> • Encounter location; </p>
<p> • Arrival and departure dates;</p>
<p> • Flight information;</p>
<p> • Immigration status changes;</p>
<p> • Document types; </p>
<p> • Document numbers; </p>
<p> • Document issuance information;</p>
<p> • Address while in the United States; and</p>
<p> • Narrative information entered by immigration enforcement officers, such as references to: </p>
<p> • Active criminal immigration enforcement investigations;</p>
<p> • Immigration enforcement investigations; </p>
<p> • Immigration status information; and</p>
<p> • Details from law enforcement or security incidents or encounters. </p>
<p> • Entry or exit data collected by foreign governments in support of their respective entry and exit processes. Generally, records collected from foreign governments relate to individuals who have entered or exited the United States at some time, but in some instances there is no pre-existing ADIS record for the individual.</p>
</xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p> 6 U.S.C. 202; 8 U.S.C. 1103, 1158, 1201, 1225, 1324, 1357, 1360, 1365a, 1365b, 1372, 1373, 1379, and 1732.</p>
</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p> The purpose of this system is to serve as the primary repository for tracking entry and exit data throughout the immigrant and non-immigrant pre-entry, entry, status management, and exit processes. This data is collected by DHS or other federal or foreign government agencies and is used in connection with DHS missions such as national security, law enforcement, immigration, intelligence, and other DHS mission-related functions. Data is also used to provide associated testing, training, management reporting, planning and analysis, or other administrative purposes. Similar data may be collected from multiple sources to verify or supplement existing data and to ensure a high degree of data accuracy.</p>
<p> Specifically, DHS/CBP uses ADIS data to: (1) identify lawfully admitted non-immigrants who remain in the United States beyond their period of authorized stay (which may have a bearing on an individual’s right or authority to remain in the country, ability to receive or renew a U.S. visa, or to receive governmental benefits); (2) assist DHS in supporting immigration inspection at ports of entry (POE) by providing quick retrieval of biographic and biometric indicator data on individuals who may be inadmissible to the United States; and (3) facilitate the investigation process of individuals who may have violated their immigration status or may be subjects of interest for law enforcement or intelligence purposes.</p>
</xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p> In addition to those disclosures generally permitted under 5 U.S.C. § 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS consistent with a routine use pursuant to 5 U.S.C. § 552a(b)(3) as follows: </p>
<p> A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
<p>  1. DHS or any component thereof;</p>
<p>  2. Any employee or former employee of DHS in his/her official capacity;</p>
<p>  3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
<p>  4. The U.S. or any agency thereof.</p>
<p> B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
<p> C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
<p> D. To an agency or organization for the purpose of performing audit or oversight operations of the system as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
<p> E. To appropriate agencies, entities, and persons when:</p>
<p> 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; </p>
<p> 2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
<p> 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p> F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
<p>G. To appropriate federal, state, tribal, local, international, or foreign law enforcement agencies or other appropriate authorities charged with investigating or prosecuting a violation of or enforcing or implementing a law, rule, regulation, or order, when CBP believes the information would assist enforcement of applicable civil and criminal laws, and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
<p>H. To appropriate federal, state, local, tribal, foreign, or international governmental agencies seeking information on the subjects of wants, warrants, or lookouts, or any other subject of interest, for purposes related to administering or enforcing the law, national security, or immigration, when consistent with a DHS mission-related function as determined by DHS.</p>
<p>I. To appropriate federal, state, local, tribal, foreign, or international government agencies charged with national security, law enforcement, immigration, intelligence, or other DHS mission-related functions in connection with the hiring, retention, or vetting by such an agency of an employee, contractor, or visitor; the issuance of a security clearance; the granting of clearance to access a secure facility; the auditing of compliance with any terms of employment or clearance; the reporting of an investigation of such an employee; the letting of a contract; or the issuance of a license, grant, loan, or other benefit by the requesting agency. </p>
<p>J. To an actual or potential party or to his or her attorney for the purpose of negotiation or discussion on such matters as settlement of a case or matter, or discovery proceedings.</p>
<p>K. To federal, state, local, tribal, foreign or international government intelligence or counterterrorism agencies or components when DHS becomes aware of an indication of a threat or potential threat to national or international security, or when such use is to assist in anti-terrorism efforts and disclosure is appropriate to the proper performance of the official duties of the person making the disclosure.</p>
<p>L. To approved federal, state, and local government agencies for any legally mandated purpose in accordance with an authorizing statute and when an approved Memorandum of Agreement or Computer Matching Agreement (CMA) is in place between DHS and the agency.</p>

<p>M. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
<p>Disclosure to consumer reporting agencies:</p>
<p> None.</p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>Storage:</p>
<p> DHS/CBP stores records electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
</xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p> DHS/CBP retrieves records using a variety of data elements including, but not limited to, name, place and date of arrival or departure, document number, and fingerprint identification number.</p>
</xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p> DHS/CBP safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS/CBP imposes strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
</xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p> The following proposal for retention and disposal is pending approval with the CBP Records Office and the NARA: Testing and training data will be purged when the data is no longer required. Electronic records for which the statute of limitations has expired for all criminal violations or that are older than 75 years, whichever is longer, will be purged.</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent>
<p> ADIS System Manager, CBP, U.S. Department of Homeland Security, Washington, D.C. 20229-1038.</p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p> The Secretary of Homeland Security exempted this system from the notification, access, and amendment procedures of the Privacy Act because it may contain records from a law enforcement system. However, DHS/CBP will consider individual requests to determine whether or not information may be released. Thus, individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the CBP Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts."</p>
<p>If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief FOIA Officer, Department of Homeland Security, 245 Murray Drive S.W., Building 410, STOP-0655, Washington, D.C. 20528. </p>
<p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief FOIA Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, you should:</p>
<p> • Explain why you believe the Department would have information on you;</p>
<p> • Identify which component(s) of the Department you believe may have the information about you;</p>
<p> • Specify when you believe the records would have been created; and </p>
<p> • Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
<p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
<p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
</xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p> DHS/CBP obtains records about individuals covered by this system directly and by other federal, state, local, tribal, or foreign governments; private citizens; and public and private organizations.</p>
<p> ADIS data may be derived from records related to entry or exit data of foreign countries collected by foreign governments in support of their respective entry and exit processes. Generally, records collected from foreign governments relate to individuals who have entered or exited the United States at some time, but in some instances there is no pre-existing ADIS record for the individual.</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent>
<p> The Secretary of Homeland Security exempted this system from 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5), (e)(8); (f); and (g) pursuant to 5 U.S.C. 552a(j)(2). In addition, the Secretary of Homeland Security has exempted portions of this system from 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H); and (f) pursuant to 5 U.S.C. 552a(k)(2). These exemptions apply only to the extent that records in the system are subject to exemption pursuant to 5 U.S.C. 552a(j)(2) and (k)(2).</p>
<p> When this system receives a record from another system exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claim any additional exemptions set forth here.
</p></xhtmlContent></subsection></section>
    <section id="cbp22" toc="yes">
    <systemNumber>/CBP-022</systemNumber>
    <subsection type="systemName">
        Department of Homeland Security (DHS)/U.S. Customs and Border Protection (CBP)-022 Electronic Visa Update System (EVUS)
    </subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p>Unclassified and classified. The unclassified data may be retained on classified networks, but this does not change the nature and character of the data until it is combined with classified information.</p>
            </xhtmlContent></subsection>
            <subsection type="systemLocation">
                <xhtmlContent>
                    <p>Records are maintained at DHS/CBP Headquarters in Washington, D.C., and in field offices. Records are replicated from the operational system and maintained on the DHS unclassified and classified networks to allow for analysis and vetting consistent with the stated uses, purposes, and routine uses published in this notice.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="systemManager">
                <xhtmlContent>
                    <p>Director, EVUS Program Management Office, evus@cbp.dhs.gov, U.S. Customs and Border Protection Headquarters, 1300 Pennsylvania Avenue NW, Washington, D.C. 20229.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="authorityForMaintenance">
                <xhtmlContent>
                    <p>Title IV of the Homeland Security Act of 2002, 6 U.S.C. 201 et seq., the Immigration and Naturalization Act, as amended, including secs. 103 (8 U.S.C. 1103), 214 (8 U.S.C. 1184), 215 (8 U.S.C. 1185), and 221 (8 U.S.C. 1201) of the Immigration and Nationality Act (INA), and 8 CFR part 2 and 8 CFR part 215; and the Travel Promotion Act of 2009, Pub. L. 111-145, 22 U.S.C. sec. 2131.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="purpose">
                <xhtmlContent>
                    <p>EVUS provides a mechanism through which DHS/CBP may obtain information updates from nonimmigrants who hold a passport issued by an identified country containing a U.S. nonimmigrant visa of a designated category. EVUS provides for greater efficiencies in the vetting of certain nonimmigrants by allowing DHS/CBP to identify subjects of potential interest before they depart for the United States, thereby increasing security and reducing traveler delays upon arrival at U.S. ports of entry. EVUS aids DHS/CBP in facilitating legitimate travel while also ensuring public safety and national security.</p>
                    <p>When DHS/CBP imposes a fee for EVUS enrollment, the tracking number associated with the payment information provided to Pay.gov will be stored in the Credit/Debit Card Data System (CDCDS). CDCDS is covered by DHS/CBP-003 Credit/Debit Card Data System (CDCDS), 76 FR 67755, November 2, 2011, and is used to process EVUS and third-party administrator fees and to reconcile issues regarding payment between EVUS, CDCDS, and Pay.gov. Payment information will not be used for vetting purposes and is stored separately from the EVUS enrollment data.</p>
                    <p>DHS maintains a replica of some or all of the data in EVUS on the unclassified and classified DHS networks to allow for analysis and vetting consistent with the above stated uses, purposes, and this published notice.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="categoriesOfIndividuals">
                <xhtmlContent>
                    <p>Categories of individuals covered by this system include: (1) nonimmigrants who hold a passport issued by an identified country containing a U.S. nonimmigrant visa of a designated category; and (2) persons, including U.S. citizens and lawful permanent residents, whose information is provided by the applicant in response to EVUS enrollment questions. </p>
                </xhtmlContent>
            </subsection>
            <subsection type="categoriesOfRecords">
                <xhtmlContent>
                    <p>Individuals who hold a passport issued by an identified country containing a U.S. nonimmigrant visa of a designated category to obtain the required travel authorization by electronically submitting an enrollment consisting of biographic and other data elements via the EVUS website. The categories of records in EVUS include:</p>
                    	<p>Full name (first, middle, and last);</p>
                    	<p>Other names or aliases, if available;</p>
                    	<p>Date of birth;</p>
                    	<p>City and country of birth;</p>
                    	<p>Gender;</p>
                    	<p>Email address;</p>
                    	<p>Social media identifiers, such as usernames(s) and platform(s) used, if voluntarily provided;</p>
                    	<p>Telephone number (home, mobile, work, other);</p>
                    	<p>Home address (address, apartment number, city, State/region);</p>
                    	<p>Internet protocol (IP) address from which the EVUS application was submitted; </p>
                    	<p>EVUS enrollment number;</p>
                    	<p>Global Entry Program Number;</p>
                     	<p>Country of residence;</p>
                    	<p>Passport number;</p>
                    	<p>Passport issuing country;</p>
                    	<p>Passport issuance date;</p>
                    	<p>Passport expiration date;</p>
                   	    <p>Department of Treasury Pay.gov payment tracking number (i.e., confirmation of payment; absence of payment confirmation will result in a "not cleared" determination);</p>
                    	<p>Country of citizenship;</p>
                        <p>Other citizenship (country, passport number);</p>
                    	<p>National identification number, if available;</p>
                    	<p>Address while visiting the United States (number, street, city, State);</p>
                    	<p>Emergency point of contact information (name, telephone number, email address);</p>
                    	<p>U.S. point of contact (name, address, telephone number);</p>
                    	<p>Parents’ names;</p>
                    	<p>Current job title;</p>
                    	<p>Current or previous employer name;</p>
                    	<p>Current or previous employer street address; and</p>
                    	<p>Current or previous employer telephone number.</p>
                        <p>The categories of records in EVUS also include responses to the following questions:</p>
                    	<p>History of mental or physical disorders, drug abuse or addiction,  and current communicable diseases, fevers, and respiratory illnesses;</p>
                    	<p>Past arrests, criminal convictions, or illegal drug violations;</p>
                    	<p>Previous engagement in terrorist activities, espionage, sabotage, or genocide;</p>
                    	<p>History of fraud or misrepresentation;</p>
                    	<p>Previous unauthorized employment in the United States;</p>
                    	<p>Past denial of visa, or refusal or withdrawal of application for admission at a U.S. port of entry;</p>
                    	<p>Previous overstay of authorized admission period in the United States;</p>
                    	<p>Travel history and information relating to prior travel to or presence in Iraq or Syria, a country designated as a state sponsor of terrorism, or another country or area of concern to determine whether travel to the United States poses a law enforcement or security risk; and,</p>
                    	<p>Citizenship and nationality information, with additional detail required for nationals of certain identified countries of concern.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="recordSourceCategories">
                <xhtmlContent>
                    <p>Records are obtained from applicants and representatives (e.g., friend, relative, travel industry professional) through the online EVUS enrollment at https://www.cbp.gov/EVUS. The passport and visa information provided by the applicant and/or representative is originally derived from the U.S. Department of State.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="routineUsesOfRecords">
                <xhtmlContent>
                    <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                    <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other Federal agency conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                    <p>1. DHS or any component thereof;</p>
                    <p>2. Any employee or former employee of DHS in their official capacity;</p>
                    <p>3. Any employee or former employee of DHS in their individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                    <p>4. The United States or any agency thereof.</p>
                    <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                    <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. sec. 2904 and 2906.</p>
                    <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                    <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                    <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                    <p>G. To an appropriate Federal, State, Tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, where CBP believes the information would assist enforcement of applicable civil or criminal laws and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                    <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                    <p>I. To appropriate Federal, State, local, Tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS is aware of a need to use relevant data, that relate to the purpose(s) stated in this System of Records notice, for purposes of testing new technology.</p>
                    <p>J. To appropriate Federal, State, local, Tribal, or foreign governmental agencies or multilateral governmental organizations for the purpose of protecting the vital health interests of a data subject or other persons (e.g., to assist such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to combat other significant public health threats; appropriate notice will be provided of any identified health threat or risk).</p>
                    <p>K. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation, provided disclosure is appropriate in the proper performance of the official duties of the officer making the disclosure.</p>
                    <p>L. To a Federal, State, Tribal, local, international, or foreign government agency or entity for the purpose of consulting with that agency or entity: (1) to assist in making a determination regarding redress for an individual in connection to a program; (2) for the purpose of verifying the identity of an individual seeking redress in connection with the operations of a DHS Component or program; or (3) for the purpose of verifying the accuracy of information submitted by an individual who has requested such redress on behalf of another individual.</p>
                    <p>M. To a Federal, State, Tribal, local, international, or foreign government agency or entity in order to provide relevant information related to intelligence or counterterrorism activities authorized by U.S. law, Executive Order, or other applicable national security directives.</p>
                    <p>N. To the Department of State in the processing of petitions or applications for benefits under the Immigration and Nationality Act, and all other immigration and nationality laws including treaties and reciprocal agreements.</p>
                    <p>O. To an organization or individual in either the public or private sector, either foreign or domestic, when there is a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to the extent the information is relevant to the protection of life or property.</p>
                    <p>P. To the carrier transporting an individual to the United States, prior to travel, in response to a request from the carrier, to verify an individual’s travel authorization status.</p>
                    <p>Q. To the Department of Treasury’s Pay.gov, for payment processing and payment reconciliation purposes.</p>
                    <p>R. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations, or in connection with criminal law proceedings.</p>
                    <p>S. To a Federal, State, local agency, Tribal, Territorial, or other appropriate entity or individual, through established liaison channels to selected foreign governments, in order to provide intelligence, counterintelligence, or other information for the purposes of intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order, or other applicable national security directive.</p>
                    <p>T. To a Federal, State, local, Tribal, Territorial, or other foreign government agency or organization, or international organization, lawfully engaged in collecting law enforcement intelligence information, whether civil or criminal, or charged with investigating, prosecuting, enforcing or implementing civil or criminal laws, related rules, regulations or orders, to enable these entities to carry out their law enforcement responsibilities, including the collection of law enforcement intelligence.</p>
                    <p>U. To the Department of Treasury's Office of Foreign Assets Control (OFAC) for inclusion on the publicly issued List of Specially Designated Nationals and Blocked Persons (SDN List) of individuals and entities whose property and interests in property are blocked or otherwise affected by one or more OFAC economic sanctions programs, as well as information identifying certain property of individuals and entities subject to OFAC economic sanctions programs.</p>
                    <p>V. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="policiesAndPractices">
                <xhtmlContent>
                    <p>DHS/CBP stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records are safeguarded with passwords and encryption and may be stored on magnetic disc, tape, and digital media.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="retrievability">
                <xhtmlContent>
                <p>DHS/CBP may retrieve records by any of the data elements supplied by the applicant/representative.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="retentionAndDisposal">
                <xhtmlContent>
                    <p>Enrollment information submitted to EVUS is retained for 15 years. DHS/CBP ingests EVUS enrollment data into other DHS/CBP systems for vetting purposes and is stored in accordance with the other systems’ respective retention periods. For example, EVUS is ingested into the Automated Targeting System and is retained for 15 years and is also ingested into TECS where it is retained for 75 years, consistent with those systems’ retention schedules. These retention periods are based on DHS/CBP’s historical encounters with suspected terrorists and other criminals, as well as the broader expertise of the law enforcement and intelligence communities. Travel records, including historical records, are essential in assisting DHS/CBP officers with their risk-based assessment of travel indicators and identifying potential links between known and previously unidentified terrorist facilitators. Analyzing these records for these purposes allows DHS/CBP to continue to effectively identify suspect travel patterns and irregularities. If the record is linked to active law enforcement lookout records, DHS/CBP matches to enforcement activities, and/or investigations or cases (i.e., specific and credible threats; flights, travelers, and routes of concern; or other defined sets of circumstances), the record will remain accessible for the life of the law enforcement matter to support that activity and other enforcement activities that may become related.</p>
                    <p> Records replicated on the unclassified and classified networks will follow the same retention schedule.</p>
                    <p>Payment information will not be stored in EVUS but will be forwarded to Pay.gov and stored in CBP’s financial processing system, pursuant to the DHS/CBP-003 Credit/Debit Card Data System of Records notice, 76 FR 67755, November 2, 2011. When a traveler’s EVUS data is used for purposes of processing their application for admission to the United States, the EVUS data will be used to create a corresponding admission record that is covered in the DHS/CBP-016 Non-Immigrant Information System (NIIS) System of Records notice, 80 FR 13398, March 13, 2015. This corresponding admission record will be retained in accordance with the NIIS retention schedule, which is 75 years.</p>
                </xhtmlContent>
                </subsection>
                    <subsection type="safeguards">
                        <xhtmlContent>
                            <p>DHS/CBP safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS/CBP has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions. </p>
                        </xhtmlContent>
                    </subsection>
                    <subsection type="recordAccessProcedures">
                        <xhtmlContent>
                            <p>Applicants may access their EVUS information to view and amend their enrollment by providing their EVUS enrollment number and/or name, date of birth, and visa/passport number through the EVUS website. EVUS applicants have the ability to view their EVUS status (successful enrollment, unsuccessful enrollment, pending) and submit limited updates to their travel itinerary information.</p>
                            <p>In addition, EVUS applicants and other individuals whose information is included on EVUS enrollment may submit requests and receive information maintained in this system as it relates to data submitted by or on behalf of a person who travels to the United States and crosses the border, as well as, for EVUS applicants, the resulting determination (successful enrollment, pending, unsuccessful enrollment). However, the Secretary of Homeland Security has exempted portions of this system from certain provisions of the Privacy Act of 1974 related to providing the accounting of disclosures to individuals because it is a law enforcement system. DHS/CBP will consider individual requests to determine whether information may be released. In processing requests for access to information in this system, DHS/CBP will review not only the records in the operational system but also the records that were replicated on the unclassified and classified networks and based on this notice provide appropriate access to the information.</p>
                            <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and Headquarters Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning them, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655, or electronically at https://www.dhs.gov/freedom-information-act-foia. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                            <p> When an individual is seeking records about themself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR part 5. The individual must first verify their identity, meaning that the individual must provide their full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. An individual may obtain more information about this process at http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                            	<p>Explain why they believe the Department would have information being requested;</p>
                            	<p>Identify which component(s) of the Department they believe may have the information;</p>
                            	<p>Specify when the individual believes the records would have been created; and</p>
                            	<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
                            <p>If an individual’s request is seeking records pertaining to another living individual, the first individual must include a statement from that individual certifying their agreement for the first individual to access their records.</p>
                            <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
                        </xhtmlContent>
                    </subsection>
                    <subsection type="contestingRecordProcedures">
                        <xhtmlContent>
                            <p>See "Record Access Procedures" above.</p>
                        </xhtmlContent>
                    </subsection>
                    <subsection type="notificationProcedure">
                        <xhtmlContent>
                            <p>See "Record Access Procedures" above.</p>
                        </xhtmlContent>
                    </subsection>
                    <subsection type="exemptionsClaimed">
                        <xhtmlContent>
                            <p>Pursuant to 6 CFR part 5, appendix C, law enforcement and other derogatory information covered in this system is exempt from 5 U.S.C. 552a(c)(3) and (4); (d)(1), (2), (3), and (4); (e)(1), (2), (3), (4)(G) through (I), (e)(5), and (8); (f); and (g) of the Privacy Act pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, pursuant to 5 U.S.C. 552a (k)(1) and (k)(2): 5 U.S.C. 552a(c)(3); (d)(1), (d)(2), (d)(3), and (d)(4); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).</p>
                            <p>Despite the exemptions taken on this system of records, DHS/CBP is not taking any exemption from subsection (d) with respect to information maintained in the system as it relates to data submitted by or on behalf of a person who travels to visit the United States and crosses the border, nor shall an exemption be asserted with respect to the resulting determination (authorized to travel, pending, or not authorized to travel). However, pursuant to 5 U.S.C. sec. 552a(j)(2), DHS/CBP plans to exempt such information in this system from sections (c)(3), (e)(8), and (g) of the Privacy Act of 1974, as amended, as is necessary and appropriate to protect this information. Further, DHS will claim exemption from sec. (c)(3) of the Privacy Act of 1974, as amended, pursuant to 5 U.S.C. sec. 552a(k)(2) as is necessary and appropriate to protect this information. CBP will not disclose the fact that a law enforcement or intelligence agency has sought particular records because it may affect ongoing law enforcement activities.</p>
                            <p>When this system receives a record from another system exempted in that source system under 5 U.S.C. sec. 552a(j) or (k), DHS/CBP will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claim any additional exemptions set forth here. For instance, as part of the vetting process, this system may incorporate records from DHS/CBP’s Automated Targeting System, and all exemptions for DHS/CBP’s Automated Targeting System of Records notice, described and referenced herein, carry forward and will be claimed by DHS/CBP.</p>
                        </xhtmlContent>
                    </subsection>
                    <subsection type="history">
                        <xhtmlContent>
                            <p>84 FR 30751 (June 27, 2019); 81 FR 60371 (September 1, 2016).</p>
                        </xhtmlContent>
                    </subsection>
                </section>


                    <section id="CBP23" toc="yes">
        <systemNumber>/CBP-023</systemNumber>
        <subsection type="systemName">
            Border Patrol Enforcement Records (BPER)
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p> Unclassified. The data may be retained on the classified networks but this does not change the nature and character of the data until it is combined with classified information.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p> DHS/CBP primarily maintains records at the CBP Headquarters offices in Washington, D.C. and at Office of Border Patrol Sector and Station locations. BPER are primarily collected and or maintained within three information technology systems (E3 Portal, U.S. Immigration and Customs Enforcement (ICE) EID, and the ICAD database), however these records may also be stored locally by Sector or Station offices, checkpoints, mobile information collection devices, and border surveillance technologies. This system of record notice encompasses the categories of information currently input and or maintained in E3, EID, and ICAD. On behalf of CBP, DHS stores BPER biometric records in the DHS biometrics repository, OBIM IDENT. </p>
                <p> DHS/CBP also replicates records from these operational systems and maintains them on other DHS unclassified and classified systems and networks.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p> Categories of individuals covered by this system of records include:</p>
                <p>1. Individuals encountered, apprehended, detained, or removed in relation to border crossings, checkpoint operations, law enforcement actions and investigations, inspections, patrols, examinations, legal proceedings, or other operations that implement and enforce the Immigration and Nationality Act (INA) (8 U.S.C. 1101 et seq.) and related treaties, statutes, orders, and regulations;</p>
                <p>2. Individuals wanted by other law enforcement agencies, including federal, state, local, tribal, foreign, and international, or individuals who are the subject of inquiries, lookouts, or notices by another agency or a foreign government; and</p>
                <p>3. Individuals who contact DHS/CBP with complaints, tips, leads, or other information regarding a violation, or potential violation, of laws enforced by DHS/CBP.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>Categories of records in this system include:</p>
                <p>1. Biographic, descriptive, historical, and other identifying data, including but not limited to: names; aliases; fingerprint identification number (FIN) or other biometric identifying numbers; date and place of birth; passport and other travel or identification document information; nationality; aliases; Alien Registration Number (A-Number); Social Security number (SSN); contact or location information (e.g., known or possible addresses, phone numbers); employment, educational, immigration, and criminal history; marital status; occupation; height, weight, eye color, hair color, and other unique physical characteristics (e.g., scars and tattoos). Identifying information also includes vehicle, vessel, and aircraft identifying information, such as license plate numbers, even if not directly related to an individual at the time of collection.</p>
                <p>2. Biometric data including: fingerprints, iris scans, blood type, and photographs. Biometric information is obtained directly from individuals, and from matches against other Government biometric databases. Biometric data is not normally collected for individuals under the age of 14.</p>
                <p>3. Geolocation imagery and coordinates including: sensor alerts and camera images of individuals, vehicles, vessels, or aircraft and the time, date, and location of the image.</p>
                <p>4. Enforcement-related data including: case number, record number, and other data describing an event involving alleged violations of criminal, immigration, or other laws (location, date, time, event category, types of criminal or immigration law violations alleged, types of property involved, use of violence, weapons, or assault against DHS personnel or third parties, attempted escape, and other related information); CBP encounter management information, including: category (event categories describe broad categories of criminal law enforcement, such as smuggling and human trafficking), agent or officer, location of officer or officer’s vehicle, date/time initiated, date/time completed, assets used for encounter (bike, horse, vehicle, etc.), results of the encounter, and any agent or officer notes and comments.</p>
                <p>5. Data on aliens in custody or detained, including: transportation information, identification numbers, custodial actions (such as meals, conditions of detainee cell, overall detainee care information), custodial property, information related to detainers, book-in/book-out date and time, and other alerts.</p>
                <p>6. Limited health information gathered during a temporary detention in a CBP facility or otherwise relevant to transportation requirements.</p>
                <p>7. Contact, biographical, and identifying data of relatives, associates of an alien (which may include information for individuals such as an attorney), or witnesses to an encounter, but not limited to: name, date of birth, place of birth, address, telephone number, and business or agency name.</p>
                <p>8. Alerts, typically containing biographic but occasionally biometric information, concerning individuals who are the subject of inquiries, lookouts, or notices by another federal agency, state, local, tribal, territorial, or foreign government.</p>
                <p>9. Data concerning personnel of other agencies that arrested, or assisted or participated in the arrest or investigation of, or are maintaining custody of, an individual whose arrest record is contained in this system of records. This can include: name, title, agency name, address, telephone number, and other information.</p>
                <p>10. Basic contact information, including name, phone numbers, and address, from members of the public who voluntarily contact DHS with complaints, tips, leads, or information about violations, or potential violations, of law.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>5 U.S.C. sec. 301; 6 U.S.C. sec. 202; 8 U.S.C. secs. 1103, 1185, 1225, 1357, 1365a, 1365b, 1379, and 1732; 19 U.S.C. secs. 482, 1461, 1496, 1581, 1582; Homeland Security Act of 2002 (Pub. L. 107-296); Justice for All Act of 2004 (Pub. L. 108-405); Intelligence Reform and Terrorism Prevention Act of 2004 (Pub. L. 108-458); Secure Fence Act of 2006 (Pub. L. 109, 367); 8 CFR 287.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p> The purposes of this system of records are to:</p>
                <p>1. Prevent the entry of inadmissible aliens into the United States;</p>
                <p>2. Record the detection, location, encounter, identification, apprehension, and/or detention of individuals who commit violations of U.S. laws enforced by CBP or DHS between the POE;</p>
                <p>3. Support the identification and arrest of individuals (both citizens and non-citizens) who commit violations of federal criminal laws enforced by DHS;</p>
                <p>4. Support the grant, denial, and tracking of individuals who seek or receive parole into the United States;</p>
                <p>5. Provide criminal and immigration history information during DHS enforcement encounters, and background checks on applicants for DHS immigration benefits (e.g., employment authorization and petitions); and</p>
                <p>6. Identify potential terrorist and criminal activity, immigration violations, and threats to homeland security; to uphold and enforce the law; and to ensure public safety.</p>
                <p>DHS/CBP maintains a replica of some or all of the data in the operating system on other unclassified and classified systems and networks to allow for analysis and vetting consistent with the above stated purposes and this published notice.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p> In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p> A. To the Department of Justice, including Offices of the United States Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>  1. DHS or any component thereof;</p>
                <p>  2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>  3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
                <p>  4. The United States or any agency thereof.</p>
                <p> B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made pursuant to a written Privacy Act waiver at the request of the individual to whom the record pertains;</p>
                <p> C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906;</p>
                <p> D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function;</p>
                <p> E. To appropriate agencies, entities, and persons when:</p>
                <p> </p>
                <p> 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;</p>
                <p> 2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
                <p> 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
                <p> F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees;</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure;</p>
                <p>H. To appropriate federal, state, tribal, local, or foreign governmental agencies or multilateral governmental organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a statute, rule, regulation, order, or license, when DHS/CBP believes the information would assist in the enforcement of applicable civil or criminal laws;</p>
                <p>I. To federal and foreign government intelligence or counterterrorism agencies or components when DHS/CBP becomes aware of an indication of a threat or potential threat to national or international security, or when such use is to assist in the anti-terrorism efforts and disclosure is appropriate in the proper performance of the official duties of the person making the disclosure;</p>
                <p>J. To a federal, state, or local agency, or other appropriate entity or individual, or through established liaison channels to selected foreign governments, in order to provide intelligence, counterintelligence, or other information for the purposes of intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order, or other applicable national security directive;</p>
                <p>K. To an organization or person in either the public or private sector, either foreign or domestic, when there is a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, or when the information is relevant to the protection of life, property, or other vital interests of a person;</p>
                <p>L. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations, or in connection with criminal law proceedings;</p>
                <p> M. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation, provided disclosure is appropriate in the proper performance of the official duties of the officer making the disclosure;</p>
                <p> N. To other federal agencies for the purposes of biometric identity verification and resolution, such as the Department of Defense (DoD) Automated Biometric Information System and the DOJ Next Generation Identification (NGI);</p>
                <p>O. To foreign governments for the purpose of coordinating and conducting the removal of aliens to other nations, including issuance of relevant travel documents; and to international, foreign, and intergovernmental agencies, authorities, and organizations in accordance with law and formal or informal international arrangements;</p>
                <p>P. To federal, state, local, territorial, tribal, and foreign law enforcement or custodial agencies for the purpose of placing an immigration detainer on an individual in that agency’s custody, or to facilitate the transfer of custody of an individual from CBP to the other agency. This will include the transfer of information about unaccompanied minor children to the U.S. Department of Health and Human Services (HHS), Office of Refugee Resettlement (ORR), to facilitate the custodial transfer of such children from CBP to HHS;</p>
                <p> Q. To appropriate federal, state, local, tribal, foreign governmental agencies, multilateral governmental organizations, or other public health entities, for the purpose of protecting the vital interests of a data subject or other persons, including to assist such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to combat other significant public health threats; appropriate notice will be provided of any identified health threat or risk;</p>
                <p>R. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations when CBP is aware of a need to use relevant data for purposes of testing new technology and systems designed to enhance border security or identify other violations of law.</p>
                <p>S. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that the release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
                <p>Disclosure to consumer reporting agencies:</p>
                <p> None.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>Storage:</p>
                <p> DHS/CBP stores records in this system electronically (on unclassified and classified systems and networks) or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media, or in any other electronic form.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p> DHS/CBP may be retrieve records by name or other personal identifiers listed in the categories of records, above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p> DHS/CBP safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS/CBP has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer systems containing the records in this system of records is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p> CBP is in the process of drafting a proposed record retention schedule for the information maintained in the BPER SORN. CBP anticipates retaining records of arrests, detentions, and removals for seventy-five (75) years. Investigative information that does not result in an individual’s arrest, detention, or removal, is stored for twenty (20) years after the investigation is closed, consistent with the N1-563-08-4-2. User account management records for ten (10) years following an individual’s separation of employment from federal service; statistical records for ten (10) years; audit files for fifteen (15) years; and backup files for up to one (1) month. Records replicated on other DHS or CBP unclassified and classified systems and networks will follow the same retention schedule.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p> Associate Chief, U.S. Border Patrol, Enforcement Systems Branch, U.S. Customs and Border Protection, 1300 Pennsylvania Avenue, NW, Washington, D.C. 20229.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p> The Secretary of Homeland Security has exempted this system from the notification, access, accounting, and amendment procedures of the Privacy Act because it is a law enforcement system. However, DHS/CBP will consider individual requests to determine whether or not information may be released. Thus, individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and Headquarters or CBP Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive, SW, Building 410, STOP-0655, Washington, D.C. 20528.</p>
                <p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR part 5.20, et seq. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, you should:</p>
                <p>•Explain why you believe the Department would have information on you;</p>
                <p>•Identify which component(s) of the Department you believe may have the information about you;</p>
                <p>•Specify when you believe the records would have been created; and</p>
                <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
                <p>In processing Privacy Act requests for related to information in this system, DHS/CBP will review the records in the operational system, and coordinate review of records that were replicated on other unclassified and classified systems and networks.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p> See "Notification procedure" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p> See "Notification procedure" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p> Records in the system are supplied by several sources. In general, information is obtained from individuals covered by this system, and other federal, state, local, tribal, or foreign governments. More specifically, DHS/CBP-023 BPER derive from the following sources:</p>
                <p>(a) Individuals covered by the system and other individuals (e.g., witnesses, family members);</p>
                <p>(b) Other federal, state, local, tribal, or foreign governments and government information systems;</p>
                <p>(c) Business records;</p>
                <p>(d) Evidence, contraband, and other seized material; and</p>
                <p>(e) Public and commercial sources.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p> The Secretary of Homeland Security has exempted portions of this system of records from subsecs. (c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5), and (e)(8); and (g) of the Privacy Act pursuant to 5 U.S.C. 552a(j)(2). In addition, the Secretary of Homeland Security has exempted portions of this system of records from subsections (c)(3); (d); (e)(1), (e)(4)(G), and (e)(4)(H) of the Privacy Act pursuant to 5 U.S.C. 552a(k)(2). These exemptions apply only to the extent that records in the system are subject to exemption pursuant to 5 U.S.C. 552a(j)(2) and (k)(2). In addition, to the extent a record contains information from other exempt systems of records, DHS will rely on the exemptions claimed for those systems. </p>
            </xhtmlContent>
        </subsection>
    </section>

    <section id="cbp24" toc="yes">
        <systemNumber>/CBP-024</systemNumber>
        <subsection type="systemName">
            <p> U.S. Department of Homeland Security (DHS)/U.S. Customs and Border Protection (CBP)-024 CBP Intelligence Records System (CIRS) System of Records.</p>
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>
                    Unclassified, Sensitive, For Official Use Only, Law Enforcement-Sensitive, and Classified. 
                </p>
            </xhtmlContent>
                </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>CBP maintains CIRS records at the CBP Headquarters in Washington, D.C. and field offices. CBP uses the Analytical Framework for Intelligence (AFI) and the Intelligence Reporting System (IRS) to facilitate the development of finished intelligence products and maintain a repository of intelligence information records. Records may also be stored on paper within the Office of Intelligence (OI), the National Targeting Center, or in CBP field offices.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Assistant Commissioner for the Office of Intelligence, U.S. Customs and Border Protection, 1300 Pennsylvania Avenue N.W., Washington, D.C. 20229.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p> Title II of the Homeland Security Act of 2002 (Pub. L. 107-296), as amended by the Intelligence Reform and Terrorism Prevention Act of 2004 (Pub. L. 108-458, 118 Stat. 3638); the Trade Facilitation and Trade Enforcement Act of 2015 (Pub. L. 114-125); the Tariff Act of 1930, as amended; the Immigration and Nationality Act ("INA"), 8 U.S.C. 1101, et seq.; the Implementing Recommendations of the 9/11 Commission Act of 2007 (Pub. L. 110-53); the Antiterrorism and Effective Death Penalty Act of 1996 (Pub. L. 104-132, 110 Stat. 1214); the SAFE Port Act of 2006 (Pub. L. 109-347); the Aviation and Transportation Security Act of 2001 (Pub. L. 107-71); 6 U.S.C. 202; and 6 U.S.C. 211.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>This system of records describes CBP’s collection and consolidation of information from multiple sources, including law enforcement agencies and agencies of the U.S. Intelligence Community, in order to enhance CBP’s ability to: identify, apprehend, or prosecute individuals who pose a potential law enforcement or security risk; aid in the enforcement of the customs and immigration laws, and other laws enforced by DHS at the border; and enhance U.S. border security.</p>
                <p> CBP maintains intelligence information to:</p>
                (a)	<p>Support CBP’s collection, analysis, reporting, and distribution of law enforcement, immigration administration, terrorism, intelligence, and homeland security information in support of CBP’s law enforcement, customs and immigration, counterterrorism, national security, and other homeland security missions.</p>
                (b)	<p>Produce law enforcement intelligence reporting that provides actionable information to CBP’s law enforcement and immigration administration personnel and to other appropriate government agencies.</p>
                (c)	<p>Enhance the efficiency and effectiveness of the research and analysis process for DHS law enforcement, immigration, and intelligence personnel through information technology tools that provide for advanced search and analysis of various datasets.</p>
                (d)	<p>Identify potential criminal activity, violations of federal law, and threats to homeland security; provide overall situational awareness for the CBP enterprise; to uphold and enforce the law; and to ensure public safety.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                1.	<p>Individuals (e.g., subjects, witnesses, associates, informants) associated with border security, immigration or customs enforcement, or other law enforcement investigations/activities conducted by CBP;</p>
                2.	<p>Individuals associated with law enforcement investigations or activities conducted by other federal, state, tribal, territorial, local, or foreign agencies when there is a potential nexus to national security, CBP’s law enforcement responsibilities, or homeland security in general;</p>
                3.	<p>Individuals known or appropriately suspected to be or have been engaged in conduct constituting, in preparation for, in aid of, or related to terrorism;</p>
                4.	<p>Individuals involved in, associated with, or who have reported suspicious activities, threats, or other incidents reported by domestic and foreign government agencies, multinational or non-governmental organizations, critical infrastructure owners and operators, private sector entities and organizations, and individuals;</p>
                5.	<p>Individuals not implicated in activities in violation of laws enforced or administered by CBP, but with pertinent knowledge of some circumstance of a case or record subject. Such records may contain any information, including personal identification data, that may assist CBP in discharging its responsibilities generally (e.g., information which may assist in identifying and locating such individuals);</p>
                6.	<p>Individuals who are the subjects of or otherwise identified in classified or unclassified intelligence reporting received or reviewed by CBP OI;</p>
                7.	<p>Individuals identified in law enforcement, intelligence, crime, and incident reports (including financial reports under the Bank Secrecy Act and law enforcement bulletins) produced by DHS and other government agencies;</p>
                8.	<p>Individuals identified in U.S. visa, border, immigration, and naturalization benefit data, including arrival and departure data;</p>
                9.	<p>Individuals identified in DHS law enforcement and immigration records;</p>
                10.	<p>Individuals not authorized to work in the United States;</p>
                11.	<p>Individuals whose passports have been lost or stolen; and</p>
                12.	<p>Individuals identified in any publicly available or commercially available information source such as news reports, property records, and social media postings.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p> Categories of records in this system include information collected by CBP for an intelligence purpose that is not covered by an existing DHS SORN and finished intelligence products. This information may include:</p>
                1.	<p>Biographic information (e.g., name, date of birth, Social Security number, alien registration number, citizenship/immigration status, passport information, addresses, phone numbers);</p>
                2.	<p>Records of immigration enforcement activities or law enforcement investigations/activities;</p>
                3.	<p>Information (including documents and electronic data) collected by CBP from or about individuals during investigative activities and border searches;</p>
                4.	<p>Records of immigration enforcement activities and law enforcement investigations/activities that have a possible nexus to CBP’s law enforcement and immigration enforcement responsibilities or homeland security in general;</p>
                5.	<p>Law enforcement, intelligence, crime, and incident reports (including financial reports under the Bank Secrecy Act and law enforcement bulletins) produced by DHS and other government agencies;</p>
                6.	<p>U.S. visa, border, immigration, and naturalization benefit data, including arrival and departure data;</p>
                7.	<p>Terrorist watchlist information and other terrorism-related information regarding threats, activities, and incidents;</p>
                8.	<p>Lost and stolen passport data;</p>
                9.	<p>Records pertaining to known or suspected terrorists, terrorist incidents, activities, groups, and threats;</p>
                10.	<p>CBP-generated intelligence requirements, analysis, reporting, and briefings;</p>
                11.	<p>Information from investigative and intelligence reports prepared by law enforcement agencies and agencies of the U.S. foreign intelligence community;</p>
                12.	<p>Articles, public-source data (including information from social media), commercially available information, and other published information on individuals and events of interest to CBP;</p>
                13.	<p>Audio and video records retained in support of CBP’s law enforcement, national security, or other homeland security missions;</p>
                14.	<p>Records and information from government data systems or retrieved from commercial data providers in the course of intelligence research, analysis, and reporting, including records of property ownership;</p>
                15.	<p>Reports of suspicious activities, threats, or other incidents generated by CBP or third parties;</p>
                16.	<p>Additional information about confidential sources or informants; and</p>
                17.	<p>Metadata, which may include but is not limited to transaction date, time, location, and frequency.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>Federal, state, local, territorial, tribal, or other domestic agencies, foreign agencies, multinational or non-governmental organizations, critical infrastructure owners and operators, private sector entities and organizations, individuals, commercial data providers, and public sources such as social media, news media outlets, and the Internet.</p>
                <p> CBP will abide by the safeguards, retention schedules, and dissemination requirements of DHS source system SORNs to the extent those systems are applicable and the information is not incorporated into a finished intelligence product. For additional information, please see the Privacy Impact Assessment for the Analytical Framework for Intelligence and the forthcoming Privacy Impact Assessment for the Intelligence Reporting System.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p> In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
                <p> A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>  1. DHS or any component thereof;</p>
                <p>  2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>  3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
                <p>  4. The United States or any agency thereof.</p>
                <p> B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p> C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p> D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p> G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p> H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p> I. To a federal, state, territorial, tribal, local, international, or foreign government agency or entity for the purpose of consulting with that agency or entity: (1) To assist in making a determination regarding redress for an individual in connection with the operations of a DHS component or program; (2) for the purpose of verifying the identity of an individual seeking redress in connection with the operations of a DHS component or program; or (3) for the purpose of verifying the accuracy of information submitted by an individual who has requested such redress on behalf of another individual.</p>
                <p> J. To a former employee of DHS, in accordance with applicable regulations, for purposes of responding to an official inquiry by a federal, state, or local government entity or professional licensing authority; or facilitating communications with a former employee that may be necessary for personnel-related or other official purposes when the Department requires information or consultation assistance from the former employee regarding a matter within that person’s former area of responsibility.</p>
                <p> K. To an appropriate federal, state, local, tribal, foreign, or international agency, if the information is relevant and necessary to the agency’s decision concerning the hiring or retention of an individual or the issuance, grant, renewal, suspension, or revocation of a security clearance, license, contract, grant, or other benefit; or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant, or other benefit and when disclosure is appropriate to the proper performance of the official duties of the person receiving the information.</p>
                <p> L. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations for the purpose of protecting the vital interests of a data subject or other persons, including to assist such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to combat other significant public health threats; appropriate notice will be provided of any identified health risk.</p>
                <p> M. To a public or professional licensing organization when such information indicates, either by itself or in combination with other information, a violation or potential violation of professional standards, or reflects on the moral, educational, or professional qualifications of an individual who is licensed or who is seeking to become licensed.</p>
                <p> N. To a federal, state, tribal, local, or foreign government agency or organization, or international organization, lawfully engaged in collecting law enforcement intelligence information, whether civil or criminal, or charged with investigating, prosecuting, enforcing, or implementing civil or criminal laws, related rules, regulations or orders, to enable these entities to carry out their law enforcement responsibilities, including the collection of law enforcement intelligence.</p>
                <p> O. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a statute, rule, regulation, order, license, or treaty when DHS determines that the information would assist in the enforcement of civil, criminal, or regulatory laws.</p>
                <p> P. To third parties during the course of an investigation by DHS, a proceeding within the purview of the immigration and nationality laws, or a matter under DHS’s jurisdiction, to the extent necessary to obtain information pertinent to the investigation, provided disclosure is appropriate to the proper performance of the official duties of the officer making the disclosure.</p>
                <p> Q. To a federal, state, or local agency, or other appropriate entity or individual, or through established liaison channels to selected foreign governments, in order to provide intelligence, counterintelligence, or other information for the purposes of intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order, or other applicable national security directive.</p>
                <p> R. To federal and foreign government intelligence or counterterrorism agencies when DHS reasonably believes there to be a threat or potential threat to national or international security for which the information may be useful in countering the threat or potential threat, when DHS reasonably believes such use is to assist in anti-terrorism efforts, and disclosure is appropriate to the proper performance of the official duties of the person making the disclosure.</p>
                <p> S. To an organization or individual in either the public or private sector, either foreign or domestic, when there is a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to the extent the information is relevant to the protection of life or property and disclosure is appropriate to the proper performance of the official duties of the person making the disclosure.</p>
                <p> T. To the Department of State in the processing of petitions or applications for benefits under the Immigration and Nationality Act, and all other immigration and nationality laws including treaties and reciprocal agreements.</p>
                <p> U. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS is aware of a need to use relevant data for purposes of testing new technology and systems designed to enhance national security or identify other violations of law.</p>
                <p> V. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p> DHS/CBP stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>DHS/CBP may retrieve records by personal identifiers such as but not limited to name, alien registration number, phone number, address, Social Security number, or passport number. DHS/CBP may retrieve records by non-personal information such as transaction date, entity/institution name, description of goods, value of transactions, and other information.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>To the extent that CBP accesses and incorporates information from other DHS systems of records as sources of information for finished intelligence products, CBP will abide by the safeguards, retention schedules, and dissemination requirements of those underlying source systems of record. For additional information, please see the Privacy Impact Assessment for the Analytical Framework for Intelligence and the forthcoming Privacy Impact Assessment for the Intelligence Reporting System.</p>
                <p> Consistent with the DHS N1-563-07-016 records schedule, CBP will retain information consistent with the same retention requirements of the DHS Office of Intelligence and Analysis:</p>
                1.	<p>Dissemination Files and Lists: CBP will retain finished and current intelligence report information distributed to support the Intelligence Community, DHS Components, and federal, state, local, tribal, and foreign Governments and includes contact information for the distribution of finished and current intelligence reports for two (2) years.</p>
                2.	<p>Raw Reporting Files: CBP will retain raw, unevaluated information on threat reporting originating from operational data and supporting documentation that are not covered by an existing DHS system of records for thirty (30) years.</p>
                3.	<p>Finished Intelligence Case Files: CBP will retain finished intelligence and associated background material for products such as Warning Products identifying imminent homeland security threats, Assessments providing intelligence analysis on specific topics, executive products providing intelligence reporting to senior leadership, intelligence summaries about current intelligence events, and periodic reports containing intelligence awareness information for specific region, sector, or subject/area of interest as permanent records and will transfer the records to the National Archives and Records Administration (NARA) after twenty (20) years.</p>
                4.	<p>Requests for Information/Data Calls: CBP will retain requests for information and corresponding research, responses, and supporting documentation for ten (10) years.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act, and the Judicial Redress Act if applicable, because it is a law enforcement system. However, DHS/CBP will consider individual requests to determine whether or not information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and CBP Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief FOIA Officer, U.S. Department of Homeland Security, Washington, D.C. 20528. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                <p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief FOIA Officer, http://www.dhs.gov/foia or (866) 431-0486. In addition, you should:</p>
                •	<p>Explain why you believe the Department would have information on you;</p>
                •	<p>Identify which component(s) of the Department you believe may have the information about you;</p>
                •	<p>Specify when you believe the records would have been created; and</p>
                •	<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p> If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
                <p> Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p> For records covered by the Privacy Act or covered JRA records, see "Record Access Procedures" above. For records not covered by the Privacy Act or JRA, individuals may submit an inquiry to the DHS Traveler Redress Inquiry Program (DHS TRIP) at https://www.dhs.gov/dhs-trip or the CBP INFO CENTER at www.help.cbp.gov or (877) 227-5511 (international callers may use (202) 325-8000 and TTY users may dial (866) 880-6582).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures."</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f); and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(1) and (k)(2), has exempted this system from the following provisions of the Privacy Act, 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), and (e)(4)(H); (e)(4)(I), and (f). When this system receives a record from another system exempted in that source system under 5 U.S.C. 552a(k)(1); (k)(2); or (j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p> 82 Fed. Reg. 44198 (September 21, 2017).</p>
                          </xhtmlContent>
        </subsection>
    </section>

    <section id="CBP25" toc="yes">
        <systemNumber>/CBP-025</systemNumber>

        <subsection type="systemName">
            <p>Department of Homeland Security (DHS)/U.S. Customs and Border Protection (CBP)-025 CBP Recruitment and Hiring System of Records.</p>
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p> Unclassified.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p> DHS/CBP maintains records at its Headquarters at 1300 Pennsylvania Avenue NW, Washington, D.C. 20229, and in field offices, and contractor-owned and operated facilities. DHS/CBP stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media and will be maintained within a CBP web portal.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Executive Assistant Commissioner, Enterprise Services, U.S. Customs and Border Protection, 1300 Pennsylvania Avenue NW, Washington, D.C. 20029.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>5 U.S.C. sec. 302, Delegation of authority; 5 U.S.C. sec. 2301(b)(1)–(2), Merit system principles; 5 U.S.C. sec. 3101, General authority to employ; 5 U.S.C. sec. 3301, Civil service; generally; Section 501 of the Rehabilitation Act of 1973; Americans with Disability Act Amendments of 2008; Executive Order 14035, Diversity, Equity, Inclusion, and Accessibility in the Federal Workforce (June 25, 2021); Executive Order 13548, Increasing Federal Employment of Individuals with Disabilities (July 10, 2010).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to conduct recruitment, marketing, outreach, and advertising to potential candidates for all CBP positions located in the United States and abroad; generate leads and maintain lists of potential applicants for recruiting purposes based on commercially available demographic or subscription lists or from community, civic, educational institutions, military, and other sources; identify quality leads based on pre-screening question responses; manage all tracking and communications with potential leads and conduct outreach to attract applicants during the hiring process; maintain logs and respond to applicant questions from a national call center; reengage withdrawn applicants for hiring positions and invite them to reapply to CBP opportunities; and conduct data analytics for recruitment strategies, to measure the effectiveness of outreach campaigns. CBP invites candidates to voluntarily self-identify their disability status for purposes of CBP’s affirmative action program, which includes those policies, practices, and procedures to ensure that all qualified individuals and potential applicants receive an equal opportunity for recruitment, selection, advancement, and every other term and privilege associated with CBP employment opportunities.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p> Potential applicants or individuals interested in CBP employment opportunities covered by the system include:</p>
                <p>1. Individuals who express interest in any CBP position and voluntarily provide information to CBP.</p>
                <p>2. Individuals who withdraw from the hiring process for CBP positions.</p>
                <p>3. Individuals who receive targeted marketing information from CBP to apply for a CBP position based on commercially available mailing lists (e.g., particular magazine or cable channel subscribers) or from community, civic, educational institutions, military, and other sources.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>CBP maintains various types of information related to recruiting and outreach records for CBP positions located in the United States and abroad, including:</p>
                <p>●First and last name;</p>
                <p>●Age or date of birth;</p>
                <p>●Disability status; </p>
                <p>●Gender;</p>
                <p>●Phone numbers;</p>
                <p>●Email addresses;</p>
                <p>●Mailing addresses, including ZIP code;</p>
                <p>●Military status (e.g., veteran, active duty);</p>
                <p>●Other biographic and contact information voluntarily provided to DHS by individuals covered by this system of records solely for recruitment and hiring activities;</p>
                <p>●Computer-generated identifier or case number when created in order to retrieve information; and</p>
                <p>●Status of opt-in/consent to receive targeted marketing and advertising based on the individual’s expressed area of interest in CBP employment opportunities;</p>
                <p>●Responses to pre-screening questions, including information related to: (1) an individual’s possession of, or eligibility to, carry a valid driver’s license (yes or no response only); (2) any reason why the individual may not be able to carry a firearm (yes or no response only); (3) interest level in CBP employment; (4) U.S. residency information (limited to length of residency only); (5) education related questions; and (6) any additional information in support of preliminary hiring activities.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>CBP may obtain records about potential applicants in this system either directly from the individual, from a third party with whom the individual has granted permission to share his or her information with potential employers, or from community, civic, educational institutions, military, and other sources. CBP will obtain records about withdrawn applicants from existing internal CBP human resources systems.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p> In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys’ Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when the Department of Justice or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach; or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/CBP stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>DHS/CBP retrieves records by an individual’s name.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>In accordance with General Records Schedule (GRS) 2.1, Item 180, DHS/CBP will delete records when superseded, obsolete, or when an individual submits a request to the agency to remove the records. In general, and unless it receives a request for removal, CBP will maintain these records for five years, after which point, they will be considered obsolete and no longer necessary for CBP operations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p>DHS/CBP safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS/CBP has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p> Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and DHS/CBP’s Freedom of Information Act Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, U.S. Department of Homeland Security, Washington, D.C. 20528-0655 or electronically at https://www.dhs.gov/dhs-foia-privacy-act-request-submission-form. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. In addition, the individual should:</p>
                <p>●Explain why he or she believes the Department would have information being requested;</p>
                <p>●Identify which component(s) of the Department he or she believes may have the information;</p>
                <p>●Specify when the individual believes the records would have been created; and</p>
                <p>●Provide any other information that will help the DHS staff determine which DHS component agency may have responsive records;</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered Judicial Redress Act records, see "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p> None.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>83 Fed. Reg. 27014 (June 11, 2018).</p>
            </xhtmlContent>
        </subsection>
    </section>

    <section id="CBP26" toc="yes">
        <systemNumber>/CBP-026</systemNumber>
        <subsection type="systemName">
            Department of Homeland Security (DHS)/U.S. Customs and Border Protection (CBP)-026 Explorer Program System of Records.
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>DHS/CBP maintains records at individual CBP Office of Field Operations Field Offices or Ports of Entry; U.S. Border Patrol Sectors or Stations; and CBP Headquarters at 1300 Pennsylvania Avenue NW, Washington, D.C. 20229.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Director of Field Operations for each Office of Field Operations location, and Sector Chief for each U.S. Border Patrol Sector location.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>5 U.S.C. 301, Departmental Regulations; 5 U.S.C. 302, Delegation of authority; 5 U.S.C. 3111, Acceptance of volunteer service; 44 U.S.C. 3101, Records management by agency heads, general duties; Federal Information Security Act (Pub. L. 104-106, section 5113); E-Government Act (Pub. L. 104-347, section 203); Paperwork Reduction Act of 1995 (44 U.S.C. 3501); Government Paperwork Elimination Act (44 U.S.C. 3504); Homeland Security Presidential Directive-12, Policies for a Common Identification Standard for Federal Employees and Contractors, August 27, 2004; Federal Property and Administrative Act of 1949, as amended (40 U.S.C. 521); the Intelligence Reform and Terrorism Prevention Act of 2004, Pub.L. 108-458, Section 3001 (50 U.S.C. 3341); Executive Order 9397, Numbering System for Federal Accounts Relating to Individual Persons, as amended by Executive Order 13478; Homeland Security Act of 2002, Pub. L. 107-296, as amended (6 U.S.C. 341).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to collect information on applicants, participants, and parents/legal guardians sponsoring a dependent for participation in the CBP Explorer Program, and any references provided on the applications, to ensure that (1) applicants meet the required qualifications for program participation; that (2) applicants and their parents and legal guardians, if appropriate, do not have a criminal history that would preclude them from accessing CBP personnel and facilities; and (3) ensure the safety and welfare of program participants. CBP uses information from Explorer Program participants to administer the program and to monitor the participant’s progress and achievements, and to ensure that CBP can attend to the participant’s medical and other needs if they arise while the individual is participating in program trainings and activities.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>Categories of individuals within this system include (1) potential applicants to the Explorer Program who submit preliminary information to CBP; (2) applicants who have submitted partial or complete application materials; (3) current and former participants in the Explorer Program; (4) parents and legal guardians of Explorer applicants and participants, as well as others authorized by the parent or legal guardian to pick up or otherwise provide support to the participant; and (5) individuals serving as references or providing information to verify eligibility for Explorer program participation.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>CBP maintains the following information related to the Explorer Program:</p>
                <p>•Applicant first name, middle initial, and last name;</p>
                <p>•Applicant age and date of birth;</p>
                <p>•Applicant place of birth;</p>
                <p>•Identification information (driver’s license, birth certificate, or other identifying information);</p>
                <p>•Social Security number (Applicant/Participant/Parents/Guardians);</p>
                <p>•Photocopies of any relevant identity documents;</p>
                <p>•Applicant Citizenship status;</p>
                <p>•Applicant Ethnic background;</p>
                <p>•Photos or videos provided during the Explorer’s tenure in the Program;</p>
                <p>•Emergency contact information;</p>
                <p>•Applicant Gender;</p>
                <p>•Applicant Phone numbers;</p>
                <p>•Applicant Email addresses;</p>
                <p>•Notary Information, if required for certain application forms;</p>
                <p>•Applicant Mailing addresses, including ZIP code;</p>
                <p>•Applicant/participant education information;</p>
                <p>•Applicant/participant employment information;</p>
                <p>•Applicant/participant annual health and medical information, including but not limited to: medical history; current and prior medical conditions and diagnoses; symptoms reported and exhibited treatment and prescription information; special needs and accommodations; health insurance information; and other records related to the assessment and treatment of a health or medical issue;</p>
                <p>•Parent/guardian general contact information;</p>
                <p>•Parent/guardian employment information;</p>
                <p>•Applicant/participant and parent/guardian general consent information;</p>
                <p>•Background check results for applicants and parents/guardians (clear/no clear response only; no details or copies of the background check are maintained among these records); and</p>
                <p>•General information related to the individuals’ training and performance in the program.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>DHS/CBP may obtain records about applicants, and parents/guardians directly from the individual, or through Learning for Life/Boy Scouts of America.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other federal agencies conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To an organization or person in either the public or private sector, either foreign or domestic, when there is a reason to believe that the recipient is or could become the target of a particular criminal or terrorist activity or conspiracy, or when the information is relevant to the protection of life, property, or other vital interests of a person.</p>
                <p>J. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations for the purpose of protecting the vital interests of a data subject or other persons, including to assist such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to combat other significant public health threats; appropriate notice will be provided of any identified health threat or risk.</p>
                <p>K. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation, provided disclosure is appropriate in the proper performance of the official duties of the officer making the disclosure.</p>
                <p>L. To any nonprofit organization or entity, such as "Learning for Life" or the "Boy Scouts of America," to the extent necessary to administer the CBP Explorer Program and ensure the health, safety, and welfare of program participants.</p>
                <p>M. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/CBP stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>DHS/CBP retrieves records by an individual’s name.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>CBP is in the process of drafting a proposed records retention schedule for the information maintained in the CBP Explorers SORN. CBP will delete records when superseded, obsolete, or when an individual submits a request to the agency to remove the records. In general, and unless it receives a request for removal, CBP will maintain these records for 2 years after the individuals leave the program, at which point the records will be considered obsolete and deleted and shredded.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p>DHS/CBP safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS/CBP has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and CBP’s Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act (FOIA).</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                <p>•Explain why he or she believes the Department would have the information being requested;</p>
                <p>•Identify which component(s) of the Department he or she believes may have the information;</p>
                <p>•Specify when the individual believes the records would have been created; and</p>
                <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>None.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>None.</p>
            </xhtmlContent>
        </subsection>
    </section>
    <section id="CBP27" toc="yes">
        <systemNumber>/CBP-027</systemNumber>
        <subsection type="systemName">
            Department of Homeland Security (DHS)/U.S. Customs and Border Protection (CBP)-027 Customs Broker Management System of Records.
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at CBP Headquarters in Washington, DC, and field offices. CBP maintains records in the Automated Commercial Environment system, as well as other applications that support Customs Broker License Examination and program management. Audio and video recordings of remotely proctored exams, images of examinees, images of examinees’ identification documents, and broker exam results are stored on vendor servers. Any files that are subject to Freedom of Information Act (FOIA) and Privacy Act requests will be transferred to CBP by the vendor and maintained on a CBP system.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Director, Commercial Operations, Revenue and Entry, Office of Trade, U.S. Customs and Border Protection, 1331 Pennsylvania Avenue NW, Washington, DC 20229.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p> 19 U.S.C. sec. 1641 and 19 CFR 111; and 31 U.S.C. sec. 7701(c).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>DHS/CBP maintains information about individuals to determine (1) an individual’s suitability for acquiring a Customs Broker license, whether that individual is representing him or herself or affiliated with an association, corporation, or partnership, and (2) determine whether a licensed Customs Broker continues to meet the eligibility requirements to maintain that Customs Broker license.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>Categories of individuals in the system include:</p>
                1.	<p>Individuals applying for, issued, or denied a Customs Broker license, whether individually or as part of an organization, including individuals who register for and attempt the Customs Broker License Examination;</p>
                2.	<p>Individuals working for, or applying to work for, a licensed customs broker, association, corporation, or partnership; and</p>
                3.	<p>Any other individuals relevant to CBP’s determination of the granting and maintenance of a Customs Broker license.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p> DHS/CBP collects the following information from individuals registering for the Customs Broker License Examination through the eCBP portal (OMB Control No. 1651-0034):</p>
                •	<p>Individual’s Name (First, Last) (Middle initial is optional);</p>
                •	<p>Residence Address and Mailing Address (Street, City, State, Zip Code);</p>
                •	<p>Email Address;</p>
                •	<p>Primary Phone Number;</p>
                •	<p>Port of Affiliation;</p>
                •	<p>Date of Birth;</p>
                •	<p>Social Security number (SSN); and</p>
                •	<p>American Disabilities Act request for a Reasonable Accommodation.</p>
                <p>CBP also assigns four Unique Identifying Numbers (UID) to the examinee after they register on eCBP:</p>
                •	<p>ACE ID;</p>
                •	<p>Exam ID;</p>
                •	<p>Receipt Number; and</p>
                •	<p>Pay.Gov ID.</p>
                <p>DHS/CBP collects the following information from individuals through vendor servers during the Customs Broker License Examination:</p>
                •	<p>Video recording and photo capture of examinee’s face at the Customs Broker License Exam check-in process;</p>
                •	<p>Images of examinees;</p>
                •	<p>Images of examinees identification documents;</p>
                •	<p>Video/audio recording of examinees while testing; and</p>
                •	<p>Broker exam results.</p>
                <p>Individuals who have passed the Customs Broker License Exam and are now applying for Customs Brokers License via the CBP 3124 Form (OMB Control No. 1651-0034) and through the Trusted Worker Program System, provide CBP with these additional data elements:</p>
                •	<p>Type of license applying for (individual, association, corporation, or partnership);</p>
                •	<p>Has the applicant ever applied for a Customs Broker License? (yes or no);</p>
                •	<p>Has the applicant (or any Officer, Member, or Principal) ever had a license suspended, refused, revoked, or cancelled? (yes or no);</p>
                •	<p>Is this applicant (or any Officer, Member, or Principal) an Officer or Employee of the United States? (yes or no);</p>
                •	<p>Place of Birth (City and State);</p>
                •	<p>Tax Identification Number (TIN), or Employer Identification Number (EIN);</p>
                •	<p>U.S. Citizenship (natural-born or naturalized, and date and place);</p>
                •	<p>Criminal History;</p>
                •	<p>Financial History (Bankruptcy of personal or business finances for which you had oversight);</p>
                •	<p>Proposed type of Customs Business (Individual, Association, Corporation, Partnership or Employee);</p>
                •	<p>Employment and Character References (References Names, Phone Numbers, Addresses);</p>
                •	<p>Any correspondence (e.g., emails, letters, phone records) relating to persons engaged in international trade in CBP licensed/regulated activities; and</p>
                •	<p>Fingerprints.</p>
                <p>DHS/CBP collects the following information from associations, corporations, or partnerships through the Customs Brokers License application, CBP 3124 Form (OMB Control No. 1651-0034):</p>
                •	<p>Date associations, corporation, or partnership was organized;</p>
                •	<p>State where organized;</p>
                •	<p>Attachments:</p>
                o	<p>Copies of articles of incorporation or association; or</p>
                o	<p>Evidence of the partnership (copies of articles of agreement or affidavit signed by all partners.</p>
                •	<p>Names, Addresses, Titles, and Dates of Birth of all Officers of the Association or Corporation, and all Principals who have a controlling interest, who hold individual customs brokers licenses and give the general nature of duties of each, or if a partnership, the names and addresses of members who hold such licenses.</p>
                <p>Names, Addresses, Titles, and Dates of Birth of all Officers and Principals (including corporations, trusts, and/or other organizations) who have a controlling interest, and partners who do not hold customs brokers licenses.</p>
                <p>CBP collects these additional data elements on the Triennial Status Report:</p>
                •	<p>Broker License Number to identify the correct license for which the report is being filed;</p>
                •	<p>Payment Information;</p>
                o	<p>Fee Amount;</p>
                o	<p>Payer Name; and</p>
                o	<p>Payer Email Address.</p>
                •	<p>Employee list for all employees of a Customs Broker, including:</p>
                o	<p>Name (First, Last);</p>
                o	<p>Social Security Number;</p>
                o	<p>Date of Birth;</p>
                o	<p>Place of Birth; and</p>
                o	<p>Home Address (Street, City, State, Zip Code).</p>
                •	<p>Proof of continuing education requirement.</p>
                <p>Additionally, CBP periodically collects the following information from the CBP licensed brokers, associations, corporations, or partnerships:</p>
                •	<p>Requests for written approval to employ individual brokerage employees who have been convicted of a felony.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p> Records from Customs Broker License Examination applicants are obtained from the eCBP portal online registration at https://e.cbp.dhs.gov/ecbp/#/main. Records from Customs Broker applicants come directly from Customs Broker applicants using CBP Form 3124, and through information given by the applicant at a CBP facility (same information) submitted to DHS as stipulated through the licensing port’s requests and stored in the Automated Commercial Environment. Information on Customs Broker applicants may come from other federal, state, tribal, or local law enforcement agencies during the background investigation. DHS/CBP may obtain records from credit reporting agencies as part of the background investigation. Additional information about Custom Broker applicants may come from character references. DHS/CBP obtains information about character references from the Customs Broker applicant as part of the application as well as from the character reference during interviews. Audio and video recordings of remotely and proctored exams, images of examinees, images of examinees’ identification documents, and broker exam results are stored on vendor servers. Any files that are subject to Freedom of Information Act (FOIA) and Privacy Act requests will be transferred to CBP by the vendor and maintained on a CBP system.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p> In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a statute, rule, regulation, order, license, or treaty where DHS determines that the information would assist in the enforcement of civil or criminal laws.</p>
                <p>J. To an appropriate federal, state, local, tribal, foreign, or international agency, if the information is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant or other benefit and disclosure is appropriate to the proper performance of the official duties of the person making the request.</p>
                <p>K. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection with criminal law proceedings.</p>
                <p>L. To third parties, such as credit bureaus, during the course of a law enforcement investigation or background check to the extent necessary to obtain information pertinent to the investigation, provided disclosure is appropriate to the proper performance of the official duties of the officer making the disclosure.</p>
                <p>M. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/CBP stores biographic records related to Broker Management in the Automated Commercial Environment, or within a CBP server. DHS/CBP stores biometric records related to Broker Management in IDENT. Audio recordings, video recordings, images of examinees, images of examinees identification documents, and broker exam results are stored on a vendor-owned server. Any files related to appeals will be transferred to CBP and maintained on a CBP system.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>DHS/CBP may retrieve records by individual’s name (first, last, or middle initial), organization name, Social Security number, tax identification number, employer identification number, date of birth, port or port number, email address, phone number, payment receipt number, project area request type (e.g., request date), Customs Broker License Exam Project Areas (e.g., exam date, pass/fail exam score, exam ID, and application date).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>In accordance with NARA-approved agency disposition authority, "Licensing Records" DAA-0568-2017-0006-0003, DHS/CBP retains biographic records in the Automated Commercial Environment system for six years from date that the license is terminated or the death of the licensee, as applicable, including the background check records uncovered as a result of the fingerprints used in the background check. CBP does not retain the actual fingerprints; however, CBP sends the fingerprints to OBIM and they are stored for 75 years or when no longer needed for legal or business purposes, whichever is later. The audio and video recordings, images of examinees, images of examinees identification documents, and broker exam results captured during the Customs Broker Licensing Exam process will be retained in accordance with the NARA-approved agency disposition authority, "Customhouse Broker’s Examination Records" DAA-0568-2017-0006-0002, for three years and six months after exam and final appeal is concluded, whichever is applicable. CBP has proposed a new records schedule of 120 days after cutoff or final review, whichever is later for the audio and video recordings, images of examinees, images of examinees’ identification documents, and broker exam results data collected and stored by the vendor. Any files subject to any FOIA or Privacy Act request will be transferred to CBP and maintained on a CBP system.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p>DHS/CBP safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS/CBP has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>DHS/CBP will consider individual requests to determine whether information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and CBP’s Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning them, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C., 20528-0655 or electronically at https://www.dhs.gov/dhs-foia-privacy-act-request-submission-form. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about the individual may be available under the Freedom of Information Act.</p>
                <p>When an individual is seeking records about themself from this system of records or any other Departmental system of records, the individual's request must conform with the Privacy Act regulations set forth in 6 CFR part 5. The individual must first verify their identity, meaning that the individual must provide their full name, current address, and date and place of birth. The individual must sign the request, and the individual's signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. An individual may obtain more information about this process at http://www.dhs.gov/foia. In addition, the individual should, whenever possible:</p>
                •	<p>Explain why they believe the Department would have information being requested;</p>
                •	<p>Identify which component(s) of the Department they believe may have the information;</p>
                •	<p>Specify when the individual believes the records would have been created; and</p>
                •	<p>Provide any other information that will help Freedom of Information Act staff determine which DHS component agency may have responsive records.</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual's request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
                <p>Additionally, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Broker Management Branch through the BrokerManagement@cbp.dhs.gov inbox, or to:</p>
                <p>U.S. Customs and Border Protection</p>
                <p>Office of Trade</p>
                <p>Trade Policy and Programs, Broker Management Branch</p>
                <p>1331 Pennsylvania Ave NW</p>
                <p>9th Floor - Broker Management Branch</p>
                <p>Washington, D.C. 20229-1142 </p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p> For records covered by the Privacy Act or covered Judicial Redress Act records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record. Regardless of whether the Privacy Act or Judicial Redress Act applies, individuals who believe that records in CBP’s system include incorrect or inaccurate information may direct inquiries to the Broker Management Branch via email through the BrokerManagement@cbp.dhs.gov inbox, or via mail here:</p>
                <p>U.S. Customs and Border Protection</p>
                <p>Office of Trade</p>
                <p>Trade Policy and Programs, Broker Management Branch</p>
                <p>1331 Pennsylvania Ave NW</p>
                <p>9th Floor - Broker Management Branch</p>
                <p>Washington, D.C. 20229-1142 </p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p> The Secretary of Homeland Security has exempted this system pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act, portions of this system are exempt from 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), and (e)(8); (f); and (g). Additionally, the Secretary has exempted this system pursuant to 5 U.S.C. 552a(k)(2) of the Privacy Act from subsections (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>None.</p>
            </xhtmlContent>
        </subsection>
    </section>


    <section id="uscg1" toc="yes">
<systemNumber>/USCG-001</systemNumber>
<subsection type="systemName">Maritime Awareness Global Network (MAGNET).
</subsection>
<subsection type="systemLocation"><xhtmlContent><p>The computer database is located at U.S. Coast Guard Intelligence Coordination Center, Department of Homeland
Security, National Maritime Intelligence Center, Washington, DC 20395. A redundant capability for continuity of operation
in the event of a primary system failure is located at the Coast Guard Operations System Center, Martinsburg, West
Virginia.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>1. Individuals, who are U.S. citizens, lawful permanent residents, and non-citizens, associated with vessels,
facilities, companies, organizations, and ports involved in the maritime sector.
</p><p>2. Individuals identified through observation by and interaction with Coast Guard personnel during Coast Guard
operations that include but not limited to boarding of vessels, conducting aircraft over-flights, and through Field
Intelligence Support team (FIST) sightings and reports.
</p><p>3. Individuals identified during Coast Guard enforcement actions as violating, suspected of violating, or witnessing
the violations of United States (U.S.) laws, international laws, or treaties.
</p><p>4. Individuals associated with vessels or other individuals that are known, suspected, or alleged to be involved in
contraband trafficking, illegal migrant activity (smuggling, trafficking, and otherwise), or terrorist activity.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>1. <i>Information related to:</i> Individuals associated with vessels, companies, organizations, and ports
involved in the maritime sector and this information may include: Name, nationality, address, telephone number, and
taxpayer or other identification number; date of birth, relationship to vessels and facilities; the individuals’
relationship to other individuals, companies, government agencies, and organizations in MAGNET; individuals involved with
pollution incidents, and violations of laws and international treaties; and casualties.
</p><p>2. Information on individuals who are associated with vessels involved in contraband trafficking, illegal migrant
activity (smuggling, trafficking, and otherwise), or any other unlawful act within the maritime sector, and with other
individuals who are known, suspected, or alleged to be involved in contraband trafficking, illegal migrant activity
(smuggling, trafficking, and otherwise), terrorist activities, or any other unlawful act within the maritime sector.
</p><p>3. Information on individuals, companies, vessels, or entities associated with the maritime industry to include:
vessel owners, vessel operators, vessel characteristics, crewmen, passengers, facility owners, facility managers,
facility employees or any other individuals affiliated with the maritime community. In addition to information on
individuals, commodities handled, equipment, location, certificates, approvals, inspection data, pollution incidents,
casualties, and violations of all laws and international treaties may also be included.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>Federal Records Act of 1950, Title 44 U.S.C. 3101; Title 36, Code of Federal Regulations, chapter XII; The
Maritime Transportation Security Act of 2002, Pub L. 107-295 The Homeland Security Act of 2002, Pub L. 107-
296; 5 U.S.C. 301; 14 U.S.C. 632; 46 U.S.C. 3717; 46 U.S.C. 12501; 33 U.S.C. 1223.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>MAGNET will assist DHS and the United States Coast Guard in performing its mission of protecting the United
States against potential terrorist threats and respond to natural and man-made disaster by providing Maritime Domain
Awareness. MAGNET has been established to enable the United States Coast Guard and various United States Government
agencies or military services/commands from the Law Enforcement and Intelligence Communities to share multi-source
maritime information that will assist them in the performance of their missions. Most recently these missions have been
expanded and are enumerated through National Security Presidential Directive NSPD 41 and Homeland Security Presidential
Directive HSPD-13 and other federal instruction.
</p><p>MAGNET will provide MDA to the field as well as to USCG strategic planners by aggregating data from existing sources
internal and external to the Coast Guard or DHS. MAGNET will organize and provide the mechanism to display information
such as ship registry, current ship position, crew background, passenger lists, port history, cargo, known criminal
vessels, and suspect lists as such information is collected from various sources.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>MAGNET Records may be disclosed to the following:
</p><p>A. To U.S. Department of Defense and related entities including, but not limited to, the Military Sealift Command and
the U.S. Navy, to provide safety and security information on vessels chartered or operated by those agencies.
</p><p>B. To a Federal State, or local agency, or other appropriate entities or individuals, or through established liaison
channels to selected foreign governments, in order to provide intelligence, counterintelligence, or other information for
the purposes of intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order,
or other applicable national security directive.
</p><p>C. To the National Transportation Safety Board and its related State counterparts for safety investigation and
transportation safety.
</p><p>D. To the International Maritime Organization (IMO) or intergovernmental organizations, nongovernmental organizations,
or foreign governments in order to conduct joint investigations, operations, and inspections.
</p><p>E. To Federal, State, or local agencies with which the Coast Guard has a Memorandum of Understanding (MOU), Memorandum
of Agreement (MOA), or Inspection and Certification Agreement (ICA) pertaining to marine safety, maritime security,
maritime intelligence, maritime law enforcement, and marine environmental protection activities.
</p><p>F. To an organization or individual in either the public or private sector, either foreign or domestic, where there is
a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to
the extent the information is relevant to the protection of life or property and disclosure is appropriate to the proper
performance of the official duties of the person making the disclosure.
</p><p>G. To a Congressional office from the record of an individual in response to an inquiry from that Congressional office
made at the request of the individual to whom the record pertains.
</p><p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>I. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental
organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a
statute, rule, regulation, order, license, or treaty where DHS determines that the information would assist in the
enforcement of civil or criminal laws.
</p><p>J. To the Department of Justice or other Federal agency conducting litigation or in proceedings before any court,
adjudicative or administrative body, when: (a) DHS or any component thereof, or (b) any employee of DHS in his/her
official capacity, or (c) any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the
employee, or (d) the United States or any agency thereof, is a party to the litigation or has an interest in such
litigation, and DHS determines that the records are both relevant and necessary to the litigation and the use of such
records is compatible with the purpose for which DHS collected the records.
</p><p>K. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to
opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection
with criminal law proceedings or in response to a subpoena.
</p><p>L. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>M. To appropriate Federal, state, local, tribal, foreign governmental agencies, multilateral governmental
organizations, and non-governmental or private organizations for the purpose of protecting the vital interests of a data
subject or other persons, including to assist such agencies or organizations in preventing exposure to or transmission of
a communicable or quarantinable disease or to combat other significant public health threats; appropriate notice will be
provided of any identified health threat or risk.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored in electronic form in an automated data processing (ADP) system operated and
maintained by the U.S. Coast Guard. Backups are performed daily. Copies of backups are stored at an offsite location.
Personal, Sensitive but Unclassified (SBU), Unclassified, and classified data and records reside commingled with each
other. Classified and non-classified information from member agencies and other sources may be merged into a classified
domain within this data base.
</p><p>Classified information, downloaded from the host and then extracted from the personal computer (PC) workstations and
recorded on paper or electronic media, will be stored at user sites in appropriately classified storage containers or on
secured electronic media.
</p><p>Unclassified information will be stored in accordance with each user sites’ handling procedures. Unclassified
information derived from MAGNET remains U.S. Coast Guard information and is For Official Use Only. Determinations by any
user to further disseminate, in any form, MAGNET derived information to other entities or agencies, foreign or domestic,
must include prior authorization from the executive agent.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records are retrieved by name (individual, company, government agency or organization), boat registration number,
documented vessel name/number, Social Security Number, drivers license number, foreign ID number, passport number, VISA
number military ID number, USCG license number, resident alien number, Merchant Mariners License number, or Merchant
Mariner documentation number.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Information in this system is safeguarded in accordance with applicable laws, rules and policies, including the
DHS Information Technology Security Program Handbook. All records are protected from unauthorized access through
appropriate administrative, physical, and technical safeguards. These safeguards include restricting access to authorized
personnel who have a need-to-know, using locks, and password protection identification features. DHS file areas are
locked after normal duty hours and the facilities are protected from the outside by security personnel.
</p><p>MAGNET falls under the security guidelines of the National Maritime Intelligence Center and has its own approved
System Security Plan which provides that:
</p><p>All classified MAGNET equipment, records and storage devices are located within facilities or stored in containers
approved for the storage of all levels of classified information.
</p><p>All statutory and regulatory requirements pertinent to classified and unclassified information have been identified in
the MAGNET System Security Plan and have been implemented, and
</p><p>Access to records requiring TOP SECRET level is limited strictly to personnel with TOP SECRET or higher level
clearances and who have been determined to have the appropriate "need to know."
</p><p>Access to records requiring SECRET level is limited strictly to personnel with SECRET or higher level clearances and
who have been determined to have the appropriate "need to know".
</p><p>Access to records requiring CONFIDENTIAL level is limited strictly to personnel with CONFIDENTIAL or higher level
clearances and who have been determined to have the appropriate "need to know".
</p><p>Access to any classified records is restricted by login and password protection. The scope of access to any records
via login and password is further limited based on the official need of each individual authorized access. The U.S. Coast
Guard will take precautions in accordance with OMB Circular A-130, Appendix III.
</p><p>The U.S. Coast Guard will operate MAGNET in consonance with Federal security regulations, policy, procedures,
standards and guidance for implementing the Automated Information Systems Security Program. Specific operating rules to
ensure compliance with national policy are reflected in each site’s Standard Operating Procedures. These rules include
specifications that accesses to records containing information on U.S. persons are as follows:
</p><p>Only authorized personnel may access such records.
</p><p>MAGNET transactions that include Privacy Act and Classified data require an active pre-screened account, username and
password and have a unique identifier to differentiate them from other MAGNET transactions. This allows for additional
oversight and audit capabilities to ensure that the data are being handled consistent with all applicable federal laws
and regulations regarding privacy and data integrity.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Dynamic information on vessel position(s) and movement(s) will be stored for not more than ten (10) years but may
be reduced in detail to comply with media storage procedures and requirements. Other information such as characteristics,
identification status and associate records is updated to remain current and is retained for twenty (20) years. The
requirements supporting the collection and storage of data are reviewed regularly. Records will be kept accessible online
for three (3) years then archived offline within MAGNET to support ongoing investigations or law enforcement activities.
</p><p>Audit records, maintained to document access to information relating to specific individuals, are maintained for five
(5) years or the life of the MAGNET whichever is longer. Access to audit records will only be granted to authorized
personnel.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Department of Homeland Security United States Coast Guard (MAGNET Executive Agent), Intelligence Directorate,
Office of ISR (CG-26), 2100 2nd Street, SW., Washington, DC 20593-0001.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Because this system contains classified and sensitive unclassified information related to intelligence,
counterterrorism, homeland security, and law enforcement programs, records in this system have been exempted from
notification, access, and amendment to the extent permitted by subsections (j)(2) and (k)(1) and (2) of the Privacy Act.
Nonetheless, DHS will examine each separate request on a case-by-case basis, and, after conferring with the appropriate
component or agency, may waive applicable exemptions in appropriate circumstances and where it would not appear to
interfere with or adversely affect the law enforcement or national security purposes of the systems from which the
information is recompiled or in which it is contained.
</p><p>To determine whether this system contains records relating to you, write to the System Manager identified above. Your
written request should include your name and mailing address. You may also provide any additional information that will
assist in determining if there is a record relating to you if applicable, such as your Merchant Mariner License or
document number, the name and identifying number (documentation number, state registration number, Social Security
Number, International Maritime Organization (IMO) number, etc.) of any vessel with which you have been associated and the
name and address of any facility (including platforms, bridges, deep water ports, marinas, terminals and factories) with
which you have been associated. The request must be signed by the individual, or his/her legal representative, and must
be notarized to certify the identity of the requesting individual pursuant to 28 U.S.C. 1746 (unsworn declarations under
penalty of perjury). Submit a written request identifying the record system and the category and types of records sought
to the Executive Agent.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Because this system contains classified and sensitive unclassified information related to intelligence,
counterterrorism, homeland security, and law enforcement programs, records in this system have been exempted from
notification, access, and amendment to the extent permitted by subsections (j)(2) and (k)(1) and (2) of the Privacy Act.
Nonetheless, DHS will examine each separate request on a case-by-case basis, and, after conferring with the appropriate
component or agency, may waive applicable exemptions in appropriate circumstances and where it would not appear to
interfere with or adversely affect the law enforcement or national security purposes of the systems from which the
information is recompiled or in which it is contained.
</p><p>Write the System Manager at the address given above in accordance with the "Notification Procedure".
Provide your full name and a description of the information you seek, including the time frame during which the record(s)
may have been generated. Individuals requesting access to their own records must comply with DHS’s Privacy Act regulation
on verification of identity (6 CFR 5.21(d)). Further information may also be found at <i>http://www.dhs.gov/foia.</i>
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Because this system contains classified and sensitive unclassified information related to intelligence,
counterterrorism, homeland security, and law enforcement programs, records in this system have been exempted from
notification, access, and amendment to the extent permitted by subsections (j)(2) and (k)(1) and (2) of the Privacy Act.
A request to amend non-exempt records in this system may be made by writing to the System Manager, identified above, in
conformance with 6 CFR Part 5, Subpart B, which provides the rules for requesting access to Privacy Act records
maintained by DHS.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information contained in MAGNET is gathered from a variety of sources both internal and external to the Coast
Guard. Source information may come from sensors, inspections, boardings, investigations, documentation offices, vessel
notice of arrival reports, owners, operators, crew members, agents, passengers, witnesses, employees, U.S. Coast Guard
personnel, law enforcement notices, commercial sources, as well as other federal, state, local and international agencies
who are related to the maritime sector and/or national security sector.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The records and information in this system are exempt from 5 U.S.C. 552a(c)(3) and (4), (d)(1), (d)(2), (d)(3),
(d)(4), (e)(1), (e)(2), (e)(3), (e)(4)(G), (H), and (I), (e)(5), (e)(8), (e)(12), (f), and (g) of the Privacy Act
pursuant to 5 U.S.C. 552a(j)(2), (k)(1), and (k)(2). A Notice of Proposed Rulemaking for exempting this record system has
been promulgated in accordance with the requirements of 5 U.S.C. 553(b)(1), (2), and (3), (c), and (e) and is being
published [in 6 CFR part 5] concurrently with publication of this Notice Establishing a New Systems of Records in the <i>
Federal Register</i>.
</p></xhtmlContent></subsection></section>
<section id="uscg2" toc="yes">
<systemNumber>/USCG-002</systemNumber>
<subsection type="systemName">United States Coast Guard Employee Assistance Program Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Employee Assistance Program case records are maintained by the USCG’s vendor for the Employee Assistance Program.
USCG Headquarters (CG-1112) is the point of contact for access to these records. Reports of USCG active duty
suicidal behavior, work place violence incidents, critical incidents, and sexual assault reports are maintained at USCG
Headquarters by the Office of Work-Life (CG-1112). All other USCG records under this system are located at Work-
Life Offices in Washington, DC and field locations. USCG Headquarters (CG-1112) is the point of contact for access
to these records.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>All USCG active duty, reserve, and retired active duty and reserve military personnel and their eligible
dependants/individuals who have been referred for assistance or counseling, are being assisted or counseled, or have been
assisted or counseled by the USCG Employee Assistance Program. Eligibility will vary based on status.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Military personnel’s name;
</p><p>• Eligible dependent/individual’s name, if applicable;
</p><p>• Social Security number;
</p><p>• Employee identification number;
</p><p>• Date of birth;
</p><p>• Addresses;
</p><p>• E-mail address;
</p><p>• Telephone numbers;
</p><p>• Job-related information including: job title, rank, duty station, supervisor’s name and telephone number,
documents received from supervisors or personnel regarding work place problems or performance, leave and attendance
records, and workplace-related recommendations made to supervisors as a result of a team meeting;
</p><p>• Counseling and intervention-related information including: notes and documentation of Employee Assistance
Program counselors; records of treatment, including non-clinical educational interventions; counseling referrals; team
reports; records of employee attendance at treatment and counseling programs; prognosis of individuals in treatment or
counseling programs; insurance data; addresses and contact information of treatment facilities; name and address of
individuals providing treatment or counseling or intervention; and Privacy Act notification forms and written consent
forms;
</p><p>• USCG Workplace Violence and related Critical Incident Team records of the Workplace Violence Prevention
Program, maintained by USCG Work-Life personnel. These records may include written reports and recommendations to
leadership personnel regarding alleged work place violence incidents;
</p><p>• USCG Critical Incident Stress Management-related records which may include descriptions of incidents,
consultations, interventions, and may contain personally-identifying information (for the purpose of follow-on contacts
with those thought to be impacted by the critical incident).
</p><p>• USCG Sexual Assault Prevention and Response Program case records maintained by USCG Work-Life personnel.
These records are used to facilitate services for victims and their family members as appropriate. In addition to
information cited above these records may contain Victim Reporting Preference Statement, case notes and safety plan.
Record may also contain descriptions of alleged assaults;
</p><p>• USCG Victim Support Person or Victim Advocate maintained by USCG Work-Life personnel. These are maintained
in conjunction with efforts to provide assistance to victims of crime. Record will contain signed Victim Support Person
or Victim Advocate Statement of Understanding and Victim Support Person or Victim Advocate Supervisor Statement of
Understanding, assignment information, and notes regarding results of screening interview, relevant training received,
and any other information relevant to the Victim Support Person’s or Victim Advocate’s provision of support services to
victims;
</p><p>• USCG Critical Incident Stress Management Peer Volunteers maintained by USCG Work-Life personnel. These
records contain statement of understanding, notes regarding screening interview, record of related training received and
any other information relevant to the peer’s provision of services when deployed after a critical incident;
</p><p>• Case records maintained by USCG Work-Life personnel on USCG Active Duty members who have demonstrated
suicidal behavior. The purpose of these records is to facilitate continuity of care for personnel who have exhibited
suicidal behavior. These records will contain reports regarding each incident and follow-up case notes;
</p><p>• Reports of USCG active duty suicidal behavior incidents, work place violence incidents, critical
incidents, and sexual assaults are maintained by USCG Headquarters (CG-1112). These reports are received from Work-
Life Offices who are responsible for providing services for the related programs described above. Their purpose is to
ensure continuity of care and to identify any systemic issues found in aggregate data.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>The Homeland Security Act of 2002, Pub. L. 107-296, 6 U.S.C. 121; Federal Records Act, 44 U.S.C. 3101; 6
CFR part 5; 5 U.S.C. app. 3; 5 U.S.C. 301 and Ch. 41; Executive Order 11348, as amended by Executive Order 12107; and
Executive Order 9397. 5 U.S.C. 7361, 7362, 7901, 7904.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The Employee Assistance Program will maintain information gathered by and in the possession of USCG Employee
Assistance Program, an internal agency program designed to assist employees of USCG and, in certain instances, their
eligible dependants/individuals, in regard to a variety of personal and/or work related problems. The program involves
counseling, educational, and consultative services provided through the internal and external Employee Assistance Program
for alcohol, drug, emotional, or behavioral problems, and addresses mandatory and voluntary counseling following exposure
to a traumatic incident, responses to critical incidents that impact employees, and workplace incidents involving actual
violence or the threat of violence and necessary follow up.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>Disclosure of substance abuse records is limited to the parameters set forth in 42 U.S.C. 290dd, 290ee, and
Public Law 100-71, Section 503(e). Accordingly, a Federal employee’s substance abuse records may not be disclosed
without the prior written consent of the employee, unless the disclosure would be one of the following:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body when it is necessary to the litigation
and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by the Department or another agency or entity) or harm to the individual who
relies upon the compromised information;
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
the Department’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>C. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>D. To appropriate State and local authorities to report, under State law, incidents of suspected child abuse or
neglect to the extent described under 42 CFR 2.12.
</p><p>E. To any person or entity to the extent necessary to prevent an imminent and potential crime which directly threatens
loss of life or serious bodily injury.
</p><p>F. To report to appropriate authorities when an individual is potentially at risk to harm himself or herself or
others.
</p><p>G. To medical personnel to the extent necessary to meet a bona fide medical emergency;
</p><p>H. To qualified personnel for the purpose of conducting scientific research, management audits, financial audits, or
program evaluation provided that employees are individually identified;
</p><p>I. To the employee’s medical review official;
</p><p>J. To the administrator of any Employee Assistance Program in which the employee is receiving counseling or treatment
or is otherwise participating;
</p><p>K. To any supervisory or management official within the employee’s agency having authority to take adverse personnel
action against such employee; or
</p><p>L. Pursuant to the order of a court of competent jurisdiction where required by the United States Government to defend
against any challenge against any adverse personnel action. <i>See</i> 42 U.S.C. 290dd, 290ee, and Public Law 100-
71, Section 503(e).
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in a locked drawer behind a locked door. The records
are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Data may be retrieved by a Military personnel’s, eligible dependant’s/individual’s name. USCG Critical Incident
Stress Management-related records are filed by unit name and are not be retrievable by individual name, rather, by unit
name.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated system security access policies. Strict controls have been imposed to minimize the risk of compromising the
information that is being stored. Access to the computer system containing the records in this system is limited to those
individuals who have a need to know the information for the performance of their official duties and who have appropriate
clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records are maintained and disposed in accordance with National Archives and Records Administration approved
agency Records Schedule, SSIC 1754, item 1 (AUTH: N1-026-07-1, Item1) Employee Assistance Program (EAP)
Coordinator Case Records; if not disclosed under the Privacy Act, records are retained for three years after the client
has ceased contact and then destroyed.
</p><p>Employee Assistance Program client records may contain Department of Transportation-required Substance Abuse
evaluations and USCG Sexual Abuse Prevention and Response Program client records; if not disclosed under the Privacy Act,
these are destroyed with the EAP Coordinator case records three years after the last contact with the client.
</p><p>Employee Assistance Program Coordinator Case Records that are disclosed are retained until five years after the client
has ceased contact or, if later, for five years after last disclosure of information from the record, as authorized by
General Records Schedule 14, item 23.
</p><p>All records will be retained beyond their normal maintenance period until any pending litigation is completed. This
will be true whether or not the client has terminated employment with DHS/USCG. Individual states may require longer
retention. The rules in this system notice should not be construed to authorize any violation of such state laws that
have greater restrictions.
</p><p>Files will be destroyed only after the required period of maintenance, with a witness present, by either (1) an DHS or
USCG Employee Assistance Program Administrator or an Employee Assistance Program Administrator from another organization
that contracts with DHS or USCG for Employee Assistance Program services, or (2) by designated staff of a private or
governmental organization under contract with DHS or USCG to provide document destruction services. The witness must be
trained in the proper handling of records covered by the Privacy Act and 42 CFR part 2.
</p><p>Written records will be destroyed by shredding or burning. Records stored on hard drives will be destroyed using
software tools which ensure the protection of the confidential information by making reconstruction or compromise by
reuse impracticable. Records contained on back-up tapes/diskettes will be disposed by either physically destroying the
tapes/diskettes or by deleting them using software tools which ensure the protection of the confidential information by
making reconstruction or compromise by reuse impracticable.
</p><p>Records located away from the destruction site shall be transferred to the destruction site in the confidential
manner. No other information about Employee Assistance Program clients may be maintained once these files have been
destroyed.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Commandant, CG-1112, Office of Work-Life, United States Coast Guard Headquarters, 2100 2nd Street, SW.,
Washington, DC 20593-0001.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to Commandant, CG-1112, Office of Work-Life, United States
Coast Guard Headquarters, 2100 2nd Street, SW., Washington, DC 20593-0001.
</p><p>When seeking records about yourself from this system of records or any other USCG system of records your request must
conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you
must provide your full name, current address and date and place of birth. You must sign your request, and your signature
must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of
perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from
the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In addition you should
provide the following:
</p><p>• An explanation of why you believe the Department would have information on you;
</p><p>• Specify when you believe the records would have been created;
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the USCG will not be able to conduct an effective search, and your request may be
denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p><i>See</i> "Notification Procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p><i>See</i> "Notification Procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are retained from the following sources:
</p><p>• USCG Employee Assistance Program: the client, the licensed mental health provider, and collateral sources
and resources intended to help the client.
</p><p>• USCG Workplace Violence and related Critical Incident Team: investigation records, personnel records,
critical incident team assembled to make recommendations to command, subject’s supervisors, and the subject.
</p><p>• USCG Critical Incident Stress Management-related records: Work-Life staff, Peers, Incident commander,
command(s) affected, individuals impacted by incident, other support persons who may be mobilized to assist those
impacted by the event.
</p><p>• USCG Sexual Assault Prevention and Response Program: victim, victim support person, medical personnel
assisting victim, criminal investigations and investigators, and other support personnel intended to assist victim.
</p><p>• USCG Victim Support Persons (VSP): the victim support person, Work-Life staff, VSP’s or Victim Advocate’s
work supervisor, other support persons who may assist in training.
</p><p>• USCG Critical Incident Stress Management Peer Volunteers: Peer, Peer’s supervisor, Work-Life staff, and
other support persons who may assist in training.
</p><p>• Case records maintained by USCG Work-Life personnel on USCG Duty members who have demonstrated suicidal
behavior: the patient, medical personnel, patient’s command, and Work-Life staff and other support persons who may assist
in helping the patient.
</p><p>• Reports of USCG active duty suicidal behavior incidents, work place violence incidents, critical
incidents, and sexual assaults maintained by USCG Headquarters (CG-1112): Work-Life staff and others as described
above under their related programs.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
    <section id="uscg6" toc="yes">
        <systemNumber>/USCG-006</systemNumber>
        <subsection type="systemName"> Individual and Community Preparedness System of Records </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>
                    Unclassified.
                </p>
            </xhtmlContent>
            </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at the FEMA Headquarters in Washington, D.C., and field offices. Records also are maintained in the Salesforce Government Cloud environment located in Salesforce Data Center, Ashburn, VA.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Individual and Community Preparedness Division (ICPD) Preparedness Behavior Change Branch Chief, 500 C St SW, Washington, D.C. 20472.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>Robert T. Stafford Disaster Relief and Emergency Assistance Act, Public Law No. 93-288, as amended, Sec. 611, at 42 U.S.C 5196(e); 6 U.S.C. 314(a)(9)(B); 6 U.S.C. 313(b)(1), (b)(2)(H); Exec. Order (E.O.) No. 13254, "Establishing the USA Freedom Corps", Jan. 29, 2002, as amended by E.O. 13286.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to enable FEMA to facilitate contact between individuals, communities, and organizations about their interest in preparedness and specific voluntary programs; enable individuals, communities, and organizations to register and participate in FEMA’s Individual and Community Preparedness Division programs; and enable FEMA to correspond with community stakeholder organizations, administer surveys, and receive survey responses. As a whole, these records enable FEMA and the Individual and Community Preparedness Division to connect with individuals, organizations, and communities with research, training, and tools to build and sustain capabilities to prepare for any disaster, hazard, or emergency.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>Individuals designated as the points of contact for a citizen responder team (Community Emergency Response Team (CERT) or Citizen Corps partner organization), members of the public who contact the agency about their interest in preparedness programs, which may include youth between grades 8 and 11, their parents or guardians, or individuals recommending the youth for preparedness programs. This system will also include members of the public who respond to FEMA-administered preparedness assessment surveys.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                •	<p>Individual’s Name;</p>
                •	<p>Organization or Sponsoring Organization;</p>
                •	<p>Telephone Number;</p>
                •	<p>Fax Number;</p>
                •	<p>Mailing Address;</p>
                •	<p>Email Address;</p>
                •	<p>Unique User ID (for IT system access);</p>
                •	<p>Password (for IT system access);</p>
                •	<p>User Type;</p>
                •	<p>Date of Birth;</p>
                •	<p>Race/Ethnicity;</p>
                •	<p>Gender/Sex;</p>
                •	<p>Academic Records;</p>
                •	<p>Letter of Recommendation, including Relationship to Applicant;</p>
                •	<p>School Grade Level;</p>
                •	<p>Extracurricular Activities;</p>
                •	<p>Volunteer Program Area and Type of Interest;</p>
                •	<p>Emergency Preparedness Training Information (e.g., courses taken and dates of courses);</p>
                •	<p>Community Preparedness Surveys and Instruments (aggregate self-reported attitudes, opinions and experiences of disasters and preparedness)</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p> FEMA collects information directly from the individuals who contact, correspond with, register for, and participate in FEMA’s Individual and Community Preparedness programs.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To organizations participating, partnering, or affiliated with the Citizen Responder Program if an individual has volunteered to assist or requested information about this specific type of organization.</p>
                <p>J. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS is aware of a need to use relevant aggregate, deidentified data, that relate to the purpose(s) stated in this System of Records Notice, for purposes of testing new technology. Data collected through the Youth Preparedness Council will not be used to test new technology.</p>
                <p>K. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p> DHS/FEMA stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital/electronic media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>DHS/FEMA may retrieve records using a system-generated case number associated with a unique application, or by Name, Mailing Address, Email Address, Phone Number, and User ID and password. DHS/FEMA may also retrieve records by non-personal information in aggregate, such as CERTs or survey respondents by county or state location, preparedness events by number of training events held per period-of-time, average positive feedback rating on preparedness surveys, and types of preparedness events and activities conducted by individuals.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>Youth Preparedness Council applications are maintained in accordance with National Archives and Records Administration N1-311-86-1, Item 1K1c (Administrative records common to most offices in FEMA). In accordance with N1-311-86-1, Item 1K1c, for enrolled applicants, Youth Preparedness Council application records will be destroyed at the end of the calendar year of the applicant’s last year in the program. For applicants that are not enrolled, Youth Preparedness Council application records will be destroyed at the end of calendar year submitted.</p>
                <p>For all other Individual and Community Preparedness Division records (e.g., results from surveys) that are not Youth Preparedness Council applications, the records are only retained until they are incorporated into the master file in accordance with NARA General Records Schedule 5.2, Item 20. (Intermediary Records). Individual and Community Preparedness Division staff use the collected data for studies and development of trend analysis. Records are continuously used and monitored and are retained until they are no longer deemed useful for analysis after which the records will be destroyed after another 3 years in accordance with NARA General Records Schedule 5.3, Item 010 (continuity planning and related emergency planning files).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p> Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and the FEMA Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning them, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655 or electronically at https://www.dhs.gov/dhs-foia-privacy-act-request-submission-form. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                <p> When an individual is seeking records about themself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify their identity, meaning that the individual must provide their full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. An individual may obtain more information about this process at http://www.dhs.gov/foia. In addition, the individual should, whenever possible:</p>
                •	<p>Explain why they believe the Department would have information being requested;</p>
                •	<p>Identify which component(s) of the Department they believe may have the information;</p>
                •	<p>Specify when the individual believes the records would have been created; and</p>
                •	<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered Judicial Redress Act records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>None.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>78 FR 43890 (July 22, 2013); 73 FR 77785 (December 19, 2008).</p>
            </xhtmlContent>
        </subsection>
    </section>

    <section id="uscg7" toc="yes">
<systemNumber>/USCG-007</systemNumber>
<subsection type="systemName">United States Coast Guard Special Needs Program.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at USCG Headquarters in Washington, DC and field locations.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Coast Guard active duty, reserve, retired active duty, retired reserve, and civilian personnel and their eligible
dependents who have a long-term physical or mental chronic condition that substantially limits one or more of the major
life activities of an individual including professionally diagnosed medical, physical, psychological, and/or educational
disabilities.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Military or civilian personnel’s name;
</p><p>• Eligible dependent’s name and birth date;
</p><p>• Service member’s, civilian’s or eligible dependents home address, phone numbers, and email information;
</p><p>• Identification number (EMPLID); social security numbers of the service member or civilian personnel are
currently in the case records (we will no longer be asking for those in the new policy, but the numbers will still be in
all of the old files);
</p><p>• Eligible dependent’s diagnosed special need, including copies of medical, educational, and psychological
reports, enrollment forms, correspondence and follow-up, and any other data relevant to the dependent’s individual
special needs’ program files; and
</p><p>• Benefits, including case management activities, and supports and services received related to the special
need.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>The Homeland Security Act of 2002, Public Law 107-296, Federal Records Act, 44 U.S.C. 3101; 6 CFR part 5; 5
U.S.C. 301, and COMNDTINST 1754.7 (series).
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to administer special needs requests of USCG military and civilian personnel to
coordinate the special needs program’s medical care, mental health treatment, and to provide case management for USCG
military and civilian personnel and eligible dependants with special needs.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>This system of records contains individually identifiable health information. The Department of Defense Health
Information Privacy Regulation (DoD 6025.18-R) issued pursuant to the Health Insurance Portability and
Accountability Act of 1996, applies to most such health information. Department of Defense 6025.18-R may place
additional procedural requirements on the uses and disclosures of such information beyond those found in the Privacy Act
of 1974 or mentioned in this system of records notice.
</p><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of
the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body when it is necessary to the litigation
and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To any member of the family when a signed release of information is documented in the case record, in furtherance
of treating the family member with special needs.
</p><p>I. To officials and employees of local and state governments and agencies in the performance of their official duties
pursuant to the laws and regulations governing local control of communicable diseases, preventive medicine and safety
programs, developmental disabilities, and other public health and welfare programs.
</p><p>K. To the federal, state or local governmental agencies when appropriate in the counseling and treatment of
individuals or families with special medical or educational needs, or receiving early intervention or related services.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in a locked drawer behind a locked door. The records
are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Data may be retrieved by a Coast Guard military or civilian personnel’s name and/or identification number
(EMPLID).
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Case records are maintained at a decentralized location until the USCG military or civilian personnel is
separated or retired, eligible family member is no longer an eligible dependent, or the eligible dependent is no longer
diagnosed as having a special need. Upon separation or retirement of the USCG military or civilian personnel, the
eligible family member is no longer an eligible dependent, or when the eligible dependent is no longer diagnosed as
having a special need, the record will be transferred to Commandant, CG-1112. After a 3-year retention, the record
is destroyed (N1-026-07-9).
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Chief, Office of Work-Life, Director of Health, Safety and Work-Life, CG-11, United States Coast Guard,
Washington, DC 20593-0001.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any open record contained in this system of records, or seeking
to contest its content, may submit a request in writing to the Work-Life field office where the case record is
maintained. Individuals seeking notification of and access to any closed record contained in this system of records, or
seeking to contest its content, may submit a request in writing to the Chief, Office of Work-Life, Director of Health,
Safety and Work-Life, CG-11, United States Coast Guard, Washington, DC 20593-0001.
</p><p>When seeking records about yourself or your minor dependent from this system of records or any other USCG system of
records your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your
identity, meaning that you must provide your full name, current address and date and place of birth. You must sign your
request, and your signature must either be notarized or submitted by you under 28 U.S.C. 1746, a law that permits
statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you
may obtain forms for this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-
431-0486. In addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the USCG may not be able to conduct an effective search, and your request may be
denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are obtained from medical reports that are provided to the USCG.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
    <section id="uscg8" toc="yes">
        <systemNumber>/USCG-008</systemNumber>
        <subsection type="systemName">
            Department of Homeland Security (DHS)/United States Coast Guard (USCG)-008 Courts-Martial and Military Justice Case Files System of Records.
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>
                    Unclassified.</p></xhtmlContent>
                </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at the United States Coast Guard Headquarters in Washington, D.C., and field offices. The Case Matter Management Tracking System (CMMT) is the information technology (IT) system in which records associated with this function are maintained.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p> Commandant, Office of Military Justice (CG-LMJ), United States Coast Guard Headquarters, HQS-DG-LST-CG-LMJ@uscg.mil, 2703 Martin Luther King Jr. Ave. SE Washington, D.C., 20593-7213.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>14 U.S.C. 632; 10 U.S.C. secs. 801, 806b, 815, 822, 823, 865, and 892, and other related provisions of Title 10, Armed Forces, Subtitle A – General Military Law, Chapter 47 - Uniform Code of Military Justice; E.O. 11835; E.O. 12198, E.O. 12473, E.O. 12233, and E.O. 13825; DHS Delegation 00170.1, "Delegation to the Commandant of the U.S. Coast Guard."</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to document military justice administration and documentation of USCG Courts-Martial proceedings relating to all USCG active duty, reserve, and retired active duty and retired reserve military personnel and other individuals who are tried by, or involved with, court martial.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p> Categories of individuals covered by this system include all USCG active duty, reserve, and retired active duty and retired reserve military personnel and other individuals who are tried by, or involved with, courts-martial.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>The categories of records in this system include:</p>
                <p>• Individual’s name;</p>
                <p>• Date of birth;</p>
                <p>• Social Security number (SSN) (if collected);</p>
                <p>Employee identification number;</p>
                <p>• Phone numbers;</p>
                <p>• Email addresses;</p>
                <p>• Addresses;</p>
                <p>• Job-related information including: job title, rank, duty station, supervisor’s name, and contact information; and</p>
                <p>• Records of Trial (contents are in accordance with Article 54 of the Uniform Code of Military Justice and Rules for Court-Martial 1112, which includes charge sheets, exhibits, transcript of trial, sentencing report, arguments, and various other documents).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>Records are obtained from USCG investigating officers, military, and civilian personnel. The records include the records of pre-trial preliminary hearings and records of trial for individual courts-martial. They also include records from post-trial hearing and appellate review of such courts-martial, including records of review in the Office of the Judge Advocate General and Chief Counsel of the Coast Guard, the Coast Guard Court of Criminal Appeals, and the Court of Appeals for the Armed Forces.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agency conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. sec. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To the confinement facility, if confinement is adjudged, and the confinement facility is not a USCG facility.</p>
                <p> J. To accused and crime victims or their counsel for the purpose of submitting matters pursuant to the Manual for Courts-Martial (2019 ed.), Pt. II, Rules for Courts-Martial (R.C.M.) 1106 and 1106A, a copy of the recording of all open sessions of the court-martial, and copies of, or access to, the evidence admitted at the court-martial, and appellate exhibits. Sealed and classified court-martial recordings or materials must be authorized by a military judge in accordance with R.C.M. 1106 and 1106A. The term victim is defined in R.C.M. 1106A(b)(2).</p>
                <p> K. To the accused or the victim of an offense of which the accused was charged if the victim testified during the proceeding, and any victim named in a specification of which the accused was charged without regards to the findings of the court-martial, a copy of the record of trial per the Manual for Courts-Martial (2019 ed.), Pt. II, Rules for Courts-Martial (R.C.M.) 1112(e). Any sealed exhibits, classified information, or closed sessions of the court-martial shall not be provided per R.C.M 1112(e)(3). The contents of the record of trial are outlined in R.C.M. 1112(b) and the term victim is defined in R.C.M. 1106A(b)(2).</p>
                <p> L. To the Veterans Administration (VA) to assist USCG in determining the individual’s entitlement to benefits administered by the VA.</p>
                <p> M. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            
                </xhtmlContent>
    </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/USCG stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>USCG retrieves records by the name of the individual.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>All General Courts-Martial and Special Courts-Martial records involving Bad Conduct Discharge are permanent. Transfer to Federal Records Center (FRC) 2 years after date of final action. Transfer to the National Archives and Records Administration (NARA) 10 years after final action (AUTH: NC1-26-76-2, Item 384a). Special Courts-Martial other than those involving Bad Conduct Discharges are temporary. Transfer to FRC 2 years after date of final action. Destroy 10 years after date of final action. (AUTH: NC1-26-76-2, Item 384b). Summary Courts-Martial convened after 5 May 1950 are Temporary. Transfer to FRC 2 years after date of final action. Destroy 10 years after date of final action. (AUTH: NC1-26-76-2, Item 384c(1)).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p>DHS/USCG safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. USCG has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act, and JRA if applicable, because it is a law enforcement system. However, DHS/USCG will consider individual requests to determine whether or not information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and United States Coast Guard Freedom of Information Act (FOIA) Officer whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                <p>• Explain why he or she believes the Department would have information being requested;</p>
                <p>• Identify which component(s) of the Department he or she believes may have the information;</p>
                <p>• Specify when the individual believes the records would have been created; and</p>
                <p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If an individual’s request is seeking records pertaining to another living individual, the first individual must include a statement from the second individual certifying his/her agreement for the first individual to access his/her records.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered JRA records, see "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>Pursuant to 5 U.S.C. 552a(j)(2) of the Privacy Act, portions of this system are exempt from 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), and (e)(8); (f); and (g). Pursuant to 5 U.S.C. 552a(k)(1) and (k)(2), this system is exempt from the following provisions of the Privacy Act, subject to the limitations set forth in those subsections: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>79 FR 64815 (October 31, 2014); 76 FR 39245 (July 6, 2011); 76 FR 27847 (May 13, 2011); 73 FR 64961 (October 31, 2008).</p>
            </xhtmlContent>
        </subsection>
    </section>

    <section id="uscg10" toc="yes">
<systemNumber>/USCG-010</systemNumber>
<subsection type="systemName">DHS/USCG-010 Physical Disability Evaluation System Files System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent>
<p> Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent>
<p> Records are maintained at the United States Coast Guard Headquarters in Washington, D.C., and in field offices.  Case Matter Management Tracking System (CMMT) is the information technology (IT) system in which records associated with this function are maintained.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent>
<p> All USCG active duty and reserve personnel who are referred for potential separation or retirement for physical disability. </p>
</xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p>Categories of records in this system include:</p>
<p>• Name;</p>
<p>• Social Security number (SSN) and/or Employee ID (EmpID);</p>
<p>• Informal Physical Evaluation Board files;</p>
<p>• Formal Physical Evaluation Board files;</p>
<p>• International Classification of Diseases code (ICD);</p>
<p>• Physical Review Council files;</p>
<p>• Physical Disability Appeal Board files; and</p>
<p>• Physical Disability Board of Review files.</p>
</xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p>Departmental Regulations 5 U.S.C. 301; 14 U.S.C. 632; the Federal Records Act, 44 U.S.C. 3101; 10 U.S.C. Chapter 61.</p>
</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p> The purpose of this system is to document physical disability evaluation proceedings and ensure equitable application of the provisions of Title 10, United States Code, Chapter 61, which relates to the separation or retirement of military personnel by reason of physical disability.</p>
</xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p>Note:</p><p>For records of identity, diagnosis, prognosis, or treatment of any client/patient maintained in connection with the performance of any alcohol or drug abuse prevention and treatment function conducted, requested, or directly or indirectly assisted by any department or agency of the United States, irrespective of whether or when he/she ceases to be a client/patient, shall except as provided therein, be confidential and be disclosed only for the purposes and under circumstances expressly authorized in 42 U.S.C. 290dd-2.  This statute takes precedence over the Privacy Act of 1974 to the extent that disclosure is more limited.  The routine uses set forth below do not apply to this information.  However, access to the record by the individual to whom the record pertains is governed by the Privacy Act.  These alcohol and drug abuse patient records may be disclosed:</p>
<p>    A.  To medical personnel to the extent necessary to meet a bona fide medical emergency;</p>
<p>    B.  To qualified personnel for the purpose of conducting scientific research, management audits, financial audits, or program evaluation provided that employees are individually identified;</p>
<p>    C.  To the employee's medical review official;</p>
<p>    D.  To the administrator of any Employee Assistance Program in which the employee is receiving counseling or treatment or is otherwise participating;</p>
<p>    E.  To any supervisory or management official within the employee's agency having authority to take adverse personnel action against such employee; or</p>
<p>    F.  Pursuant to the order of a court of competent jurisdiction when required by the United States Government to defend against any challenge against any adverse personnel action. See 42 U.S.C. 290dd, 290ee, and Public Law 100-71, Section 503(e).</p>
<p><i>Note:</i> For all other records besides those noted above, this system of records contains individually identifiable health information.  The Health Insurance Portability and Accountability Act of 1996, applies to most of such health information. Department of Defense 6025.18-R may place additional procedural requirements on the uses and disclosures of such information beyond those found in the Privacy Act of 1974 or mentioned in this system of records notice.  Therefore, routine uses outlined below may not apply to such protected health information.</p>
<p>  In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows: </p>
<p> A.  To the Department of Justice (DOJ), including Offices of the U.S. Attorney, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
<p>  1.  DHS or any component thereof;</p>
<p>  2.  Any employee or former employee of DHS in his/her official capacity;</p>
<p>  3.  Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
<p>  4.  The United States or any agency thereof.</p>
<p> B.  To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
<p> C.  To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
<p> D.  To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
<p> E.  To appropriate agencies, entities, and persons when:</p>
<p> 1.  DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; </p>
<p> 2.  DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
<p> 3.  The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p> F.  To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records.  Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
<p>G.  To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
<p> H.  To the Department of Veterans Affairs for assistance in determining the eligibility of individuals for benefits administered by that agency, and available to the U.S. Public Health Service or the Department of Defense medical personnel in connection with the performance of their official duties.</p>
<p>                I.  To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS's officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
<p>Disclosure to consumer reporting agencies:  </p>
<p> None.</p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>Storage:</p>
<p> USCG stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door.  The records may be stored on magnetic disc, tape, digital media.</p>
</xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p> USCG retrieves records by name, social security number, employee identification number, command, date, and the diagnosis or International Classification of Diseases (ICD) code.</p>
</xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p> USCG safeguards records in this system in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies.  DHS imposes strict controls to minimize the risk of compromising the information that is being stored.  Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.     </p>
</xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p> USCG transfers records to the National Personnel Records Center, Military Personnel Records NPRC (MPRC) three years after last activity.  USCG destroys records  50 years from the date of the latest document in the record. (AUTH: NC1-26-82-5, Item 2a2).</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent>
<p> Commander (CG-PSC), United States Coast Guard, 4200 Wilson Boulevard, Mail Stop 7200, Arlington, VA 20598-7200. </p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p> Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Commandant (CG-611), United States Coast Guard, Mail Stop 7710, Washington, D.C. 20593.  If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act (FOIA) Officer, Department of Homeland Security, 245 Murray Drive, S.W., Building 410, STOP-0655, Washington, D.C. 20528.</p>
<p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR part 5.  You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth.  You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization.  While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486.  In addition, you should:</p>
<p>• Explain why you believe the Department would have information on you;</p>
<p>• Identify which component(s) of the Department you believe may have the information about you;</p>
<p>• Specify when you believe the records would have been created; and </p>
<p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records; and</p>
<p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
<p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
</xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p> Records are obtained from information in records developed through proceedings of administrative bodies listed in "Categories of records" above.</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent>
<p> None.

</p></xhtmlContent></subsection></section>
<section id="uscg11" toc="yes">
<systemNumber>/USCG-011</systemNumber>
<subsection type="systemName">Military Personnel Health Records System.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at USCG Headquarters in Washington, DC, in field locations, and at USCG health care
facilities at which USCG military personnel or eligible dependents receive treatment.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Active duty, reserve, retired active duty, reserve USCG military personnel or their eligible dependents, USCG
Academy cadets, auxiliary while performing Coast Guard duties, members of foreign military services, federal employees
assigned to USCG vessels, seamen, non-federally employed civilians aboard USCG vessels and civilians receiving physical
exams prior to entry into the USCG.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Military personnel’s name;
</p><p>• Eligible dependant’s name;
</p><p>• Social security number;
</p><p>• Employee ID;
</p><p>• Date of Birth;
</p><p>• Medical History;
</p><p>• Records of medical and dental treatment, for example x-rays, physical examinations, psychological
examinations;
</p><p>• Records containing due date for physical/dental and eye examinations, inoculations, screening tests and
results of actions required by USCG or other Federal, State or local government or agency; and
</p><p>• Records concerning line of duty determination and eligibility for disability benefits.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301: The Federal Records Act, 44 U.S.C. 3101; Departmental Regulations; 10 U.S.C. 1071-1107;
Medical and Dental Care; 14 U.S.C. 93(a)(17); 14 U.S.C. 632: Functions and powers vested in the Commandant.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>To determine normal duty rotations, suitability of members for overseas assignments, develop automated
information relating to medical readiness in wartime and contingence operations, determine eligibility for disability,
and to maintain health care records as a function of general health maintenance.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>Note:
</p><p>For records of identity, diagnosis, prognosis, or treatment of any client/patient, irrespective of whether or when
he/she ceases to be a client/patient, maintained in connection with the performance of any alcohol or drug abuse
prevention and treatment function conducted, requested, or directly or indirectly assisted by any department or agency of
the United States, shall, except as provided therein, be confidential and be disclosed only for the purposes and under
circumstances expressly authorized in 42 U.S.C. 290dd-2. The results of a drug test of civilian employees may be
disclosed only as expressly authorized under 5 U.S.C. 7301. Theses statutes take precedence over the Privacy Act of 1974
to the extent that disclosure is more limited. However, access to the record by the individual to whom the record
pertains is governed by the Privacy Act. The Routine Uses set forth below do not apply to this information.
</p><p>Note:
</p><p>For other records than those mentioned in the note above, this system of records contains individually identifiable
health information. The Health Insurance Portability and Accountability Act of 1996, applies to most of such health
information. Department of Defense 6025.18-R may place additional procedural requirements on the uses and
disclosures of such information beyond those found in the Privacy Act of 1974 or mentioned in this system of records
notice. Therefore, routine uses outlined below may not apply to such health information.
</p><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of
the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice or other Federal agency conducting litigation or in proceedings before any court,
adjudicative or administrative body, when:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To Federal, State, or local governments and agencies to compile statistical data for research and auditing; to
provide quality assurance; to report medical conditions and other data required by law; to aid in preventive health and
communicable disease control programs.
</p><p>I. To the Accreditation Association for Ambulatory Health Care, Inc. to evaluate health care provided, personnel, and
facilities for professional certification and hospital accreditation; to provide quality services.
</p><p>J. To the Department of Defense to analyze the results of communicable diseases, to ensure uniformity of record
keeping, and to centralize production of reports for all uniformed services.
</p><p>K. To the Department of Defense or other Federal, State, or local governments and agencies for casualty identification
purposes.
</p><p>L. To the Social Security Administration and Veterans Administration for use in determining an individual’s
entitlement to benefits administered by those agencies.
</p><p>M. To the Public Health Service, Department of Defense, or Veterans Administration medical personnel or to personnel
or facilities providing care to eligible beneficiaries under contract in connection with medical treatment of
individuals.
</p><p>N. To the Department of Health and Human Services for purposes of the Federal Medical Care Recovery Act. Records are
available to the Public Health Service or Department of Defense medical personnel in connection with medical treatment of
individuals at the Public Health Service or Department of Defense facilities.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by name and sponsor’s social security number.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individual who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>A. Active Duty Personnel: Individual medical files are retained at the military personnel’s unit or healthcare
facility at which the military personnel receives care for so long as individual is assigned to the particular area. When
the military personnel is reassigned, the individual medical file is transferred to the new duty station upon
reassignment of military personnel. Upon separation or retirement, the medical file is incorporated into DHS/USCG-
005 Military Services Personnel.
</p><p>B. Retired Personnel: military personnel medical files are retained at the medical facility for a period of 6 years
from date of last activity. Six years after the last report, the files are transferred to National Personnel Records
Center (Military Personnel Records), 9700 Page Blvd, St. Louis, MO 63132.
</p><p>C. Dependents: dependent’s medical files are retained at the medical treatment facility for period of 6 years from
date of last activity. Transferred to new duty station of sponsor upon written request of dependent. Records not
transferred are forwarded to National Personnel Records Center, CPR, 111 Winnebago Street, St. Louis, MO 63118 six years
after last activity.
</p><p>D. Reserve Personnel: reservist medical files are retained in custody of the reserve group or unit, or healthcare
facility at which the member receives care for so long as the reservist is assigned to the particular area. When the
reservist is reassigned, the medical file is transferred to the new reserve group or unit or district commander as
appropriate. Upon separation or retirement, the medical file is incorporated into Official USCG Reserve Service Record
System, DHS/USCG-028.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Commandant, CG-11, United States Coast Guard Headquarters, Director, Health and Safety Directorate, 2100
2nd Street, SW., Washington, DC 20593-0001.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to USCG, Commandant (CG-611), 2100 2nd St., SW., Attn: FOIA
Coordinator, Washington, DC 20593-0001.
</p><p>When seeking records about yourself from this system of records or any other USCG system of records your request must
conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you
must provide your full name, current address and date and place of birth. You must sign your request, and your signature
must either be notarized or submitted to you under 28 U.S.C. 1746, a law that permits statements to be made under penalty
or perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose
from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In addition you
should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the USCG may not be able to conduct an effective search, and your request may be
denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Medical facilities where beneficiaries treated or examined; investigations resulting from illness or injury; the
individual.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="uscg12" toc="yes">
<systemNumber>/USCG-012</systemNumber>
<subsection type="systemName">Request for Remission of Indebtedness.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the United States Coast Guard Headquarters in Washington, DC and field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Active duty enlisted USCG personnel.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Individual’s name; employee ID number (EMPLID), command name, and command address.
</p><p>• Individual’s Leave and Earning Statement (LES), including home address.
</p><p>• Correspondence submitted to the USCG, such as leave and earning statements, letters or notices of
indebtedness, financial worksheets, travel orders, or other documents related to the cause for indebtedness;
</p><p>• Requests for endorsements;
</p><p>• Correspondence submitted by the enlisted member, as appropriate;
</p><p>• Research material on the individual’s file;
</p><p>• Paneling action;
</p><p>• Commandant’s decision.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; the Federal Records Act, 44 U.S.C. 3101; 14 U.S.C. 461, 632.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to aid USCG in making determinations whether an active duty enlisted member is
eligible to have the indebtedness to the U.S. Government forgiven, or a portion of the indebtedness pursuant to 14 U.S.C.
461, based on the best interests of the individual and the Government.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice or other Federal agency conducting litigation or in proceedings before any court,
adjudicative or administrative body, when:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved alphabetically by name.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records are retained for five years past the date of the final adjudication.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Director, Personnel Management Directorate, G-WP, United States Coast Guard Headquarters, 2100 2nd Street,
SW., Washington, DC 20593-0001.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to USCG, Commandant (CG-611), 2100 2nd St., SW., Attn: FOIA
Coordinator, Washington, DC 20593-0001.
</p><p>When seeking records about yourself from this system of records or any other USCG system of records your request must
conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you
must provide your full name, current address and date and place of birth. You must sign your request, and your signature
must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of
perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from
the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In addition you should
provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the USCG will not be able to conduct an effective search, and your request may be
denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Individuals covered by this system of records and Coast Guard Officials.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="uscg13" toc="yes">
<systemNumber>/USCG-013</systemNumber>
<subsection type="systemName">United States Coast Guard Marine Information for Safety and Law Enforcement (MISLE).
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Sensitive, but Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the United States Coast Guard (USCG) Headquarters in Washington, DC, the USCG
Operations Systems Center, Kearneysville, WV, and other field locations.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Individuals with established relationship(s) and/or associations with vessels and marine transportation
facilities and activities regulated by the USCG. Specifically, vessel owners, operators, charterers, masters, crew and/or
agents, mortgagees, lien claimants, vessel builders, facility owners, managers or employees, individuals who own,
operate, or represent marine transportation companies and other individuals who come in contact with the USCG through its
law enforcement, marine safety, investigation, and environmental activities.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Name of individual, vessel, or facility;
</p><p>• Home and work addresses;
</p><p>• Phone numbers;
</p><p>• Facility number, involved party identification number, social security number, drivers license number,
Immigration and Naturalization Service number, military identification number, U.S. Coast Guard license number, cellular
number, foreign seaman’s booklet number, resident alien number, merchant mariners license or documentation number, tax
payer identification number;
</p><p>• Casualty case number;
</p><p>• Pollution incident case number;
</p><p>• Date of incident;
</p><p>• Civil penalty case number;
</p><p>• Biometric information through photographs including height, weight, eye color and hair color;
</p><p>• Videos;
</p><p>• Information on vessels and vessel characteristics including: Vessel identification data, registration
data, port visits, inspection data, documentation data, port safety boarding, casualties, pollution incidents, and civil
violations if applicable and associated information (data pertaining to people or organizations associated with vessels);
</p><p>• Information on marine transportation facilities including: Name, identification number, location,
commodities handled, equipment certificates, approvals, inspection reports, pollution incidents, casualties, violations
of U.S. laws, and data pertaining to people or organizations associated with those facilities;
</p><p>• For owners, operators, agents, and crew members: Statements submitted by USCG relating to boarding,
investigations as a result of a pollution and/or casualty incident, as well as any violations of United States law, along
with civil penalty actions taken as a result of such violations. Such reports could contain names of passengers on
vessels, as well as witnesses to such violations.
</p><p>• Narratives, reports and documents by USCG personnel describing their activates on vessels and within
facilities including incident reports, violations of laws and international treaties,
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; 14 U.S.C 89a, 93(a) and (c), 632; 16 U.S.C 1431; The Federal Records Act, 33 U.S.C 1223; 33 U.S.C.
1228; 44 U.S.C. 3101; 46 U.S.C. 3717; 46 U.S.C. 12501; 46 U.S.C. 12119; 12502; 46 CFR par 67.1 <i>et seq.;</i> 49 CFR
1.45, 1.46.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to establish a safety, security and law enforcement performance history of vessels,
facilities, people and organizations engaged in marine transportation, including enforcement action, that can be used to
identify and address safety, security and environmental risks and to establish vessel eligibility for documentation as a
U.S. flag vessel.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice or other Federal agency conducting litigation or in proceedings before any court,
adjudicative or administrative body, when:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, Tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To Federal and State safety enforcement agencies, including, but not limited to, the Maritime Administration, U.S.
Department of Transportation, and National Transportation Safety Board, to access historical data that may assist in
safety investigations and improve transportation safety.
</p><p>I. To Federal, State, and local environmental agencies, including, but not limited to, the U.S. Environmental
Protection Agency, to access historical data that may improve compliance with U.S. laws relating to environmental
protection.
</p><p>J. To the United States Department of Commerce and National Technical Information Service (NTIS) to provide the
characteristics of vessels documented by the USCG and owner information. This information is the same as that published
in the annual publication "Merchant Vessels of the United States" (also known as the "blue
book"). This information is distributed electronically and is sold to the public.
</p><p>K. To Federal and State numbering and titling officials to access information for improving the tracking, registering,
and titling of vessels.
</p><p>L. To the U.S. Department of Defense and related entities, including, but not limited to, the Military Sealift Command
and U.S. Navy, to access data on safety information regarding vessels chartered by those agencies.
</p><p>M. To other Federal and State agencies not listed above, including, but not limited to, the U.S. Census Bureau, U.S.
Department of Labor, and U.S. Department of Commerce, to access historical data for improving general statistical
information.
</p><p>N. To the International Maritime Organization or intergovernmental organizations, nongovernmental organizations, or
foreign governments in order to conduct joint investigations, operations, and inspections;
</p><p>O. To Federal, State, or local agencies with which the U.S. Coast Guard Memorandum or Understanding, Memorandum of
Agreement, or Inspection and Certification Agreement pertaining to Marine Safety, Maritime Security, Maritime Law
Enforcement, and Marine Environmental Protection activities.
</p><p>P. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or in paper form in file cabinets, in file rooms, in secure
facilities behind a locked door. Electronic records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by name of individual, vessel, or facility, facility number, involved party
identification number, social security number, drivers license number, Immigration and Naturalization Service number,
military identification number, U.S. Coast Guard license number, cedula number, foreign seaman’s booklet number, resident
alien number, merchant mariners license or documentation number, tax payer identification number person or organization
name, casualty case number, pollution incident case number, date of incident, civil penalty case number, USCG unit
entering data or incident location.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated and paper systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system and paper files containing the records
in this system is limited to those individuals who have a need to know the information for the performance of their
official duties and who have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records are retained indefinitely because the records schedules are currently pending. A copy of this system has
been transferred to the National Archives and Records Administration permanent records collection. The following records
schedule has been proposed:
</p><p>A. Notifications associated with a Case or Activity are considered historically important and so are maintained
permanently by the National Archives. USCG will transfer the records to the National Archives at least every five years
after the close of a case or activity. In some cases, information may transferred prior to the five years.
</p><p>B. Notifications not associated with a Case or Activity are maintained for five years and then destroyed or deleted.
Information collected by MISLE is stored for a minimum of five years after the record is created, after which the
information will be retained, archived or destroyed in accordance with the MISLE Records Schedule approved by the
National Archives and Records Administration. All system hardware and data is stored at OSC, Kearneysville, WV. Backups
are performed daily. Copies of backups are stored at an off-site location.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>United States Coast Guard, Operations Systems Management Division, CG-635, 2100 2nd Street, SW.,
Washington, DC 20593-0001; Boating Safety Division, CG-5422; United States Coast Guard National Vessel
Documentation Center, 792 T J Jackson Drive, Falling Waters, WV 25419.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to USCG, Commandant (CG-611), 2100 2nd St., SW., Attn: FOIA
Coordinator, Washington, DC 20593-0001. Specific FOIA contact information can be found at <i>
http://www.dhs.gov/foia</i> under "contacts."
</p><p>When seeking records about yourself from this system of records or any other USCG system of records your request must
conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity, meaning that you
must provide your full name, current address and date and place of birth. You must sign your request, and your signature
must either be notarized or subscribed to pursuant to 28 U.S.C. 1746, a law that permits statements to be made under
penalty or perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this
purpose form the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the USCG may not be able to conduct an effective search, and your request may be
denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>All information entered into the MISLE is gathered from USCG boarding, USCG inspections, and USCG documentation
offices, vessel notice of arrival reports in the course of normal routine business. This information is gathered from the
owners, operators, crew members, agents, passengers, witnesses, other government agencies and United States Coast Guard
personnel.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from subsections (c)(3) and (4); (d); (e)(1), (2),
(3), (5), and (8); and (g) of the Privacy Act pursuant to 5 U.S.C. 552a(j)(2). In additional, the Secretary of Homeland
Security has exempted this system from subsections (c)(3), (d), (e)(1), (e)(4)(G), (H), (I), and (f) of the Privacy Act
pursuant to 5 U.S.C. 552a(k)(2).
</p></xhtmlContent></subsection></section>
<section id="uscg14" toc="yes">
<systemNumber>/USCG-014</systemNumber>
<subsection type="systemName">United States Coast Guard Military Pay and Personnel System.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at USCG Headquarters in Washington, DC and field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include active and reserve service applicants and prospective
applicants, civilian personnel, active duty, reserve, retired active duty and retired reserve USCG military personnel and
their annuitants and dependents, separated military personnel, USCG auxiliary members, USCG exchange workers, and
contractor personnel. Also included are active duty and retired National Oceanic and Atmospheric Administration (NOAA)
Officers and their annuitants and dependents, as well as Officers of the Commissioned Corps of the U.S. Public Health
Service (PHS) and their annuitants and dependents.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Individual’s name;
</p><p>• Social security number;
</p><p>• Employee identification number;
</p><p>• Date and place of birth;
</p><p>• Gender;
</p><p>• Minority designation and nationality;
</p><p>• Marital status;
</p><p>• Limited medical related information to include dates of physical examinations, color blindness,
immunizations, weight and body mass index (and compliance to standards);
</p><p>• Other HIPAA related/protected data;
</p><p>• Addresses;
</p><p>• Total current monetary earnings, including overtime, computed to the nearest dollar;
</p><p>• Number of hours worked;
</p><p>• Leave accrual rate;
</p><p>• Leave requests and balances;
</p><p>• Health and life insurance requests and eligibility;
</p><p>• Payroll deduction requests;
</p><p>• Information for the purpose of validating legal requirements for garnishment of wages;
</p><p>• Salary rate;
</p><p>• Cash awards;
</p><p>• Retirement withholdings;
</p><p>• Background information to include work experience;
</p><p>• Education records, including: highest level achieved; specialized education or training obtained in and
outside of military service; non-traditional education support records; achievement and aptitude test results; academic
performance records; correspondence course rate advancement records; military performance records; admissions processing
records; grade reporting records; academic status records; and transcript maintenance records;
</p><p>• Military duty assignments;
</p><p>• Ranks held;
</p><p>• Allowances;
</p><p>• Personnel actions such as promotions, demotions, or separations;
</p><p>• Record of instances of Uniform Code of Military Justice infractions;
</p><p>• Performance evaluations;
</p><p>• Background investigation, and security clearance information;
</p><p>• Government credit card status;
</p><p>• Individual’s desires for future assignments, training requested, and notations by assignment officers;
</p><p>• Information for determinations of waivers and remissions of indebtedness to the U.S. government;
</p><p>• Travel claims, transportation claims, government bills of lading, and applications for shipment of
household effects;
</p><p>• USCG housing records, including: housing surveys, computer data summaries, and correspondence from the
individual seeking housing;
</p><p>• Information regarding IT training, IT system accounts, roles, permissions; and
</p><p>• Names, dates of birth, addresses, social security numbers, and gender of annuitants and dependents of
active duty, reserve, and retired active duty and reserve military members.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; The Federal Records Act, 44 U.S.C. 3101; 5 U.S.C. 5501-5597; 10 U.S.C. 1043, 1147; 14 U.S.C.
92(I) 92(r), 93(g), 475, 512, 620, 632, 645, 681, 687; 37 U.S.C. 406; 42 U.S.C. 213, 253; 49 CFR 1.45, 1.46.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to administer the USCG active duty, reserve, and retired active duty and retired
reserve military pay and personnel system. To accomplish personnel accountability for USCG affiliated personnel in a
natural or man-made disaster or when directed by the USCG Commandant. The USCG may also collect information about Service
members and their dependents and civilian employees and their dependents as well as all personnel assigned to USCG for
regular performance of duties including Officers of the Commissioned Corps of the U.S. PHS and personnel in exchange or
reimbursable positions (per COOP requirements for personnel accountability), and for needs assessment as a result of the
natural or man-made disaster.
</p><p>The USCG may also use this accountability data for accountability and assessment reporting exercises. The system is
also used to administer USCG civilian personnel formal USCG training course management, security clearance data,
competency, and accomplishment data as well as tracking IT training, IT system accounts, roles, and permissions for
military, civilian, and contractor personnel. Additionally, the system is used to provide necessary information to the
Department of Commerce (DOC) for NOAA Officers and to Department of Health and Human Services (HHS) for Officers of the
Commissioned Corps of the U.S. PHS to administer their respective pay and personnel system.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>Note:</p><p>This system of records contains individually identifiable health information. The HIPAA of 1996, applies
to most of such health information. DoD 6025.18-R may place additional procedural requirements on the uses and
disclosures of such information beyond those found in the Privacy Act of 1974 or mentioned in this system of records
notice. Therefore, routine uses outlined below may not apply to such health information.
</p><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of
the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (DOJ), including U.S. Attorney Offices, or other federal agency conducting litigation
or in proceedings before any court, adjudicative or administrative body, when it is necessary to the litigation and one
of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. any employee of DHS in his/her official capacity;
</p><p>3. any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. the U.S. or any agency thereof, is a party to the litigation or has an interest in such litigation, and DHS
determines that the records are both relevant and necessary to the litigation and the use of such records is compatible
with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration (NARA) or other federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To the Department of Treasury (DOT) for the purpose of disbursement of salary, U.S. Savings Bonds, allotments, or
travel claim payments.
</p><p>I. To appropriate insurance agencies/companies for the purpose of health and life insurance requests and eligibility.
</p><p>J. To the DOC and HHS to administer their respective pay and personnel systems for NOAA Officers and Officers of the
Commissioned Corps of the PHS, respectively.
</p><p>K. To Federal, State, and local government agencies to disclose earnings and tax information, including the Internal
Revenue Service (IRS) and the Social Security Administration (SSA).
</p><p>L. To DoD and Veterans Administration (VA) for determinations of benefit eligibility for military members and their
dependents.
</p><p>M. To DoD for manpower and readiness planning.
</p><p>N. To the Comptroller General for the purpose of processing waivers and remissions.
</p><p>O. To an individual’s spouse, or person responsible for the care of the individual concerned when the individual to
whom the record pertains is mentally incompetent, critically ill, or under other legal disability for the purpose of
assuring the individual is receiving benefits or compensation they are entitled to receive.
</p><p>P. To a requesting government agency, organization, or individual the home address and other relevant information on
those individuals who, it is reasonably believed, might have contracted an illness, been exposed to, or suffered from a
health hazard while a member of government service.
</p><p>Q. To other government agencies for the purpose of earnings garnishment.
</p><p>R. To DoD for the purpose of preparing the Register of Officers and Register of Reserve Officers, which is provided to
all USCG officers.
</p><p>S. To education institutions or training facilities for purposes of enrollment and verification of employee attendance
and performance.
</p><p>T. To DoD for the purpose of preparing for and during actual emergencies, exercises or COOP tests for the purpose of
responding to emergency situations or to allow emergency service.
</p><p>U. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.</p>
<p>To the U.S. Department of the Treasury when disclosure of the information is relevant to review payment and award eligibility through the Do Not Pay Working System for the purposes of identifying, preventing, or recouping improper payments to an applicant for, or recipient of, Federal funds, including funds disbursed by a state (meaning a state of the United States, the District of Columbia, a territory or possession of the United States, or a federally recognized Indian tribe) in a state-administered, federally funded program.</p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, CD-ROM, and DVD.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by name, social security number, or employee identification number.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies as well as those of the USCG. A defense in depth strategy has been
employed. Overlapping and complimentary management, operational and technical security controls have been implemented and
followed to minimize the risk of compromising the confidentiality or adversely impacting the integrity of the information
that is being stored, processed, and/or transmitted. Access to the computer system(s) containing the records in this
system is limited to those individuals who have a verified need to know the information for the performance of their
official duties and who have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>In accordance with General Records Schedule (GRS) 9, Item 1c and 3, travel and transportation of household
effects records are temporary and are destroyed seven years after the period covered by account.
</p><p>In accordance with NC1-26-76-2, item 359 and NC1-26-80-4, item 151, PHS
Commissioned Officer Corps staffing and recruiting records are temporary and are transferred to the PHS Commission
Personnel Operation Division upon completion of the USCG assignment.
</p><p>In accordance with NC1-26-76-2, items 559 and 561 and NC1-26-80-4, item 338b,
military training and education records are temporary, including training courses and related material, school and
training files containing correspondence, reports and related paper on USCG and Navy schools and trainee index cards.
These records are destroyed when five years old. In accordance with GRS 2, item 29 b, civilian training education records
are destroyed after five years.
</p><p>In accordance with NC1-26-80-4, items 338b, 338c, 338d and 338e, class folders containing military
personal and service history, muster card files, and recruit training record cards are destroyed when one year old.
</p><p>In accordance with N1-330-04-1, item 1, military personnel system (Official Military Personnel File
(OMPF)) records are permanent and folders are transferred to the National Personnel Records Center (NPRC) six months
after separation. OMPF records are transferred to NARA 62 years after the date of retirement or separation.
</p><p>In accordance with NC1-26-76-2, items 583a and 584a and N1-330-04-1, item 1,
officer selection and appointment system records, officer candidates and direct commission program application for
selected applicants are filed in the OMPF.
</p><p>In accordance with NC1-26-76-2, item 583b, non-selected officer candidate applicant’s records are
destroyed six months after deadline dates for class which application is made.
</p><p>In accordance with NC1-26-79-2, item 584b, non-selected direct commission program applicants records
are destroyed one year from date of board by which considered.
</p><p>In accordance with NC1-26-80-4, item 337b, Officer Candidates School and direct commission officer
applicant files containing copies of applications for appointment in the USCG reserve, interviews, reports, and medical
examination are destroyed when one year after period covered by account.
</p><p>In accordance with NC1-26-76-2, item 587, applicant files are destroyed one year after the period
covered by account.
</p><p>In accordance with GAO-SCHED/5/1 and NC1-26-80-4, item 99d, military pay records are destroyed
56 years after the period covered by account.
</p><p>In accordance with SSIC 7400, item 1 and NC1-26-76-2, items 184 and 99s, military personnel FICA
wage credit, federal income tax listings, leave and earnings statements and pay records are microfilmed and retained
onsite for four years, then archived at the Federal Record Center, and destroyed 50 years after the period covered by
account.
</p><p>In accordance with GRS 15, item 3, USCG family housing records are temporary and destroyed two years after the period
covered by account.
</p><p>In accordance with GRS 25, item 1a, outside employment of active duty USCG personnel records are temporary and
destroyed when three years old or when superseded or obsolete, whichever is later.
</p><p>Duplicate magnetic copies of the pay and personnel record are retained at an offsite facility for a useful life of
seven years.
</p><p>In accordance with GRS 24, item 61, information regarding IT training, IT system accounts, roles, permissions,
Automatic Identification System user access authorization/revocation, and password files are destroyed one year after
user account is terminated, password altered, or when no longer needed for investigative or security purposes.
</p><p>Paper records for waivers and remissions are retained on site and destroyed six years three months after the
determination.
</p><p>In accordance with GRS 2, item 18, paper records to determine legal sufficiency for garnishment are destroyed six
years three months after the period covered by account when the member separates from service or garnishment is
terminated. Federal employee records are destroyed three years after garnishment is terminated.
</p><p>Records concerning congressional correspondence are maintained indefinitely because they have been determined to be of
historical value.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>For active duty military personnel, civilian personnel, and separated personnel of the USCG: Chief, Office of
Personnel, USCG Headquarters, 2100 2nd Street, SW., Washington, DC 20593-0001. For USCG reserve military personnel
and retired USCG reserve military personnel waiting pay at age 60: Chief, Office of Reserve Affairs, USCG Headquarters,
2100 2nd Street, SW., Washington, DC 20593-0001. For USCG waivers and remissions: Chief, Personnel Services
Division, Office of Military Personnel, USCG Headquarters, 2100 2nd Street, SW., Washington, DC 20593-0001. For
records used to determine legal sufficiency for garnishment of wages and pay records: Commanding Officer, USCG, Personnel
Services Center, 444 SE., Quincy Street, Topeka, KS 66683-3591. For data added to the decentralized data segment
the commanding officer, officer-in-charge of the unit handling the military personnel’s pay and personnel record, or
Chief, Administrative Services Division for individuals whose records are handled by USCG Headquarters 2100 2nd Street,
SW., Washington, DC 20593-0001.
</p><p>For active and reserve service applicants and prospective applicants: Commanding Officer, USCG Recruiting Command,
STOP 7500, 2300 Wilson Blvd. Suite 500, Arlington, VA 20598-7500.
</p><p>For retired active USCG military personnel and their annuitants and dependents: Commanding Officer, USCG, Personnel
Services Center, 444 SE., Quincy Street, Topeka, KS 66683-3591.
</p><p>For USCG auxiliary members: Director of Auxiliary, USCG, 2100 2ND ST, SW., STOP 7581, Washington, DC 20593-7581.
</p><p>For USCG exchange workers: Commandant (G-WPX), USCG Exchange System, CGES &amp;amp;amp;amp;amp;amp; MWR Headquarters, 870 Greenbrier
Circle, Greenbrier Tower II, Suite 502, Chesapeake, VA 23320-2681.
</p><p>For contractor personnel: Commandant (USCG-9), USCG Headquarters, 1900 Half Street, SW., Washington, DC 20593.
</p><p>For NOAA members: National Oceanic and Atmospheric Administration, Commissioned Personnel Division, 11400 Rockville
Pike, Rockville, MD 20852.
</p><p>For Officers of the Commissioned Corps: U.S. Public Health Service Office of Commissioned Corps Operations, 1100
Wootton Parkway, Suite 100, Rockville, MD 20852.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to: For active duty military personnel of the USCG: Chief, Office of
Personnel, USCG Headquarters, 2100 2nd Street, SW., Washington, DC 20593-0001. For USCG reserve military personnel
and retired USCG reserve military personnel awaiting pay at age 60: Chief, Office of Reserve Affairs, USCG Headquarters,
2100 2nd Street, SW., Washington, DC 20593-0001. For USCG waivers and remissions: Chief, Personnel Services
Division, Office of Military Personnel, USCG Headquarters, 2100 2nd Street, SW., Washington, DC 20593-0001. For
records used to determine legal sufficiency for garnishment of wages and pay records: Commanding Officer, USCG, Personnel
Services Center, 444 SE., Quincy Street, Topeka, KS 66683-3591. For data added to the decentralized data segment
the commanding officer, officer-in-charge of the unit handling the individual’s pay and personnel record, or Chief,
Administrative Services Division for individuals whose records are handled by USCG Headquarters, 2100 2nd Street, SW.,
Washington, DC 20593-0001.
</p><p>For NOAA members: National Oceanic and Atmospheric Administration, Commissioned Personnel Division, 11400 Rockville
Pike, Rockville, MD 20852.
</p><p>For Officers of the Commissioned Corps: U.S. Public Health Service, Office of Commissioned Corps Operations, 1100
Wootton Parkway, Suite 100, Rockville, MD 20852. If an individual believes more than one component maintains Privacy Act
records, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer,
Department of Homeland Security, 245 Murray Drive, SW., Building 410, STOP-0655, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other USCG system of records your request must
conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you
must provide your full name, current address and date and place of birth. You must sign your request, and your signature
must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of
perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from
the Chief Privacy Officer and Chief Freedom of Information Act Officer, <i>http://www.dhs.gov</i> or 1-(866) 431
-0486. In addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created;
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records; and
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the USCG may not be able to conduct an effective search, and your request may be
denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Individuals, USCG personnel officials, NOAA personnel officials, DoD, PHS personnel officials, previous
employers, educational institutions, court records, and test results.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="uscg15" toc="yes">
<systemNumber>/USCG-015</systemNumber>
<subsection type="systemName">United States Coast Guard Legal Assistance Case Files.
</subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p>Unclassified.</p>
        </xhtmlContent>
            </subsection>
            <subsection type="systemLocation">
                <xhtmlContent>
                    <p> Records are maintained at the USCG Headquarters in Washington, D.C. and field offices.  The Case Matter Management Tracking (CMMT) System, also known as "Law Manager," is the information technology (IT) system in which records associated with this function are maintained.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="categoriesOfIndividuals">
                <xhtmlContent>
                    <p> Categories of individuals covered by this system include:</p>
                    <p>•Military personnel of the armed forces who are on active duty (including reservists on active duty or scheduled for deployment).</p>
                    <p>•Military personnel and former military personnel entitled to retired or retainer pay or equivalent pay.</p>
                    <p>•Officers of the commissioned corps of the Public Health Service who are on active duty or entitled to retired or equivalent pay.</p>
                    <p>•Dependents of military personnel (including dependents of reservists on active duty or scheduled for deployment) and retired military personnel described above.</p>
                    <p>•Other persons authorized by the Judge Advocate General.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="categoriesOfRecords">
                <xhtmlContent>
                    <p>•Categories of records in this system include:</p>
                    <p>o Name;</p>
                    <p>o Rank;</p>
                    <p>o Employee identification number;</p>
                    <p>o Date of birth;</p>
                    <p>o Duty station;</p>
                    <p>o Telephone numbers;</p>
                    <p>o Work and home addresses;</p>
                    <p>o Case number;</p>
                    <p>o Any information within the legal case file concerning the personal matters handled by these offices for clients (e.g., executing wills, power of attorney, separation/divorce, landlord/tenant issues, consumer issues).</p>
                </xhtmlContent>
            </subsection>
            <subsection type="authorityForMaintenance">
                <xhtmlContent>
                    <p> 10 U.S.C. 1044; and Commandant Instruction 5801.4E.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="purpose">
                <xhtmlContent>
                    <p> The purpose of this system is to provide legal assistance to eligible clients (active duty armed forces members and their dependents; former members entitled to retired/retainer/equivalent pay and their dependents; commissioned corps of the Public Health Service and the National Oceanic and Atmospheric Administration officers on active duty or entitled to retired or equivalent pay; survivors of members or former members who were eligible for legal assistance when they died; and those persons authorized by the Judge Advocate General) seeking personal legal assistance pursuant to CI 5801.4E.  Legal assistance services provided may include; wills and estate planning; military testamentary instruments; advanced medical directives or living wills; Military Advanced Medical Directives (MAMD); Landlord-Tenant and Consumer Affairs disputes; civil suits; tax disputes; adoptions and name changes; domestic relations; powers of attorney; and minor criminal matters.  All Coast Guard legal assistance services are described in CI 5801.4E.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="routineUsesOfRecords">
                <xhtmlContent>
                    <p> In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS, subject to attorney ethical requirements regarding confidentiality and privilege, as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
                    <p> A.  To the Department of Justice (DOJ), including offices of the United States Attorney, or other Federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                    <p>  1.  DHS or any component thereof;</p>
                    <p>  2.  Any employee or former employee of DHS in his/her official capacity;</p>
                    <p>3.  Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
                    <p>  4.  The United States or any agency thereof.</p>
                    <p> B.  To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                    <p> C.  To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
                    <p> D.  To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                    <p> E.  To appropriate agencies, entities, and persons when:</p>
                    <p> 1.  DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;</p>
                    <p> 2.  DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
                    <p> 3.  The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
                    <p> F.  To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records.  Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                    <p>G.  To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                    <p> H.  To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
                    <p>Disclosure to consumer reporting agencies:</p>
                    <p> None.</p>
                     
                    </xhtmlContent> 
            </subsection>
            <subsection type="policiesAndPractices">
                <xhtmlContent>
                    <p>Storage:</p>
                    <p> DHS/USCG stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door.  The records may be stored on magnetic disc, tape, and digital media.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="retrievability">
                <xhtmlContent>
                    <p> DHS/USCG may retrieve records by name or case number.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="safeguards">
                <xhtmlContent>
                    <p> DHS/USCG safeguards records in this system in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies.  DHS/USCG has imposed strict controls to minimize the risk of compromising the information that is being stored.  Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="retentionAndDisposal">
                <xhtmlContent>
                    <p> DHS/USCG destroys or deletes records 3 years after case is closed or when no longer needed by an attorney’s state bar, whichever is later. (AUTH: N1-26-06-3, Item 1).</p>
                </xhtmlContent>
            </subsection>
            <subsection type="systemManager">
                <xhtmlContent>
                    <p> Commandant, (CG-094), United States Coast Guard, Mail Stop 7213, Washington, D.C. 20593-0001.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="notificationProcedure">
                <xhtmlContent>
                    <p> Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Commandant (CG-611), United States Coast Guard, Mail Stop 7710, Washington, D.C. 20593.  If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act (FOIA) Officer, Department of Homeland Security, 245 Murray Drive, S.W., Building 410, STOP-0655, Washington, D.C. 20528.</p>
                    <p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR part 5.  You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth.  You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization.  While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief FOIA Officer, http://www.dhs.gov/foia or 1-866-431-0486.  In addition, you should:</p>
                    <p>•Explain why you believe the Department would have information on you;</p>
                    <p>•Identify which component(s) of the Department you believe may have the information about you;</p>
                    <p>•Specify when you believe the records would have been created; and</p>
                    <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
                    <p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
                    <p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="recordAccessProcedures">
                <xhtmlContent>
                    <p> See "Notification procedure" above.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="contestingRecordProcedures">
                <xhtmlContent>
                    <p> See "Notification procedure" above.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="recordSourceCategories">
                <xhtmlContent>
                    <p> Records are obtained directly from the client involved and during any subsequent investigation by the legal officer on behalf of the client.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="exemptionsClaimed">
                <xhtmlContent>
                    <p> None.</p>
                </xhtmlContent>
            </subsection>
        </section>









            <section id="uscg16" toc="yes">
<systemNumber>/USCG-016</systemNumber>
<subsection type="systemName">United States Coast Guard Adjudication and Settlement of Claims System.
</subsection>
<subsection type="securityClassification"><xhtmlContent>
<p> Unclassified.</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent>
<p> USCG maintains records at the United States Coast Guard Headquarters in Washington, D.C. and field offices.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent>
<p> Categories of individuals covered by this system include active duty, reserve, retired active duty, and retired reserve military personnel who submit claims against USCG related to monetary disputes.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p>Individual's name;</p>
<p>Social Security number or Employee ID Number (EMPLID);</p>
<p>Leave and earnings statements; and</p>
<p>Other related information regarding claims arising out of disputes concerning amounts of pay received.</p>
</xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p> Departmental Regulations, 5 U.S.C. 301, 5512-5514; 10 U.S.C. 939, 1442, 1453, 2774-2775; 14 U.S.C. 461; 31 U.S.C. 3716; 37 U.S.C. 1007; the Federal Records Act, 44 U.S.C. 3101; Debt Collection Act of 1982, Public Law 97-276, Section 124; Debt Collection Improvement Act of 1996, Public Law 104-132; Federal Claims Collection Standards, 31 CFR Chapter IX.</p>
</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p> The purpose of this system is to adjudicate and settle claims related to salary disputes, overpayments resulting from travel and transportation entitlement, claims from spouses, former spouses or widows of military personnel involving an annuity, and other similar activities when submitted by USCG active duty, reserve, and retired active duty and retired reserve military personnel.</p>
</xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p>  In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows: </p>
<p> A.  To the Department of Justice (DOJ), including Offices of the United States Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
<p>  1.  DHS or any component thereof;</p>
<p>  2.  Any employee or former employee of DHS in his/her official capacity;</p>
<p>  3.  Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
<p>  4.  The United States or any agency thereof.</p>
<p> B.  To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
<p> C.  To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
<p> D.  To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
<p> E.  To appropriate agencies, entities, and persons when:</p>
<p> 1.  DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; </p>
<p> 2.  DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
<p> 3.  The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p> F.  To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records.  Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
<p>G.  To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
<p>            H.  To authorized officials of the Internal Revenue Service, General </p>
<p>Accountability Office (GAO), and the Civil Service Commission, as required, to address salary claims submitted by USCG military and civilian personnel.</p>
<p>             I.  To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations, or in connection with criminal law proceedings or in response to a subpoena.</p>
<p>            J.  To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS's officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
<p>Disclosure to consumer reporting agencies:  </p>
<p> None.</p>

</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>Storage:</p>
<p> USCG stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door.  The records may be stored on magnetic disc, tape, or digital media.</p>
</xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p> USCG retrieves records by claimant's name, employee ID (EMPLID), </p>
<p>or Social Security number.</p>
</xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p> USCG safeguards records in this system in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies.  USCG imposes strict controls to minimize the risk of compromising the information.  Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.     </p>
</xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p> USCG retains records until adjudication and settlement.  USCG retains most submissions for present setting value, as required. USCG retains records for 10 years, 3 months after the year in which the Government's right to collect first accrued. (AUTH: GRS 6, Item 10b(2)(a))(Records Officer).</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent>
<p> Commandant (CG-12), United States Coast Guard, Mail Stop 7907, Washington, D.C. 20593-0001.</p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p> Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Commandant (CG-611), United States Coast Guard, Mail Stop 7710, Washington, D.C. 20593.  If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive, S.W., Building 410, STOP-0655, Washington, D.C. 20528.</p>
<p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR part 5.  You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth.  You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization.  While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486.  In addition, you should:</p>
<p>Explain why you believe the Department would have information on you;</p>
<p>Identify which component(s) of the Department you believe may have the information about you;</p>
<p>Specify when you believe the records would have been created; and </p>
<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records; and</p>
<p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
<p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
</xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p> USCG obtains records from individuals, USCG payroll offices, legal staff, investigators, Personnel Directorate, Comptroller General, GAO, and congressional correspondence.</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent>
<p> None.

</p></xhtmlContent></subsection></section>
<section id="uscg17" toc="yes">
<systemNumber>/USCG-017</systemNumber>
<subsection type="systemName">DHS/USCG-017 Federal Medical Care Recovery Act.
</subsection>
<subsection type="securityClassification"><xhtmlContent>
<p> Unclassified.</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent>
<p> Records are maintained at the United States Coast Guard Headquarters in Washington, D.C. and field offices and at USCG health care facilities where the USCG military personnel or eligible dependent receives treatment. </p>
</xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent>
<p> Categories of individuals covered by this system include active duty, reserve, and retired active duty, retired reserve, and their eligible dependents. Also included are insurance company employees, related legal staff, the alleged tortfeasor.  Finally, individuals such as Search and Rescue victims, employees, volunteers, or others who are provided emergency care by the USCG.</p>

</xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p>Categories of records in this system include:</p>
<p>?Military personnel's name;</p>
<p>?Eligible dependent's name;</p>
<p>?Social Security number;</p>
<p>?Gender;</p>
<p>Date of birth;</p>
<p>Case number;</p>
<p>Insurance company's name and representative's name;</p>
<p>Legal firm's name and legal representative's name;</p>
<p>Addresses;</p>
<p>Telephone numbers;</p>
<p>Correspondence, memoranda, and related documents concerning potential and actual FMCRA claims;</p>
<p>Police reports;</p>
<p>Witness statements;</p>
<p>Court documentation;</p>
<p>Basic contact information for insurance companies, legal staff, and tortfeasor;</p>
<p>Copies of medical and dental treatment provided to the individual subject of the claim;</p>
<p>Copies of medical bills associated with civilian care provided at government expense; and</p>
<p>Automated data processing (ADP) records containing identifying data on individuals, unit of assignment and address, home address, the amount of the claim, the amount paid to the government on the claim, dates of correspondence sent, due dates of reply, claim number, date claim opened, and date claim closed.</p>
</xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p> Departmental Regulations, 5 U.S.C. 301; the Federal Records Act, 44 U.S.C. § 3101; 14 U.S.C. 632.; 10 U.S.C. 1095, Uniformed Services Medical and Dental Care; 42 U.S.C. 2651 et seq., Federal Medical Care Recovery Act. 3 CFR 25.131, 133.</p>
</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p> The purpose of this system is to collect and maintain FMCRA claims for the United States Coast Guard. </p>
</xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p> Note:  For records of identity, diagnosis, prognosis, or treatment of any client/patient, irrespective of whether or when he/she ceases to be a client/patient, maintained in connection with the performance of any alcohol or drug abuse prevention and treatment function conducted, requested, or directly or indirectly assisted by any department or agency of the United States, shall, except as provided therein, be confidential and be disclosed only for the purposes and under circumstances expressly authorized in 42 U.S.C. 290dd-2.  The results of a drug test of civilian employees may be disclosed only as expressly authorized under 5 U.S.C. 7301.  These statutes limit disclosures otherwise permitted by the Privacy Act of 1974 to the extent that disclosure is more limited.  Thus, the Routine Uses set forth below do not apply to this information.  However, access to the record by the individual to whom the record pertains is governed by the Privacy Act.</p>
<p>    A.  To medical personnel to the extent necessary to meet a bona fide medical emergency;</p>
<p>    B.  To qualified personnel for the purpose of conducting scientific research, management audits, financial audits, or program evaluation, provided that employees are individually identified;</p>
<p>    C.  To the employee's medical review official;</p>
<p>    D.  To the administrator of any Employee Assistance Program in which the employee is receiving counseling or treatment or is otherwise participating;</p>
<p>    E.  To any supervisory or management official within the employee's agency having authority to take adverse personnel action against such employee; or</p>
<p>    F.  Pursuant to the order of a court of competent jurisdiction when required by the United States Government to defend against any challenge against any adverse personnel action. See 42 U.S.C. 290dd, 290ee, and Public Law 100-71, Section 503(e).</p>
<p><i>Note:</i>  For all other records besides those noted above, this system of records contains individually identifiable health information.  The Health Insurance Portability and Accountability Act of 1996 applies to most of such health information.  Department of </p>
<p>Defense 6025.18-R may place additional procedural requirements on the uses and disclosures of such information beyond those found in the Privacy Act of 1974 or mentioned in this system of records notice. Therefore, routine uses outlined below may not apply to such health information.</p>
<p>  In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
<p>    A.  To the Department of Justice including Offices of the United States Attorneys or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body when it is necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
<p>    1.  DHS or any component thereof;</p>
<p>    2.  Any employee of DHS in his/her official capacity;</p>
<p>    3.  Any employee of DHS in his/her individual capacity when DOJ or </p>
<p>DHS has agreed to represent the employee; or</p>
<p>    4.  The United States or any agency thereof. </p>
<p>  B.  To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
<p> C.  To the National Archives and Records Administration (NARA) or General Services Administration (GSA) pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
<p>    D.  To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
<p>    E.  To appropriate agencies, entities, and persons when:</p>
<p>    1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;</p>
<p>    2.  DHS has determined that as a result of the suspected or confirmed compromise there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity); and</p>
<p>    3.  The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS's efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p>    F.  To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records.  Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
<p>    G.  To an appropriate federal, State, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
<p>    H.  To attorneys and insurance companies involved in settling and litigating claims pursuant to Health Information Portability and Accountability Act.</p>

<p>Disclosure to consumer reporting agencies:  </p>
<p> None.</p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>Storage:</p>
<p> USCG stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door.  The records may be stored on magnetic disc, tape, or digital media.</p>
</xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p> USCG may retrieve records by name, Social Security number, case number, or address of military personnel or eligible dependent. USCG can also retrieve records by attorney's or other parties' names.</p>

</xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p> USCG safeguards records in this system in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies.  USCG imposes strict controls to minimize the risk of compromising the information.  Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.     </p>
</xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p> USCG retains records at USCG Headquarters for 2 years; transfers the records to a Federal Records Center for an additional 4 years, for a total of 6 years, and destroys the records thereafter. (AUTH: GRS 1, Item 19.)</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent>
<p> Commandant (CG-1), United States Coast Guard, Mail Stop 7907, Washington, D.C. 20593-0001.</p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p> Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Commandant (CG-611), United States Coast Guard, Mail Stop 7710, Washington, D.C. 20593.  If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive, S.W., Building 410, STOP-0655, Washington, D.C. 20528.</p>
<p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR Part 5.  You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth.  You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. § 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization.  While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486.  In addition, you should:</p>
<p>Explain why you believe the Department would have information on you;</p>
<p>Identify which component(s) of the Department you believe may have the information about you;</p>
<p>Specify when you believe the records would have been created; and </p>
<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records; and</p>
<p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
<p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>

</xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p>  See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p>  See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p> USCG obtains records from the individual, or if a minor, the parent or guardian, and witnesses; Medical facilities (USCG, Department of Defense, Uniformed </p>
<p>Services Treatment Facility, or Civilian Facility) where beneficiaries are treated; injury investigations, attorneys, and insurance companies involved in the claim.</p>
</xhtmlContent></subsection>

<subsection type="exemptionsClaimed"><xhtmlContent><p>None.

</p></xhtmlContent></subsection></section>
<section id="uscg18" toc="yes">
<systemNumber>/USCG-018</systemNumber>
<subsection type="systemName">Exchange System (CGES) and Morale, Well-being and Recreation (MWR) Program.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the United States Coast Guard Headquarters in Washington, DC and field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system Include eligible patrons of CGES and MWR including active duty
members and their dependents, members of the reserves and their dependents, military cadets of Services academies and
their families, commissioned officers of the Public Health Service, and their dependents, commissioned officers of the
National Oceanic and Atmospheric Administration on active duty, armed forces retirees from active duty and their
dependents, armed forces retires from the reserves with/without pay and their dependents, honorably discharged veterans
with 100 percent service-connected disability and their dependents, Medal of Honor recipients and their dependents,
former spouses who have not remarried, but were married to a military member for at least 20 years while the military
member was on active duty of the armed forces and their dependents, orphans of a military member when not adopted by new
parents under 21 years old or 23 years old if they are in full-time study, DHS and DoD civilian employees and their
dependents, other U.S. Federal employees, medical personnel under contract to the Coast Guard or DoD, when residing on an
installation, military personnel of foreign nations and their dependents when on orders from the U.S. Armed Forces, paid
members of the American Red Cross, Young Men’s Christian Association, United Services Organization and other private
organizations when assigned to and serving with the U.S. Armed Forces, DHS/DoD contract personnel, Reserve Officers
Training Corps cadets, former prisoners of war and spouses of current POWs or service members missing in action and their
family members, nonappropriated and appropriated funded foreign nationals, and other civilian members as authorized.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Individual’s name;
</p><p>• Payroll and personnel records;
</p><p>• Accounting records for MWR loans;
</p><p>• Listing of bad checks;
</p><p>• Job applications;
</p><p>• Correspondence regarding use of CGES and MWR programs and facilities;
</p><p>• Membership applications as applicable for the use of any facilities;
</p><p>• Investigatory reports involving damage to facilities or abuse of privileges to utilize facilities; and
</p><p>• Financial accounting documentation supporting sales, accounts payable, accounts receivable as examples for
the CGES/MWR program.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; 5 U.S.C. 2105; 10 U.S.C. 1146, 1587; 14 U.S.C. 632; the Federal Records Act, 44 U.S.C. 3101.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system to administer programs that provide for the mission readiness and retention of Coast
Guard personnel and other authorized users; to document the approval and conduct of specifics contests, shows,
entertainment programs, sports activities/competitions, and other MWR-type activities and events sponsored or sanctioned
by the Coast Guard. Information is used for registration; reservations; track participation; pass management; report
attendance; record sales transactions; maintain billing for individuals; collect payments; collect and report time and
attendance of employees; process credit cards, personal checks, and debt cards; create and manage budgets; order and
receive supplies and services; provide child care services reports; track inventory, and issue catered event contracts.
Information will be used to market and promote similar MWR-type activities conducted by Services’ MWR programs, to
provide a means of paying, recording, accounting, reporting, and controlling expenditures and merchandise inventories
associated with retail operations, rentals, and activities such as bingo games.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice or other Federal agency conducting litigation or in proceedings before any court,
adjudicative or administrative body, when:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved alphabetically by name.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Letters of authorization for Coast Guard MWR/CGES activities are destroyed 3 years after disestablishment of the
activity. Records and supporting documents for administration of Coast Guard MWR/CGES activities including bank
statements, check registers, cash books, cancelled checks, property and stock records, expenditure vouchers, purchase
orders, vendors’ invoices, payroll and personnel records, daily activity records, guest registration cards, food and
beverage cost control sheets, petty cash vouchers, reports and related papers are destroyed 6 years and 3 months after
the period covered by the account. Credit cards receipts are destroyed in accordance with retention requirements issued
by the card processing agency and ranges from 6 months to 2 years. GRS 2, item 1-31.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Commandant, CG-1, Assistant Commandant for Human Resources, United States Coast Guard Headquarters, 2100
2nd Street, SW., Washington, DC 20593-0001.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to Commandant, CG-1, Assistant Commandant for Human Resources,
United States Coast Guard Headquarters, 2100 2nd Street, SW., Washington, DC 20593-0001.
</p><p>When seeking records about yourself from this system of records or any other USCG system of records your request must
conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you
must provide your full name, current address and date and place of birth. You must sign your request, and your signature
must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of
perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from
the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In addition you should
provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the USCG will not be able to conduct an effective search, and your request may be
denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Individual record subject, previous employees, employment agencies, civilian and military investigative reports,
and general correspondence.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="uscg19" toc="yes">
<systemNumber>/USCG-019</systemNumber>
<subsection type="systemName">Non-Federal Invoice Processing System.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the United States Coast Guard Maintenance and Logistics Command Atlantic in Norfolk,
VA.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include active duty, reserve, and retired members of the
uniformed services and their eligible dependents, as well as non-Federal health care providers that have rendered
services to eligible beneficiaries.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Individual’s name;
</p><p>• Social security number;
</p><p>• Social security number of dependent’s sponsor;
</p><p>• Tax identification number of dental provider
</p><p>• Correspondence, memoranda, and related documents concerning potential and actual health care invoices for
processing by NIPS;
</p><p>• Dental treatment and related medical records provided to the individual that are the subject of an invoice
for non-Federal health care provided to an eligible beneficiary; and
</p><p>• Automated data processing (ADP) records containing identifying data on individuals including: Units of
assignment and address, home address, and information necessary to process and monitor bills for payment.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; 10 U.S.C. 1091; 14 U.S.C. 93.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of the USCG Non-Federal Invoice Processing System is to maintain an electronic record of dental
invoices for Coast Guard active duty member, reserve, retired, and dependent, so that USCG can pay such invoices.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>Note:</p><p>This system of records contains individually identifiable health information. The Health Insurance
Portability and Accountability Act of 1996, applies to most of such health information. Department of Defense 6025.18
-R may place additional procedural requirements on the uses and disclosures of such information beyond those found
in the Privacy Act of 1974 or mentioned in this system of records notice. Therefore, routine uses outlined below may not
apply to such health information.
</p><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of
the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice or other Federal agency conducting litigation or in proceedings before any court,
adjudicative or administrative body, when:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To healthcare professionals: medical information, including records of healthcare and medical invoices to support a
government claim.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.</p>
<p>To the U.S. Department of the Treasury when disclosure of the information is relevant to review payment and award eligibility through the Do Not Pay Working System for the purposes of identifying, preventing, or recouping improper payments to an applicant for, or recipient of, Federal funds, including funds disbursed by a state (meaning a state of the United States, the District of Columbia, a territory or possession of the United States, or a federally recognized Indian tribe) in a state-administered, federally funded program.</p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by name, Social Security number of member or dependents sponsor, or name or tax
identification number of non-Federal healthcare provider.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions. The system maintains a real-time auditing function of individuals who access
the system. Additional safeguards may vary by component and program.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records are retained for one year from date of service; transferred to a Federal Record Center and retained for
an additional 5 years 3 months, and destroyed thereafter. (AUTH: GRS 6, Item 1a)
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>United States Coast Guard Maintenance and Logistics Command Atlantic Health and Safety Division (MLC LANT (k)),
300 East Main Street, Suite 1000, Norfolk, VA 23510-9103.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to USCG, Commandant (CG-611), 2100 2nd St., SW., Attn: FOIA
Coordinator, Washington, DC 20593-0001.
</p><p>When seeking records about yourself from this system of records or any other USCG system of records your request must
conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you
must provide your full name, current address and date and place of birth. You must sign your request, and your signature
must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of
perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from
the Director, Disclosure and FOIA, <i>http://www.dhs.gov or 1-866-431-0486.</i> In addition you should
provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the USCG will not be able to conduct an effective search, and your request may be
denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>From the individual, individual’s spouse, parent or guardian. Medical facilities (United States Coast Guard,
Department of Defense, uniformed Services Treatment Facility, or non-Federal, provider) where beneficiaries are treated.
From Active Duty and Enlisted Personnel; DHS/USCG-005 Military Services Personnel. From Reserve personnel--the
Official Coast Guard Reserve Service Record System, DHS/USCG-028. Investigations resulting from illness or injury.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="uscg20" toc="yes">
<systemNumber>/USCG-020</systemNumber>
<subsection type="systemName">Substance Abuse Prevention and Treatment Program.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the USCG Headquarters in Washington, DC and field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include Coast Guard personnel, active duty and reserve receiving
substance abuse screening, those receiving substance abuse treatment (inpatient or outpatient), and those requiring
follow-up or aftercare substance abuse treatment services.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Individual’s name;
</p><p>• Employee ID Number (EMPLID);
</p><p>• Rate/Rank;
</p><p>• History of substance abuse;
</p><p>• Operation facility code;
</p><p>• Treatment center;
</p><p>• Diagnosis;
</p><p>• Dates of treatment;
</p><p>• Member responses to alcohol screening questions;
</p><p>• Treatment records;
</p><p>• Notes on aftercare; and
</p><p>• Final disposition and type.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; 5 U.S.C. 7901; 14 U.S.C. 93(a)(17); 14 U.S.C. 632; 42 U.S.C. 4541; COMDTINST M6200.1A, Coast Guard
Health Promotion Manual.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to administer the USCG Substance Abuse Prevention and Treatment program, including
to identify alcohol and drug abusers within the USCG; to treat, counsel, and rehabilitate individuals who participate in
the USCG Substance Abuse Program; as a management tool to identify trends, to understand through prevalence samples the
impact on the service, to judge the magnitude of drug and alcohol abuse in the service; and to measure the effectiveness
and efficacy of drug and alcohol prevention efforts in the USCG.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>Note:</p><p>For records of identity, diagnosis, prognosis, or treatment of any client/patient, irrespective of
whether or when he/she ceases to be a client/patient, maintained in connection with the performance of any alcohol or
drug abuse prevention and treatment function conducted, requested, or directly or indirectly assisted by any department
or agency of the United States, shall, except as provided therein, be confidential and be disclosed only for the purposes
and under circumstances expressly authorized in 42 U.S.C. 290dd-2. The routine uses set forth below do not apply to this
information. This statute takes precedence over the Privacy Act of 1974 to the extent that disclosure is more limited.
However, access to the record by the individual to whom the record pertains is governed by the Privacy Act.
</p><p><b>Note:</b>  For those records not described above, this system of records contains individually identifiable health
information. The Health Insurance Portability and Accountability Act of 1996, applies to most of such health information.
Department of Defense 6025.18-R may place additional procedural requirements on the uses and disclosures of such
information beyond those found in the Privacy Act of 1974 or mentioned in this system of records notice. Therefore,
routine uses outlined below may not apply to such health information.
</p><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of
the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (DOJ), including U.S. Attorney Offices, or other federal agency conducting litigation
or in proceedings before any court, adjudicative or administrative body, when it is necessary to the litigation and one
of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. any employee of DHS in his/her official capacity;
</p><p>3. any employee of DHS in his/her individual capacity where the DOJ or DHS has agreed to represent the employee; or
</p><p>4. the U.S. or any agency thereof, is a party to the litigation or has an interest in such litigation, and DHS
determines that the records are both relevant and necessary to the litigation and the use of such records is compatible
with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of and with the consent of the individual to whom the record pertains in accordance with 42 U.S.C.
290dd-2(g).
</p><p>C. To the National Archives and Records Administration (NARA) or other federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>E. To appropriate State and local authorities to report, under State law, incidents of suspected child abuse or
neglect to the extent described under 42 CFR 2.12 and in accordance with 42 U.S.C. 290dd-2(e).
</p><p>F. To any person or entity to the extent necessary to prevent an imminent and potential crime that directly threatens
loss of life or serious bodily injury.
</p><p>G. To report to appropriate authorities when an individual is potentially at risk to harm himself/herself or others.
</p><p>H. To health care components of the Department of Veterans Affairs furnishing health care to veterans.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by individual name, EMPLID, or unit operation facility code.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individual who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records in this system are stored electronically in secure facilities behind a locked door. The records are
stored on an electronic server. Military Substance abuse records are not scheduled. Records will be retained
indefinitely.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Commandant (CG-11), United States Coast Guard Headquarters, 2100 2nd Street, SW., Stop 7902, Washington, DC
20593.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to Commandant (CG-11), United States Coast Guard Headquarters,
2100 2nd Street, SW., Stop 7902, Washington, DC 20593.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records, your
request must conform to the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity,
meaning that you must provide your full name, current address, and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created;
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records; and
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the USCG may not be able to conduct an effective search, and your request may be
denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are obtained from personnel who submit to drug and alcohol testing, DHS and its components and offices,
and testing and treatment facilities.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="uscg21" toc="yes">
<systemNumber>/USCG-021</systemNumber>
<subsection type="systemName"> DHS/USCG-021 Appointment of Trustee or Guardian for Mentally Incompetent Personnel.
</subsection>
<subsection type="securityClassification"><xhtmlContent>
<p> Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent>
<p> USCG maintains records at the United States Coast Guard Headquarters in Washington, D.C. and field offices. Composite Health Care System is the information technology (IT) system in which records associated with this function are maintained.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent>
<p> Categories of individuals covered by this system include Coast Guard military personnel (regular, reserve, active duty, and retired) and their dependents or survivors who are mentally incompetent and the guardian or trustee.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p>• Individual's name;</p>
<p>• Guardian trustee's name and contact information;</p>
<p>• Information relating to the mental incompetence of certain Coast Guard personnel, their dependents, or survivors; and</p>
<p>• Records used to assist USCG officials in appointing guardian trustees to mentally incompetent USCG personnel.</p>
</xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p> Departmental Regulations, 5 U.S.C.  301; 10 U.S.C.  1448, 1449; 14 U.S.C.  632; 37 U.S.C.  601-604; 33 CFR 49.05; 49 CFR  1.45, 1.46.</p>
</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p> The purpose of this system is to maintain information on mentally incompetent USCG military personnel, their dependents, and survivors to determine eligibility for DHS/USCG benefits such as military retired pay or the Survivor Benefit Plan for survivors, and the closely-related Veterans Affairs benefits.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p> Note: This system of records contains individually identifiable health information.  The Health Insurance Portability and Accountability Act of 1996, applies to most of such health information.  Department of Defense 6025.18-R may place additional procedural requirements on the uses and disclosures of such information beyond those found in the Privacy Act of 1974 or mentioned in this system of records notice.  Therefore, routine uses outlined below may not apply to such health information.</p>
<p> In addition to those disclosures generally permitted under 5 U.S.C.  552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.  552a(b)(3) as follows: </p>
<p> A.  To the Department of Justice (DOJ), including Offices of the U.S. Attorneys,  or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
<p>  1. DHS or any component thereof;</p>
<p>  2. Any employee or former employee of DHS in his/her official capacity;</p>
<p>  3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
<p>  4. The U.S. or any agency thereof.</p>
<p> B.  To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
<p> C.  To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C.  2904 and 2906.</p>
<p> D.  To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
<p> E.  To appropriate agencies, entities, and persons when:</p>
<p> 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; </p>
<p> 2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
<p> 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p> F.  To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records.  Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
<p>G.   To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
<p>H.  To prospective or approved guardian trustees or appointees, including but not limited to relatives, lawyers, and physicians or other designated representatives.</p>
<p>I.  To the Department of Veteran's Affairs upon request for the determination of eligibility for benefits administered by that agency.</p>
<p>J.  To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
<p>Disclosure to consumer reporting agencies:  </p>
<p> None. </p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>Storage:</p>
<p> DHS/USCG stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door.  The records may be stored on magnetic disc, tape, and digital media.</p>
</xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p> DHS/ USCG retrieves records alphabetically by name. </p>
</xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p> DHS/USCG safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies.  USCG has imposed strict controls to minimize the risk of compromising the information that is being stored.  Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.     </p>
</xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p> Records are retained for five years after action is complete, then destroyed. (AUTH: NC1-26-76-2, Item 577)</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent>
<p> Commandant (CG-12), United States Coast Guard, Mail Stop 7907, Washington, D.C. 20593-0001.</p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p> Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and USCG’s FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts."  If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive, S.W., Building 410, STOP-0655, Washington, D.C. 20528.</p>
<p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR Part 5.  You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth.  You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization.  While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486.  In addition, you should:</p>
<p>• Explain why you believe the Department would have information on you;</p>
<p>• Identify which component(s) of the Department you believe may have the information about you;</p>
<p>• Specify when you believe the records would have been created; and </p>
<p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records; </p>
<p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
<p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
</xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p> Records are obtained from U.S. Coast Guard officials, legal representatives of individuals, and/or individuals concerned, medical personnel, and complainants.</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="uscg24" toc="yes">
<systemNumber>/USCG-024</systemNumber>
<subsection type="systemName">United States Coast Guard Auxiliary Database (AUXDATA).
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the USCG Headquarters in Washington, DC, the USCG Operations Systems Center in
Martinsburg, WV, and field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>As of January 2011, the Auxiliary had approximately 30,400 members in active status and approximately 7,000
members in retired status (i.e., members who have 15 years of recorded Auxiliary membership but no longer desire to
engage in Auxiliary activities). Categories of individuals covered by this system include all current and former USCG
Auxiliarists, the volunteer workforce element of the USCG. This includes applicants who have submitted requisite
information to the USCG as part of the enrollment process. The enrollment process entails submission of this information,
verification of proper age and U.S. citizenship, and completion of a background check conducted through the Coast Guard
Security Center (SECCEN) and the Office of Personnel Management (OPM). Auxiliary enrollment ends upon disenrollment,
retirement, or death. An Auxiliarist’s AUXDATA records are archived upon the end of their enrollment.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Personal information (name, employee identification number, address, birth date, phone number);
</p><p>• Auxiliary qualifications information (formal designations in program disciplines that result from
successful completion of training regimens, for example: class instructor, vessel examiner, boat coxswain, and
certifications and licenses);
</p><p>• Auxiliary activities information (patrols conducted, classes taught); and
</p><p>• Information on facilities (boats, radio stations or aircraft-owned by Auxiliarists as well as facility
identification numbers (e.g. boat license number).
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; The Federal Records Act, 44 U.S.C. 3101; 14 U.S.C. 632, 830, and 831; COMDTINST M16790.1 (series).
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>This system is the primary information management tool for the USCG Auxiliary program. As the repository for
personal and activity data for Auxiliarists and the units they comprise, AUXDATA is routinely used at local, regional,
and national USCG levels to measure and monitor the levels of support that the Auxiliary provides to USCG missions and to
recognize Auxiliarists for their service. It also provides an inventory of Auxiliary surface, air, and radio facilities
that are offered to and accepted for use by the USCG.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body when it is necessary to the litigation
and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof is a party to the litigation or has an interest in such litigation, and DHS
determines that the records are both relevant and necessary to the litigation and the use of such records is compatible
with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on tape at the USCG Operations Systems Center in Martinsburg, WV.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Information may be retrieved by an individual’s name and employee identification number (EMPLID).
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Information collected by AUXDATA is stored for a minimum of five years after the record is created, then retained
and destroyed in accordance with Coast Guard Commandant Instruction M5212.12 (series), Information and Life Cycle
Management Manual, approved by the National Archives and Records Administration (NARA).
</p><p>• Personal information (name, employee identification number, address, birth date, phone number) is
destroyed/deleted 30 years after disenrollment or death of a member. (AUTH: N1-26-05-10)
</p><p>• Item 2a Information on facilities (boats, radio stations or aircraft-owned by Auxiliarists as well as
facility identification numbers (e.g. boat license number) destroy/delete data 5 years after facility becomes inactive or
is withdrawn from service. (AUTH: N1-26-05-10) Item 2c(1)
</p><p>• Item 2b Auxiliary qualifications information (formal designations in program disciplines that result from
successful completion of training regimens, for example: Class instructor, vessel examiner, boat coxswain, and
certifications and licenses); Training Management Tool Destroy/Delete data 30 years after disenrollment or death of a
member. (AUTH: N1-26-05-10)
</p><p>• Item 2d Auxiliary activities information (patrols conducted, classes taught); Destroy/Delete data when no
longer needed for administrative use or 5 years after final action is completed. (AUTH: N1-26-05-10)
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>United States Coast Guard, Office of Command, Control, Communications, Computers, and Sensors Capabilities (CG
-761), United States Coast Guard, 2100 2nd Street, SW., Washington, DC 20593-0001. United States Coast Guard,
Office of Auxiliary and Boating Safety (CG-542), United States Coast Guard, 2100 2nd Street, SW., Washington, DC
20593-0001.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to United States Coast Guard, Office of Command, Control,
Communications, Computers, and Sensors Capabilities (CG-761), United States Coast Guard, 2100 2nd Street, SW.,
Washington, DC 20593-0001. United States Coast Guard, Office of Auxiliary and Boating Safety (CG-542), United
States Coast Guard, 2100 2nd Street, SW., Washington, DC 20593-0001.
</p><p>When seeking records about yourself from this system of records or any other USCG system of records your request must
conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity, meaning that you
must provide your full name, current address and date and place of birth. You must sign your request, and your signature
must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of
perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from
the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In addition you should
provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the USCG may not be able to conduct an effective search, and your request may be
denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are obtained from forms completed by USCG Auxiliary members.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="uscg27" toc="yes">
<systemNumber>/USCG-027</systemNumber>
<subsection type="systemName">Recruiting Files.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained within the Recruiting Analysis and Tracking System (RATS) at the United States Coast Guard
Recruiting Command, Arlington, Virginia, United States Coast Guard Operations Systems Center, Kearneysville, West
Virginia, USCG Headquarters in Washington, DC, and field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include records and correspondence pertaining to prospective
applicants, applicants for regular and reserve enlisted and officer programs, and any other individuals who have
initiated correspondence pertaining to enlistment in the United States Coast Guard. This system also covers civilians and
military personnel who have taken the following tests: Armed Services Vocational Aptitude Battery; United States Navy
Officer Qualification Test; OQT; United States Navy and United States Marine Corps Aviation Selection Test, AST; United
States Navy Basic Test Battery (BTB), BTB (retests); the Cooperative Tests for Advanced Electronic Training (AET TESTS);
the 16 Personality Fact Test used for screening of enlisted personnel for recruiting duty; and Professional Examination
for Merchant Mariners.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Individual’s name;
</p><p>• Individual’s home address;
</p><p>• Date of birth;
</p><p>• Social security number;
</p><p>• Program of interest;
</p><p>• Citizenship;
</p><p>• Marital status;
</p><p>• Race;
</p><p>• Ethnicity;
</p><p>• Gender;
</p><p>• Personal history;
</p><p>• E-mail and phone contact information;
</p><p>• Education;
</p><p>• Test scores, college majors, grades and transcripts;
</p><p>• Professional qualifications;
</p><p>• Adverse or disqualifying information, such as criminal record, medical data, and credit history;
</p><p>• Mental aptitude;
</p><p>• Medical documentation;
</p><p>• Medical waivers;
</p><p>• Physical qualifications;
</p><p>• Character and interview appraisals;
</p><p>• National Agency Checks and certifications;
</p><p>• Service performance;
</p><p>• Advertising responses;
</p><p>• Applicant initiated inquiries;
</p><p>• Congressional or special interests;
</p><p>• Marketing data collected through the USCG recruiting Web site and telephone queries made by prospects; and
</p><p>• Credit report results (per Homeland Security Presidential Directive-12).
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; 10 U.S.C. 503; 14 U.S.C. 350-373, 632; COMDTINST M1100.2E, Coast Guard Recruiting Manual.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to document recruiting efforts and maintain recruiting files for the United States
Coast Guard and United States Coast Guard Reserves. This system also provides test results if an applicant (military or
civilian) applies for an officer program, or is already in the military and is recruited to a training program.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (DOJ), including U.S. Attorney Offices, or other Federal agency conducting litigation
or in proceedings before any court, adjudicative or administrative body, when it is necessary to the litigation and one
of the following is a party to the litigation and one of the following is a party to the litigation or has an interest in
such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The U.S. or any agency thereof, is a party to the litigation or has an interest in such litigation, and DHS
determines that the records are both relevant and necessary to the litigation and the use of such records is compatible
with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration (NARA) or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, state, Tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To officials and employees of the Veterans Administration and Selective Service System in the performance of their
official duties related to enlistment and reenlistment eligibility and related benefits.
</p><p>I. To officials and employees of the Department of Defense in the performance of their official duties related to the
qualification of applicants for enlistment or commissioning, and for the analysis of and recordation of military force
levels.
</p><p>J. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved alphabetically by name and social security number.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions. The system maintains a real-time auditing function of individuals who access
the system.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Completed Coast Guard Selection Test (CGST), including Short Basic Test Battery (SBTB) answer sheets sent to
Coast Guard Institute by Recruiting Offices are destroyed when two years old (SSIC 1500 Item 17a, (NC1-26-80
-4, item 338j(1)) and 17b (NC1-26-80-4, item 338j(2))).
</p><p>Officer candidate files for selected applicants are filed in the permanent Official Military Personnel Folder (SSIC
1100, item 1a, NC1-26-76-2, item 583a) Files for non-selected applicants are destroyed 6 months after
deadline dates for class which application is made (SSIC1100, item 1b, NC1-26-76-2, item 583b) Direct
Commission Programs Applicant files; selected applicants records are filed in the permanent Official Military Personnel
Folder (SSIC 1100, item 2a, NC1-26-79-2, item 584a); Non-selected Applicants files are destroyed 1 year
from date of board by which considered. (SSIC 1100, item 2b, NC1-26-79-2, item 584b) OCS and direct
commission applicant files containing copies of applications for appointment in the Coast Guard Reserve are destroyed
when 1 year old. (SSIC 1100, Item 3b, NC1-26-80-4, item 337b)
</p><p>Recruiting office jackets of successful and unsuccessful applicants for enlistment are destroyed one year after
enlistment or rejection. (SSIC 1100, Item 3a, NC1-26-80-4, item 337a) General information files with
the recruiting and enlistment are destroyed after two years (SSIC 1100 item 4, NC1-26-76-2, Item 587).
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Commander, United States Coast Guard Personnel Command, 2100 2nd Street, SW., Stop 7801, Washington, DC 20539.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to the Commandant (CG-611), U.S. Coast Guard, <i>Attn:</i>
FOIA Coordinator, 2100 2nd Street, SW., Stop 7101, Washington, DC 20593.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the USCG will not be able to conduct an effective search, and your request may be
denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are obtained from USCG recruiting personnel and administrative staff. Medical personnel or private
physicians providing consultations or patient history. Character and employee references. Educational institutions, staff
and faculty members. Selective Service System. Local, state, and Federal law enforcement agencies. Prior or current
military service records. Members of Congress. Other officials and employees of the Coast Guard, Department of Defense
and components thereof, in the performance of their duties and as specified by current instructions and regulations
promulgated by competent authority. Recruiting officials and individuals being recruited or who have been recruited by
the United States Coast Guard, United States Marine Corps, United States Navy, and the United States Navy Bureau of
Medicine.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="uscg28" toc="yes">
<systemNumber>/USCG-028</systemNumber>
<subsection type="systemName">United States Coast Guard Family Advocacy Case Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the USCG Headquarters in Washington, DC, and servicing Work-Life Offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include active duty, reserve, and retired active duty and
retired reserve military personnel and their dependents entitled to care at a USCG or other military or dental facility
whose abuse or neglect is brought to the attention of appropriate authorities. Also included are persons suspected of
abusing or neglecting such beneficiaries and persons presenting a need for preventive services.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>• Individual’s name;
</p><p>• Name of the suspected or confirmed abuser/neglecter or person in need of preventive services;
</p><p>• Employee Identification Number and/or Social Security Number;
</p><p>• Medical records of suspected and confirmed cases of family member abuse or neglect;
</p><p>• Interviews and intake reports;
</p><p>• Investigative reports;
</p><p>• Correspondence;
</p><p>• Family Advocacy Incident Determination Committee reports;
</p><p>• Clinical assessment reports;
</p><p>• State and/or local child protective services reports;
</p><p>• Follow-up and evaluation reports; and
</p><p>• Other supportive data assembled relevant to individual Family Advocacy Program files.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; 14 U.S.C. 632; the Federal Records Act; 42 U.S.C. 5101, 5102; 44 U.S.C. 3101; COMDTINST 1750.7C.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to administer the USCG Family Advocacy program, including to maintain records that
identify, monitor, track and provide treatment to alleged offenders, eligible victims and their families of substantiated
spouse/child abuse and neglect; and to manage prevention programs to reduce the incidence of abuse throughout the USCG
military communities.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>Note:</p><p>Disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act limit access to those
individuals within the Coast Guard who have a "need to know" in order to perform their official duties.
Confidential information contained in Family Advocacy Case Records should generally be limited to the servicing Family
Advocacy Specialist, with access permissible to the Family Advocacy Program Manager and direct supervisor of the Family
Advocacy Specialist, on a "need to know" basis. When direct and complete access to the record is given to any
other personnel within the agency who does not have a "need to know" in order to perform their official
duties, written permission of the service member and any identified adult dependent is required.
</p><p><b>Note:</b> This system of records contains individually identifiable health information. The Health Insurance Portability
and Accountability Act of 1996, applies to most of such health information. Department of Defense 6025.18-R may
place additional procedural requirements on the uses and disclosures of such information beyond those found in the
Privacy Act of 1974 or mentioned in this system of records notice. Therefore, routine uses outlined below may not apply
to such health information.
</p><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of
the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body when it is necessary to the litigation
and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To Federal, State, or local government or private agencies, or approved researchers for coordination of family
advocacy programs, medical care, mental health treatment, and research into the causes and prevention of family domestic
violence and trends within the USCG.
</p><p>I. To Federal, State, or local governmental agencies when it is deemed appropriate to use civilian resources in
counseling and treating individuals or families involved in child abuse or neglect or spouse abuse; or when appropriate
or necessary to refer a case to civilian authorities for civil or criminal law enforcement; or when a state, county, or
municipal child protective service agency inquires about a prior record of substantiated abuse for the purpose of
investigating a suspected case of abuse.
</p><p>J. To victims and witnesses of a crime for purposes of providing information consistent with the requirements of the
Victim and Witness Assistance Program, regarding the investigation and disposition of an offense.
</p><p>K. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored electronically on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Individual’s name, social security number, types of incidents, employee identification number.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system and/or paper files containing the
records in this system is limited to those individuals who have a need to know the information for the performance of
their official duties and who have appropriate clearances or permissions. Those individuals routinely granted full access
are Family Advocacy Program staff. When appropriate, those individuals may share information with persons outside the
Family Advocacy Program, which is generally limited to a summary of the incident; names of individuals involved, when
appropriate; and overview of assessment, disposition and treatment recommendations.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records are maintained at the servicing Work-Life Office until the case is closed or the service member is
separated from the Coast Guard. Upon closure of the case or separation of the sponsor, the paper record will be
transferred to Commandant, CG-1112, or retained at the servicing Work-Life Office. The record is retained for five
years from case closure or last date of action. At the end of five years the record is destroyed, except for information
concerning certain minor USCG dependents who are victims of child abuse, neglect, or sexual abuse. These records are
retained until the dependent turns 18 years-old. (AUTH: N1-26-05-8, Items, 1, 2, 3)
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Commandant, CG-111, Office of Work-Life-WP, Director, Personnel Management Directorate, United States Coast
Guard Headquarters, 2100 2nd Street, SW., Washington, DC 20593-0001.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to Commandant, CG-111, Office of Work-Life G-WP,
Director, Personnel Management Directorate, United States Coast Guard Headquarters, 2100 2nd Street, SW., Washington, DC
20593-0001.
</p><p>When seeking records about yourself from this system of records or any other USCG system of records your request must
conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you
must provide your full name, current address and date and place of birth. You must sign your request, and your signature
must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of
perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from
the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In addition you should
provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the USCG may not be able to conduct an effective search, and your request may be
denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Reports from medical personnel, educational institutions, law enforcement agencies, public and private health and
welfare agencies, USCG personnel and private individuals.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from subsections (c)(3), (d), (e)(1), (e)(4)(G), (e)
(4)(H), (e)(4)(I), and (f) of the Privacy Act pursuant to 5 U.S.C. 552a(k)(2).
</p></xhtmlContent></subsection></section>
<section id="uscg29" toc="yes">
<systemNumber>/USCG-029</systemNumber>
<subsection type="systemName">Notice of Arrival and Departure Information (NOAD).
</subsection>
<subsection type="securityClassification"><xhtmlContent>
<p> Unclassified. The data may be retained on classified networks but this does not change the nature and character of the data until it is combined with classified information.</p>
</xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent>
<p> The United States Coast Guard (USCG) maintains records in the operational system at the USCG Operations Systems Center, Kearneysville, West Virginia (WV), and in disaster recovery backup systems in other USCG field locations. USCG maintains records associated with this function in the Ship Arrival Notification System (SANS) operational information technology (IT) system.</p>
<p> DHS replicates records from the operational IT system and maintains them in other IT systems connected on the DHS unclassified and classified networks.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent>
<p>Categories of individuals covered by this notice include:</p>
<p>Crew members who arrive or depart the United States by sea; and </p>
<p>Other individuals or organizations associated with a vessel and whose information is submitted as part of a notice of arrival or notice of departure, such as vessel owners, operators, charterers, reporting parties, 24-hour contacts, company security officers, and passengers who arrive and depart the United States by sea.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p>Records on vessels include: name of vessel; name of registered owner; country of registry; call sign; International Maritime Organization (IMO) number or, if a vessel does not have an IMO number the official number; name of the operator; name of charterer; and name of classification society.</p>
<p>Records on arrival information pertaining to the voyage include: names of last five foreign ports or places the vessel visited; dates of arrival and departure for last five foreign ports or places it visited; for each port or place in the United States the vessel will visit, the name of the receiving facility; for the port or place in the United States the estimated date and time of arrival; for the port or place in the United States the estimated date and time of departure; the location (port or place and country) or position (latitude and longitude or waterway and mile marker) of the vessel at the time of reporting; and the name and telephone number of a 24-hour point of contact (POC). This individual may be a crew or non-crew member.</p>
<p>Records on departure information pertaining to the voyage include: the name of the departing port or waterway of the United States; the estimated date and time of departure; next port or place of call (including foreign); the estimated date and time of arrival at the next port or place of call; and the name and telephone number of a 24-hour POC.</p>
<p>Records about crewmembers includes: full name; date of birth; nationality; identification type (e.g., passport, U.S. Alien Registration Card, U.S. Merchant Mariner Document, foreign mariner document, government-issued picture identification (ID) (Canada) or (United States)); identification issue and expiration dates; position or duties on the vessel; location where the crewmember embarked (list port or place and country); and location where the crewmember will disembark.</p>
<p>Records about "other individuals associated with a vessel and whose information is submitted as part of a notice of arrival or notice of departure" (e.g., passenger information) includes: full name; date of birth; nationality; identification type (e.g., passport, U.S. Alien Registration Card, government-issued picture ID); identification number, issuing country, issue date, expiration date; U.S. address information; and location where the individual embarked (list port or place and country).</p>
<p>Records related to cargo onboard the vessel include: a general description of cargo other than Certain Dangerous Cargo (CDC) onboard the vessel (e.g., grain, container, oil); name of each CDC carried, including United Nations (UN) number, if applicable; and amount of each CDC carried.</p>
<p>Records regarding the operational condition of equipment required by 33 Code of Federal Regulations (CFR) part 164 include: the date of issuance for the company"s document of compliance certificate; the date of issuance of the vessel"s safety management certificate; and the name of the flag administration, or recognized organization(s) representing the vessel flag administration that issued those certificates.</p>
</xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p> The Secretary of the Department of Homeland Security has delegated to the Coast Guard authority from the Ports and Waterways Safety Act (33 U.S.C. 1221 et seq.). See specifically 33 U.S.C. 1223(a)(5), 1225, and 1231; 46 U.S.C. 3717; 46 U.S.C. 12501; the Maritime Transportation Act of 2002, Pub. L. 107-295; the Homeland Security Act of 2002, Public Law 107-296; 33 CFR part 160; and 36 CFR chapter XII.</p>
</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p> The purpose of this system is to maintain NOAD information to improve navigation safety, enhance the Coast Guard"s ability to identify and track vessels, and heighten the Coast Guard"s overall situational and maritime domain awareness (MDA), which will enhance mariner"s navigation safety and the Coast Guard"s ability to address threats to maritime transportation security. </p>
<p> DHS maintains a replica of some or all of the NOAD data in operational IT systems residing on unclassified and classified DHS networks to allow for analysis and vetting consistent with the above stated purposes and this published notice.</p>
</xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p> In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows: </p>
<p> A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
<p>  1. DHS or any component thereof;</p>
<p>  2. Any employee or former employee of DHS in his/her official capacity;</p>
<p>  3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
<p>  4. The United States or any agency thereof.</p>
<p> B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
<p> C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
<p> D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
<p> E. To appropriate agencies, entities, and persons when:</p>
<p> 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; </p>
<p> 2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
<p> 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS"s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p> F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
<p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
<p> H. To federal and foreign government intelligence or counterterrorism agencies or components if USCG becomes aware of an indication of a threat or potential threat to national or international security, or if such use is to assist in anti-terrorism efforts and disclosure is appropriate to the proper performance of the official duties of the person making the disclosure.</p>
<p> I. To an organization or individual in either the public or private sector, foreign or domestic, if there is a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to the extent the information is relevant to the protection of life, property, or other vital interests of a data subject and disclosure is proper and consistent with the official duties of the person making the disclosure;</p>
<p> J. To appropriate federal, state, local, tribal, territorial, or foreign governmental agencies or multilateral governmental organizations for the purpose of protecting the vital interests of a data subject or other persons, USCG will provide appropriate notice of any identified health threat or risk to assist such agencies or organizations in preventing exposure to or transmission of a communicable or quarantined disease or for combating other significant public health threats;</p>
<p> K. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, settlement negotiations, response to a subpoena, or in connection with criminal law proceedings;</p>
<p> L. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation, provided disclosure is appropriate in the proper performance of the official duties of the officer making the disclosure;</p>
<p> M. To appropriate federal, state, local, tribal, territorial, or foreign governmental agencies or multilateral governmental organizations if USCG is aware of a need to utilize relevant data for purposes of testing new technology and systems designed to enhance border security or identify other violations of law, provided disclosure is appropriate in the proper performance of the official duties of the person making the disclosure;</p>
<p>N. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS"s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
<p>Disclosure to consumer reporting agencies:</p>
<p> None.</p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>Storage:</p>
<p> Records in this system are stored electronically in the operational IT system as well as on other IT systems residing on the unclassified and classified networks or on paper in secure facilities in a locked drawer behind a locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM. </p>
<p> USCG stores NOAD information electronically in the Ship Arrival Notice System (SANS) located at USCG Operations Systems Center in Kearneysville, WV. USCG uses an alternative storage facility for the SANS historical logs and system backups. Derivative NOAD system data may be stored on USCG Standard Workstation computers or USCG unit servers located at USCG Headquarters, headquarters units, area offices, sector offices, sector sub-unit offices, and other locations where USCG authorized personnel may be posted to facilitate DHS"s mission.</p>
</xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p> USCG retrieves records from the SANS by vessel. Information from the retrieved records may then be extracted by name, passport number, or other unique personal identifier. NOAD information maintained in the SANS operational IT system is not directly retrievable by name or other unique personal identifier.</p>
<p> NOAD data that is replicated on the unclassified and classified DHS networks to allow for analysis and vetting consistent with the above stated purposes and this published notice may be retrieved by all core and extended biographic fields (e.g., full name; date of birth; nationality).</p>
</xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p> USCG safeguards NOAD data in accordance with applicable laws, rules, and policies. All records are protected from unauthorized access through appropriate administrative, physical, and technical safeguards. These safeguards include role-based access provisions, restricting access to authorized personnel who have a need-to-know, using locks, and password-protection identification features. USCG file areas are locked after normal duty hours and the facilities are protected from the outside by security personnel. In addition, the system manager, in addition, has the capability to maintain system back-ups for the purpose of supporting continuity of operations and the discrete need to isolate and copy specific data access transactions for the purpose of conducting security incident investigations. All communication links with the USCG datacenter are encrypted. The databases are Certified and Accredited in accordance with the requirements of the Federal Information Security Management Act (FISMA). </p>
</xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p> In accordance with NARA Disposition Authority number N1-026-05-11, NOAD information on vessels and individuals maintained in the SANS is destroyed or deleted when no longer needed for reference, or after ten years, whichever is later. Outputs, which include ad-hoc reports generated for local and immediate use to provide a variety of interested parties with necessary information are deleted after five years if they do not constitute a permanent record according to NARA. For example, in accordance with this schedule, USCG shares outputs with the Captain of the Port and marine safety offices, sea marshals, U.S. Customs and Border Protection, U.S. Immigration and Customs Enforcement require such information to set up security zones, schedule boarding and inspections activities, take actions for non-compliance with regulations, and other activities in support of USCG"s mission to provide for safety and security of U.S. ports. Records replicated to IT systems residing on the unclassified and classified networks will also follow the same retention schedule.</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent>
<p> Commandant (CG-26), United States Coast Guard, 2703 Martin Luther King Jr. Ave. SE, Mail Stop 7301, Washington, D.C. 20593-0001.</p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p> Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and USCG"s Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts." If an individual believes more than one component maintains Privacy Act records concerning him or herself, the individual may submit the request to the Chief Privacy Officer and Chief FOIA Officer, Department of Homeland Security, Washington, D.C. 20528-0655.</p>
<p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief FOIA Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, you should:</p>
<p>Explain why you believe the Department would have information on you;</p>
<p>Identify which component(s) of the Department you believe may have the information about you;</p>
<p>Specify when you believe the records would have been created; and </p>
<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records; </p>
<p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
<p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
<p>In processing requests for access to information in this system, the USCG will review not only the records in the operational IT system but also the records replicated on IT systems residing on the unclassified and classified networks; and provide appropriate access to the information based on this notice.</p>
</xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p> USCG obtains NOAD records from vessel carriers and operators regarding passengers, crewmembers, and cargo that arrive in, depart from, or transit through the United States on a vessel carrier covered by notice of arrival and departure regulations.</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent>
<p>No exemption shall be asserted with respect to information maintained in the system that is collected from a person if that person, or his or her agent, seeks access or amendment of such information.</p>
<p> The Privacy Act, however, requires DHS to maintain an accounting of the disclosures made pursuant to all routines uses. Disclosing the fact that a law enforcement or intelligence agency has sought particular records may affect ongoing law enforcement activities. The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), exempted this system from the following provisions of the Privacy Act: Sections (c)(3), (e)(8), and (g) of the Privacy Act of 1974, as amended, as is necessary and appropriate to protect this information. Further, DHS has exempted section (c)(3) of the Privacy Act of 1974, as amended, pursuant to 5 U.S.C. 552a(k)(2) as is necessary and appropriate to protect this information.

</p></xhtmlContent></subsection></section>
<section id="uscg30" toc="yes">
<systemNumber>/USCG-030</systemNumber>
<subsection type="systemName">United States Merchant Seamen’s Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the National Maritime Center in Martinsburg, WV, the USCG Headquarters in Washington,
DC, the USCG Operations Systems Center in Kearneysville, WV, and in Regional Examination Centers. Archived records are
located at the regional Federal Records Centers.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include all current and former United States Merchant Seamen, as
well as applicants.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Full name (including maiden name, if applicable);
</p><p>• Employee identification number;
</p><p>• Mailing address;
</p><p>• Date and place of birth;
</p><p>• Phone number(s), include home, work, fax;
</p><p>• E-mail Address;
</p><p>• Next of Kin’s Name, mailing address, phone number and email address;
</p><p>• Country of citizenship;
</p><p>• Social Security number;
</p><p>• Color of eyes, hair, weight and height;
</p><p>• Type of license or certificate for which the individual is applying;
</p><p>• Shipping articles;
</p><p>• Log books;
</p><p>• Seamen’s license records;
</p><p>• Seamen’s biometrics including photographs and fingerprint records;
</p><p>• Disciplinary records;
</p><p>• Security records;
</p><p>• Current state of application, including granted or denied with place and date of issuance;
</p><p>• Information related to narcotics, drinking while under the influence, and conviction records; and
</p><p>• Character references, including full name, contact information.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; 14 U.S.C. 632; 46 U.S.C. 2103, 7302, 7305, 7314, 7316, 7319, 7502, 7701, 8701; 46 CFR 12.02-
25; 49 CFR 1.45, 1.46.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The principle purpose of this system is to administer the Commercial Vessel Safety Program to determine domestic
and international qualifications for the issuance of licenses, documents, and staff officer certifications. This includes
establishing eligibility of a merchant mariner’s document, duplicate documents, or additional endorsements issued by the
Coast Guard and establishing and maintaining continuous records of the persons documentation transactions.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body when it is necessary to the litigation
and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 3004 and 3006.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To private organizations when considered beneficial to the seaman.
</p><p>I. To other Federal Agencies, such as the Veteran’s Administration, the Social Security Administration, the Internal
Revenue Service, in connection with benefits and services administered by those agencies.
</p><p>J. To any source or potential source from which information is requested in the course of an investigation concerning
the retention of an employee or other personnel action (other than hiring), or the retention of a security clearance,
contract, grant, license, or other benefit, to the extent necessary to identify the individual, inform the source of the
nature and purpose of the investigation, and to identify the type of information requested.
</p><p>K. To designated officers and employees of Federal, State, local or international agencies in connection with the
hiring or continued employment of an individual, the conduct of a suitability or security investigation of an individual,
the grant, renewal, suspension, or revocation of a security clearance, or the certification of security clearances, to
the extent that DHS determines the information is relevant and necessary to the hiring agency’s decision.
</p><p>L. To the Maritime Administration for the purpose of merchant mariner call-ups related to national security.
</p><p>M. To the U.S. Navy for the purpose of verifying the credential status of Navy personnel.
</p><p>N. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>Disclosures pursuant to 5 U.S.C552a(b)(12) may be made from this system to "consumer reporting agencies,
" as defined in the Fair Credit Reporting Act (15 U.S. C. 1681a(f)) or Federal Claims Collection Act of 1982 (31
U.S.C 3701(a)(3)).
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Paper files are stored at a secure, controlled access site managed by either Coast Guard personnel or contract
personnel with oversight from Coast Guard personnel. Electronic records are stored on a secure database server at the
Coast Guard Operation Systems Center. Inactive records are stored by the National Archives and Records Administration at
that agency’s Federal Records Centers facilities.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Information is retrieved by individual’s name and identifying number (<i>e.g.</i> Social Security, MMLD assigned
system number or Continuous Discharge Book number) .
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Electronic records in this system are safeguarded in accordance with applicable rules and policies, including all
applicable DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions. Paper records related to issuance of Merchant Mariners’ Licenses and
Documents (MMLD) are located in Coast Guard Regional Examination Centers or the National Maritime Center in locked file
cabinets. Access to records is limited to personnel requiring access for their jobs.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Paper records related to issuance of Merchant Mariner Licenses and Documents are held on site for five years past
the last activity with the file. After that time they are then transferred to the Washington National Records Center in
Suitland, MD. As disposition is pending on this system contingent on NARA approval, records are maintained indefinitely.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>United States Coast Guard, National Maritime Center, NMC-4, 100 Forbes Drive, Martinsburg, WV 25404.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to United States Coast Guard, National Maritime Center, NMC-4,
100 Forbes Drive, Martinsburg, WV 25404.
</p><p>When seeking records about yourself from this system of records or any other USCG system of records your request must
conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity, meaning that you
must provide your full name, current address and date and place of birth. You must sign your request, and your signature
must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of
perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from
the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In addition you should
provide the following:
</p><p>• An explanation of why you believe the Department would have information on you;
</p><p>• Specify when you believe the records would have been created;
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the USCG may not be able to conduct an effective search, and your request may be
denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Personnel File-seamen, United States Coast Guard officials, other Federal Agencies, and employer. Shipping
Articles--Vessels’ operators, seamen, masters of vessels, State Department, and Coast Guard officials. Training
records--schools certified to provide training for U.S. mariners. Medical records--physicians, hospitals and
other medical providers authorized by mariners to provide this information on their behalf. Disciplinary Records-Coast
Guard Investigating Officers.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from subsections (c)(3), (d), (e)(1), (e)(4)(G), (H),
(I), and (f) of the Privacy Act pursuant to 5 U.S.C. 552a(k)(2).
</p></xhtmlContent></subsection></section>

    <section id="uscg31" toc="yes">
        <systemNumber>/USCG-031</systemNumber>
        <p> Department of Homeland Security (DHS)/USCG–31</p>
        <subsection type="systemName"> USCG Law Enforcement (ULE) System of Records.</subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p> Sensitive but Unclassified.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p> Records are maintained at the United States Coast Guard (USCG) Headquarters in Washington, D.C., USCG Operations Systems Center (OSC) in Kearneysville, WV, and other field locations. Records collected from the USCG Biometrics at Sea System (BASS) are maintained at the DHS Office of Biometric Identity Management in Washington, D.C. The Marine Information for Safety and Law Enforcement (MISLE) System is the information technology (IT) repository for marine safety, security, environmental protection, and law enforcement records. The Automated Biometric Identification System (IDENT) is the IT repository for USCG BASS records.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p> Individuals with established relationship(s) or associations to maritime vessels or marine transportation facilities that are the subject of enforcement or compliance activities regulated by the USCG. This may include:</p>
                <p>•Vessel owners or operator;</p>
                <p>•Charterers;</p>
                <p>•Masters;</p>
                <p>•Crew members;</p>
                <p>•Vessel or boat agents;</p>
                <p>•Mortgagees;</p>
                <p>•Lien claimants;</p>
                <p>•Vessel builders;</p>
                <p>•Transportation facility owners, managers, or employees;</p>
                <p>•Individuals who own, operate, or represent marine transportation companies; and</p>
                <p>•Other individuals come into contact with the USCG as part of an enforcement or compliance activity.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p> The following information may appear in case files, reports, investigations, and other documents (either physical or electronic) maintained by USCG relating to an enforcement or compliance activity:</p>
                <p>•Name of individual, vessel, or facility;</p>
                <p>•Home and work address;</p>
                <p>•Home, work, and mobile phone numbers;</p>
                <p>•Facility number;</p>
                <p>•Involved party identification number;</p>
                <p>•Social Security number (SSN);</p>
                <p>•Driver license number;</p>
                <p>•Alien Registration Number (A-Number);</p>
                <p>•Military identification number;</p>
                <p>•U.S. Coast Guard license number;</p>
                <p>•Foreign seaman’s booklet number;</p>
                <p>•Resident alien number;</p>
                <p>•Merchant mariners license or documentation number;</p>
                <p>•Taxpayer Identification Number (TIN);</p>
                <p>•Casualty case number;</p>
                <p>•Pollution incident case number;</p>
                <p>•Date of incident;</p>
                <p>•Civil penalty case number;</p>
                <p>•Biometric information, which may include:</p>
                <p>o Photographs and digital images,</p>
                <p>o Height,</p>
                <p>o Weight,</p>
                <p>o Eye color,</p>
                <p>o Hair color,</p>
                <p>o Fingerprints, and</p>
                <p>o Irises.Videos;</p>
                <p>•Vessel or boat registration data;</p>
                <p>•Port visits;</p>
                <p>•Vessel or boat inspection data;</p>
                <p>•Vessel or boat documentation data;</p>
                <p>•Port Safety boarding;</p>
                <p>•Casualties;</p>
                <p>•Pollution incidents, civil violations (as applicable), and associated information (data pertaining to people or organizations associated with the subject vessels);</p>
                <p>•Information on marine transportation facilities including:</p>
                <p>o Name,</p>
                <p>o Identification number,</p>
                <p>o Location,</p>
                <p>o Commodities handled,</p>
                <p>o Equipment certificates,</p>
                <p>o Approvals,</p>
                <p>o Inspection reports,</p>
                <p>o Pollution incidents, and</p>
                <p>o Casualties.</p>
                <p>o Violations of U.S. laws and data pertaining to people or organizations associated with those facilities;</p>
                <p>•For owners, operators, agents, and crew members;</p>
                <p>•Statements submitted by USCG personnel relating to boarding;</p>
                <p>•Investigations as a result of a pollution and/or casualty incident, as well as any violations of United States law, along with civil penalty actions taken as a result of such violations. Such reports could contain names of passengers on vessels, as well as witnesses to such violations; and</p>
                <p>•Narratives, reports, and documents by USCG personnel describing their activities on vessels and within facilities, including incident reports, violations of laws, and international treaties</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p> 14 U.S.C 89a, 93(a) and (c), 632; 16 U.S.C 1431; 33 U.S.C 1223; 33 U.S.C. 1228; 46 U.S.C. 3717; 46 U.S.C. 12119, 12501-502.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p> The purpose of this system is to collect and maintain USCG case records and other reported information relating to the safety, security, law enforcement, environmental, and compliance activities of vessels, facilities, organizations engaged in marine transportation, and related persons.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p> In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
                <p> A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other Federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>  1. DHS or any component thereof;</p>
                <p>  2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>  3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
                <p>  4. The U.S. or any agency thereof.</p>
                <p> B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p> C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
                <p> D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p> E. To appropriate agencies, entities, and persons when:</p>
                <p> 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;</p>
                <p> 2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
                <p> 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
                <p> F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p> G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p> H. To federal and state safety enforcement agencies, including, but not limited to, the Maritime Administration and National Transportation Safety Board, U.S. Department of Transportation, to access historical data that may assist in safety investigations and improve transportation safety.</p>
                <p> I. To federal, state, and local environmental agencies, including, but not limited to, the U.S. Environmental Protection Agency, to access historical data that may improve compliance with U.S. laws relating to environmental protection.</p>
                <p> J. To the U.S. Department of Defense and related entities, including, but not limited to, the Military Sealift Command and U.S. Navy, to access data on safety information regarding vessels chartered by those agencies.</p>
                <p> K. To the International Maritime Organization or intergovernmental organizations, nongovernmental organizations, or foreign governments in order to conduct joint investigations, operations, and inspections;</p>
                <p> L. To federal, state, or local agencies with which the U.S. Coast Guard has a Memorandum of Understanding, Memorandum of Agreement, or Inspection and Certification Agreement pertaining to Marine Safety, Maritime Security, Maritime Law Enforcement, and Marine Environmental Protection activities.</p>
                <p> M. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or is necessary to demonstrate the accountability of DHS's officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
                <p>Disclosure to consumer reporting agencies:</p>
                <p> None.</p>
                </xhtmlContent>
    </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>Storage:</p>
                <p> DHS/USCG stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p> Records may be retrieved by name of individual, vessel, or facility, facility number, involved party identification number, SSN, TIN, driver license number, (A-Number), military identification number, U.S. Coast Guard license number, cellular number, foreign seaman’s booklet number, resident alien number, merchant mariners license or documentation number, person or organization name, casualty case number, pollution incident case number, date of incident, civil penalty case number, USCG unit entering data, or incident location.</p>
                <p> Biometric records associated with case files or reports may be retrieved from IDENT by reference to the applicable Organization/Unit/Subunit designations for the Biometrics-at-Sea-System.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p> DHS/USCG safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. USCG has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p> Records are retained in accordance with National Archives and Records Administration (NARA) schedule N1-026-05-15 approved July 7, 2005. Most of the records in this system are retained indefinitely by NARA; however law enforcement boarding activities are retained for three years. A copy of this system has been transferred to the National Archives and Records Administration permanent records collection. Updates of system information are transferred to NARA every 5 years. All system hardware and data is stored at OSC, Kearneysville, WV. Backups are performed daily.  Copies of backups are stored at an off-site location.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p> Commandant (CG-633), United States Coast Guard, Mail Stop 7710, Washington, D.C. 20593; Commandant (BSX), United States Coast Guard, Mail Stop 7501, Washington, D.C. 20593; Director, United States Coast Guard, National Vessel Documentation Center, 792 T J Jackson Drive, Falling Waters, WV 25419; IDENT Program Management Office, U.S. Department of Homeland Security, Washington, D.C. 20528.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p> The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act because it is a law enforcement system. However, DHS/USCG will consider individual requests to determine whether or not information may be released. Thus, individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and Commandant (CG-611), United States Coast Guard, whose contact information can be found at http://www.dhs.gov/foia under "Contacts." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act (FOIA) Officer, Department of Homeland Security, Washington, D.C. 20528-0655.</p>
                <p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, you should:</p>
                <p>•Explain why you believe the Department would have information on you;</p>
                <p>•Identify which component(s) of the Department you believe may have the information about you;</p>
                <p>•Specify when you believe the records would have been created; and</p>
                <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p> See "Notification procedure" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p> See "Notification procedure" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p> Records are obtained from USCG boardings, USCG inspections, USCG investigations, USCG documentation offices, and vessel notice of arrival reports in the course of normal routine business. This information is gathered from the owners, operators, crew members, agents, passengers, witnesses, other government agencies, and USCG personnel. In addition records or record identifiers are ingested from other DHS and Federal systems, including IDENT, Vessel Identification System (VIS), Merchant Vessel Documentation System (MVDS), and the National Crime Information Center (NCIC).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p> The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3-4), (d), (e)(1-3), (e)(5), (e)(8), and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2) has exempted this system from the following provisions of the Privacy Act, 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f).</p>
                <p> When this system receives a record from another system exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.</p>
            </xhtmlContent>
        </subsection>
    </section>
    <section id="uscg32" toc="yes">
        <systemNumber>/USCG-032</systemNumber>
        <subsection type="systemName">
            Department of Homeland Security (DHS)/United States Coast Guard (USCG)-032 Asset Logistics Management Information System (ALMIS).
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p> Unclassified, Sensitive, For Official Use Only.</p>
                </xhtmlContent>
                </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at the United States Coast Guard Headquarters in Washington, D.C. and field offices.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Commandant (CG-4), United States Coast Guard, Mail Stop 7714, Washington, D.C. 20593.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>14 U.S.C. 2; 14 U.S.C. 93; 14 U.S.C. 102; 14 U.S.C. 141; 14 U.S.C. 632; 14 U.S.C. 648; 44 U.S.C. 3101; 44 U.S.C. 3534; Executive Order (E.O.) 9397, Numbering System for Federal Accounts Relating to Individual Persons, as amended by E.O. 13478, Amendments to Executive Order 9397 Relating to Federal Agency Use of Social Security Numbers; and the National Defense Authorization Act of 2014 (Pub. L. 113-66).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to provide maintenance tracking, parts ordering/inventory, and mission information for USCG aviation and surface assets.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p> USCG personnel (including military, Federal employees, and contractors) and non-DHS Federal employees whose home agencies have agreements in place with USCG to use its equipment (e.g., U.S. Forest Service (USFS)).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>USCG Military:</p>
                <p>•  SSN;</p>
                <p>•  Common Access Card number (CAC#);</p>
                <p>•  Personal Identification Number (PIN) for two-factor authentication;</p>
                <p>•  Name;</p>
                <p>•  Rate/rank;</p>
                <p>•  Employee Identification (EMPLID);</p>
                <p>•  Sector/group;</p>
                <p>•  Unit Operating Facilities Address Code (OPFAC);</p>
                <p>•  Work email address;</p>
                <p>•  Work phone number; and</p>
                <p>•  Digital signature.</p>
                <p>Government Civilians:</p>
                <p>•  SSN;</p>
                <p>•  CAC#;</p>
                <p>•  PIN;</p>
                <p>•  Name;</p>
                <p>•  Civilian grade;</p>
                <p>•  EMPLID;</p>
                <p>•  Unit OPFAC;</p>
                <p>•  Work email address;</p>
                <p>•  Work phone number; and</p>
                <p>•  Digital signature.</p>
                <p>Federal contractors:</p>
                <p>•  SSN;</p>
                <p>•  CAC#;</p>
                <p>•  PIN;</p>
                <p>•  Name;</p>
                <p>•  Unit OPFAC;</p>
                <p>•  Work email address;</p>
                <p>•  Work phone number;</p>
                <p>•  Digital signature;</p>
                <p>•  Contract number;</p>
                <p>•  Company name; and</p>
                <p>•  Period of contract performance.</p>
                <p>USFS personnel:</p>
                <p>•  SSN;</p>
                <p>•  CAC#;</p>
                <p>•  PIN;</p>
                <p>•  Name;</p>
                <p>•  Civilian grade;</p>
                <p>•  EMPLID;</p>
                <p>•  Unit OPFAC;</p>
                <p>•  Work email address;</p>
                <p>•  Work phone number; and</p>
                <p>•  Digital signature.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p> Records are obtained from USCG personnel (including military, Federal employees, and contractors) and the United States Forest Service (USFS), or other agencies that have agreements in place with USCG to use its equipment.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other Federal agency conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary and otherwise compatible with the purpose of collection to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>H. To an appropriate Federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>I. To the United States Forest Service, or other agency that has an equipment-sharing agreement in place with USCG, for the purpose of verifying personnel authorized to utilize the system and to access aircraft maintenance and logistic records.</p>
                <p>J. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/USCG stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p> USCG retrieves records be retrieved by name of individual, Social Security number (SSN), rank, Unit Operating Facilities Address Code (OPFAC), Employee Identification number (EMPLID), and Command Access Card (CAC) number.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>Currently, ALMIS retains all records. The records retention schedule disposition is currently pending with NARA.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p>DHS/USCG safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS/USCG has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p> Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and the United States Coast Guard Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about the individual may be available under the Freedom of Information Act.</p>
                <p>When seeking records about one’s self from this system of records or any other Departmental system of records, the request must conform with the Privacy Act regulations set forth in 6 CFR part 5. The individual must first verify his or her identity, meaning that he or she must provide his or her full name, current address, and date and place of birth. The individual must sign the request, and the signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                <p>•  Explain why he or she believes the Department would have information being requested;</p>
                <p>•  Identify which Component(s) of the Department he or she believes may have the information;</p>
                <p>•  Specify when the individual believes the records would have been created; and</p>
                <p>•  Provide any other information that will help the FOIA staff determine which DHS Component agency may have responsive records.</p>
                <p>If the request is seeking records pertaining to another living individual, the person seeking the records must include a statement from the subject individual certifying his/her agreement for the requestor to access his or her records.</p>
                <p>Without the above information, the Component(s) may not be able to conduct an effective search, and the request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p> For records covered by the Privacy Act or covered JRA records, see "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p> See "Record Access Procedures."</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>None.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>None.</p>
            </xhtmlContent>
        </subsection>
    </section>

    <section id="uscg60" toc="yes">
<systemNumber>/USCG-060</systemNumber>
<subsection type="systemName">Homeport.
</subsection>
<subsection type="securityClassification"><xhtmlContent>
<p>Classified, sensitive, and unclassified.</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent>
<p> Records are maintained at the United States Coast Guard Headquarters in Washington, D.C., the USCG Operations Systems Center, 600 Coast Guard Drive, Kearneysville, WV, and field offices.  Homeport is the information technology (IT) system in which records associated with this function are maintained.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent>
<p>Categories of individuals covered by this system include:</p>
<p>  Representatives of the maritime industry, such as: Members of Area Maritime Security Committees (AMSC); National Harbor Safety Committees and Environmental Committees (NHSCEC); and other entities regulated under the Maritime Transportation Security Act (MTSA).</p>
<p>     Federal, State and local government agency members involved in maritime safety, security, and environmental protection missions.  These persons may complete on-line forms and/or request an account to provide the information required by the USCG, access sensitive but unclassified information, and participate in collaboration communities.</p>
<p>     Individuals for whom background screening will be conducted for the purpose of facilitating the establishment of AMSC membership and to inform owners, operators, and security officers of MTSA regulated entities of the names of persons who have passed the background screening including, but not limited to Owners and Operators and their employees, and non-employees who require regular access privileges to such regulated vessels and facilities, as well as many credentialed merchant mariners.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p> To participate in the Homeport portal for information dissemination and collection, the following information may be included in this record system:</p>
<p>Full name;</p>
<p>Complete address;</p>
<p>Country;</p>
<p>Company or organization name;</p>
<p>Work phone;</p>
<p>Mobile phone;</p>
<p>24 hour contact phone;</p>
<p>Fax;</p>
<p>Pager;</p>
<p>E-mail address;</p>
<p>Alternate e-mail address; and</p>
<p>Referral full name/work and cell phone/e-mail address.</p>
<p> For USCG active duty and civilian personnel, the following fields are pre-populated using data from the Direct Access system, the USCG's enterprise human resource system:</p>
<p>Employee ID;</p>
<p>Billet control number;</p>
<p>Government Service Grade or Military Rate/Rank; and</p>
<p>Position number.</p>
<p> For purposes of establishing AMSC membership, the following information will be included in accordance with 33 CFR 103.305 "Composition of an Area Maritime Security (AMS) Committee:"</p>
<p>Full name;</p>
<p>Date of birth; and</p>
<p>Alien identification number (if applicable).</p>
<p> For purposes of establishing Transportation Worker Identification Credential (TWIC) New Hire query, the following information will be included in accordance with Navigation and Vessel Inspection Circulars (NVIC) 03-07:</p>
<p>Full name; and</p>
<p>Social Security number (last 4 digits only) should it be provided (not required).</p>

</xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p>46 U.S.C. 3717; 46 U.S.C. 12501; 44 U.S.C. 3507; 33 U.S.C. 1223; 50 U.S.C. 191; 14 U.S.C. 93(a) (6); and 33 CFR part 125.</p>
</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p> The Homeport system is an enterprise tool that facilitates compliance with the requirements set forth in the Maritime Transportation Security Act (MTSA) of 2002, by providing secure information dissemination, advanced collaboration, electronic submission and approval for vessel and facility security plans, and complex electronic and telecommunication notification capabilities.  The collection of personally identifiable information concerning those with access to the Homeport system allows the USCG to validate the suitability and identify the eligibility of those who request permission and/or have access to the system.</p>
</xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p>  In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows: </p>
<p> A.  To the Department of Justice (DOJ), including Offices of the United States  Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
<p>  1.  DHS or any component thereof;</p>
<p>  2.  Any employee or former employee of DHS in his/her official capacity;</p>
<p>  3.  Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
<p>  4.  The United States or any agency thereof.</p>
<p> B.  To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
<p> C.  To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
<p> D.  To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
<p> E.  To appropriate agencies, entities, and persons when:</p>
<p> 1.  DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; </p>
<p> 2.  DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
<p> 3.  The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p> F.  To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records.  Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
<p>G.  To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
<p>            H.  To the news media and the public, with the approval of the Chief </p>
<p>Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS's officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
<p>Disclosure to consumer reporting agencies:  </p>
<p> None.</p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>Storage:</p>
<p> USCG stores Homeport information electronically or on paper in secure facilities in a locked drawer behind a locked door.  The records may be stored on magnetic disc, tape, or digital media.</p>
</xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p> USCG retrieves homeport records by first name, last name, city, state, Captain of the Port Zone, vessel role, facility role, committee membership, vessel association, case identification number, or facility association.</p>
</xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p> USCG safeguards Homeport records in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies.  USCG imposes strict safeguards to minimize the risk of compromising the information stored in Homeport.  Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.     </p>
</xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p> In accordance with NARA disposition Authority Number  N1-026-06-06, records of registration information are destroyed upon account termination.  Maritime personnel screening data is destroyed after two years.  Response-associated information, such as personal data needed for search and rescue purposes, is destroyed 120 days following completion of response operations.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent>
<p> Commandant (CG-633), United States Coast Guard, Mail Stop 7710, </p>
<p>Washington, D.C. 20593-0001.</p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p> Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Commandant (CG-611), United States Coast Guard, Mail Stop 7710, Washington, D.C. 20593.  If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive, S.W., Building 410, STOP-0655, Washington, D.C. 20528.</p>
<p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR Part 5.  You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth.  You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization.  While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486.  In addition, you should:</p>
<p>Explain why you believe the Department would have information on you;</p>
<p>Identify which component(s) of the Department you believe may have the information about you;</p>
<p>Specify when you believe the records would have been created; and </p>
<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records; and</p>
<p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
<p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
</xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>

</xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p> Records are obtained by registered users; the general public (if completing an on-line form during marine casualty incidents or natural disasters); individuals who are authorized to have access to maritime facilities; government agencies; and USCG personnel.</p>
</xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>


    <section id="uscg61" toc="yes">
        <systemNumber>/USCG-061</systemNumber>

        <subsection type="systemName">
            Department of Homeland Security (DHS)/United States Coast Guard (USCG)-061 Maritime Analytic Support System (MASS)
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified, Classified.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records may be maintained at all locations at which the USCG operates or at which Coast Guard operations are supported including: U.S. Coast Guard Headquarters and field offices as listed on the USCG website. System information may be duplicated at other locations where the USCG has been granted direct access for support of Coast Guard missions for purposes of system back up, emergencies, preparedness, and/or continuity of operations. The main system is currently located at U.S. Coast Guard Intelligence Coordination Center, Department of Homeland Security, National Maritime Intelligence Center, Washington, D.C. 20395.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Commandant, Coast Guard Intelligence (CG-2), U.S. Coast Guard Headquarters, 2701 Martin Luther King, Jr. Avenue SE, Washington, D.C. 20032.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>Maritime information is critical to accomplish the eleven Coast Guard statutory missions mentioned above. The collection of the pertinent information in support of these missions have been authorized by: 14 United States Code (U.S.C.) secs. 1, 2, 81, 88, 89, 91, 93, 94, 141, 143, 634; 19 U.S.C. 1401; 33 U.S.C. secs. 1221, 1223, 1321; 46 U.S.C. 2306, 3306, 3717, 12501; 46 U.S.C. 3306; 50 U.S.C. 191; 33 U.S.C. 1223; the Magnuson-Stevens Fisheries Conservation and Management Act, 16 U.S.C. 1801; the Lacey Act, 16 U.S.C. secs. 3371-78; the Endangered Species Act, 16 U.S.C. secs. 1531-44; the National Marine Sanctuaries Act, 16 U.S.C. secs. 1431-45; The Espionage Act of 1917; 33 U.S.C. 1221, The Ports and Waterways Safety Act (PWSA); The Maritime Transportation Security Act of 2002 (MTSA), Pub L. No. 107-295; The Homeland Security Act of 2002, Pub L. No. 107-296; National Presidential Security Directive 41 (NPSD); and 33 Code of Federal Regulations (CFR) Part 160.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p> The purpose of this system is to enhance the U.S. Coast Guard’s capabilities by developing a total picture of the maritime environment and the people, places, and things that affect it. The enhancements of this picture effectively promote the successful execution of the Coast Guard’s statutory missions of Port, Waterways, and Coastal Security (PWCS); Drug Interdiction; Aid to Maritime Navigation; Search and Rescue (SAR) Operations; Protection of Living Marine Resources; Ensuring Marine Safety; Defense Readiness; Migrant Interdiction; Marine Environmental Protection; Ice Operations; and Law Enforcement.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p> 1. Individuals associated with vessels, facilities, companies, organizations, and ports involved in the maritime sector.</p>
                <p> 2. Individuals identified through observation by and interaction with Coast Guard personnel during Coast Guard operations that include boarding of vessels, conducting aircraft over-flights, and through Field Intelligence Support team (FIST) sightings and reports.</p>
                <p> 3. Individuals identified during Coast Guard enforcement actions as violating, suspected of violating, or witnessing the violations of U.S. laws, international laws, or treaties.</p>
                <p> 4. Individuals associated with vessels or other individuals that are known, suspected, or alleged to be involved in contraband trafficking, illegal migrant activity (smuggling, trafficking, and otherwise), or terrorist activity.</p>
                <p>  5. Any other individual not listed above who operates in, or affects, the maritime domain.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p> 1. Information related to individuals associated with vessels, companies, organizations, and ports involved in the maritime sector includes:</p>
                • 	<p>Name;</p>
                • 	<p>Nationality;</p>
                • 	<p>Address;</p>
                • 	<p>Telephone number;</p>
                • 	<p>Taxpayer or other identification number;</p>
                • 	<p>Date of birth;</p>
                • 	<p>Relationship to vessels and facilities;</p>
                • 	<p>The individuals’ relationship to other individuals, companies, government agencies, and organizations in MASS;</p>
                • 	<p>Individuals involved with pollution incidents, and violations of laws and international treaties; and casualties to include publicly available information; and</p>
                • 	<p>Information gathered from publicly available social media.</p>
                <p> 2. Field Intelligence Reports, Requests for Information, Intelligence Information Reports, Situation Reports, Operational Status Reports, and Operations Reports on:</p>
                <p> A. Individuals who are associated with vessels involved in contraband trafficking, illegal migrant activity (e.g., smuggling, trafficking), or any other unlawful act within the maritime sector, and with other individuals who are known, suspected, or alleged to be involved in contraband trafficking, illegal migrant activity (e.g., smuggling, trafficking), terrorist activities, or any other unlawful act within the maritime sector.</p>
                <p> B. Individuals, companies, vessels, or entities associated with the maritime industry (e.g., vessel owners, vessel operators, vessel characteristics, crewmen, passengers, facility owners, facility managers, facility employees, or any other individuals affiliated with the maritime community) to include publicly available information (including social media sources).</p>
                <p> C. Commodities handled, equipment, location, certificates, approvals, inspection data, pollution incidents, casualties, and violations of all laws and international treaties.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p> Information contained in MASS is gathered from a variety of sources both internal and external to the Coast Guard. Source information may come from sensors, inspections, boardings, investigations, documentation offices, vessel notice of arrival reports, owners, operators, crew members, agents, passengers, witnesses, employees, U.S. Coast Guard personnel, law enforcement notices, commercial sources, as well as other federal, state, local, and international agencies that are related to the maritime sector and/or national security sector. In addition, MASS maintains information from open source data (i.e., publicly available information) including social media sources.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p> In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agencies conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration (GSA) pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach, there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the federal government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the federal government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>H. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>I. To an appropriate federal, state, territorial, tribal, local, international, or foreign government intelligence entity, counterterrorism agency, or other appropriate authority charged with investigating threats or potential threats to national or international security or assisting in counterterrorism efforts, when a record, either on its face or in conjunction with other information, identifies a threat or potential threat to national or international security, or DHS reasonably believes the information may be useful in countering a threat or potential treat, which includes terrorist and espionage activities, and disclosure is appropriate to the proper performance of the official duties of the person receiving the disclosure.</p>
                <p>J. To an appropriate federal, state, or local agency entity, or other appropriate entities or individuals, or through established liaison channels to selected foreign governments, in order to provide intelligence, counterintelligence, or other information for the purposes of intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order, or other applicable national security directive.</p>
                <p>K. To appropriate federal, state, local, tribal, foreign governmental agencies, multilateral governmental organizations, and non-governmental or private organizations for the purpose of protecting the vital interests of a data subject or their persons, including to assist such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to combat other significant public health threats; appropriate notice will be provided of any identified health threat or risk.</p>
                <p>L. To the International Maritime Organization (IMO), intergovernmental organizations, nongovernmental organizations, or foreign governments in order to conduct investigations, operations, and inspections pursuant to its authority.</p>
                <p>M. To an organization or individual in either the public or private sector, either foreign or domestic, when there is a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to the extent the information is relevant to the protection of life or property and disclosure is appropriate to the proper performance of the official duties of the person making the disclosure.</p>
                <p>N. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS is aware of a need to use relevant data for purposes of testing new technology.</p>
                <p>O. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/USCG stores records in this system electronically in a database. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>Dynamic information on vessel position(s) and movement(s) will be readily retrievable for three (3) years and then archived. Seven (7) years after being archived the records will be deleted from the system. The other information discussed in the Categories of Records section will be readily retrievable for five (5) years and then archived. Ten (10) years after being archived the records will be deleted from the system. This information is stored for this length of time to ensure the analytic process is properly informed and to show patterns or history to analysts in the course of their duty. The requirements supporting the collection and storage of data are reviewed regularly.</p>
                <p> Audit records, maintained to document access to information relating to specific individuals, will be readily retrievable for 90 days and then moved to long term storage. After five (5) years the records will be deleted from the system. Access to audit records will only be granted to authorized personnel.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p> The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act because it is a law enforcement and intelligence system. However, DHS/USCG will consider individual requests to determine whether information may be released. Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and U.S. Coast Guard FOIA Office (CG-611), whose contact information can be found at http://www.dhs.gov/foia under "Contacts Information." If an individual believes more than one DHS Component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about the individual may be available under the Freedom of Information Act (FOIA).</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                • 	<p>Explain why he or she believes the Department would have information being requested;</p>
                • 	<p>Identify which component(s) of the Department he or she believes may have the information;</p>
                • 	<p>Specify when the individual believes the records would have been created; and</p>
                • 	<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If an individual’s request is seeking records pertaining to another living individual, the first individual must include a statement from the second individual certifying his/her agreement for the first individual to access his/her records.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p> Because this system contains classified and sensitive but unclassified information related to intelligence, counterterrorism, homeland security, and law enforcement programs, records in this system have been exempted from notification, access, and amendment to the extent permitted by subsections (j)(2) and (k)(1) and (2) of the Privacy Act. A request to amend non-exempt records in this system may be made by writing to the System Manager, identified above, in conformance with 6 CFR Part 5, Subpart B, which provides the rules for requesting access to Privacy Act records maintained by DHS.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures."</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. sec. 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (f); and (g)(1). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(k)(1), and (k)(2), has exempted this system from the following provisions of the Privacy Act, 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). When this system receives a record from another system exempted in that source system under 5 U.S.C. sec. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>73 FR 28143 (May 15, 2008); 73 FR 56924 (Final Rule) (Sept. 30, 2008).</p>
            </xhtmlContent>
        </subsection>
    </section>


    <section id="USGC62" toc="yes">
<systemNumber>/USCG-062</systemNumber>
<subsection type="systemName">Law Enforcement Information Database (LEIDB)/Pathfinder.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Sensitive but unclassified to Classified, Secret.</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>The computer database is located at U.S. Coast Guard Intelligence Coordination Center, Department of Homeland
Security, National Maritime Intelligence Center, Washington, DC, 20395.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this notice consist of:
</p><p>A. Individuals, U.S. citizens, lawful permanent residents, and foreign nationals, associated with vessels, facilities,
companies, and organizations, engaged in commercial and recreational maritime activity on or adjacent to waters subject
to the jurisdiction of the United States.
</p><p>B. Individuals, U.S. citizens, lawful permanent residents, and foreign nationals, identified during enforcement
actions taken by enforcement Officials and employees of the Coast Guard while enforcing United States (U.S.) law,
international law, or treaties.
</p><p>C. Individuals, U.S. citizens, resident aliens, and foreign nationals, directly and indirectly associated with
individuals listed in paragraphs A and B of this section
</p><p>D. Individuals, U.S. citizens, resident aliens, and foreign nationals, directly and indirectly associated with
vessels, maritime facilities and other maritime infrastructure which are known, suspected, or alleged to be involved in
illegal activity (e.g. contraband trafficking, illegal migrant smuggling, or terrorist activity).
</p><p>E. Individuals, U.S. citizens, resident aliens, and foreign nationals, identified during a terrorist screening process
as a possible identity match to a known or suspected terrorist.
</p><p>F. Individuals, U.S. citizens, resident aliens, and foreign nationals, identified in or reasonably believed to be
related to reports submitted by Coast Guard personnel engaged in enforcement boarding’s, safety inspections, aircraft
over-flights or other means of observation, and other Coast Guard operational activity.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>LEIDB/Pathfinder contains:
</p><p>A. Messages delivered to the system automatically from the Coast Guard Messaging System (CGMS) or the Defense
Messaging System (DMS). Additional data records may be delivered to LEIDB/Pathfinder by Coast Guard Intelligence
personnel through an electronic mail interface.
</p><p>B. Field Intelligence Reports (FIR) generated by any Coast Guard unit that observes or otherwise obtains information
they believe may be relevant to security threats, vulnerabilities or criminal activity.
</p><p>C. Request For Information (RFI) generated by any Coast Guard unit as a request for assistance from the Intelligence
program to better understand a situation.
</p><p>D. Intelligence Information Report (IIR) generated by select Coast Guard units and other government agencies able to
issue a standardized Department of Defense message reporting information relevant to intelligence requirements.
</p><p>E. Situation Reports (SITREPS) generated by Coast Guard operational units engaged in operations providing a status
update to a developing or ongoing operation.
</p><p>F. Operational Status Reports (OPSTAT), generated by Coast Guard operational units to report on operational capability
of personnel, units, and stations.
</p><p>G. Operations Reports (OPREPS) generated by Coast Guard operational units to report the conclusion of an operation.
</p><p>H. Any other operational reports in any format that contain information with intelligence value are also included and
can be transmitted through CGMS or DMS.
</p><p>I. Data records related to known, suspected, or alleged criminals as well as individuals associated with them (e.g.
immigrants being smuggled) to include individuals engaged in terrorist activity in the Maritime domain.
</p><p>J. Data records on facilities and their characteristics including: geographic location, commodities handled,
equipment, certificates, inspection data, pollution incidents, casualties, and violations of all laws and international
treaties, if applicable.
</p><p>K. Data records on individuals associated with facilities and information pertaining to directly and indirectly
related individuals, companies, and organizations associated with those facilities such as owners, operators, managers,
and employees.
</p><p>The above reports may have the following types of biographical information: names, aliases, dates of birth, phone
numbers, addresses, nationality, identification numbers such as A-File Number, Social Security Number, or driver’s
license number, employer, boat registration numbers, and physical characteristics. No biometric data is collected or
maintained.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>Federal Records Act of 1950, Title 44 U.S.C. 3101; Title 36, Code of Federal Regulations, chapter XII; The
Maritime Transportation Security Act of 2002, Pub L. 107-295 The Homeland Security Act of 2002, Pub L. 107-
296; 5 U.S.C. 301; 14 U.S.C. 93, 14 U.S.C. 632; 46 U.S.C. 2306, 46 U.S.C. 3717; 46 U.S.C. 12501; 33 U.S.C. 1221 <i>et
seq.</i>
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>LEIDB/Pathfinder enables Coast Guard Intelligence program personnel to manage Coast Guard message traffic that
contains law enforcement information collected by Coast Guard Officers and employees in the course of their statutory
duties. It also enables analysis of that information to improve the effectiveness and efficiency of Coast Guard mission
performance. The Coast Guard Intelligence Program supports the full range of Coast Guard missions through data collection
and analysis to meet operational Commanders information requirements. One reason for collection is to improve the
awareness of operational Commanders such that they will be optimally positioned to provide services to the public.
Another reason is to assist in the detection, prevention, and mitigation of all unlawful acts that occur within the
maritime environment and to support responses to man made or naturally occurring threats to public safety.  Routine uses
of records maintained in the system, including categories of users and the purposes of such uses:
</p><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of
the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3):
</p><p>A. To an appropriate Federal, State, territorial, tribal, local, international, or foreign government intelligence
entity, counterterrorism agency, or other appropriate authority charged with investigating threats or potential threats
to national or international security or assisting in counterterrorism efforts, where a record, either on its face or in
conjunction with other information, identifies a threat or potential threat to national or international security, or DHS
reasonably believes the information may be useful in countering a threat or potential treat, which includes terrorist and
espionage activities, and disclosure is appropriate to the proper performance of the official duties of the person
receiving the disclosure.
</p><p>B. To a Federal State, or local agency, or other appropriate entities or individuals, or through established liaison
channels to selected foreign governments, in order to provide intelligence, counterintelligence, or other information for
the purposes of intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order,
or other applicable national security directive.
</p><p>C. To appropriate Federal, state, local, tribal, foreign governmental agencies, multilateral governmental
organizations, and non-governmental or private organizations for the purpose of protecting the vital interests of a data
subject or other persons, including to assist such agencies or organizations in preventing exposure to or transmission of
a communicable or quarantinable disease or to combat other significant public health threats; appropriate notice will be
provided of any identified health threat or risk.
</p><p>D. To U.S. Department of Defense and related entities including, but not limited to, the Military Sealift Command and
the U.S. Navy, to provide safety and security information on vessels or facilities chartered, leased, or operated by
those agencies.
</p><p>E. To a Federal, State, or local agency responsible for response and recovery operations caused by a man made or
naturally occurring disaster for use in such operations.
</p><p>F. To the National Transportation Safety Board and its related State counterparts for safety investigation and
transportation safety.
</p><p>G. To the International Maritime Organization (IMO), intergovernmental organizations, nongovernmental organizations,
or foreign governments in order to conduct investigations, operations, and inspections pursuant to its authority.
</p><p>H. To Federal, State, or local agencies or foreign government agencies pertaining to marine environmental protection
activities.
</p><p>I. To an organization or individual in either the public or private sector, either foreign or domestic, where there is
a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to
the extent the information is relevant to the protection of life or property and disclosure is appropriate to the proper
performance of the official duties of the person making the disclosure.
</p><p>J. To contractors, grantees, experts, and consultants, performing or working on a contract, service, grant,
cooperative agreement, or other assignment for the Federal Government, when necessary to accomplish a DHS function
related to this system of records.
</p><p>K. To an appropriate federal, state, territorial, tribal, local, international, or foreign law enforcement agency or
other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law,
rule, regulation, or order, where a record, either on its face or in conjunction with other information, indicates a
violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is
proper and consistent with the official duties of the person making the disclosure.
</p><p>L. To the Department of Justice or other Federal agency conducting litigation or in proceedings before any court,
adjudicative or administrative body, when: (a) DHS or any component thereof, or (b) any employee of DHS in his/her
official capacity, or (c) any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the
employee, or (d) the United States or any agency thereof, is a party to the litigation or has an interest in such
litigation, and DHS determines that the records are both relevant and necessary to the litigation and the use of such
records is compatible with the purpose for which DHS collected the records.
</p><p>M. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>N. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that the security or
confidentiality of information in the system of records has been compromised; (2) the Department has determined that as a
result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft
or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by the
Department or another agency or entity) that rely upon the compromised information; and (3) the disclosure made to such
agencies, entities, and persons is reasonably necessary to assist in connection with the Department’s efforts to respond
to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>O. To a federal, state, tribal, local or foreign government agency or organization, or international organization,
lawfully engaged in collecting law enforcement intelligence information, whether civil or criminal, or charged with
investigating, prosecuting, enforcing or implementing civil or criminal laws, related rules, regulations or orders, to
enable these entities to carry out their law enforcement responsibilities, including the collection of law enforcement
intelligence.
</p><p>Disclosure to consumer reporting agencies:
</p><p>No disclosure.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored in electronic form in an automated data processing (ADP) system operated and
maintained by the U.S. Coast Guard. Backups are performed daily. Copies of backups are stored at an offsite location.
Personal, Sensitive but Unclassified (SBU), Unclassified, and Classified data and records reside commingled with each
other. Classified and non-classified information are merged on a classified domain.
</p><p>Data is stored electronically. Short term data extracts may be in paper or electronic form for the duration of a
specific analytic project or activity. Data extracts are stored in appropriately classified storage containers or on
secured electronic media in accordance with existing security requirements.
</p><p>Extracted unclassified information will be stored in accordance with DHS Management Directive governing the marking,
storage, and handling of unclassified sensitive information. Unclassified information derived from LEIDB/Pathfinder
remains U.S. Coast Guard information and is For Official Use Only. Determinations by any user to further disseminate, in
any form, LEIDB/Pathfinder derived information to other entities or agencies, foreign or domestic, must include prior
authorization from the appropriate supervisor authorized to make such determinations.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Information can be retrieved from LEIDB/Pathfinder via text string search submitted in Boolean language query
format. Data records in LEIDB/Pathfinder do not rely on normalization or correlation to manipulate data, there are no
prescribed data fields for LEIDB/Pathfinder data records.
</p><p>Records retrieval through string searches enables data association by any term, including personal identifier.
Unstructured text in a data record can be matched to any other data record. Specifically, information on individuals may
be retrieved by matching individual name, Social Security Number, passport number, or the individual’s relationship to a
vessel (e.g., owner, shipper, consignee, crew member, passenger, etc.). Information may also be an innumerable amount of
non-identifying information such as vessel name, vessel type, port location, port status, etc.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Information in this system is safeguarded in accordance with applicable laws, rules and policies, including the
DHS Information Technology Security Program Handbook. All records are protected from unauthorized access through
appropriate administrative, physical, and technical safeguards. These safeguards include restricting access to authorized
personnel who have a need-to-know, using locks, and password protection identification features. Physical locations are
locked after normal duty hours and the facilities are protected from the outside by security personnel.
</p><p>LEIDB/Pathfinder falls under the security guidelines of the National Maritime Intelligence Center (NMIC) and has its
own approved System Security Plan which provides that:
</p><p>All classified LEIDB/Pathfinder equipment, records and storage devices are located within facilities or stored in
containers approved for the storage of all levels of classified information.
</p><p>All statutory and regulatory requirements pertinent to classified and unclassified information have been identified in
the LEIDB/Pathfinder System Security Plan and have been implemented.
</p><p>Access to records requiring SECRET level is limited strictly to personnel with SECRET or higher level clearances and
who have been determined to have the appropriate "need to know".
</p><p>Access to records requiring CONFIDENTIAL level is limited strictly to personnel with CONFIDENTIAL or higher level
clearances and who have been determined to have the appropriate "need to know".
</p><p>Access to all records is restricted by login and password protection. The scope of access to any records via login and
password is further limited based on the official need of each individual authorized access. The U.S. Coast Guard will
take precautions in accordance with OMB Circular A-130, Appendix III.
</p><p>The U.S. Coast Guard will operate LEIDB/Pathfinder in consonance with Federal security regulations, policy,
procedures, standards and guidance for implementing the Automated Information Systems Security Program. Specific Coast
Guard operating rules include Command certification that an individual Officer or employee requires access to
LEIDB/Pathfinder to perform official duties. Individual Officers and employees must certify knowledge of Coast Guard
policies limiting the use of PII and FOUO information. Individual Officers and employees must certify agreement to proper
use of data records contained in LEIDB/Pathfinder and must agree to meet minimum security requirements.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>All records, but not including audit records maintained to document user access to information relating to
specific individuals, are maintained within the system for ten (10) years. These records are then destroyed. Audit
records are maintained for five years from the date of last use by any given user then destroyed.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Department of Homeland Security United States Coast Guard, Assistant Commandant for Intelligence and Criminal
Investigations (CG-2), Office of ISR Systems and Technology, Data Analysis and Manipulation Division (CG-
262), 2100 2nd Street, SW., Washington, DC 20593-0001.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Because this system contains classified and sensitive unclassified information related to intelligence,
counterterrorism, homeland security, and law enforcement programs, records in this system have been exempted from
notification, access, and amendment to the extent permitted by subsection (j)(2) and (k)(1) and (k)(2) of the Privacy
Act.
</p><p>General inquiries regarding LEIDB/Pathfinder may be directed to Department of Homeland Security United States Coast
Guard, Assistant Commandant for Intelligence and Criminal Investigations (CG-2), Office of ISR Systems and
Technology, Data Analysis and Manipulation Division (CG-262), 2100 2nd Street, SW., Washington, DC 20593-
0001. Submit a written request that includes your name, mailing address, and Social Security number to the above listed
system manager.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Because this system contains classified and sensitive unclassified information related to intelligence,
counterterrorism, homeland security, and law enforcement programs, records in this system have been exempted from
notification, access, and amendment to the extent permitted by subsection (j)(2) and (k)(1) and (k)(2) of the Privacy
Act. Nonetheless, DHS will examine each separate request on a case-by-case basis, and, after conferring with the
appropriate component or agency, may waive applicable exemptions in appropriate circumstances and where it would not
appear to interfere with or adversely affect the law enforcement or national security purposes of the systems from which
the information is recompiled or in which it is contained.
</p><p>Write the FOIA/Privacy Act Officer (CG-611), FOIA/Privacy Act Request at the address given above in accordance
with the "Notification Procedure".
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted to you under 28 U.S.C. 1746, a law that permits statements to be
made under penalty or perjury as a substitute for notarization. While no specific form is required, you may obtain forms
for this purpose form the Director, Disclosure and FOIA, <i>http://www.dhs.gov/foia</i> or 1-866-431-
0486. In addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you, </p><p>• Identify
which component(s) of the Department you believe may have the information about you, </p><p>• Specify when you
believe the records would have been created, </p><p>• Provide any other information that will help the FOIA staff
determine which DHS component agency may have responsive records, </p><p>• If your request is seeking records
pertaining to another living individual, you must include a statement from that individual certifying his/her agreement
for you to access his/her records.
</p><p>Without this bulleted information the component(s) will not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p><p>Further information may also be found at www.dhs.gov/foia.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Because this system contains classified and sensitive unclassified information related to intelligence,
counterterrorism, homeland security, and law enforcement programs, records in this system have been exempted from
notification, access, and amendment to the extent permitted by subsection (j)(2) and (k)(1) and (k)(2) of the Privacy
Act. A request to amend non-exempt records in this system may be made by writing to the System Manager, identified above,
in conformance with 6 CFR Part 5, Subpart B, which provides the rules for requesting access to Privacy Act records
maintained by DHS.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information contained in LEIDB/Pathfinder is gathered from a variety of sources both internal and external to the
Coast Guard. Source information may come from at sea boardings, investigations, vessel notice of arrival reports, U.S.
Coast Guard personnel (both direct observations and interviews of non-Coast Guard personnel), law enforcement notices,
commercial sources, as well as other federal, state, local and international agencies who are related to the maritime
sector and/or national security sector.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>Pursuant to 5 U.S.C. 552a(j)(2) of the Privacy Act, the records and information in this system are exempt from 5
U.S.C. 552a(c)(3) and (4), (d), (e)(1), (e)(2), (e)(3), (e)(4)(G), (H), and (I), (e)(5), (e)(8), (f), and (g). Pursuant
to 5 U.S.C. 552a(k)(1) and (k)(2) of the Privacy Act the records and information in the system are exempt from 5 U.S.C.
552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f). A Final Rule for exempting this record system has been
promulgated in accordance with the requirements of 5 U.S.C. 553(b)(1), (2), and (3), (c), and (e) and is being published
[in 6 CFR Part 5] concurrently with publication of this re-publication of the system of records notice, and the proposed
rulemaking receiving no public comments.
</p></xhtmlContent></subsection></section>
<section id="oha1" toc="yes">
<systemNumber>/OHA-001</systemNumber>
<subsection type="systemName">Office of Health Affairs--Contractor Occupational Health and Immunization Records System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified, sensitive, and classified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records may be maintained at the Directorate of Science and Technology (S&amp;amp;amp;amp;amp;amp;T) Headquarters in Washington, DC
at S&amp;amp;amp;amp;amp;amp;T Laboratories or Federally Funded Research and Development Centers (FFRDC), or by the contracted Competent
Medical Authority, collecting the records on behalf of S&amp;amp;amp;amp;amp;amp;T.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include: S&amp;amp;amp;amp;amp;amp;T contractors working at S&amp;amp;amp;amp;amp;amp;T Laboratories
(and other sites); FFRDC contractors; and contractors from other Federal agencies assigned to these S&amp;amp;amp;amp;amp;amp;T entities,
whose occupational health and immunization records are created in support of the S&amp;amp;amp;amp;amp;amp;T’s Laboratory research mission
and occupational health surveillance operations. To note, Federal employees are specifically not covered by this system
because they are covered by the Office of Personnel Management OPM/GOVT-10 <i>Employee Medical File System Records
</i> system (June 19, 2006, 71 FR 35360).
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Individual’s full name;
</p><p>• Date of birth and age;
</p><p>• Gender;
</p><p>• Work e-mail address;
</p><p>• Work phone number;
</p><p>• Work address;
</p><p>• Organizational affiliation;
</p><p>• Blood type;
</p><p>• Immunization record;
</p><p>• Other relevant occupational health records.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>The DHS Chief Medical Officer, under 6 U.S.C. 321e is authorized to ensure "internal and external
coordination of all medical preparedness and response activities of the Department", to serve as the Department’s
primary point of contact on medical and health issues, and to perform such other duties relating to the Chief Medical
Officer’s responsibilities as the Secretary may require. DHS Delegation 5001 (to the Assistant Secretary for Health
Affairs (ASHA) and Chief Medical Officer) builds upon the Chief Medical Officer’s statutory authority in 6 U.S.C. 321e by
granting the Chief Medical Officer "the authority to exercise oversight over all medical and public health
activities of" DHS. Section II, DHS Delegation 5001. Additionally, the Delegation authorizes the Chief Medical
Officer to assure an effective coordinated medical response to natural or man-made disasters or acts of terrorism,
including "[s]upporting the National Operations Center, National Response Coordination Center, and Component
leadership to ensure that operations have appropriate medical support, to specifically include coordination of medical
activities for any level of incident with biological or medical consequences."
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to manage, quantify, monitor, and track occupational health and immunization
records of contractors working at S&amp;amp;amp;amp;amp;amp;T Laboratories or FFRDCs, and employees and contractors from other Federal
agencies assigned to those S&amp;amp;amp;amp;amp;amp;T entities created in support of S&amp;amp;amp;amp;amp;amp;T research mission and occupational health
surveillance operations.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body, when it is necessary to the
litigation and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, Tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To the Department of Energy when conducting research in collaboration with DHS under an interagency agreement, a
Memorandum of Understanding, or Memorandum of Agreement.
</p><p>I. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by an individual’s name, date of birth, e-mail address, and/or work telephone number.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records will be maintained in accordance with the National Archives and Records Administration (NARA) approved
General Records System 1, Item 19, which covers forms, correspondence, and other records, including summary records
documenting an individual employee’s medical history, physical condition, and visits to the Government health-facilities,
for non-work related purposes. Occupational health and immunization records maintained at field sites will be retained by
the laboratories contract operators. Records are deleted/destroyed when S&amp;amp;amp;amp;amp;amp;T or laboratory contract operators
determine that they are no longer needed for administrative, legal, audit, or other operational purposes.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Directorate of Science and Technology Laboratory Operations and Oversight Manager (202-254-6400),
Directorate of Science and Technology, Department of Homeland Security, Washington, DC 20520.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to S&amp;amp;amp;amp;amp;amp;T’s FOIA Officer, whose contact information can be found at
<i>http://www.dhs.gov/foia</i> under "contacts."
</p><p>When seeking records about yourself from this system of records your request must conform with the Privacy Act
regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name,
current address and date and place of birth. You must sign your request, and your signature must either be notarized or
submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for
notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer
and Chief Freedom of Information Act Officer, <i>http://www.dhs.gov</i> or 1-866-431-0486. In addition
you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created;
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records; and
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are obtained by the subject individual.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
    <section id="ice1" toc="yes">
        <systemNumber>/ICE-001</systemNumber>
        <subsection type="systemName"> Student and Exchange Visitor Program (SEVP)</subsection>
<subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified, Controlled Unclassified Information. The data may be retained on classified networks, but this does not change the nature and character of the data until it is combined with classified information.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p> Records are maintained at the ICE Headquarters in Washington, D.C., and field offices. Records from SEVP systems may also be maintained in DHS unclassified and classified networks.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Systems Management Unit Chief, ICE Student and Exchange Visitor Program, 500 12th St. SW, MS 5600, Washington D.C. 20536-5600; sevp@ice.dhs.gov.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>Pub. L. No. 104-208, Illegal Immigration Reform and Immigrant Responsibility Act of 1996 (IIRIRA); Pub. L. No. 106-215, Immigration and Naturalization Service Data Management Improvement Act of 2000 (DMIA); Pub. L. No. 106-396, Visa Waiver Permanent Program Act of 2000 (VWPPA); Pub. L. No. 107-56, U.S.A. PATRIOT Act; Pub. L. No. 107-173, Enhanced Border Security and Visa Entry Reform Act of 2002 (Border Security Act); 8 C.F.R. § 214.2(f), (j), and (m); 8 C.F.R. §§ 214.3, 214.4, 214.5, 214.12, 214.13; 22 CFR Part 62; and Homeland Security Presidential Directive–2 (HSPD-2, Combating Terrorism Through Immigration Policies), as amended by HSPD–5, Management of Domestic Incidents (Feb. 28, 2003).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system of records is to maintain the integrity of the U.S. immigration system by collecting, maintaining, and analyzing information so that only bona fide nonimmigrant students or exchange visitors gain entry to the United States and that institutions accepting nonimmigrant students are legitimate and certified and adhere to the federal rules and regulations that govern them. DHS and DOS use of records covered by this system of records are for the following purposes:</p>
                <p>Identity Validation – To identify and validate the identity of F/M/J nonimmigrants, federal government personnel, and school and program officials to ensure data integrity, accuracy, and proper data matching, as well as to authenticate individuals who either access SEVP systems or need to update information maintained by SEVP.</p>
                <p>Determination and Status – To facilitate and support determination activities related to admissibility into the United States and the eligibility and status of benefits.</p>
                <p>Adjudication – To 1) review and decide whether to certify a school or designate an EV Program so that F/M/J nonimmigrants may enroll or participate in the U.S.-based school or program; and 2) use supplemental information such as open-source media (e.g., publicly available information in newspaper articles, school websites, government websites, social media sites and blogs, online forums) to support vetting of F/M/J nonimmigrants and their dependents and school and program officials who handle personally identifiable information (PII) for other officials at their school or program.</p>
                <p>Compliance – To monitor the compliance of F/M/J nonimmigrants, schools, programs, and school and program officials with immigration laws and regulations, including those addressing employment and training activities and immigration benefits, that govern the following: F and M nonimmigrants and the schools that enroll or seek to enroll them through the SEVP certification process; and participation of J nonimmigrants and programs within the EV Program.</p>
                <p>Investigative – To perform administrative and criminal investigations related to the participation of F/M/J nonimmigrants, school and EV Program sponsors, and the schools and exchange visitor programs that enroll or seek to enroll individuals through the SEVP certification process, and to identify noncompliance with U.S. laws and regulations. Information is also shared with other law enforcement agencies for purposes of coordinating activities, such as administrative reviews and criminal investigations.</p>
                <p>Analysis and Reporting – To create and provide reports for analyzing compliance issues and identifying activities and related individuals (if needed) for evidence-based decision-making.</p>
                <p>Communication and Customer Relations – To provide customer service to individuals who contact the SEVP (e.g., via telephone, email, chat, social media), including providing general information about SEVP regulations, performing data corrections, and providing technical support to access SEVP systems.</p>
                <p>Training – To keep track of training activities performed by school and program officials to validate compliance with SEVP requirements to access SEVP external-facing systems.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p> SEVP collects, receives, captures, and maintains information on individuals who are U.S. citizens and lawful permanent residents, as well as information on persons who are currently nonimmigrants. DHS maintains this information in recognition that persons who are nonimmigrants may later adjust status to lawful permanent resident and naturalize to U.S. citizen and, therefore, become individuals covered by the Privacy Act. DHS provides this notice in anticipation of such an eventuality :</p>
                <p>F and M nonimmigrants who participate as students in an academic or vocational program at SEVP-certified schools, as well as F and M dependents (e.g., spouse, minor children).</p>
                <p>J nonimmigrants who participate in DOS-designated work or study exchange visitor programs, as well as J dependents (e.g., spouse, minor children).</p>
                <p>Proxy, parent, or legal guardian who has legal authority to make decisions or sign documents on behalf of another individual who participates in a student and exchange visitor program (e.g., a minor, an individual with disabilities).</p>
                <p>School partners and representatives including the head of school (e.g., owner, president, chief executive officer [CEO], legal counsel) who has legal signature authority for the school and school employees (e.g., faculty members, student recruiters) who are employed by a U.S.-based school and interact with F and M students but who do not oversee the F and M students pursuant to the laws and regulations governing F and M nonimmigrant students and schools that enroll them (this is the responsibility of school officials). Also included are school partners (e.g., contractor who builds housing facility, sports program that uses school space) who provide a service for a school or manage activities on school sites that impact F and M students but who are not employees of the school.</p>
                <p>School officials (individuals who are U.S. citizens or lawful permanent residents) who submit information for school SEVP certification and recertification and oversee F and M students enrolled at their school.</p>
                <p>Exchange visitor program sponsors (e.g., an entity seeking to sponsor a nonimmigrant au pair, research scholar, intern, or government visitor) who must be designated by DOS to run an EV Program and host J nonimmigrants. This includes the program sponsor (e.g., owner, CEO, legal counsel) who has legal signature authority for the EV Program sponsor.</p>
                <p>Program officials (individuals who are U.S. citizens or lawful permanent residents) who submit information for EV Program sponsor DOS designation and re-designation and oversee J nonimmigrants enrolled in programs offered by the sponsor.</p>
                <p>Host families (individuals who are U.S. citizens or lawful permanent residents) who provide living arrangements for J nonimmigrants.</p>
                <p>Financial support provider who, as an individual, organization, or government, provides support to F/M/J nonimmigrants.</p>
                <p>Employers (e.g., supervisor, official with signature authority) of F/M/J nonimmigrants with authority to work in the United States.</p>
                <p>Federal government personnel (i.e., federal employees and contractors) who manage the SEVP program and use information maintained by SEVP to support the DHS mission, and coordinate with DOS with respect to the J exchange visitor program-related data. Federal government personnel also use SEVP information to support other federal agency missions that align with DHS’s and DOS’s oversight of nonimmigrant students and exchange visitors, including the ED, Department of Commerce, Department of Justice – Federal Bureau of Investigation, and federal intelligence agencies.</p>
                <p>State government personnel (i.e., state employees and contractors) who interact with federal government personnel and exchange information for activities related to administrative reviews and investigations.</p>
                <p>Governing bodies (e.g., licensing and accrediting bodies) that ensure the education provided by schools meets acceptable levels of quality and grant licenses and accreditation to schools that meet these criteria.</p>
                <p>Members of the public (e.g., property owners, holding companies, school officials, F and M nonimmigrants, individuals of the general population) who (1) provide SEVP with information about things such as a school, program, or individual aligned with SEVP and potential infractions or illegal activities; (2) provide feedback about SEVP on the performance of SEVP employees, its programs, or its regulations; or (3) contact SEVP for other reasons.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>The various categories of information (including PII and sensitive PII) collected, received, captured, used, shared, and maintained by SEVP and DOS on the individuals identified above are as follows:</p>
                <p>Biographical – Includes full name; gender; date of birth; country of birth; country of citizenship; country of legal permanent residence; contact information (e.g., telephone number, email address, physical/mailing address); and full name and contact information of proxy, parent, or legal guardian for F/M/J nonimmigrant.</p>
                <p>Criminal History – Includes arrest and bail information, case number, date charges were filed, case type, initial criminal offense type, date of crime, disposition and judgment date, and county jurisdiction.</p>
                <p>Identity Verification – Includes identity documents (e.g., driver’s license, passport); unique identifiers (e.g., SEVIS ID, immigration identification number [IIN], official personal identification number [OPID], A-number, passport number, limited instances of incidental collection of social security number); and biometric identifiers (e.g., fingerprint identification number [FIN]).</p>
                <p>Education – Includes education transcripts; certificates of graduation; program of study (e.g., types of program, courses, level of education); length of study; school registration information; school admission number; school transfer information; extensions; and changes to program of study or activity.</p>
                <p>Exchange visitor program – Includes exchange visitor program information (e.g., type of program, program activities); placement information (e.g., site of activity, host family, host family contact information, EV Program sponsor name); extensions; and changes to program or activity.</p>
                <p>Employment – Includes practical training information (e.g., training plan); employer and supervisor information (e.g., name of employer, name of supervisor); employer and supervisor contact information (e.g., telephone number, email address, website URL); employer identification number; and employment information (e.g., position title, description of duties, employment authorization document number).</p>
                <p>Financial – Includes financial support information (e.g., sources of funding); payment receipt information related to school certification and EV Program sponsor designation fees; and payment receipt information for the Form I-901 fee.</p>
                <p>Travel – Includes visa information (e.g., visa number, country of issuance, expiration date); passport information (e.g., passport number, expiration date, country issued); and arrival and departure information.</p>
                <p>Immigration-Related – Includes entry into and exit from the United States (e.g., Form I-94 admission number, dates of entry and exit, ports of entry); class of admission (e.g., visa type); immigration status; adjudication decisions; and, immigration benefit application information (e.g., adjustment of status).</p>
                <p>School – Includes school name; contact information (e.g., telephone number, email address, physical mailing address); open-source media information (e.g., publicly available information available in newspaper articles, websites, personal and organizational social media); school’s program information (e.g., site locations, addresses, phone number, school code); school’s accreditation and certification information and documentation; and documented evidence from nonaccredited schools (e.g., articulation agreements, state-issued professional licenses).</p>
                <p>Program Sponsor – Includes program sponsor name; CEO name and contact information (e.g., telephone number, email address, physical mailing address); and, location and contact information (e.g., site locations, addresses, phone number).</p>
                <p>Case-Related – Includes case number; adjudication determinations; site visit reports; appeals determinations; administrative reviews; and information regarding investigations.</p>
                <p>Auditing and Training – Includes auditing information (e.g., IP addresses, access and change history, date/time access, username, user role); system login (e.g., username, password, email address, name of individual); unique identifier (e.g., SEVIS ID, IIN, OPID); and training information (e.g., training status, training certificates, training transcripts).</p>
                <p>Reporting – Includes reporting information (e.g., aggregate data, statistics on overstays).</p>
                <p>Inquiries and Data Corrections – Includes contact information (e.g., telephone number, email address, physical mailing address); unique identifier (e.g., SEVIS ID, IIN, OPID); identity documents (e.g., driver’s license, passport, marriage certificate); and information not previously collected (e.g., new address, passport number) by SEVP to facilitate handling inquiries and data corrections.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>Records are obtained from F/M/J nonimmigrants; proxy, parent, or legal guardians; school officials; program officials; federal and state government personnel; federal agency systems; governing bodies; and members of the public.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorney’s Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant and necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his or her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his or her individual capacity, only when DOJ or DHS has agreed to represent the employee;</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the federal government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another federal agency or federal entity when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the federal government, or national security resulting from a suspected or confirmed breach.</p>
                <p>G. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>H. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>I. For investigative material compiled for law enforcement purposes, to appropriate federal, state, tribal, local, or foreign governmental agencies or multilateral governmental organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a statute, rule, regulation, order, or treaty where DHS determines that the information would assist in the enforcement of civil or criminal laws.</p>
                <p>J. To a court, magistrate, administrative tribunal, opposing counsel, parties, and witnesses in the course of a civil, criminal or administrative proceeding before a court or adjudicative body when DHS determines that the use of such records is relevant and necessary to the litigation or the proceeding and one of the following is a party to, or has an interest in, the litigation or the proceeding:</p>
                <p>1.DHS or any component thereof;</p>
                <p>2.Any employee of DHS in his or her official capacity;</p>
                <p>3.Any employee of DHS in his or her individual capacity where the agency has agreed to represent the employee;</p>
                <p>4.The United States, where DHS determines that litigation is likely to affect DHS or any of its components.</p>
                <p>K. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection with criminal law proceedings.</p>
                <p>L. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations for the purpose of protecting the vital interests of a data subject or other persons, including to assist such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to combat other significant public health threats. Appropriate notice of any identified health threat or risk will be given.</p>
                <p>M. To foreign governments for the purpose of providing information about their citizens or permanent residents, or family members thereof, during a school closing, local or national disasters, or health emergencies.</p>
                <p>N. To the U.S. Treasury Department and its contractors to facilitate and track SEVP fee payments made by F/M/J nonimmigrants.</p>
                <p>O. To schools and exchange visitor sponsors participating in the SEVP or EV Program for the purpose of certification and designation, enrollment, transfer, and monitoring of F/M/J nonimmigrants, audit, oversight, and compliance enforcement.</p>
                <p>P. To the DOS for the purpose of visa issuance to F/M/J nonimmigrants; the operation of its exchange visitor program; or the enforcement of, and investigation into, its visa and exchange visitor program laws, regulations, and requirements.</p>
                <p>Q. To the DOS in the processing of petitions or applications for benefits under the Immigration and Nationality Act and all other immigration and nationality laws including treaties and reciprocal agreements.</p>
                <p>R. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS is aware of a need to use relevant data that relate to the purposes stated in this SORN in order to test, develop, and implement new technologies for the purposes of data sharing to support and enhance the efficiency of the SEVP or homeland security.</p>
                <p>S. To a federal, state, tribal, local, international, or foreign government agency or entity for the purpose of consulting with that agency or entity:</p>
                <p>1. To assist in making a determination about redress provided under the Privacy Act for an individual in connection with the operations of a DHS component or program.</p>
                <p>2. For the purpose of verifying the identity of an individual seeking redress in connection with the operations of a DHS component or program.</p>
                <p>3. For the purpose of verifying the accuracy of information submitted by an individual who has requested such redress on behalf of another individual.</p>
                <p>T. To a former employee of DHS for purposes of (1) responding to an official inquiry by a federal, state, or local government entity or professional licensing authority, in accordance with applicable DHS regulations; or (2) facilitating communications with a former employee that may be necessary for personnel-related or other official purposes when DHS requires information and/or consultation assistance from the former employee regarding a matter within that person’s former area of responsibility.</p>
                <p>U. To a federal state, or local agency, or other appropriate entities or individuals, or through established liaison channels to selected foreign governments, in order to provide intelligence, counterintelligence, or other information for the purposes of intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order, or other applicable national security directive.</p>
                <p>V. To an accrediting agency, recognized by ED, for the purpose of performing accreditation activities for schools and exchange visitor programs, including  accreditation of English-language training programs in accordance with the Accreditation of English Language Training Programs Act (Pub. L. 111-306), but only such as is necessary and relevant to such accreditation function.</p>
                <p>W. To an appropriate Federal, State, local, tribal, foreign, or international agency, if the information is relevant and necessary to a requesting agency's decision concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant or other benefit and when disclosure is appropriate to the proper performance of the official duties of the person making the request.</p>
                <p>X. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there is a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the CPO determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
                <p>To the U.S. Department of the Treasury when disclosure of the information is relevant to review payment and award eligibility through the Do Not Pay Working System for the purposes of identifying, preventing, or recouping improper payments to an applicant for, or recipient of, Federal funds, including funds disbursed by a state (meaning a state of the United States, the District of Columbia, a territory or possession of the United States, or a federally recognized Indian tribe) in a state-administered, federally funded program.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/ICE stores records in these systems electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>Records may be retrieved by biographical and unique verification identifiers such as full name, date of birth, email address, SEVIS ID, IIN, FIN, OPID, and A-number.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>An SEVP program-wide, media-neutral records retention schedule is currently under development. ICE is proposing a 75-year retention schedule for program- specific records maintained by SEVP to facilitate program operations and carry out the mission objectives of the Agency. ICE will maintain these records permanently, until an Agency retention schedule is submitted to the National Archives and Records Administration (NARA) and approved by the Archivist of the Unites States. All other federal Agency records will be maintained in accordance with the appropriate general records schedule (GRS). For example, ICE will follow the appropriate retention periods outlined in the NARA-approved GRS for administrative records (e.g., audit information, system login, inquiries, reporting). The NARA-approved GRS can be found at https://www.archives.gov/records-mgmt/grs.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p> The Secretary of Homeland Security has exempted this system of records from the notification, access, and amendment procedures of the Privacy Act, and the JRA if applicable, because it is a law enforcement system of records. However, DHS/ICE will consider individual requests to determine whether information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the ICE Privacy Officer and ICE Freedom of Information Act (FOIA) Officer, whose contact information can be found at https://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains his or her Privacy Act records, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, U.S. Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the JRA provides a right of access, certain records about an individual may be available under the FOIA.</p>
                <p> When an individual is seeking his or her records about from this system of records or any other departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his or her identity, meaning that the individual must provide full name, current address, and date and place of birth. The individual must sign the request, and the signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. Although no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, https://www.dhs.gov/foia, or call (866) 431-0486. In addition, you should do the following:</p>
                <p>Explain why he or she believes the Department would have information being requested;</p>
                <p>Identify which component(s) of the Department he or she believe may have the information;</p>
                <p>Specify when the individual believes the records would have been created; and</p>
                <p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If an individual’s request is seeking records pertaining to another living individual, the first individual must include a statement from the second individual certifying that individual’s agreement for the first individual to access his/her records.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
                <p>To correct an ICE record, individuals may submit a Privacy Act amendment request by completing DHS Form 500-05 "Certification of Identity," which can be found at https://www.ice.gov/privacy. The signed form and a detailed request should be sent to the ICE Office of Information Governance and Privacy at ICEPrivacy@ice.dhs.gov, or to the following address:</p>
                <p>
                    U.S. Immigration and Customs Enforcement
                    ICE Information Governance and Privacy
                    ATTN: Privacy Office
                    500 12th Street SW, Stop 5004
                    Washington, D.C. 20536-5004
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See the "Record Access Procedures" section.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p> The Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. secs. 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (f); and (g)(1). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a (k)(1) and (k)(2), has exempted this system from the following provisions of the Privacy Act, 5 U.S.C. secs. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).</p>
                <p>When this system receives a record from another system exempted in that source system under 5 U.S.C. sec. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary system of records from which they originated and claims any additional exemptions set forth here.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>75 Fed. Reg. 412 (Jan. 5, 2010); 73 Fed. Reg. 63057 (Oct. 23, 2008).</p>
                <p>****</p>
            </xhtmlContent>
        </subsection>
    </section>

    <section id="ice2" toc="yes">
<systemNumber>/ICE-002</systemNumber>
<subsection type="systemName">ICE Pattern Analysis and Information Collection.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Sensitive But Unclassified.</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>U.S. Department of Homeland Security Immigration and Customs Enforcement Headquarters data facilities are located
in the Virginia suburbs of Washington, DC, with continuity of operations sites in remote locations within the continental
United States.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>A. Individuals or entities who are associated with investigations, inspections, apprehensions, detentions,
patrols, removals, examinations, naturalizations, intelligence production, legal proceedings, or other operations that
implement and enforce the Immigration and Nationality Act (INA) (8 U.S.C. 1101 <i>et seq.</i>) and related treaties,
statutes, orders, and regulations.
</p><p>B. Individuals or entities who are associated with investigations, inspections, apprehensions, detentions, law
enforcement intelligence production, legal proceedings or other operations that implement and enforce immigration- and
customs-related laws, specifically those found in Titles 8, 19, and 31 of the United States Code.
</p><p>C. Individuals who are respondents, representatives, or witnesses in administrative, civil penalty, or forfeiture
proceedings, or defendants, representatives or witnesses in criminal prosecution or extradition proceedings under
immigration or customs-related laws or regulations.
</p><p>D. Associates of the above individuals and entities who are sources of information relevant to an investigation.
</p><p>E. Individuals wanted by other law enforcement agencies, including Federal, State, local, tribal, foreign and
international, or individuals who are the subject of inquiries, lookouts, or notices by another agency or a foreign
government.
</p><p>F. Individuals, including U.S. Citizens, Lawful Permanent Residents, immigrants and non-immigrants who apply for
immigration benefits and/or any form of automated or other expedited inspection for verifying eligibility to cross the
borders into the United States.
</p><p>G. Non-United States citizens and Non-Lawful Permanent Residents who present themselves for entry into and/or exit
from the United States, including individuals subject to the requirements and processes of US-VISIT. Individuals
covered under US-VISIT include those who are not United States citizens at the time of entry or exit or who are
United States citizens or Lawful Permanent Residents who have not identified themselves as such at the time of entry or
exit.
</p><p>H. Individuals unlawfully present in the United States to include persons who have failed to maintain a valid
immigration status as well as persons who are otherwise unlawfully present in the United States.
</p><p>I. Nationals of countries that threaten to wage war, or are at war with the United States, and individuals required to
register as agents of foreign governments in the United States.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Records come directly from information collected from individuals during DHS or federal enforcement encounters,
from information provided by individuals when applying for U.S. immigration benefits or temporary admission to the U.S.,
or from persons entering or leaving the U.S. Analyzed records include biographical data; biometric identifiers, including
fingerprints and photographs; and information or data related to the individual subject’s case, including immigration
history, alien registration, and other identification or record numbers. The system maintains records used to show
relationships across all categories of records. These records include:
</p><p>A. Information collected from individuals during a DHS enforcement encounter or investigation, including, but not
limited to: Names, aliases, dates of birth, phone numbers, addresses, nationality, identification numbers such as A-File
Number, Social Security Number, or driver’s license number, and physical characteristics. This information is maintained
in the Treasury Enforcement Communications System (TECS), last published October 18, 2001, 66 FR 52984 and in the DHS
Enforcement Operational Immigration Records (ENFORCE) system, last published DHS/ICE-CBP-CIS-001-
03, ENFORCE/IDENT March 20, 2006, 71 FR 13987;
</p><p>B. Information collected about individuals during a DHS enforcement encounter or investigation, or provided by other
State, local, tribal Federal, or foreign law enforcement or other relevant agencies, including, but not limited to:
Names, aliases, nationality, dates of birth, phone numbers, addresses, affiliations, identification numbers such as A
-File Number, Social Security Number, or driver’s license number, or physical characteristics. This information is
maintained in TECS;
</p><p>C. Biographic information such as names, aliases, dates of birth, phone numbers, addresses, nationality,
identification numbers such as A-File Number, Social Security Number, or driver’s license number, and immigration
violation information obtained from the DHS ENFORCE or successor systems;
</p><p>D. Biographic information such as names, aliases, dates of birth, phone numbers, addresses, nationality,
identification numbers such as A-File Number, Social Security Number, or driver’s license number, and descriptive
information obtained from U.S. Citizenship and Immigration Services (USCIS) immigration benefits applications and
application review findings;
</p><p>E. Information obtained from other Federal or foreign law enforcement agencies about individuals known or reasonably
suspected to be or to have been engaged in conduct constituting, in preparation for, in aid of, or related to terrorism;
</p><p>F. Biographic information and other information such as name, address, and phone number obtained from commercial data
providers for individuals identified as prospective leads or suspects in active investigations; and
</p><p>G. Biographic information such as names, aliases, dates of birth, phone numbers, addresses, nationality,
identification numbers such as A-File Number, Social Security Number, or driver’s license number, and descriptive
information obtained from U.S. Customs and Border Protection (CBP) encounters at Ports of Entry during border crossings.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; 8 U.S.C. 1103; 8 U.S.C. 1225(d)(3); 8 U.S.C. 1324(b)(3); 8 U.S.C. 1357(a); 8 U.S.C. 1360(b); 19
U.S.C. 1; and 19 U.S.C. 1509.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of the ICEPIC system is to provide the information technology infrastructure products and services
that enable investigators and analysts within ICE and other DHS components to recognize non-obvious person, address, and
organizational relationships within existing DHS records systems, and to develop timely, actionable leads needed to
accomplish ICE law enforcement and counter-terrorism mission objectives. All ICEPIC activity is predicated on ongoing and
valid law enforcement investigations. Current manual and automated processes for research, collation, organization,
validation, and analysis of the information in numerous DHS alien registration, entry, intelligence, lookout, and
enforcement systems can accomplish similar objectives, but are cumbersome, time-consuming, and error-prone. ICEPIC will
provide a reliable, responsive, and secure system to support production of actionable leads and law enforcement
intelligence for DHS components and other Federal entities, as appropriate and in conformance with this system of records
notice.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under the Privacy Act, 5 U.S.C. 552a(b), all or a portion of
the records or information contained in this system may be disclosed to authorized entities, as is determined to be
relevant and necessary, outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:
</p><p>A. To the Department of Justice (DOJ) or other Federal agency in the review, settlement, defense, and prosecution of
claims, complaints, and lawsuits involving matters over which ICE exercises jurisdiction, or when conducting litigation
or in proceedings before any court, adjudicative or administrative body, when: (a) DHS; or (b) any employee of DHS in
his/her official capacity; or (c) any employee of ICE in his/her individual capacity, where DOJ or DHS has agreed to
represent the employee; or (d) the United States, or any agency thereof, is a party to the litigation or has an interest
in such litigation, and DHS determines that the records are both relevant and necessary to the litigation and the use of
such records is compatible with the purpose for which DHS collected the records.
</p><p>B. To appropriate Federal, State, local, tribal, or foreign governmental agencies or multilateral governmental
organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a
statute, rule, regulation, order, license, or treaty where DHS determines that the information would assist in the
enforcement of domestic and foreign civil or criminal laws.
</p><p>C. To U.S. agencies of the national intelligence community or through established liaison channels to selected foreign
governments where analysis of the records indicates a potential or confirmed threat of terrorist activity justifying
further analysis or investigation.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function. Those provided
information under this routine use are subject to the same Privacy Act limitations as are applicable to DHS officers and
employees.
</p><p>E. To the National Archives and Records Administration (NARA) or other Federal agencies pursuant to records management
inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Those provided information under this routine use are subject to the same Privacy Act
limitations as are applicable to DHS officers and employees.
</p><p>G. To appropriate Federal, State, tribal, local, or foreign law enforcement, intelligence, and regulatory agencies,
foreign governments, and international law enforcement organizations, for example: the Department of Defense; the
Department of State; the Department of the Treasury; the Central Intelligence Agency; the Selective Service System; the
United Nations; and INTERPOL; as well as to other individuals and organizations during the course of an investigation by
DHS or the processing of a matter under DHS’s jurisdiction, or during a proceeding within the purview of the immigration
and nationality laws, when DHS deems that such disclosure is necessary to elicit information required to accomplish the
purposes described in this paragraph.
</p><p>H. To an appropriate Federal, State, tribal, local, or foreign government agency or organization, or international
organization, lawfully engaged in collecting law enforcement intelligence, whether civil or criminal, or charged with
investigating, prosecuting, enforcing or implementing civil or criminal laws, related rules, regulations or orders, to
enable these entities to carry out their law enforcement responsibilities, including the collection of law enforcement
intelligence, but only when the disclosure is appropriate to the proper performance of the official duties of the person
receiving the disclosure.
</p><p>I. To an appropriate Federal, State, local, tribal, or foreign government agency, international organization, or
private organization where the President or the Secretary of the Department of Homeland Security has declared an event to
be a National Special Security Event, if the information is relevant and necessary to a requesting agency’s decision
concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or
other benefit, or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an
employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a
contract, or the issuance of a license, grant or other benefit, but only when disclosure is appropriate to the proper
performance of the official duties of the person making the request, and;
</p><p>J. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that the security or
confidentiality of information in the system of records has been compromised; (2) DHS has determined that as a result of
the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud,
harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another
agency or entity) that rely upon the compromised information, or harm to the individual; and (3) the disclosure made to
such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the
suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records are stored electronically at one or more ICE data centers that are located in secure facilities. The
records are stored on magnetic disc, tape, digital media, and optical media, and may also be retained in hard copy format
in secured file folders.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Data are retrievable by an individual’s name, Social Security Number, A-File Number, or other unique
identifier, as well as by non-identifying information such as address or date of entry into the United States.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Information in this system is safeguarded in accordance with applicable laws and policies, including the DHS
information technology security policies and the Federal Information Security Management Act (FISMA). All records are
protected from unauthorized access through appropriate administrative, physical, and technical safeguards. These
safeguards include restricting access to authorized personnel who have a need-to-know, using locks, and password
protection features. The system is also protected through a multi-layer security approach. The protective strategies are
physical, technical, administrative and environmental in nature, which provide access control to sensitive data, physical
access control to DHS facilities, confidentiality of communications, authentication of sending parties, and personnel
screening to ensure that all personnel with access to data are screened through background investigations commensurate
with the level of access required to perform their duties. The system also maintains a real-time auditing log of
individuals who access and update the system. Audit logs are reviewed and analyzed for unauthorized and inappropriate
system usage. DHS will investigate instances of unauthorized or inappropriate access or use of the system and take
appropriate disciplinary actions where violations have occurred.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>The National Archives Records Administration has not yet approved a retention schedule for this system of
records. Because a history of Federal law enforcement interactions with persons and organizations is essential to
detecting criminal and terrorist patterns of behavior and locating leads in current investigations, ICE has proposed to
retain records in ICEPIC for ten (10) years from ICE’s last use of the individual’s data, and then archive the
information for an additional five (5) years. After the five (5) year period, information will be destroyed unless it has
become relevant to a legal action, at which point the retention schedule would reset.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Unit Chief, Program Management Oversight, Mission Support, Office of Investigations, U.S. Immigration and Customs
Enforcement, 425 I Street, NW., Washington, DC 20536, telephone: (202) 307-6201.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Pursuant to 5 U.S.C. 552a(j) and (k), this system of records may not be accessed by members of the public for
purposes of determining if the system contains a record pertaining to a particular individual. Nonetheless persons may
seek access to records maintained in ICEPIC as outlined in the Record Access Procedures section below. Requests for such
access will be reviewed on a case-by-case basis.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>ICEPIC is exempt from record access procedures pursuant to 5 U.S.C. 552a(j) and (k). Nonetheless persons may seek
access to records maintained in ICEPIC by contacting U.S. Immigration and Customs Enforcement Freedom of Information Act
Office, 800 North Capitol Street, NW., Room 585, Washington, DC 20536. Individuals must submit their request and use the
form found at <i>http://www.ice.gov/doclib/g-639.pdf</i>. Requests for such access will be reviewed on a case-by-case
basis to ensure that the records meet the requirements set out by the Privacy Act.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>This system is exempt from 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4) (G) and (H), and (f) pursuant to 5 U.S.C.
552a(j)(2), (k)(2); however, requests for amendment of records may be reviewed on a case-by-case basis. Follow the
"Record Access Procedures" noted above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information contained in the system is obtained from DHS investigators, other DHS law enforcement officers, other
Federal, State, foreign and tribal law enforcement and intelligence agencies, public records, commercial data
aggregators, and immigration and alien admission records systems.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>Pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act, portions of this system are exempt from 5 U.S.C.
552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and (e)(8); (f), and (g). Pursuant to 5
U.S.C. 552a(k)(2), this system is exempt from the following provisions of the Privacy Act, subject to the limitations set
forth in those subsections: 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), and (f). In addition, to the extent a
record contains information from other exempt systems of records, ICE will rely on the exemptions claimed for those
systems.
</p></xhtmlContent></subsection></section>
<section id="ice3" toc="yes">
<systemNumber>/ICE-003</systemNumber>
<subsection type="systemName">General Counsel Electronic Management System (GEMS).
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records in GEMS are maintained in electronic form at the U.S. Immigration and Customs Enforcement headquarters in
Washington, DC and at field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include: (1) Individuals covered by provisions of the
Immigration and Nationality Act; (2) individuals who are under investigation by ICE, who were investigated by ICE in the
past, and those who are suspected of violating the criminal or civil provisions of statutes, treaties, Executive Orders,
and regulations administered by ICE; (3) witnesses, informants, or other third parties who may have knowledge of such
violations; (4) ICE attorneys and other employees who have been assigned to represent the agency in litigation relating
to aliens and other individuals whose files are contained in the system; and (5) defense attorneys, asylum officers, and
immigration judges involved with immigration cases.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• The alien’s biographical information such as name, A-number, date and place of birth, date and port of
entry, nationality, language, race, gender, height, and weight; identification information including social security
number, driver’s license number, and passport number; employment information; flags regarding the individual’s status
including if the person is legally sufficient, if a final order has been issued, or if a stay is in effect; flags
regarding the individual including if the person is a convicted felon, a terrorist, an interest of the Federal Bureau of
Investigation (FBI), has a gang affiliation, or is a child predator; information on relief; comments about the alien by
CBP officers at the border; and events associated with the alien such as court appearances. If the alien has applied for
asylum, the system also collects religion, marital status, address, the date of the request for asylum, the asylum
officer assigned to the case, the alien’s persecution code, the basis of the claim, information on the person’s
interviews and court appearances, the results of various database checks done on the person as part of the case, and the
final decision code and the date of the final decision.
</p><p>• Personal information on other people associated with the alien including family members, witnesses, and
informants. For each person, GEMS contains the person’s name, gender, role, contact information, and notes about the
person.
</p><p>• Personal information on attorneys and immigration judges associated with the alien including the person’s
name, gender, role, contact information, and notes about the person.
</p><p>• Hearing information including the language the alien speaks, the hearing start time and end time, the
hearing location and address, the immigration judge hearing the case, the prosecuting and defending attorneys, and a flag
indicating if the alien was battered or not.
</p><p>• Subsets or complete sets of information also contained in the hard copy A-File that may include the
alien’s official record material, such as naturalization certificates, various forms and attachments such as photographs,
applications and petitions for benefits under the immigration and nationality laws, reports of investigations,
statements, arrest reports, correspondence, and enforcement documents.
</p><p>• Attorney work products consisting of pre-trial, trial, and post-trial notes, memoranda stating positions
for litigation, notes to investigators, information related to immigration cases that have been obtained from hardcopy or
online research, legal opinions, and policy memos.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>Immigration And Nationality Act of 1952, as amended.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purposes of the system are (1) to support the litigation of immigration cases before U.S. administrative and
Federal courts, including immigration courts and the Board of Immigration Appeals; (2) to support the tracking,
processing, and reporting of case information for internal management, reporting, planning, and analysis purposes; and
(3) to support the ICE mission by maintaining and sharing information that supports the identification, arrest,
apprehension, detention, and removal of aliens who are subject to removal under the Immigration and Naturalization Act.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body, when it is necessary to the
litigation and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. any employee of DHS in his/her official capacity;
</p><p>3. any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. the United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, state, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To other Federal, State, tribal, and local government law enforcement and regulatory agencies and foreign
governments, individuals and organizations during the course of an investigation or the processing of a matter, or during
a proceeding within the purview of the immigration and nationality laws, to elicit information required by ICE to carry
out its functions and statutory mandates.
</p><p>I. To an appropriate Federal, State, local, tribal, foreign, or international agency, if the information is relevant
and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or issuance of a
security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS
decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an
investigation of an employee, the letting of a contract, or the issuance of a license, grant or other benefit and when
disclosure is appropriate to the proper performance of the official duties of the person making the request.
</p><p>J. To a former employee of DHS, in accordance with applicable regulations, for purposes of responding to an official
inquiry by a Federal, State, or local government entity or professional licensing authority; or facilitating
communications with a former employee that may be necessary for personnel-related or other official purposes where the
Department requires information or consultation assistance from the former employee regarding a matter within that
person’s former area of responsibility.
</p><p>K. To a Federal, State, tribal, local or foreign government agency or organization, or international organization,
lawfully engaged in collecting law enforcement intelligence information, whether civil or criminal, or charged with
investigating, prosecuting, enforcing or implementing civil or criminal laws, related rules, regulations or orders, to
enable these entities to carry out their law enforcement responsibilities, including the collection of law enforcement
intelligence.
</p><p>L. To a court, magistrate, administrative tribunal, opposing counsel, parties, and witnesses, in the course of an
immigration, civil, or criminal proceeding before a court or adjudicative body when:
</p><p>(a) DHS or any component thereof; or
</p><p>(b) any employee of DHS in his or her official capacity; or
</p><p>(c) any employee of DHS in his or her individual capacity where the agency has agreed to represent the employee; or
</p><p>(d) the United States, where DHS determines that litigation is likely to affect DHS or any of its components, is a
party to litigation or has an interest in such litigation, and DHS determines that use of such records is relevant and
necessary to the litigation, provided however that in each case, DHS determines that disclosure of the information to the
recipient is a use of the information that is compatible with the purpose for which it was collected.
</p><p>M. To clerks and judges of courts exercising naturalization jurisdiction for the purpose of filing petitions for
naturalization and to enable such courts to determine eligibility for naturalization or grounds for revocation of
naturalization.
</p><p>N. To an attorney or representative (as defined in 8 CFR 1.1(j)) who is acting on behalf of an individual covered by
this system of records in connection with any proceeding before USCIS or the Executive Office for Immigration Review.
</p><p>O. To the appropriate foreign government agency charged with enforcing or implementing laws where there is an
indication of a violation or potential violation of the law of another nation (whether civil or criminal), and to
international organizations engaged in the collection and dissemination of intelligence concerning criminal activity.
</p><p>P. To any Federal agency, where appropriate, to enable such agency to make determinations regarding the payment of
Federal benefits to the record subject in accordance with that agency’s statutory responsibilities.
</p><p>Q. To an actual or potential party or his or her attorney for the purpose of negotiation or discussion on such matters
as settlement of the case or matter, or informal discovery proceedings.
</p><p>R. To foreign governments for the purpose of coordinating and conducting the removal of aliens from the United States
to other nations.
</p><p>S. To a Federal, State, tribal, local, international, or foreign government agency or entity for the purpose of
consulting with that agency or entity: (1) To assist in making a determination regarding redress for an individual in
connection with the operations of a DHS component or program; (2) for the purpose of verifying the identity of an
individual seeking redress in connection with the operations of a DHS component or program; or (3) for the purpose of
verifying the accuracy of information submitted by an individual who has requested such redress on behalf of another
individual.
</p><p>T. To the Department of State in the processing of petitions or applications for benefits under the Immigration and
Nationality Act, and all other immigration and nationality laws including treaties and reciprocal agreements.
</p><p>U. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>V. To the Office of Management and Budget in connection with the review of private relief legislation as set forth in
OMB Circular No. A-19 at any stage of the legislative coordination and clearance process as set forth in the
Circular.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically in a central database.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records in the system are indexed and retrieved by an individual’s alien number, name, case information (such as
hearing location and type of hearing), and other criteria that can identify an individual in proceedings in a court or
adjudicative body before which ICE is authorized to appear.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>The records will be retained for seventy-five (75) years after the last administrative action has been taken on
the case. The seventy-five (75) year retention period is consistent with the retention period for the physical A-File.
This retention period ensures that sufficient information is available to conduct meaningful analysis if needed. Records
are destroyed appropriately after the retention period.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Principal Legal Advisor, ICE Office of the Principal Legal Advisor, 500 12th Street, SW., Washington, DC 20536.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment
procedures of the Privacy Act because it is a law enforcement system. However, ICE will consider requests to determine
whether or not information may be released. Thus, individuals seeking notification of and access to any record contained
in this system of records, or seeking to contest its content, may submit a request in writing to the Headquarters or
component’s FOIA Officer, whose contact information can be found at <i>http://www.dhs.gov/foia</i> under "contacts.
" If an individual believes more than one component maintains Privacy Act records concerning him or her the
individual may submit the request to the Chief Privacy Officer, Department of Homeland Security, 245 Murray Drive, SW.,
Building 410, STOP-0550, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Director, Disclosure and FOIA,<i> http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Identify which component(s) of the Department you believe may have the information about you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records in this system are supplied by several sources. ICE attorneys provide information regarding the cases
that they are working. Other records are derived from the alien file maintained on individuals and may include
investigative material that provides the basis for the legal proceedings. Records are also obtained from other Federal
agency information systems including USCIS’ Refugee, Asylum, and Parole System (RAPS), Custom and Border Protection’s
Treasury Enforcement Communication System (TECS), and the Department of Justice’s Case Access System for EOIR (CASE).
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary has exempted this system from subsections (c)(3) and (4), (d), (e)(1), (2), and (3), (e)(4)(G) and
(H), (e)(5) and (8), and (g) of the Privacy Act. These exemptions apply only to the extent that records in the system are
subject to exemption pursuant to 5 U.S.C. Sections 552a (j)(2) and (k)(1) and (k)(2).
</p></xhtmlContent></subsection></section>
    <section id="ice4" toc="yes">
        <systemNumber>/ICE-004</systemNumber>
        <subsection type="systemName">
            Bond Management Information System (BMIS).
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records in BMIS are maintained in electronic form at the U.S. Immigration and Customs Enforcement Headquarters and in DHS Data Centers.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Deputy Division Chief of Financial Systems, ICE Office of Financial Management, 1201 Maryland Avenue SW, Washington, D.C. 20024 OFMFINSYS@ice.dhs.gov.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>Sections 103, 212(g), 213, 214, 236, 240B, 241(c)(2)(C)(i), 286, and 293 of the Immigration and Nationality Act of 1982, as amended (8 U.S.C. 1103, 1182(g), 1183, 1184, 1226, 1229c, 1231(c)(2)(C)(i), 1356(r), and 1363, respectively).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to maintain records related to the administration and financial management operations of ICE’s immigration bond program. Immigration bond administration includes the maintenance, cancellation, and revocation of bonds. Financial management operations include collection, reimbursement, or forfeiture of the bond principal; calculation, payment, and reporting of interest income; calculation, withholding, and reporting of income taxes; and the collection or filing of associated income tax forms.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>Categories of records in this system include, for example:</p>
                <p>For the Obligor: name; Social Security number (SSN)/Tax Identification Number (TIN); address; phone number; U.S. citizenship or immigration status; and government-issued identification (type and number) shown at the time the bond is posted; and income tax-related information, such as taxpayer status, rate of withholding, income taxes withheld, income reporting (interest paid), tax treaty status, foreign tax identification number, country of residence, and information collected or reported on various income tax forms, such as IRS Forms W-9, W-8BEN, 945, 1042, 1042-S, and 1099-INT.</p>
                <p>For the Bonded Individual: name; alien number; location (while in detention); address(es) and phone number of residence upon release; date and country of birth; nationality; and date and port of arrival;</p>
                <p>For the Indemnitor: name; address(es); and phone number.</p>
                <p>For the Surety Bonding Agent: name; Tax Identification Number; address(es); and phone number.</p>
                <p>For notary public and attorneys in fact: name and phone number. </p>
                <p>General bond information, that is associated with one of the types of individuals listed above, including: bond number; bond amount; securities pledged; bond types; bond status; location and date of posted bond; dates for bond-related activities, such as declaration of breach; names and titles of Department of Homeland Security (DHS) officials that approve, cancel, or declare breaches of bonds; communications between ICE and the surety agents, such as information related to the administration, issuance, breach termination, or cancellation of a bond; dates, forms, and status and outcome concerning motions to reconsider a breach or cancellation of bonds; and dates, forms, and status and outcome concerning bond-related appeals.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>Records are obtained from categories of individuals listed and described above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other federal agencies conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another Federal agency or Federal entity when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To the Department of the Treasury and its bureaus to carry out financial transactions and any debt- or tax-related reporting, withholding, collection, and/or processing activities required or permitted by federal law, regulation or policy.</p>
                <p>J. To the Department of Justice, the Department of the Treasury, other appropriate federal agencies, state insurance regulators, credit bureaus, debt collection agencies, legal representatives for surety companies and bonding agencies, and insurance investigators to provide information relevant to (1) investigations of an agent or bonding agency that posts surety bonds, or (2) activities related to collection of unpaid monies owed to the U.S. Government on immigration bonds.</p>
                <p>K. To agencies, individuals, or entities as necessary to locate individuals who are owed money or property connected with the issuance of an immigration bond.</p>
                <p>L. To an individual or entity seeking to post or arrange, or who has already posted or arranged, an immigration bond for an alien to aid the individual or entity in (1) identifying the location of the alien, or (2) posting the bond, obtaining payments related to the bond, or conducting other administrative or financial management activities related to the bond.</p>
                <p>M. To federal, state, local, tribal, territorial, international, or foreign government agencies or entities for the purpose of consulting with that agency or entity: (1) to assist in making a determination regarding redress for an individual in connection with the operations of a DHS component or program; (2) to verify the identity of an individual seeking redress in connection with the operations of a DHS component or program; or</p>
                <p>(3) to verify the accuracy of information submitted by an individual who has requested such redress on behalf of another individual.</p>
                <p>N. To an attorney who is acting on behalf of a prospective claimant for the purpose of negotiating the settlement of an actual or prospective claim against DHS or its current or former employees, in advance of the initiation of formal litigation or proceedings.</p>
                <p>O. To international, foreign, intergovernmental, and multinational government agencies, authorities, and organizations in accordance with law and formal or informal international arrangements.</p>
                <p>P. To appropriate federal, state, local, tribal, territorial, or foreign governmental agencies or multilateral governmental organizations for the purpose of protecting the vital interests of a data subject or other persons, including to assist such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to combat other significant public health threats.</p>
                <p>Q. To a former employee of DHS for purposes of responding to an official inquiry by federal, state, local, tribal, or territorial government agencies or professional licensing authorities; or facilitating communications with a former employee that may be relevant and necessary for personnel-related or other official purposes when DHS requires information or consultation assistance from the former employee regarding a matter within that person’s former area of responsibility.</p>
                <p>R. To federal, state, local, tribal, territorial, foreign, or international agencies, if the information is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or the issuance, grant, renewal, suspension or revocation of a security clearance, license, contract, grant, or other benefit</p>
                <p>S. To federal, state, local, tribal, territorial, foreign, or international agencies, if DHS determines (1) the information is relevant and necessary to the agency’s decision concerning the hiring or retention of an individual, or the issuance of a security clearance, license, contract, grant, or other benefit, and (2) failure to disclose the information is likely to create a significant risk to government facilities, equipment, or personnel; sensitive information; critical infrastructure; or the public safety.</p>
                <p>T. To federal, state, local, tribal, territorial, or foreign government agencies, as well as to other individuals and organizations during the course of an investigation by DHS or the processing of a matter under DHS’s jurisdiction, or during a proceeding within the purview of the immigration and nationality laws, when DHS deems that such disclosure is necessary to carry out its functions and statutory mandates or to elicit information required by DHS to carry out its functions and statutory mandates.</p>
                <p>U. To the Department of State when it requires information to consider and/or provide an informed response to a request for information from a foreign, international, or intergovernmental agency, authority, or organization about an alien or an enforcement operation with transnational implications.</p>
                <p>V. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
                <p>To the U.S. Department of the Treasury when disclosure of the information is relevant to review payment and award eligibility through the Do Not Pay Working System for the purposes of identifying, preventing, or recouping improper payments to an applicant for, or recipient of, Federal funds, including funds disbursed by a state (meaning a state of the United States, the District of Columbia, a territory or possession of the United States, or a federally recognized Indian tribe) in a state-administered, federally funded program.</p>22
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/ICE stores records in this system electronically in a central database or on paper in secure facilities in a locked drawer behind a locked door. The records are stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>DHS/ICE retrieves by any of the following: bond number, SSN or TIN, name, Alien Number, obligor name, surety company name, or location and date bond was posted.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>In accordance with the Bond Management Information System (BMIS Web) schedule N1-567-10-11, ICE maintains records for six years and three months after the bond is closed, cancelled or breached and the collateral is returned to the obligor (when applicable). Copies of forms completed as part of the immigration bonds process (e.g., Form I-352 (Immigration Bond) or Form I-395 (Affidavit In Lieu of Lost Receipt of United States ICE For Collateral Accepted As Security)) are placed into the bonded individual’s A-File and maintained for the life of that file until transferred to the National Archives (100 years from the date of the alien’s birthdate) in accordance with N1-566-08-11.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and ICE’s FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about a person may be available under the Freedom of Information Act.</p>
                <p>When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                • 	<p>Explain why he or she believes the Department would have the information being requested;</p>
                • 	<p>Identify which component(s) of the Department he or she believes may have the information;</p>
                • 	<p>Specify when the individual believes the records would have been created; and</p>
                • 	<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requestor</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should so state and be addressed to each component that maintains a system of records containing the record.</p>
                <p> Individuals who wish to contest the accuracy of records in this system of records should submit these requests to the Privacy Division of the ICE Information Governance &amp;amp;amp;amp;amp;amp; Privacy Office. Requests must comply with verification of identity requirements set forth in Department of Homeland Security Privacy Act regulations at 6 CFR 5.21(d). Please specify the nature of the complaint and provide any supporting documentation. By mail (please note substantial delivery delays exist): ICE Information Governance &amp;amp;amp;amp;amp;amp; Privacy Office, ATTN: Privacy Division, 500 12th Street SW, Mail Stop 5004, Washington, D.C. 20536. By email: ICEPrivacy@ice.dhs.gov.</p>
                <p> Please contact the Privacy Division with any questions about submitting a request at ICEPrivacy@ice.dhs.gov.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>None.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>DHS/ICE-004 Bonds Management Information System (BMIS) System of Records, 76 FR 8761 (February 15, 2011).</p>
            </xhtmlContent>
        </subsection>
    </section>
    <section id="ice6" toc="yes">
        <systemNumber>/ICE-006</systemNumber>
        <subsection type="systemName"> Department of Homeland Security (DHS)/U.S. Immigration and Customs Enforcement (ICE)-006 ICE Intelligence Records System (IIRS). </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>
                    Sensitive But Unclassified, Classified.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p> Records are maintained at ICE Headquarters in Washington, D.C., ICE fields offices, or designated cloud computing environments.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p> Deputy Assistant Director, Homeland Security Investigations Cyber and Operational Technology Division, 202-732-5200, 500 12th Street, SW, Washington, D.C. 20536.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>8 U.S.C. secs. 1103, 1105, 1225(d)(3), 1324(b)(3), 1357(a), and 1360(b); 19 U.S.C. secs. 1 and 1509.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p> The purpose of this system is:</p>
                <p> (a) To support ICE’s collection, analysis, reporting, and distribution of criminal and civil law enforcement, immigration administration, terrorism, intelligence, and homeland security information in support of ICE’s law enforcement and immigration administration mission;</p>
                <p> (b) To produce criminal and civil law enforcement analysis and intelligence reporting that provides actionable information to ICE’s law enforcement and immigration administration personnel and to other appropriate government agencies;</p>
                <p> (c) To enhance the efficiency and effectiveness of the research and analysis process for DHS law enforcement, immigration, and intelligence personnel through information technology tools that provide for advanced search and analysis of various datasets, including commercial data and open sources;</p>
                <p> (d) To facilitate multi-jurisdictional informational exchange between ICE and other law enforcement agencies regarding known and suspected members of transnational organized crime and associates; and</p>
                <p> (e) To identify potential criminal activity, immigration violations; threats to homeland security, ICE personnel, and ICE facilities; to uphold and enforce the law; and to ensure public safety.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p> Categories of individuals covered by this system include the following:</p>
                <p>(1) Individuals (e.g., subjects, victims, witnesses, associates, informants) associated with current or previous immigration and law enforcement investigations and other activities conducted by ICE;</p>
                <p>(2) Individuals associated with law enforcement investigations or activities conducted by other federal, state, tribal, territorial, local, or foreign agencies where there is a potential nexus to ICE’s law enforcement and immigration enforcement responsibilities or homeland security in general;</p>
                <p> (3) Individuals known or appropriately suspected to be or have been engaged in conduct constituting, in preparation for, in aid of, or related to terrorism;</p>
                <p> (4) Individuals involved in, associated with, or who have reported suspicious activities, threats, or other incidents reported by domestic and foreign government agencies, multinational or non-governmental organizations, critical infrastructure owners and operators, private sector entities and organizations, and individuals;</p>
                <p> (5) Individuals who are the subjects of, or otherwise identified in, classified or unclassified intelligence reporting received or reviewed by ICE;</p>
                <p> (6) Individuals who are known or suspected gang members or associates;</p>
                <p> (7) Individuals not implicated in activities in violation of laws enforced or administered by ICE, but with pertinent knowledge of some circumstance of a case or record subject. Such records may contain any information, including personal identification data, that may assist ICE in discharging its responsibilities generally (e.g., information which may assist in identifying and locating such individuals);</p>
                <p> (8) Individuals identified in law enforcement, intelligence, crime, and incident reports (including financial reports under the Bank Secrecy Act and law enforcement bulletins) produced by DHS and other government agencies;</p>
                <p> (9) Individuals identified in U.S. visa, border, immigration, and naturalization benefit data, including arrival and departure data;</p>
                <p> (10) Individuals identified in DHS law enforcement and immigration records;</p>
                <p> (11) Individuals whose passports have been lost or stolen;</p>
                <p> (12) Individuals identified in public news reports that may be pertinent to the ICE mission; and</p>
                <p> (13) Individuals who have made credible threats against ICE personnel or facilities.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>Categories of records in this system may include:</p>
                	<p>Biographic information (e.g., name, date of birth, Social Security number, A-Number, citizenship/immigration status, passport information, addresses, phone numbers);</p>
                	<p>Records of immigration enforcement activities or law enforcement investigations and activities conducted by ICE;</p>
                	<p>Information (including documents and electronic data) collected by DHS from or about individuals during investigative activities and border searches;</p>
                	<p>Records of immigration enforcement activities and law enforcement investigations/activities that have a possible nexus to ICE’s law enforcement and immigration enforcement responsibilities or homeland security in general;</p>
                	<p>Law enforcement, intelligence, crime, and incident reports (including financial reports under the Bank Secrecy Act and law enforcement bulletins) produced by DHS and other government agencies;</p>
                	<p>U.S. visa, border, immigration, and naturalization benefit data, including arrival and departure data;</p>
                	<p>Terrorist watchlist information compiled by DHS and other terrorism related information regarding threats, activities, and incidents;</p>
                	<p>Watchlist information compiled by DHS regarding individuals associated with Transnational Organized Crime and other related criminal threats, activities, and incidents.</p>
                	<p>Lost and stolen passport data;</p>
                	<p>Records pertaining to known or suspected terrorists, terrorist incidents, activities, groups, and threats;</p>
                	<p>ICE-generated intelligence requirements, analysis, reporting, and briefings;</p>
                	<p>Third party intelligence reporting, such as information from investigative and intelligence reports prepared by law enforcement agencies and agencies of the U.S. intelligence community;</p>
                	<p>Articles, public-source data, and other published information on individuals and events of interest to ICE, including social media account information and social media posts, Internet protocol addresses, and usernames;</p>
                	<p>Records and information from government data systems or retrieved from commercial data providers in the course of intelligence research, analysis, and reporting;</p>
                	<p>Reports of suspicious activities, threats, or other incidents generated by ICE and third parties;</p>
                	<p>Additional information about known and suspected transnational organized crime actors and associates such as, , gang affiliation, physical description, , photos of the individual, , field interview notes, and criminal history information;</p>
                	<p>Audio and video records retained in support of ICE’s law enforcement, national security, or other homeland security missions;</p>
                	<p>Additional information about confidential sources or informants;</p>
                	<p>Metadata, which may include but is not limited to transaction date, time, location, and frequency;</p>
                	<p>Biometric information, including facial images, iris images, and fingerprints; and</p>
                	<p>Location-Related Records, including geotags from metadata associated with other record categories collected; geolocation information derived from authorized law enforcement activities, ICE-owned devices, witness accounts, or commercially available data; location tracking tools that maintain a list of tracking devices or personal mobile devices by serial number/Mobile Directory Number (MDN)/International Mobile Equipment Identity (IMEI)/Mobile Equipment ID (MEID)/AD_ID number, and their current locations using Global Positioning System (GPS) and/or assisted Cellular Tower coordinates. These location tracking tools are not only deployed on targets of investigations, vehicles of interest in investigations, contraband, but also on the official vehicles owned by ICE and used by agents and officers in the field, and geographic areas of interest related to criminal and intelligence investigations and activities.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>Records are obtained from federal, state, local, territorial, tribal, or other domestic agencies, foreign agencies, multinational or non-governmental organizations, critical infrastructure owners and operators, private sector entities and organizations, individuals, commercial data providers, and public sources such as news media outlets and the Internet.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant and necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the federal government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, territorial, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To the Department of Justice (DOJ), Civil Rights Division, for the purpose of responding to matters within the DOJ’s jurisdiction to include allegations of fraud and/or nationality discrimination.</p>
                <p>J. To a federal, state, tribal, local, territorial, international, or foreign government agency or entity for the purpose of consulting with that agency or entity: (1) to assist in making a determination regarding redress for an individual in connection with the operations of a DHS component or program; (2) to verify the identity of an individual seeking redress in connection with the operations of a DHS component or program; or (3) to verify the accuracy of information submitted by an individual who has requested such redress on behalf of another individual.</p>
                <p>K. To a former employee of DHS, in accordance with applicable regulations, for purposes of responding to an official inquiry by a federal, state, local, tribal, territorial, government entity, or professional licensing authority; or facilitating communications with a former employee that may be relevant and necessary for personnel-related or other official purposes where the Department requires information or consultation assistance from the former employee regarding a matter within that person’s former area of responsibility.</p>
                <p>L. To an appropriate federal, state, local, tribal, territorial, foreign, or international agency, if the information is relevant and necessary to the agency’s decision concerning the hiring or retention of an individual or the issuance, grant, renewal, suspension or revocation of a security clearance, license, contract, grant, or other benefit; or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant or other benefit and when disclosure is appropriate to the proper performance of the official duties of the person receiving the information.</p>
                <p>M. To appropriate federal, state, local, tribal, territorial, or foreign governmental agencies or multilateral governmental organizations for the purpose of protecting the vital interests of a data subject or other persons, including to assist such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to combat other significant public health threats; appropriate notice will be provided of any identified health risk.</p>
                <p>N. To a public or professional licensing organization when such information indicates, either by itself or in combination with other information, a violation or potential violation of professional standards, or reflects on the moral, educational, or professional qualifications of an individual who is licensed or who is seeking to become licensed.</p>
                <p>O. To appropriate federal, state, tribal, local, territorial, or foreign government agencies or organizations, international organizations, or multilateral governmental organizations lawfully engaged in collecting law enforcement intelligence information, whether civil or criminal, or charged with investigating, prosecuting, enforcing or implementing civil or criminal laws, rules, regulations, orders, license, or treaty where DHS determines that the information will enable these entities to carry out their law enforcement responsibilities.</p>
                <p>P. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation, provided that disclosure is appropriate to the proper performance of the official duties of the officer making the disclosure.</p>
                <p>Q. To federal, state, local, tribal, or territorial government agencies, or other appropriate entities or individuals, or through established liaison channels to selected foreign governments, in order to provide national security, intelligence, counterintelligence, or other information for the purposes of intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order, or other applicable national security directive.</p>
                <p>R. To federal and foreign government intelligence or counterterrorism agencies where DHS becomes aware of an indication of a threat or potential threat to national or international security for which the information may be useful in countering the threat or potential threat, or when such use is to assist in anti-terrorism efforts, and disclosure is appropriate to the proper performance of the official duties of the person making the disclosure.</p>
                <p>S. To an organization or individual in either the public or private sector, either foreign or domestic, where there is a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to the extent that the information is relevant to the protection of life or property and disclosure is appropriate to the proper performance of the official duties of the person making the disclosure.</p>
                <p>T. To international, foreign, intergovernmental, and multinational agencies, authorities, and organizations in accordance with law and formal or informal international agreements or arrangements.</p>
                <p>U. To the Department of State in the processing of petitions or applications for benefits under the Immigration and Nationality Act, and all other immigration and nationality laws including treaties and reciprocal agreements, or when the Department of State requires information to consider and/or provide an informed response to a request for information from a foreign, international, or intergovernmental agency, authority, or organization about an enforcement operation with transnational implications.</p>
                <p>V. To appropriate federal, state, local, tribal, territorial, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS is aware of a need to utilize relevant data for purposes of developing, implementing, and testing new software and technologies for the purpose of data sharing to enhance and support homeland security, national security, or law enforcement.</p>
                <p>W. To federal, state, local, territorial, tribal, international, or foreign criminal, civil, or regulatory law enforcement authority where the information is necessary for collaboration, coordination and deconfliction of law enforcement investigative matters and prosecutions to avoid duplicative or disruptive efforts and for the safety of law enforcement officers who may be working on related law enforcement investigations and law enforcement intelligence matters.</p>
                <p>X. To prospective claimants and their attorneys for the purpose of negotiating the settlement of an actual or prospective claim against DHS or its current or former employees, in advance of the initiation of formal litigation or proceedings.</p>
                <p>Y. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent that the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p> DHS/ICE records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p> DHS/ICE may retrieve records by personal identifiers such as, but not limited to, name, A-Number, phone number, address, Social Security number, or passport number. Records may also be retrieved by non-personal information such as transaction date, entity/institution name, description of goods, value of transactions, and other information.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p> Intelligence information reports (IIR) will be retained for 22 years after cutoff in accordance with ICE records schedule DAA-0567-2016-0003-0007. Other intelligence records will be retained in accordance with their corresponding disposition within ICE record schedule DAA-0567-2016-0003, to include finished intelligence products (permanent records) and reports and analysis (destroyed 22 years at cut off at end of fiscal year). Records associated with an investigative case file will be retained for 20 years in accordance with legacy customs schedule N1-36-86-1-161.3 (inv 7B), with the exception of N1-36-86-1/162.38,Neutrality Investigative Files, which are permanent records.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p>DHS/ICE safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS/ICE has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act, and the Judicial Redress Act if applicable, because it is a law enforcement system. However, ICE will consider individual requests to determine whether or not information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and ICE FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia. If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or (866) 431-0486. In addition, the individual should:</p>
                	<p>Explain why he or she believes the Department would have information being requested;</p>
                	<p>Identify which component(s) of the Department he or she believes may have the information;</p>
                	<p>Specify when the individual believes the records would have been created; and</p>
                	<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered Judicial Redress Act records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(j)(2) of the Privacy Act, has exempted this system from 5 U.S.C. secs. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5), and (e)(8); (f); and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. secs. 552a (k)(1) and (k)(2), has exempted from this system the following provisions of the Privacy Act, subject to the limitations set forth in those subsections: 5 U.S.C. secs. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), and (f).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>75 FR 9233 (March 1, 2010); 73 FR 74735 (December 9, 2008).</p>
            </xhtmlContent>
        </subsection>
    </section>

    <section id="ice7" toc="yes">
<systemNumber>/ICE-007</systemNumber>
    <subsection type="systemName">
        Department of Homeland Security (DHS)/ U.S. Immigration and Customs Enforcement (ICE)-007 Criminal History and Immigration Verification (CHIVe) System of Records.
    </subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p>Unclassified.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p>Records are maintained at the ICE Headquarters in Washington, D.C. and ICE field offices. Records are also maintained in the ACRIMe information technology system, and the DHS Data Centers in Washington, D.C.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p> Unit Chief, Law Enforcement Support Center, U.S. Immigration and Customs Enforcement, 188 Harvest Lane, Williston, VT 05495; Unit Chief, Juvenile and Family Residential Management Unit, U.S. Immigration and Customs Enforcement, 500 12th Street SW, Washington, DC 20536.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="authorityForMaintenance">
        <xhtmlContent>
            <p> 8 U.S.C. secs. 1103, 1226, 1227, 1228, 1231, 1232, 1357, 1360; 19 U.S.C. sec. 1589a; and the Brady Handgun Violence Protection Act of 1993 (Pub. L. No. 103-159).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p>The purposes of this system are: (1) To assist in identifying and arresting individuals in the United States who may be subject to removal under the Immigration and Nationality Act, as amended; (2) To respond to inquiries from criminal justice agencies that seek to determine the immigration status of an individual in the context of a criminal justice matter for the purpose of identifying and arresting those who may be subject to removal; (3) To screen individuals to verify or ascertain citizenship or immigration status, immigration history, and criminal history to inform determinations regarding sponsorship of unaccompanied alien children who are in the care and custody of HHS and to identify and arrest those who may be subject to removal; and (4) To inform criminal justice agencies and agencies conducting background checks whether an individual is under investigation and/or wanted by ICE or other criminal justice agencies.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
            <p>Categories of individuals covered in this system include:</p>
            <p>(1) Individuals who are the subjects of immigration status inquiries submitted to ICE or immigration checks conducted by ICE, including:</p>
            <p>A. Individuals who are encountered by, arrested by, under the investigation of, or in the custody of a criminal justice agency.</p>
            <p>B. Individuals convicted of sexual offenses required to register as a sexual offender.</p>
            <p>C. Individuals subject to background checks or investigations by or under the authority of a federal, state, local, tribal, or territorial agency to determine eligibility or suitability for employment, access, or other purposes.</p>
            <p>D. Individuals applying to obtain/purchase a firearm in the United States and whose information has been submitted to ICE for the purpose of conducting an immigration status check in support of background checks required by the Brady Handgun Violence Protection Act (Brady Act) or other applicable laws.</p>
            <p>(2) Individuals who are the subjects of criminal arrest warrants and immigration lookouts that ICE has entered into the Federal Bureau of Investigation’s (FBI) National Crime Information Center (NCIC) System.</p>
            <p>(3) Individuals seeking approval from HHS to sponsor an unaccompanied alien child, and/or other adult members of the potential sponsor’s household.</p>
            <p>(4) Law enforcement officers or other personnel working for criminal justice agencies who contact ICE for reasons relating to the purposes of this system of records, or for other law enforcement assistance.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p>Categories of records in this system include:</p>
            <p>•Biographic identifiers, other identifiers, and contact information (e.g., name, aliases, date and place of birth, address, telephone number, Social Security number (SSN), Alien Registration Number (A-Number), driver’s license number, other personal identification numbers, fingerprint identification number, passport number);</p>
            <p>•Visa, border, immigration and citizenship information (e.g., citizenship and/or immigration status, application for benefit information, visa and travel history);</p>
            <p>•Criminal history information (e.g., FBI number, booking number, current charge[s], custodial status, past offenses and convictions);</p>
            <p>•NCIC hit confirmation records, which consist of information supporting the entry of criminal warrants or immigration lookouts into the NCIC system, such as criminal arrest warrant information, fingerprints and photographs, other information identifying the individual, and records reflecting the purpose/basis for the warrant or lookout. Records of inquiries received from criminal justice agencies regarding potential matches against ICE-created NCIC records, and records pertaining to ICE’s research, resolution, and response to those inquiries;</p>
            <p>•Background investigation records, which consist of identifying and other information received from agencies requesting an immigration status check and/or criminal history check on individuals as part of a background check for employment, gun ownership, or other reasons; research conducted by ICE during the conduct of the immigration status check; and ICE’s research, resolution, and response to those inquiries;</p>
            <p>•Sponsor screening records, which consist of identifying and other information received from HHS regarding potential sponsors of unaccompanied alien children and other adult members of the potential sponsor’s household; research conducted by ICE during such screening; and ICE’s response to those inquiries.</p>
            <p>•Biometric identifiers (potential sponsors for unaccompanied alien children and other adult members of the potential sponsors’ household only);</p>
            <p>•Criminal justice immigration status check records, which consist of identifying and other information received from criminal justice agencies requesting an immigration status check on individuals in the context of a criminal justice matter; prioritization of requests; research conducted by ICE during the conduct of the immigration status check; and ICE’s research, resolution, and response to those inquiries;</p>
            <p>•Information received pursuant to the activities supported by this system of records, including leads for ICE investigations and referrals to other agencies; and</p>
            <p>•Identification and authentication information for law enforcement officers or other criminal justice personnel who contact ICE.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p>Records are obtained from ICE, other federal, state, local, tribal, foreign, and international criminal justice entities (e.g., law enforcement agencies, investigators, prosecutors, correctional institutions, police departments, and parole boards), and other Federal Government agencies.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
            <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agency conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
            <p>1. DHS or any component thereof;</p>
            <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
            <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
            <p>4. The United States or any agency thereof.</p>
            <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
            <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. sec. 2904 and 2906.</p>
            <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
            <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
            <p>F: To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
            <p>G. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            <p>H. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
            <p>I. To federal, state, local, tribal, territorial, foreign, or international agencies, if the information is relevant and necessary to a requesting agency’s decision concerning individuals who are being screened with respect to their participation in, attendance at, or other relation to a national or special security event.</p>
            <p>J. To domestic governmental agencies seeking to determine the immigration status of persons who have applied to purchase/obtain a firearm in the United States, pursuant to checks conducted on such persons under the Brady Handgun Violence Prevention Act or other applicable laws.</p>
            <p>K. To federal, state, local, tribal, territorial, or international agencies seeking to verify or ascertain the citizenship or immigration status of any individual within the jurisdiction of the agency for any purpose authorized by law.</p>
            <p>L. To courts, magistrates, administrative tribunals, opposing counsel, parties, and witnesses, in the course of immigration, civil, or criminal proceedings (including discovery, presentation of evidence, and settlement negotiations) and when DHS determines that use of such records is relevant and necessary to the litigation before a court or adjudicative body when any of the following is a party to or have an interest in the litigation:</p>
            <p>1. DHS or any component thereof;</p>
            <p>2. Any employee of DHS in his/her official capacity;</p>
            <p>3. Any employee of DHS in his/her individual capacity when the Government has agreed to represent the employee; or</p>
            <p>4. The United States, when DHS determines that litigation is likely to affect DHS or any of its components.</p>
            <p>M. To the DOJ, Federal Bureau of Prisons (BOP), and other federal, state, local, territorial, tribal, and foreign law enforcement or custodial agencies for the purpose of placing an immigration detainer on an individual in that agency’s custody, or to facilitate the transfer of custody of an individual to DHS from the other agency.</p>
            <p>N. To a former employee of DHS for purposes of responding to an official inquiry by federal, state, local, tribal, territorial government agencies, or professional licensing authorities; or facilitating communications with a former employee that may be relevant and necessary for personnel-related or other official purposes when DHS requires information or consultation assistance from the former employee regarding a matter within that person’s former area of responsibility.</p>
            <p>O. To federal, state, local, tribal, territorial, or foreign government agencies, as well as to other individuals and organizations during the course of an investigation by DHS or the processing of a matter under DHS’s jurisdiction, or during a proceeding within the purview of the immigration and nationality laws, when DHS deems that such disclosure is necessary to carry out its functions and statutory mandates or to elicit information required by DHS to carry out its functions and statutory mandates.</p>
            <p>P. To international, foreign, intergovernmental, and multinational government agencies, authorities, and organizations in accordance with law and formal or informal international arrangements.</p>
            <p>Q. To OMB in connection with the review of private relief legislation as set forth in OMB Circular No. A-19 at any stage of the legislative coordination and clearance process as set forth in the Circular.</p>
            <p>R. To the U.S. Senate Committee on the Judiciary or the U.S. House of Representatives Committee on the Judiciary when necessary to inform members of Congress about an alien who is being considered for private immigration relief.</p>
            <p>S. To the Department of State when it requires information to consider and/or provide an informed response to a request for information from a foreign, international, or intergovernmental agency, authority, or organization about an alien or an enforcement operation with transnational implications.</p>
            <p>T. To federal, state, local, territorial, tribal, international, or foreign criminal, civil, or regulatory law enforcement authorities when the information is necessary for collaboration, coordination, and de-confliction of investigative matters, prosecutions, and/or other law enforcement actions to avoid duplicative or disruptive efforts and to ensure the safety of law enforcement officers who may be working on related law enforcement matters.</p>
            <p>U. To federal, state, local, tribal, territorial, or foreign government agencies or entities or multinational government agencies, with the approval of the Chief Privacy Officer, when DHS desires to exchange relevant data for the purpose of developing, testing, or implementing new software or technology whose purpose is related to this system of records.</p>
            <p>V. To prospective claimants and their attorneys for the purpose of negotiating the settlement of an actual or prospective claim against DHS or its current or former employees, in advance of the initiation of formal litigation or proceedings.</p>
            <p>W. To federal and foreign government intelligence or counterterrorism agencies or components when DHS becomes aware of an indication of a threat or potential threat to national or international security, or when such disclosure is to support the conduct of national intelligence and security investigations or to assist in anti-terrorism efforts.</p>
            <p>X. To the DOJ, Federal Bureau of Investigation (FBI) in order to facilitate responses to fingerprint-based immigration status queries that are sent to ICE, including queries that the FBI sends on behalf of another agency.</p>
            <p>Y. To federal, state, local, tribal, territorial, international, or foreign government agencies or entities for the purpose of consulting with that agency or entity:</p>
            <p>1. To assist in making a determination regarding redress for an individual in connection with the operations of a DHS component or program;</p>
            <p>2. To verify the identity of an individual seeking redress in connection with the operations of a DHS component or program; or</p>
            <p>3. To verify the accuracy of information submitted by an individual who has requested such redress on behalf of another individual.</p>
            <p>Z. To federal, state, local, tribal, territorial, foreign, or international agencies, if the information is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or the issuance, grant, renewal, suspension, or revocation of a security clearance, license, contract, grant, or other benefit; or to the extent necessary to obtain information relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant or other benefit.</p>
            <p>AA. To federal, state, local, tribal, territorial, foreign, or international agencies, if DHS determines (1) the information is relevant and necessary to the agency’s decision concerning the hiring or retention of an individual, or the issuance of a security clearance, license, contract, grant, or other benefit, and (2) failure to disclose the information is likely to create a risk to government facilities, equipment, or personnel; sensitive information; critical infrastructure; or the public safety.</p>
            <p>BB. To federal, state, local, tribal, territorial, foreign, or international agencies seeking information on the subjects of wants, warrants, or lookouts, or any other subject of interest, for purposes related to administering or enforcing the law, national security, immigration, or intelligence, when consistent with a DHS mission-related function.</p>
            <p>CC. To federal, state, local, tribal, territorial, or foreign government agencies or organizations, or international organizations, lawfully engaged in collecting law enforcement intelligence, whether civil or criminal, to enable these entities to carry out their law enforcement responsibilities, including the collection of law enforcement intelligence.</p>
            <p>DD. To foreign governments in order to notify them concerning an alien who is incapacitated, an unaccompanied minor, or deceased.</p>
            <p>EE. To federal, state, local, tribal, and territorial courts or government agencies involved in criminal investigation or prosecution, pretrial services, sentencing, parole, probation, bail bonds, child welfare services, or any other aspect of the criminal justice process, and to counsel representing an individual in a criminal, civil, or child welfare proceeding, in order to ensure the integrity of the justice system by informing these recipients of the existence of an immigration detainer on that individual or that individual’s status in removal proceedings, including removal, voluntary departure, or custodial status/location. Disclosure of that individual’s Alien Registration Number (A-Number) and country of birth is also authorized to facilitate use of the ICE Online Detainee Locator System by the aforementioned individuals and agencies. This routine use does not authorize disclosure to bail bond companies or agents.</p>
            <p>FF. To appropriate federal, state, local, tribal, foreign or international criminal justice agencies, or other authorized users of NCIC, to respond to inquiries regarding a person who is or may be the subject of an ICE-generated NCIC criminal arrest warrant or immigration lookout record.</p>
            <p>GG. To the U.S. Department of Health and Human Services (HHS), the citizenship or immigration status, immigration history, criminal history information, and other biographic information of potential sponsors for unaccompanied alien children and other adult members of the potential sponsors’ households to inform an HHS determination regarding sponsorship of an unaccompanied alien child.</p>
            <p>HH. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p> DHS/ICE stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
            <p> DHS/ICE retrieves records by personal, biographic, or biometric identifiers such as name, date of birth, place of birth, address, A-Number(s), FBI criminal history number(s), Social Security number, Fingerprint Identification Number, and passport number.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p>In accordance with Records Control Schedule DAA-0567-2017-0002, ICE retains the Immigration Alien Query (IAQ) and Immigration Alien Response (IAR) records pertaining to traditional law enforcement checks, non-criminal biographical and biometric investigations; and ICE-generated FBI NCIC records for seventy-five (75) years.. Records collected pursuant to the Brady Act, special security events, and OPM checks will be kept for five (5) years from the date an immigration status determination is made and an IAR returned, after which the records will be deleted from the ACRIMe information technology system. Furthermore, ICE is proposing to NARA to maintain records pertaining to the sponsorship of unaccompanied alien children for five (5) years. Until these records are officially scheduled, they will be treated as permanent and cannot be deleted.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
            <p>DHS/ICE safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. ICE has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act, and the JRA if applicable, because it is a law enforcement system. However, DHS/ICE will consider individual requests to determine whether or not information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the ICE Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the JRA provides a right of access, certain records about the individual may be available under FOIA.</p>
            <p>When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR part 5. The individual must first verify his or her identity, meaning that the individual must provide his or her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief FOIA Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
            <p>•Explain why he or she believe the Department would have information being requested;</p>
            <p>•Identify which component(s) of the Department the individual believes may have the information about him or her;</p>
            <p>•Specify when the individual believes the records would have been created; and</p>
            <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
            <p>If an individual’s request is seeking records pertaining to another living individual, the first individual must include a statement from the second individual certifying his/her agreement for the first individual to access his or her records.</p>
            <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p>Individuals who wish to contest the accuracy of records in this system of records should submit these requests to the ICE Office of Information Governance and Privacy – Privacy Division. Requests must comply with verification of identity requirements set forth in DHS Privacy Act regulations at 6 CFR 5.21(d). Please specify the nature of the complaint and provide any supporting documentation. By mail (please note substantial delivery delays exist): ICE Office of Information Governance and Privacy – Privacy Division, 500 12th Street SW., Mail Stop 5004, Washington, D.C. 20536. By email: ICEPrivacy@ice.dhs.gov. Please contact the Privacy Division with any questions about submitting a request or complaint at 202-732-3300 or ICEPrivacy@ice.dhs.gov.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p> See "Record Access Procedures."</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p> The Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. sec. 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), and (e)(8); (f); and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(k)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. sec. 552a(c)(3), (d), and (e)(1), (e)(4)(G), (e)(4)(H), and (f). Rules have been promulgated in accordance with the requirements of 5 U.S.C. sec. 553(b), (c), and (e) and have been published in the Federal Register as additions to Title 28, Code of Federal Regulations (28 CFR § 16.99). In addition, to the extent a record contains information from other exempt systems of records, ICE will rely on the exemptions claimed for those systems.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="history">
        <xhtmlContent>
            <p>78 FR 10623 (Feb. 14, 2013); 75 FR 8377 (Feb. 24, 2010); 74 FR 45079 (Aug. 31, 2009); 73 FR 74739 (Dec. 9, 2008).</p>
        </xhtmlContent>
    </subsection>
</section>

    <section id="ice8" toc="yes">
        <systemNumber>/ICE-008</systemNumber>
        <subsection type="systemName"> Department of Homeland Security (DHS)/U.S. Immigration and Customs Enforcement (ICE)-008 Search, Arrest, and Seizure Records.</subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified, Law Enforcement Sensitive.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at the U.S. Immigration and Customs Enforcement Headquarters in Washington D.C. and field offices, or designated cloud computing environments. Records are maintained in such systems as the following:  Telecommunications Linking (TLS) System, Title III Tracking, Body Worn Camera (BWC) System, ICE Case Management (ICM) System, and Repository for Analytics in a Virtualized Environment (RAVEN).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Deputy Assistant Director, Homeland Security Investigations Cyber and Operational Technology Division, 202-732-5200, 500 12th Street, SW, Washington, D.C. 20536.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>6 U.S.C. 202-203; 8 U.S.C. 1357; 18 U.S.C. 554; 8 U.S.C. 2518; 19 U.S.C. 66; 19 U.S.C. 1431; 19 U.S.C. 1509; 19 U.S.C. 1603; 19 U.S.C. 2072; 21 U.S.C. 967; 22 U.S.C. 2778; other applicable authorities from Title 18, United States Code; and Title 19, United States Code as delegated by the Secretary of Homeland Security under his or her authority granted by the Homeland Security Act of 2002 (Pub. L. 107-296); 31 CFR part 103; 19 U.S.C. secs. 66, 1618, 1625; 19 U.S.C. sec. 19 CFR Parts 171 and 172.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p> The purpose of this system is to:</p>
                <p>(1) Document relevant information and activity related to ICE searches of individuals and property; arrests of individuals; seizures of goods, property, and non-physical property (data, bank accounts); as well as related information about the individuals or entities suspected of violations of laws and regulations enforced by ICE.</p>
                <p>(2) Collect video/audio documentation of interactions:</p>
                	<p>(i) Between ICE and partner law enforcement and the public in furtherance of an active search, arrest, and seizure;</p>
                	<p>(ii) Between ICE and individuals who are aliens or foreign nationals encountered near/on the United States border; and</p>
                	<p>(iii) During significant public events requiring ICE’s involvement to ensure documentation of a search, arrest, or seizure so long as the sole purpose is not to record individuals who are engaged in activity protected by the First Amendment.</p>
                <p>(3) Facilitate communication between ICE and foreign and domestic law enforcement agencies for the purpose of enforcement and administration of laws, including immigration and customs laws.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p> Categories of individuals covered by this system include:</p>
                <p>  (1) Individuals who violated, or are believed to have violated, the laws and regulations enforced by ICE or partner law enforcement agencies, including those who have been administratively or criminally charged with violations of such laws and regulations;</p>
                <p>(2) Individuals related to arrested individuals, including guardians or custodians of minors, sponsors, or hosts of individuals who are dependent guests or visitors;</p>
                <p>(3) Individuals who are witnesses, and individuals who may have knowledge of alleged illegal activity (e.g., victims, associates) related to a search, arrest, and/or seizure;</p>
                <p>(4) Individuals who may be recorded incidentally by video or audio during a search, arrest, and/or seizure;</p>
                <p>(5) Owners, claimants, and other interested parties relating to detained seized, seized and/or forfeited goods and property;</p>
                <p>(6) Law enforcement personnel (e.g., ICE personnel, foreign and domestic law enforcement partners, and task force participants) or other assigned government personnel both directly involved in law enforcement duties and encountered incidental to enforcement duties.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p> Categories of records in this system may include:</p>
                <p>Information about individuals:</p>
                	<p>Name;</p>
                	<p>Nationality;</p>
                	<p>Aliases;</p>
                	<p>Social Security number;</p>
                	<p>A-Number;</p>
                	<p>Citizenship;</p>
                	<p>Date and place of birth;</p>
                	<p>Physical description of individual;</p>
                	<p>Addresses;</p>
                	<p>Telephone numbers;</p>
                	<p>Occupation;</p>
                	<p>Place of business;</p>
                	<p>Driver’s license number and other license information for owners and operators of vehicles, aircraft, and vessels;</p>
                	<p>Other biographical information;</p>
                	<p>Passport and visa information;</p>
                	<p>Criminal history;</p>
                	<p>Immigration status and history;</p>
                	<p>Employment history;</p>
                	<p>Business information, including occupation and place of business;</p>
                	<p>Information related to the individual’s entry into and exit from the United States;</p>
                	<p>Suspicious financial activity, currency transaction reports, and currency or monetary instrument reports;</p>
                	<p>Biometric information (i.e., fingerprints, voiceprints or voice audio recognition, iris images, photographs, DNA samples, and any unique numerical identifiers assigned to biometrics for administrative purposes) collected as a result of a search or arrest. DNA samples are collected and sent to the FBI. DNA samples are not retained or analyzed by ICE; and</p>
                	<p>Information pertaining to ICE’s collection of DNA samples, limited to the date and time of a successful collection and confirmation from the FBI that the sample was able to be sequenced. ICE does not receive or maintain the results of the FBI’s DNA analysis (i.e., DNA sequences).</p>
                <p>Information about the search, seizure, or detention of goods or property, or the search or arrest of individuals:</p>
                	<p>Search/arrest/seizure/detention:</p>
                	<p>Date;</p>
                	<p>Arrest location (public or non-public), including location of safehouse.</p>
                	<p>License and registration number of vehicles, aircraft, vessels, merchandise, goods, and other assets;</p>
                	<p>License plate vehicle tag number and registration information, including image of license plate characters and associated temporal and location information;</p>
                	<p>Individual and/or contraband's mode of entry (e.g., marine vessel), including a description of entry points(s);</p>
                	<p>Photographs related to searches, detentions, seizures, or arrests including those captured incidentally by search, arrest, and seizure activity;</p>
                	<p>Search, arrest, and seizure audio and or video footage/recordings, overt or covert, of ICE and partner law enforcement encounters, searches, seizures, stops, arrests, or other interactions (i.e., between ICE personnel and the public) including those captured incidentally by search, arrest, and seizure activity from a device mounted on a:</p>
                	<p>Mobile object, including a mobile vehicle or vessel (e.g., uncrewed aerial vehicles (UAS or sUAS); submersible vessels; land vehicles);</p>
                	<p>Stationary object; and</p>
                	<p>Individual, including</p>
                	<p>Law enforcement personnel (e.g., BWC footage); and</p>
                	<p>Citizen witnesses recording a law enforcement encounter(s) with the public (e.g., on a mobile device);</p>
                	<p>Forms that are part of the search arrest seizure process (e.g., declaration forms submitted to U.S. Customs and Border Protection (CBP));</p>
                	<p>Receipts of:</p>
                	<p>Cash, currency (e.g., crypto currency) or banking records; and</p>
                	<p>Goods, or other property seized, detained, or forfeited;</p>
                	<p>Description of goods or other property seized, detained, searched, or forfeited;</p>
                	<p>Estimated foreign value of seized goods or other property;</p>
                	<p>Duty paid and owed;</p>
                	<p>Domestic value of seized goods or other property;</p>
                	<p>Notices provided to owners, claimants, or other interested parties pertaining to seized goods or other property;</p>
                	<p>Reports of arrests, searches, detentions, and seizures by ICE including the circumstances of the seizure, including reports from other law enforcement agencies;</p>
                	<p>Section of law violated;</p>
                	<p>Warrant number;</p>
                	<p>Location tracking related data (e.g., geolocation coordinates, Global Positioning System (GPS) use, and cell tower coordinates);</p>
                	<p>Information, including that which is received from other governmental agencies, confidential sources, and other sources pertaining to search, arrest, and seizure activity, as well as search, arrest, and seizure referrals from other agencies, tips, and other leads pertaining to potential violations of U.S. customs and immigration law, as well as other laws and regulations within ICE's jurisdiction; and</p>
                	<p>Information about other law enforcement personnel (e.g., other Federal governmental and State and Local agencies) involved in an enforcement action, including: name, badge number, and station location.</p>
                <p>Any other evidence in any form collected during the course of a search, arrest, or seizure or contained within documents relating to such an action, including:</p>
                	<p>Papers, photographs, video, electronic recordings, electronic data, digital, virtual, non-fungible, or video records that was obtained, seized, or otherwise lawfully acquired from any source during the course of a search, arrest, seizure, to the extent relevant and necessary for the performance of ICE’s statutory enforcement authorities. This includes footage created from ICE’s use of body-worn cameras.</p>
                	<p>Seized or detained records in both paper and electronic form, including computers, computer records, disks, hard drives, flash drives and other electronic media and storage devices;</p>
                	<p>Digital evidence including cyber forensics (e.g., computer code which could reveal a nation-state’s or cyber criminal’s signature);</p>
                	<p>Internet protocol (IP) address, name, and uniform resource locator (URL), including those of website(s) seized; and</p>
                	<p>Metadata (data about data) which may include geolocation data, device unique identifier, video clip unique identifier, video clip file name, and video category tags.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p> Records are obtained from individuals who have been subject to search or arrest; owners, claimants, and other interested parties of detained, seized, and/or forfeited property; ICE personnel and ICE IT systems described in Privacy Impact Assessments which are wholly or partially covered by the SAS System of Records Notice; other federal agencies, and state, tribal, local and foreign law enforcement agencies; confidential sources; members of the public; and third-party commercial data brokers, sources or aggregators, or record holders. Sources of information also include: public records; publicly available information including social media; import and export records systems; immigration and admission records systems; victims; witnesses; and those individuals with knowledge of the alleged activity.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys Offices, or other federal agency conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency, or organization, or individual for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To a federal agency for a statistical or research purpose, including the development of methods or resources to support statistical or research activities, provided that the records support DHS programs and activities that relate to the purpose(s) stated in this SORN, and will not be used in whole or in part in making any determination regarding an individual’s rights, benefits, or privileges under federal programs, or published in any manner that identifies an individual.</p>
                <p>J. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation, provided disclosure is appropriate to the proper performance of the official duties of the ICE employee making the disclosure.</p>
                <p>K. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS is aware of a need to use relevant data, that relate to the purpose(s) stated in this SORN, for purposes of developing, testing, and/or implementing new technology.</p>
                <p>L. To international and foreign governmental authorities in accordance with the law and formal or informal international arrangements.</p>
                <p>M. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection with criminal law proceedings or in response to a judge-approved subpoena from a court of competent jurisdiction.</p>
                <p>N. To an appropriate federal, state, local, tribal, foreign, or international agency, if the information is relevant and necessary to a requesting agency's decision concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant or other benefit and disclosure is appropriate to the proper performance of the official duties of the person making the request.</p>
                <p>O. To federal, state, local, tribal, territorial, international, or foreign government agencies or entities for the purpose of consulting with those agencies or entities: (1) To assist in making a determination regarding redress for an individual in connection with the operations of a DHS component or program; (2) to verify the identity of an individual seeking redress in connection with the operations of a DHS component or program; or (3) to verify the accuracy of information submitted by an individual who has requested redress on behalf of another individual.</p>
                <p>P. To the Department of State when it requires information to consider and/or provide an informed response to a request for information from a foreign, international, or intergovernmental agency, authority, or organization about an alien or an enforcement operation with transnational implications.</p>
                <p>Q. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/ICE stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may also be stored on magnetic disc, tape, digital media, and CD-ROM. Records covered by this system of records notice may reside on the same on-premise servers or in a FedRAMP authorized cloud computing environment.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p> ICE may retrieve records by any of the personal identifier’s stored in the system including individual's name, Social Security number, ICE case number, biometric identification or algorithm (e.g., facial recognition, fingerprint, voice recognition), warrant number, or vehicle, vessel (e.g., marine), or aircraft number. Records may also be retrieved by non-personal information such as search, arrest, and seizure observation device (e.g., camera identification number), serial number/footage and date, description and value of goods or currency seized, encounter date and details, location (e.g., jurisdiction or hideout coordinates), and other information.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>The retention period for information contained in search, arrest, and seizure systems varies depending on the type of data. Biometric and biographical records are maintained for seventy-five (75) years in accordance with DHS schedule DA-0563-2013-0001-0006. Investigative case files are retained for twenty years (20) years after the case closure in accordance with N1-36-86-1-161.3 (inv 7B) and Neutrality/Munitions Investigative case files, which are permanent records, in accordance with N1-36-86-1-162.38. Evidentiary recordings are retained in accordance with the applicable ICE retention schedule - this is contingent on the information that is captured in the recording. For example, if the recording captures a use of force incident, it will be retained in accordance with DAA-0567-2015-0008-0001 for 45 years. Non-evidentiary video and audio recordings and associated identification information are retained for sixty (60) days in accordance with DAA-0567-2021-0001-0001. Disposal of paper files occurs by burning or shredding; electronic data is disposed of using methods approved by the DHS Chief Information Security Officer.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p>ICE safeguards records in this system according to applicable rules and policies, including all applicable DHS automated system security access policies. ICE has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions. For any records covered by this system of records notice that reside in a cloud computing environment, those environments will have undergone a robust FedRAMP authorization process to validate strict controls are employed to protect the confidentiality, integrity, and availability of the records.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act, and the Judicial Redress Act if applicable, because it is a law enforcement system. However, ICE will consider individual requests to determine whether or not information may be released. Thus, individuals seeking access to, and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the DHS Chief Privacy Officer and the ICE FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia. If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Certain records about an individual may be available under the Freedom of Information Act if they are not available under the Privacy Act or the Judicial Redress Act.</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                	<p>Explain why he or she believes the Department would have information being requested;</p>
                	<p>Identify which component(s) of the Department he or she believes may have the information;</p>
                	<p>Specify when the individual believes the records would have been created; and</p>
                	<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered Judicial Redress Act records, individuals may make a request for amendment or correction of a record by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record. See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p> See "Records Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. sec. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), and (e)(4)(H), (e)(5), and (e)(8); (f); and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(k)(2), has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in those subsections: 5 U.S.C. sec. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), and (f). In addition, to the extent a record contains information from other exempt systems of records, ICE will rely on the exemptions claimed for those original systems.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>73 Fed. Reg. 74732 (December 9, 2008).</p>
            </xhtmlContent>
        </subsection>
    </section>

    <section id="ice9" toc="yes">
<systemNumber>/ICE-009</systemNumber>
    <subsection type="systemName">
        U.S. Department of Homeland Security (DHS)/Immigration and Customs Enforcement (ICE)-009 External Investigations
    </subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p>Unclassified and Law Enforcement Sensitive (LES).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p>Records are maintained at U.S. Immigration and Customs Enforcement Headquarters in Washington, D.C. and in field offices.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p>Immigration and Customs Enforcement, Mission Support Division, Unit Chief, Executive Information Unit/Program Management Oversight (EIU/PMO), Potomac Center North, 500 12th Street, SW, Washington, D.C. 20536.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="authorityForMaintenance">
        <xhtmlContent>
            <p>5 U.S.C. 301; 6 U.S.C. 201-203; 8 U.S.C. 1357; 18 U.S.C. 116; 18 U.S.C. 554; 18 U.S.C. 1091; 18 U.S.C. 2340A; 18 U.S.C. 2441; 18 U.S.C. 2442; 18 U.S.C. 2518; 19 U.S.C. 66; 19 U.S.C. 1431; 19 U.S.C.1509; 19 U.S.C. 1603; 19 U.S.C. 2072; 21 U.S.C. 967; 22 U.S.C. 2778; 40 U.S.C. 1315; 50 U.S.C. 1701; 50 U.S.C. 2410; 50 U.S.C. 2411; other applicable authorities from Title 18, United States Code; and Title 19, United States Code as delegated by the Secretary of Homeland Security under his or her authority granted by the Homeland Security Act of 2002 (Pub. Law 107-296); 31 CFR part 103; Title 40 United States Code; INA 235(d)(4)(A); and INA 274A(e)(2)(C).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p>(1) To document external audits, inquiries, and investigations performed by ICE pertaining to suspected violations of laws regulating the movement of people and goods into and out of the United States in addition to other violations of other laws within ICE’s jurisdiction; (2) To facilitate communication between ICE and foreign and domestic law enforcement agencies for the purpose of enforcement and administration of laws, including immigration and customs laws; (3) To provide appropriate notification to victims in accordance with federal victim protection laws; (4) To support inquiries and investigations performed to enforce the administrative provisions of the INA; and (5) To identify potential criminal activity, immigration violations, and threats to homeland security; to uphold and enforce the law; and to ensure public safety.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p>Categories of records in this system may include:</p>
            <p>Subject Records:</p>
            • 	<p>Name and Aliases;</p>
            • 	<p>Addresses;</p>
            • 	<p>Social Security number;</p>
            • 	<p>Armed Forces Number;</p>
            • 	<p>Alien Registration number;</p>
            • 	<p>Date and place of birth;</p>
            • 	<p>Citizenship;</p>
            • 	<p>Passport and visa information;</p>
            • 	<p>License information for owners and operators of vehicles, aircraft, and vessels;</p>
            • 	<p>Criminal history;</p>
            • 	<p>Immigration status and history;</p>
            • 	<p>Employment history or business information;</p>
            • 	<p>Information related to the subject’s entry and exit of the United States;</p>
            • 	<p>Other biographical information;</p>
            • 	<p>IP address;</p>
            • 	<p>Social media account information and publicly available social media posts;</p>
            • 	<p>Biometric information, including facial images, iris images, fingerprints, and voice audio;</p>
            • 	<p>Suspicious financial activity, currency transaction reports, and currency or monetary instrument reports; and</p>
            • 	<p>Information related to whether individuals have a verified familial relationship based on DNA test results.</p>
            <p>Associate, Victim, and Witness Records:</p>
            • 	<p>Name;</p>
            • 	<p>Contact information, including address and telephone numbers;</p>
            • 	<p>Alien Registration number;</p>
            • 	<p>Date and place of birth;</p>
            • 	<p>Citizenship;</p>
            • 	<p>Passport and visa information;</p>
            • 	<p>Biometric information, including facial images, iris images, fingerprints, and voice audio;</p>
            • 	<p>Sworn statements, reports of interview, and testimony;</p>
            • 	<p>Relationship to subject of the investigation;</p>
            • 	<p>Social media handles or account names and publicly available social media posts;</p>
            • 	<p>Victim services needed; and</p>
            • 	<p>Other relevant biographical and background information, such as employment and education.</p>
            <p>Location-Related Records:</p>
            • 	<p>Location tracking tools that maintain a list of tracking devices by serial number/Mobile Directory Number (MDN)/International Mobile Equipment Identity (IMEI)/Mobile Equipment ID (MEID), and their current locations using Global Positioning System (GPS) and/or assisted Cellular Tower coordinates. These location tracking tools are deployed on targets of investigations, vehicles of interest in investigations, contraband, but also on the official vehicles owned by ICE and used by agents and officers in the field;</p>
            • 	<p>License Plate Reader (LPR) information, including images of vehicles license plates associated with a target of investigation (a person or vehicle), date and time of image capture, and GPS coordinates for the location where the license plate was photographed;</p>
            <p>Third-Party Records Holders:</p>
            • 	<p>Name;</p>
            • 	<p>Date of birth;</p>
            • 	<p>Contact information, including address and telephone numbers;</p>
            • 	<p>Social Security number, Alien Number, tax information number, or other personal identification numbers;</p>
            • 	<p>Importer and exporter numbers;</p>
            • 	<p>Internet protocol (IP) addresses and uniform resource locators (URLs);</p>
            • 	<p>Bank account numbers;</p>
            • 	<p>Device identifiers and serial numbers.</p>
            <p>Investigatory and Evidentiary Records:</p>
            • 	<p>ICE case number;</p>
            • 	<p>Unique numerical identifiers assigned to biometrics for administrative purposes;</p>
            • 	<p>Identifying information of assigned ICE personnel, including name, badge number, and contact information;</p>
            • 	<p>Incident reports;</p>
            • 	<p>Complaint forms and other records pertaining to potential or actual intellectual property crimes;</p>
            • 	<p>I-9 Forms and other records pertaining to employment control audits, inquiries, and investigations;</p>
            • 	<p>Emails;</p>
            • 	<p>Telecommunication device identifiers;</p>
            • 	<p>Telecommunications usage data;</p>
            • 	<p>Call and subscriber records;</p>
            • 	<p>Banking records;</p>
            • 	<p>Travel history records;</p>
            • 	<p>Reports and memoranda prepared by investigators during the course of the investigation or received from other agencies participating in or having information relevant to the investigation;</p>
            • 	<p>Statements of targets and witnesses;</p>
            • 	<p>Law enforcement intelligence reports;</p>
            • 	<p>Electronic surveillance reports;</p>
            • 	<p>Asset ownership information such as registration data and license data, for vehicles, vessels, merchandise, goods, and other assets;</p>
            • 	<p>Information about duties and penalties owed, assessed, and paid;</p>
            • 	<p>Information about goods and merchandise, such as import and export forms and declarations filed, lab or analytical reports, valuation and classification of goods, and other relevant data;</p>
            • 	<p>Correspondence and court filings;</p>
            • 	<p>Information received from other governmental agencies, confidential sources, and other sources pertaining to an investigation, as well as investigatory referrals from other agencies, tips, and other leads pertaining to potential violations of U.S. customs and immigration law, as well as other laws and regulations within ICE’s jurisdiction; and</p>
            • 	<p>Any other evidence in any form, including papers, photographs, video, electronic recordings, electronic data, or video records that was obtained, seized, or otherwise lawfully acquired from any source during the course of the investigation, to the extent relevant and necessary for the performance of ICE’s statutory enforcement authorities.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p>ICE may receive information in the course of its law enforcement investigations from nearly any source. Sources of information include: domestic and foreign governmental and quasi-governmental agencies and data systems, public records, publicly available social media, commercial data aggregators, import and export records systems, immigration and alien admission records systems, members of the public, subjects of investigation, victims, witnesses, confidential sources, and those with knowledge of the alleged activity.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
            <p>A. To the Department of Justice, Offices of the U.S. Attorney, or other federal agencies conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
            <p>1. DHS or any component thereof;</p>
            <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
            <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
            <p>4. The United States or any agency thereof.</p>
            <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
            <p>C. To the National Archives and Records Administration (NARA) or the General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
            <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
            <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
            <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
            <p>G. To an appropriate federal, State, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
            <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            <p>I. To a federal agency for a statistical or research purpose, including the development of methods or resources to support statistical or research activities, provided that the records support DHS programs and activities that relate to the purpose(s) stated in this SORN, and will not be used in whole or in part in making any determination regarding an individual’s rights, benefits, or privileges under federal programs, or published in any manner that identifies an individual.</p>
            <p>J. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation, provided disclosure is appropriate to the proper performance of the official duties of the officer making the disclosure.</p>
            <p>K. To federal law enforcement and/or regulatory agencies, technical, or subject matter expert, or any other entity involved in or assisting with law enforcement efforts pertaining to suspected or confirmed export violations in accordance with Federal export laws, including the Arms Export Control Act, 22 U.S.C. sec. 2778 and the Export Administration Act, 50 U.S.C. sec. 2410.</p>
            <p>L. To federal and foreign government intelligence or counterterrorism agencies or components when DHS becomes aware of an indication of a threat or potential threat to national or international security, or when such disclosure is to support the conduct of national intelligence and security investigations or to assist in anti-terrorism efforts.</p>
            <p>M. To victims regarding custodial information, such as release on bond, order of supervision, removal from the United States, or death in custody, about an individual who is the subject of a criminal or immigration investigation, proceeding, or prosecution.</p>
            <p>N. To international, foreign, intergovernmental, and multinational government agencies, authorities, and organizations in accordance with law and formal or informal international arrangements.</p>
            <p>O. To a public or professional licensing organization when such information indicates, either by itself or in combination with other information, a violation or potential violation of professional standards, or reflects on the moral, educational, or professional qualifications of an individual who is licensed or who is seeking to become licensed.</p>
            <p>P. To federal, state, local, tribal, territorial, or foreign government agencies or organizations, or international organizations, lawfully engaged in collecting law enforcement intelligence, whether civil or criminal, to enable these entities to carry out their law enforcement responsibilities, including the collection of law enforcement intelligence.</p>
            <p>Q. To the Department of State when it requires information to consider and/or provide an informed response to a request for information from a foreign, international, or intergovernmental agency, authority, or organization about an alien or an enforcement operation with transnational implications.</p>
            <p>R. To federal, state, local, territorial, tribal, international, or foreign criminal, civil, or regulatory law enforcement authorities when the information is necessary for collaboration, coordination, and de-confliction of investigative matters, prosecutions, and/or other law enforcement actions to avoid duplicative or disruptive efforts and to ensure the safety of law enforcement officers who may be working on related law enforcement matters.</p>
            <p>S. To the Department of Justice to facilitate the missions of the Organized Crime Drug Enforcement Task Force (OCDETF) Program and the International Organized Crime Intelligence and Operations Center (IOC-2).</p>
            <p>T. To the Department of State for use in passport and visa revocation, issuance, or reissuance determinations.</p>
            <p>U. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS is aware of a need to use relevant data for purposes of testing new technology to be used by or on behalf of DHS.</p>
            <p>V. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
            <p>Records are retrieved by individual’s name, date of birth, ICE investigative file number, Social Security number, numerical identifiers assigned to biometrics collected (e.g., fingerprint ID number); driver’s license number, pilot’s license number, vehicle license plate number, address, home telephone number, passport number, citizenship, country of birth, armed forces number, and date of entry into the United States.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p>Investigative files concerning munitions control cases are permanent records that are transferred to the Federal Records Center after one year, and then transferred to NARA fifteen years after case closure, in accordance with legacy Customs schedule N1-36-86-1/162.38. Records for all other closed investigative cases are retained for 20 years in accordance with legacy customs schedule N1-36-86-1-161.3 (inv 7B). Destruction is by burning or shredding. An updated schedule for investigative records will be developed and submitted to NARA for approval.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
            <p>DHS/ICE safeguards records in this system according to applicable rules and policies, including all applicable DHS automated system security and access policies. DHS/ICE has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions. The system maintains a real-time auditing function of individuals who access the system. Additional safeguards</p>
            <p>may vary by component and program.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act because it is a law enforcement system. However, ICE will consider requests to determine whether or not information may be released. Thus, individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the U.S. Immigration and Customs Enforcement Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, U.S. Department of Homeland Security, 245 Murray Drive SW, Building 410, STOP-0550, Washington, D.C. 20528. Even if neither the Privacy Act nor the Judicial Redress Act provides a right of access, certain records about you may be available under the Freedom of Information Act.</p>
            <p>When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
            • 	<p>Explain why he or she believes the Department would have information being requested;</p>
            • 	<p>Identify which component(s) of the Department he or she believes may have the information;</p>
            • 	<p>Specify when the individual believes the records would have been created; and</p>
            • 	<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
            <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
            <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p>For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
            <p> Individuals who wish to contest the accuracy of records in this system of records should submit these requests to the Privacy Division of the ICE Information Governance &amp;amp;amp;amp;amp;amp; Privacy Office. Requests must comply with verification of identity requirements set forth in Department of Homeland Security Privacy Act regulations at 6 CFR 5.21(d). Please specify the nature of the complaint and provide any supporting documentation. By mail (please note substantial delivery delays exist): ICE Information Governance &amp;amp;amp;amp;amp;amp; Privacy Office, ATTN: Privacy Division, 500 12th Street SW, Mail Stop 5004, Washington, D.C. 20536. By email: ICEPrivacy@ice.dhs.gov.</p>
            <p> Please contact the Privacy Division with any questions about submitting a request at (202) 732-3300 or ICEPrivacy@ice.dhs.gov.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p>See "Record Access Procedures" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. sec. 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5), and (e)(8); (f); and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(k)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. sec. 552a(c)(3); (d); (e)(1), (e)(4)(G), and (e)(4)(H); and (f). To the extent a record contains information from other exempt systems of records, ICE will rely on the exemptions claimed for those systems.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="history">
        <xhtmlContent>
            <p>DHS/ICE-009 External Investigations, 75 FR 404 (January 5, 2010).</p>
        </xhtmlContent></subsection></section>

<section id="ice10" toc="yes">
<systemNumber>/ICE-010</systemNumber>
<subsection type="systemName">Immigration and Customs Enforcement Confidential and Other Sources of Information (COSI).
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified. Law Enforcement Sensitive (LES).
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at ICE Headquarters in Washington, DC and at ICE field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include:
</p><p>(1) Confidential Informants: Individuals who have been documented as Confidential Informants and report information to
ICE regarding possible violations of law or other information in support of law enforcement investigations and
activities. Confidential Informants are members of the public acting in either their personal or professional capacities.
</p><p>(2) Sources of Information: Individuals who are not documented as Confidential Informants as described in (1) above
who report information to ICE regarding possible violations of law or other information in support of law enforcement
investigations and activities. These individuals are cooperating defendants to a criminal, civil, or administrative case
or members of the public acting in either their personal or professional capacities.
</p><p>(3) Federal, state, local, tribal, territorial, or foreign government personnel acting in their personal or
professional capacities.
</p><p>(4) Federal, state, local, tribal, territorial, or foreign law enforcement officers acting in their professional
capacities.
</p><p>(5) Individuals reported by Confidential Informants and Sources of Information or federal, state, local, tribal,
territorial or foreign government personnel or law enforcement officers acting in their professional capacities:
Individuals whose information is provided to ICE by the individuals described in (1), (2), and (3) above. These
individuals are typically persons who are alleged to have engaged in, witnessed, or otherwise been associated with
suspected illegal activity.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system may include:
</p><p>For Confidential Informants:
</p><p>• Individual’s name (actual or assumed);
</p><p>• ICE Confidential Informant (identifying) number;
</p><p>• Date ICE Informant number assigned;
</p><p>• Date Informant was deactivated;
</p><p>• Addresses;
</p><p>• Nationality;
</p><p>• Occupational information;
</p><p>• Date and place of birth;
</p><p>• Physical description of identifying features;
</p><p>• Special skills (e.g., languages spoken, special certifications, areas of expertise);
</p><p>• Photograph of Informant;
</p><p>• Fingerprints;
</p><p>• Handwriting sample;
</p><p>• Identifying numbers, such as Social Security Number, Alien Registration Number, driver’s license number,
FBI number, and passport number;
</p><p>• Immigration history;
</p><p>• Criminal history information;
</p><p>• Copy of driver’s license;
</p><p>• Copy of alien registration card;
</p><p>• Copy of passport(s);
</p><p>• Bank account information;
</p><p>• Documentation of information received and the amount and date of any monetary payment made to the
Informant; and
</p><p>• Internal ICE memoranda and other reports pertinent to a confidential informant’s eligibility,
suitability, and identity.
</p><p>For Sources of Information:
</p><p>• Individual’s name (actual or assumed);
</p><p>• Addresses;
</p><p>• Nationality;
</p><p>• Occupational information;
</p><p>• Criminal History Information;
</p><p>• Date and place of birth;
</p><p>• Immigration history;
</p><p>• Documentation of information received and the amount and date of any monetary payment made to the Source;
and
</p><p>• Internal ICE memoranda and other reports pertinent to a Source’s eligibility, suitability and identity.
</p><p>For federal, state, local, tribal, territorial or foreign government personnel or law enforcement officers:
</p><p>• Individual’s Name (actual or assumed);
</p><p>• Addresses;
</p><p>• Agency;
</p><p>• Nationality; and
</p><p>• Occupational Information.
</p><p>For individuals about whom information is provided:
</p><p>• Individual’s name (alleged violator, witness, interested parties, those connected with the
investigation);
</p><p>• Aliases;
</p><p>• Addresses;
</p><p>• Nationality;
</p><p>• Occupational information;
</p><p>• Date and place of birth;
</p><p>• Physical description of identifying features;
</p><p>• Photograph of the individual;
</p><p>• Fingerprints;
</p><p>• Handwriting sample;
</p><p>• Identifying numbers, such as Social Security Number, Alien Registration Number, driver’s license number,
FBI/National Crime Information Center (NCIC) number, and passport number;
</p><p>• Telephone numbers;
</p><p>• Emergency contact information;
</p><p>• Association/Organization memberships;
</p><p>• Copy of alien registration card;
</p><p>• Copy of driver’s license;
</p><p>• Registration number of vehicle, vessel, or aircraft;
</p><p>• ICE Investigative case number;
</p><p>• Internal DHS/ICE memoranda and related materials regarding possible violations of law;
</p><p>• Criminal record information;
</p><p>• Financial record information;
</p><p>• Documentation of information received from Confidential Informants, agencies and other individuals;
</p><p>• The ICE office receiving the information; and
</p><p>• ICE Duty Agent Log of information received, which contains some or all of the specific data listed above.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>8 U.S.C. 1357 and 19 U.S.C. 1589a.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to document and manage the identities of and information received from a number of
sources, including Confidential Informants, regarding possible violations of law or other information in support of law
enforcement investigations and activities conducted by ICE.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of
the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (DOJ), including U.S. Attorney Offices, or other federal agency conducting litigation
or in proceedings before any court, adjudicative, or administrative body, when it is relevant and necessary to the
litigation and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. any employee or former employee of DHS in his/her official capacity;
</p><p>3. any employee or former employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the
employee; or
</p><p>4. the United States, or any agency thereof.
</p><p>B. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>C. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. DHS has determined that as a result of the suspected or confirmed compromise there is a risk of identity theft or
fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system
or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised
information; and
</p><p>3. the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>D. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>E. Where a record, either on its face or in conjunction with other information, indicates a violation of law, rule,
regulation, or order, which includes criminal, civil, or regulatory violations, and such disclosure is proper and
consistent with the official duties of the person making the disclosure, a disclosure may be made to federal, state,
local, tribal, territorial, international, or foreign law enforcement agencies or other appropriate authorities charged
with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order.
</p><p>F. To federal, state, local, tribal, territorial, foreign, or international agencies for the purpose of obtaining
information relevant and necessary to ICE’s decision whether an individual may act as a Confidential Informant.
</p><p>G. To courts, magistrates, administrative tribunals, parties, and witnesses, in the course of immigration, civil, or
criminal proceedings (including discovery, presentation of evidence, and settlement negotiations) and when DHS determines
that use of such records is relevant and necessary to the litigation before a court or adjudicative body when any of the
following is a party to or have an interest in the litigation:
</p><p>(1) DHS or any component thereof;
</p><p>(2) any employee of DHS in his/her official capacity;
</p><p>(3) any employee of DHS in his/her individual capacity where the government has agreed to represent the employee; or
</p><p>(4) the United States, where DHS determines the litigation is likely to affect DHS or any of its components.
</p><p>H. To prospective claimants and their attorneys for the purpose of negotiating the settlement of an actual of
prospective claim against DHS or its current or former employees, in advance of the initiation of formal litigation or
proceedings.
</p><p>I. To a former employee of DHS for purposes of responding to an official inquiry by federal, state, local, tribal, or
territorial government agencies or professional licensing authorities or facilitating communications with a former
employee that may be relevant and necessary for personnel-related or other official purposes where DHS requires
information nor consultation assistance from the former employee regarding a matter within that person’s former area of
responsibility.
</p><p>J. To international, foreign, intergovernmental, and multinational government agencies, authorities, and organizations
to facilitate the testimony of a Confidential Informant in a criminal, civil, or administrative case in which the
Confidential Informant is a cooperating witness or party.
</p><p>K. To federal, state, local, tribal, territorial, or foreign government agencies, as well as to other individuals and
organizations during the course of an investigation by DHS or the processing of a matter under DHS’s jurisdiction, or
during a proceeding within the purview of the immigration and nationality laws, when DHS deems that such disclosure is
necessary to carry out its functions and statutory mandates or to elicit information required by DHS to carry out its
functions and statutory mandates.
</p><p>L. To federal, state, local, tribal, territorial, foreign, or international criminal, civil, or regulatory law
enforcement authorities when the information is necessary for collaboration, coordination, and de-confliction of
investigative matters, prosecutions, and/or other law enforcement actions to avoid duplicative or disruptive efforts and
to ensure the safety of law enforcement officers who may be working on related law enforcement matters.
</p><p>M. To federal and foreign government intelligence or counterterrorism agencies or components where DHS becomes aware
of an indication of a threat or potential threat to national or international security, or where such disclosure is to
support the conduct of national intelligence and security investigations or to assist in anti-terrorism efforts.
</p><p>N. To the Department of State when it requires information to consider and/or provide an informed response to a
request for information from a foreign, international, or intergovernmental agency, authority, or organization about an
alien or an enforcement operation with transnational implications.
</p><p>O. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a locked
door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records for Confidential Informants are retrieved by ICE by their numerical identifier or the associated ICE
investigative case number. Other source records are retrieved by ICE investigative case number, individual’s name or
alias (source, subject or other person connected with the investigation), the ICE field office which received the
information, and the date the information was received.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable DHS
automated system security access policies. Strict controls have been imposed to minimize the risk of compromising the
information that is being stored. Access to the computer system containing the records in this system is limited to those
individuals who have a need to know the information for the performance of their official duties and who have appropriate
clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>ICE is seeking approval for a records retention schedule for the records described in this system of records. ICE
proposes to maintain both electronic and paper-based records pertaining to Confidential Informants in active form at ICE
Headquarters for five (5) years past the date of an individual’s deactivation from being a Confidential Informant. The
records will then be archived and retained at ICE Headquarters for an additional fifty (50) years, following which the
records will be destroyed.
</p><p>The retention and disposal period listed in the existing system of records notice will continue to be applicable for
paper-based records pertaining to Confidential Informants maintained at ICE field offices as well as records pertaining
to Non-Confidential Sources and individuals reported by Confidential Informants and Non-Confidential Sources. Records are
maintained until the end of the fiscal year in which the related investigative file is closed. The records are then
transferred to the Federal Records Center five (5) years after the end of that fiscal year. The records are then
destroyed fifty (50) years after the end of the fiscal year in which the related investigative file is closed. Disposal
of paper files occurs by burning or shredding; electronic data is disposed of using methods approved by the DHS Chief
Information Security Officer.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Deputy Assistant Director, Investigative Services Division, Office of Investigations, ICE Headquarters, Potomac Center
North, 500 12th St. SW., Washington, DC 20024.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of
the Privacy Act because it is a law enforcement system. However, DHS/ICE will consider individual requests to determine
whether or not information may be released. Thus, individuals seeking notification of and access to any record contained
in this system of records, or seeking to contest its content, may submit a request in writing to ICE’s FOIA Officer,
whose contact information can be found at <i>http://www.dhs.gov/foia</i> under "contacts." If an
individual believes more than one component maintains Privacy Act records concerning him or her, the individual may
submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, U.S. Department of Homeland
Security, 245 Murray Drive SW., Building 410, STOP-0550, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, <i>
http://www.dhs.gov/foia</i> or 1-866-431-0486. In addition you should:
</p><p>• Explain why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created; and
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records.
</p><p>If your request is seeking records pertaining to another living individual, you must include a statement from that
individual certifying his/her agreement for you to access his/her records.
</p><p>Without the above information, the component(s) will not be able to conduct an effective search, and your request may
be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are obtained from other federal, state, local, tribal, and territorial law enforcement agencies, Confidential
Informants, and any other sources of information including members of the public.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>Pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act, portions of this system are exempt from 5 U.S.C. 552a(c)
(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and (e)(8); (f), and (g). Pursuant to 5 U.S.C.
552a(k)(2), this system is exempt from the following provisions of the Privacy Act, subject to the limitations set forth
in those subsections: 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), and (f). When a record received from
another system has been exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will claim the same exemptions for
those records that are claimed for the original primary systems of records from which they originated and claims any
additional exemptions set forth here.
</p></xhtmlContent></subsection></section>
    <section id="ice11" toc="yes">
        <systemNumber>/ DHS/ICE-011</systemNumber>
        <subsection type="systemName">
            DHS/ICE-011 Criminal Arrest Records and Immigration Enforcement Records (CARIER).
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>
                    Unclassified. The data may be retained on classified networks, but this does not change the nature and character of the data until it is combined with classified information.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p> Records are maintained in DHS/ICE information technology (IT) systems (e.g., the Enforcement Integrated Database (EID) and their associated ICE applications. and contractor-owned IT systems, including those supporting the ICE Alternatives to Detention program). Records are also maintained in associated electronic and paper files located at ICE Headquarters in Washington, D.C., ICE field and attaché offices, contractor offices, and detention facilities operated by or on behalf of ICE, or that otherwise house individuals arrested or detained by ICE. Finally, records are replicated from the operational DHS/ICE IT systems and maintained on DHS unclassified and classified networks used for analysis and vetting.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Executive Associate Director, Office of Enforcement and Removal Operations, U.S. Immigration &amp; Customs Enforcement, 500 12th Street SW, Washington, D.C. 20536.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>Authority for maintaining this system is in sections 103, 235, 236, 274, 287, and 290 of the Immigration and Nationality Act (INA), 8 United States Code, sections 1103, 1225, 1226, 1324, 1357, 1360, and 1365(a)(b); Title 18, United States Code, Chapters 27, 77, 85, 95, 109A, 110, 113, and 117; Title 31, United States Code, Chapter 53, Subchapter II; Title 50 Appendix, United States Code; The Tariff Act of 1930; Justice for All Act of 2004 (Pub. L. 108-405); DNA Fingerprint Act of 2005 (Public Law 109-162); Adam Walsh Child Protection and Safety Act of 2006 (Pub. L. 109-248); and 28 CFR Part 28, "DNA-Sample Collection and Biological Evidence Preservation in the Federal Jurisdiction."</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purposes of this system are:</p>
                <p>1. To support the identification, arrest, charging, monitoring, detention, and/or removal of individuals unlawfully entering or present in the United States in violation of the INA, including fugitive non-citizens, non-detained non-citizens, and non-lawful re-entrants.</p>
                <p>2. To support the identification and arrest of individuals (both citizens and non-citizens) who commit violations of criminal laws enforced by DHS/ICE.</p>
                <p>3. To track the process and results of administrative and criminal proceedings, including compliance with court orders and hearing dates, against individuals who are alleged to have violated the INA or other laws enforced by DHS.</p>
                <p>4. To support the grant or denial of parole and tracking of individuals who seek or receive parole into the United States.</p>
                <p>5. To provide criminal and immigration history information during DHS enforcement encounters, and to support background checks on applicants for DHS immigration benefits (e.g., employment authorization and petitions).</p>
                <p>6. To identify potential criminal activity, immigration violations, and threats to homeland security, to ensure public safety, and to uphold laws enforced by DHS.</p>
                <p>7. To support the geolocation tracking, biometric verification, and rapid enrollment of non-citizens into the ICE Alternatives to Detention program.</p>
                <p>8. To improve the coordination necessary to efficiently transfer/transport individuals from CBP to ICE and from ICE to various detention facilities.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p> Categories of individuals covered by this system include: (1) individuals arrested, detained, or removed from the United States for criminal or administrative violations of the INA, or individuals issued a Notice to Appear in immigration court; (2) individuals who are the subject of an immigration detainer issued to another law enforcement or custodial agency; (3) individuals arrested by ICE for violations of criminal laws enforced by ICE or DHS; (4) individuals who fail to leave the United States after receiving a final order of removal, deportation, or exclusion, or who fail to report to ICE for removal after receiving notice to do so (fugitive non-citizens); (5) individuals who non-lawfully re-enter the United States after departing pursuant to an order of voluntary departure or being removed from the United States (non-lawful re-entrants); (6) individuals who request to be removed at their own expense or are eligible for voluntary removal from the United States pursuant to section 250 of the INA; (7) individuals who are granted parole into the United States under section 212(d)(5) of the INA (parolees); (8) individuals awaiting immigration proceedings under a "non-detained" or Alternatives to Detention program; (9) other individuals whose information may be collected or obtained during the course of an immigration enforcement or criminal matter, such as witnesses, associates, and relatives; (10) persons who post or arrange bond for the release of an individual from ICE detention, or receive custodial property of a detained non-citizen; (11) prisoners of the U.S. Marshals Service held in ICE detention facilities; and (12) attorneys or representatives who represent individuals listed in the categories above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>Biographic, biometric, descriptive, historical, and other identifying data, including:</p>
                •	<p>Full name;</p>
                •	<p>Alias(es);</p>
                •	<p>A-Number;</p>
                •	<p>Social Security number (SSN);</p>
                •	<p>Date of birth;</p>
                •	<p>Place of birth;</p>
                •	<p>Nationality;</p>
                •	<p>Fingerprint Identification Number (FIN);</p>
                •	<p>Federal Bureau of Investigation (FBI) number;</p>
                •	<p>Other unique identifying numbers (e.g., federal, state, local, and tribal identification numbers);</p>
                •	<p>Government-issued identification (e.g., passport, driver’s license):</p>
                o	<p>Document type;</p>
                o	<p>Issuing organization;</p>
                o	<p>Document number;</p>
                o	<p>Expiration date;</p>
                •	<p>Visa information;</p>
                •	<p>Contact or location information (e.g., known or possible addresses, phone numbers);</p>
                •	<p>Employment history;</p>
                •	<p>Education history;</p>
                •	<p>Immigration history (e.g., citizenship/naturalization certificate number, removals, explanations);</p>
                •	<p>Domestic and foreign criminal history (e.g., arrest, charges, dispositions, and sentencing, corresponding dates, jurisdictions);</p>
                •	<p>Physical description (e.g., height, weight, eye color, hair color, race, ethnicity, identifying marks like scars, tattoos, or birthmarks); and</p>
                •	<p>Biometric data (i.e., fingerprints, voiceprints, iris images, photographs, facial verification images/templates, and DNA samples).</p>
                o	<p>DNA samples required by DOJ regulation (see 28 CFR Part 28) are collected and sent to the FBI. DNA samples are not retained or analyzed by DHS, nor does ICE receive or maintain the results of the FBI’s DNA analysis (i.e., DNA sequences).</p>
                o	<p>Information pertaining to ICE’s collection of DNA samples, limited to the date and time of successful collection and confirmation from the FBI that the sample was able to be sequenced, is maintained by ICE and DHS.</p>
                <p>Case-related data:</p>
                •	<p>Case number;</p>
                •	<p>Family unit identification number ID numbers;</p>
                •	<p>Record number;</p>
                •	<p>Case category;</p>
                •	<p>Description of charges and disposition of arrest;</p>
                •	<p>Case agent;</p>
                •	<p>Data initiated and completed;</p>
                •	<p>Location-related data, including geotags from metadata associated with other record categories collected; geographical indicators; and geolocation information (e.g., GPS) derived from the ICE Alternatives to Detention program ;</p>
                •	<p>National Sex Offender Registry (NSOR) status; and</p>
                •	<p>Other data describing an event involving alleged violations of criminal or immigration law (i.e., location; date; time; type of criminal or immigration law violations alleged; type of property involved; use of violence, weapons, or assault against DHS personnel or third parties; attempted escape; and other related information).</p>
                <p>Information presented to or collected by ICE during immigration and law enforcement proceedings or activities:</p>
                •	<p>Date of birth;</p>
                •	<p>Place of birth;</p>
                •	<p>Marital status;</p>
                •	<p>Education history;</p>
                •	<p>Employment history;</p>
                •	<p>Travel history; and</p>
                •	<p>Other information derived from affidavits, certificates, manifests, and other documents. This data typically pertains to subjects, relatives, associates, and witnesses.</p>
                <p>Detention data on non-citizens:</p>
                •	<p>Immigration detainers issued;</p>
                •	<p>Transportation information;</p>
                •	<p>Detention-related identification numbers;</p>
                •	<p>Detention facility;</p>
                •	<p>Security, risk, and custody classification;</p>
                •	<p>Custody recommendation and status;</p>
                •	<p>Flight risk indication;</p>
                •	<p>Book-in/book-out date and time;</p>
                •	<p>Mandatory detention and criminal flags;</p>
                •	<p>Aggravated felon status;</p>
                •	<p>Other alerts (e.g., gang affiliation, community ties, health accommodation, humanitarian or medical considerations);</p>
                •	<p>Information about a non-citizen’s release from custody on bond, recognizance, or supervision;</p>
                •	<p>Information related to prosecutorial discretion determinations;</p>
                •	<p>Property inventory and receipt;</p>
                •	<p>Information related to disciplinary issues or grievances;</p>
                •	<p>Documents and video recordings related to alleged misconduct and other incidents involving detainees; and</p>
                •	<p>Other detention-related information (e.g., documentation of an allegation of sexual abuse or assault, documentation of strip and body cavity searches, documentation of reasons for segregation or other housing placement, documentation of participation in the orientation process).</p>
                <p>Detention data for U.S. Marshals Service prisoners:</p>
                •	<p>Full name;</p>
                •	<p>Date of birth;</p>
                •	<p>Country of birth;</p>
                •	<p>Identification numbers (e.g., detainee, FBI, state);</p>
                •	<p>Book-in/book-out date and time; and</p>
                •	<p>Security classification.</p>
                <p>Limited health information relevant to an individual’s placement in an ICE detention facility or transportation requirements:</p>
                •	<p>Medical alerts, mental competency, or general information on physical disabilities or other special needs or vulnerabilities to facilitate placement in a facility or bed that best accommodates these needs. Medical records about individuals in ICE custody (i.e., records relating to the diagnosis or treatment of individuals) are maintained in DHS/ICE-013 Alien Medical Records System of Records.</p>
                <p>Progress, status, and final result of removal, prosecution, and other DHS processes and related appeals:</p>
                •	<p>Information relating to criminal convictions;</p>
                •	<p>Incarceration;</p>
                •	<p>Travel documents; and</p>
                •	<p>Other information pertaining to the actual removal of non-citizens from the United States.</p>
                <p>Contact, biographical, and identifying data about Relatives, Attorneys, Representatives, Associates, or Witnesses of a noncitizen in proceedings initiated or conducted by DHS may include:</p>
                •	<p>Full name;</p>
                •	<p>Date of birth;</p>
                •	<p>Place of birth; and</p>
                •	<p>Contact or location information (e.g., addresses, phone numbers, and business or agency name).</p>
                <p>Data concerning personnel of other agencies that arrested, or assisted or participated in the arrest or investigation of, or are maintaining custody of an individual whose arrest record is contained in this system of records may include:</p>
                •	<p>Full name;</p>
                •	<p>Title; and</p>
                •	<p>Contact or location information (e.g., addresses, phone numbers, and business or agency name).</p>
                <p>Data about persons who post or arrange an immigration bond for the release of an individual from ICE custody, or receive custodial property of an individual in ICE custody may include:</p>
                •	<p>Full name;</p>
                •	<p>Address;</p>
                •	<p>Phone numbers; and</p>
                •	<p>Social Security number.</p>
                <p>Recordings of detainee telephone calls when responding as part of an alternative to detention program or of detainee calls made in detention facilities. Information about these calls may include:</p>
                •	<p>Date;</p>
                •	<p>Time;</p>
                •	<p>Duration; and</p>
                •	<p>Phone number called. (Note: protected telephone calls, such as calls with an attorney, are not recorded and information about protected telephone calls is not retained.)</p>
                <p>Information related to detainees’ accounts for telephone or commissary services in a detention facility.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p> Records are obtained from several sources. In general, information is obtained from individuals covered by this system, and other federal, state, local, tribal, or foreign governments. More specifically, DHS/ICE-011 records derive from the following sources:</p>
                <p>
                    a)	Individuals covered by the system and other individuals (e.g., witnesses, family members);
                </p>
                <p>
                    b)	Other federal, state, local, tribal, or foreign governments and government information systems;
                </p>
                <p>
                    c)	Business records;
                </p>
                <p>
                    d)	Evidence, contraband, and other seized material; and
                </p>
                <p>
                    e)	Public and commercial sources, including social media.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including Offices of the United States Attorneys, or other federal agencies conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant and necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p> 1. DHS or any component thereof;</p>
                <p> 2. Any employee or former employee of DHS in their official capacity;</p>
                <p> 3. Any employee or former employee of DHS in their individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
                <p> 4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another federal agency or federal entity when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the federal government, or national security resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To prospective claimants and their attorneys for the purpose of negotiating the settlement of an actual or prospective claim against DHS or its current or former employees, in advance of the initiation of formal litigation or proceedings.</p>
                <p>J. To appropriate federal, state, local, tribal, territorial, or foreign government agencies, as well as to other individuals and organizations during the course of an investigation by DHS or the processing of a matter under DHS’s jurisdiction, or during a proceeding within the purview of immigration and nationality laws, when DHS deems that such disclosure is necessary to carry out its functions and statutory mandates or to elicit information required by DHS to carry out its functions and statutory mandates.</p>
                <p>K. To federal, state, local, tribal, or territorial government agencies, or other entities or individuals, or through established liaison channels to selected foreign governments, to provide intelligence, counterintelligence, or other information for the purposes of national security, intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order, or other applicable national security directive.</p>
                <p>L. To federal and foreign government intelligence or counterterrorism agencies or components when DHS becomes aware of an indication of a threat or potential threat to national or international security, or when such disclosure is to support the conduct of national intelligence and security investigations or to assist in anti-terrorism efforts.</p>
                <p>M. To any federal agency to enable such agency to make determinations regarding the payment of federal benefits to the record subject in accordance with that agency’s statutory responsibilities.</p>
                <p>N. To foreign governments for the purpose of coordinating and conducting the removal of non-citizens from the United States to other nations under the Immigration and Nationality Act; and to international, foreign, intergovernmental, and multinational agencies, authorities, and organizations in accordance with law and formal or informal international arrangements.</p>
                <p>O. To the DOJ Executive Office of Immigration Review (EOIR) or its contractors, consultants, or others performing or working on a contract for EOIR, for the purpose of providing information about non-citizens who are or may be placed in removal proceedings so that EOIR may arrange for the provision of educational services to those non-citizens under EOIR’s Legal Orientation Program, or for other purposes or activities within the scope of the EOIR contract.</p>
                <p>P. To disclose information to the DOJ EOIR and to the Board of Immigration Appeals, to the extent necessary to carry out their authorized duties pertaining to the adjudication of matters arising under the Immigration and Nationality Act.</p>
                <p>Q. To attorneys or legal representatives for the purpose of facilitating group presentations to non-citizens in detention that will provide the non-citizens with information about their rights under U.S. immigration law and procedures.</p>
                <p>R. To the Department of State in the processing of petitions or applications for benefits under the Immigration and Nationality Act, and all other immigration and nationality laws including treaties and reciprocal agreements; or when the Department of State requires information to consider or provide an informed response to a request for information from a foreign, international, or intergovernmental agency, authority, or organization about a non-citizen or an enforcement operation with transnational implications.</p>
                <p>S. To OMB in connection with the review of private relief legislation as set forth in OMB Circular No. A-19 at any stage of the legislative coordination and clearance process as set forth in the Circular. </p>
                <p>T. To federal, state, local, territorial, tribal, international, or foreign criminal, civil, or regulatory law enforcement authorities when the information is necessary for collaboration, coordination, and de-confliction of investigative matters, prosecutions, and/or other law enforcement actions to avoid duplicative or disruptive efforts and to ensure the safety of law enforcement officers who may be working on related law enforcement matters.</p>
                <p>U. To the U.S. Marshals Service (USMS) concerning USMS prisoners that are or will be held in detention facilities operated by or on behalf of ICE, and to federal, state, local, tribal, or territorial law enforcement or correctional agencies concerning individuals in DHS custody that are to be transferred to such agency’s custody, to coordinate the transportation, custody, and care of these individuals.</p>
                <p>V. To third parties to facilitate placement or release of an individual (e.g., at a group home, homeless shelter) who has been or is about to be released from DHS custody but only such information that is relevant and necessary to arrange housing, continuing medical care, or other social services for the individual.</p>
                <p>W. To victims and witnesses regarding custodial information, such as transfer to another custodial agency or location, release on bond, order of supervision, removal from the United States, or death in custody, about an individual who is the subject of a criminal or immigration investigation, proceeding, or prosecution. This would also authorize disclosure of custodial information to individuals with a legal responsibility to act on behalf of a victim or witness (e.g., attorney, parent, legal guardian) and individuals acting at the request of a victim or witness; as well as external victim notification systems that make such information available to victims and witnesses in electronic form.</p>
                <p>X. To the Federal Bureau of Prisons (BOP) and other federal, state, local, territorial, tribal, and foreign law enforcement or custodial agencies for the purpose of facilitating the transfer of custody of an individual to or from that agency. This will include the transfer of information about unaccompanied minor children to the U.S. Department of Health and Human Services (HHS) to facilitate the custodial transfer of such children from DHS to HHS.</p>
                <p>Y. To DOJ and other law enforcement or custodial agencies to facilitate payments and reporting under the State Criminal Alien Assistance Program or similar programs.</p>
                <p>Z. To any law enforcement agency or custodial agency (such as a jail or prison) to serve that agency with notice of an immigration detainer, or to update or remove a previously issued immigration detainer, for an individual who is believed to be in that agency’s custody.</p>
                <p>AA. To DOJ, disclosure of DNA samples and related information as required by 28 CFR part 28.</p>
                <p>BB. To DOJ, disclosure of arrest and removal information for inclusion in relevant DOJ law enforcement databases and for use in the enforcement of federal firearms laws (e.g., Brady Handgun Violence Prevention Act, as amended by the NICS Improvement Amendments Act).</p>
                <p>CC. To the attorney or guardian ad litem of an individual’s child, or to federal, state, local, tribal, territorial, or foreign governmental or quasi-governmental agencies or courts, to confirm the location, custodial status, removal, or voluntary departure of an individual from the United States, to facilitate the recipients’ exercise of responsibilities pertaining to the custody, care, or legal rights (including issuance of a U.S. passport) of the individual’s children, or the adjudication or collection of child support payments or other similar debts owed by the individual.</p>
                <p>DD. To an individual or entity seeking to post or arrange, or who has already posted or arranged, an immigration bond for a noncitizen to aid the individual or entity in (1) identifying the location of the noncitizen; (2) posting the bond; (3) obtaining payments related to the bond; or (4) conducting other administrative or financial management activities related to the bond.</p>
                <p>EE. To federal, state, local, tribal, territorial, or foreign government agencies or entities or multinational governmental agencies when DHS needs to exchange relevant data for the purpose of developing, testing, or implementing new software or technology whose purpose is related to this system of records.</p>
                <p>FF. Limited detainee biographical information will be publicly disclosed via the ICE Online Detainee Locator System or any successor system for the purpose of identifying whether a detainee is in ICE custody and the custodial location.</p>
                <p>GG. To courts, magistrates, administrative tribunals, opposing counsel, parties, and witnesses, in immigration, civil, or criminal proceedings (including discovery, presentation of evidence, and settlement negotiations) and when DHS determines that use of such records is relevant and necessary to the litigation before a court or adjudicative body when any of the following is a party to or have an interest in the litigation:</p>
                <p> 1. DHS or any component thereof;</p>
                <p> 2. Any employee of DHS in their official capacity;</p>
                <p> 3. Any employee of DHS in their individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
                <p> 4. The United States, when DHS determines that litigation is likely to affect DHS or any of its components.</p>
                <p>HH. To federal, state, local, tribal, territorial, international, or foreign government agencies or entities for the purpose of consulting with that agency or entity:</p>
                <p>1. To assist in making a determination regarding redress for an individual in connection with the operations of a DHS component or program;</p>
                <p>2. To verify the identity of an individual seeking redress in connection with the operations of a DHS component or program; or</p>
                <p>3. To verify the accuracy of information submitted by an individual who has requested such redress on behalf of another individual.</p>
                <p>II. To federal, state, local, tribal, territorial, or foreign governmental agencies; multilateral governmental organizations; or other public health entities, for the purposes of protecting the vital interests of a record subject or other persons, including to assist such agencies or organizations during an epidemiological investigation, in facilitating continuity of care, in preventing exposure to or transmission of a communicable or quarantinable disease of public health significance, or to combat other significant public health threats.</p>
                <p>JJ. To foreign governments for the purpose of providing information about their citizens or permanent residents, or family members thereof, during local or national disasters or health emergencies.</p>
                <p>KK. To a coroner for purposes of affirmatively identifying a deceased individual (whether or not such individual is deceased as a result of a crime) or cause of death.</p>
                <p>LL. To a former employee of DHS for purposes of responding to an official inquiry by Federal, State, local, tribal, or territorial government agencies or professional licensing authorities; or facilitating communications with a former employee that may be relevant and necessary for personnel-related or other official purposes, when DHS requires information or consultation assistance from the former employee regarding a matter within that person’s former area of responsibility.</p>
                <p>MM. To federal, state, local, tribal, territorial, foreign, or international agencies, if the information is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or the issuance, grant, renewal, suspension or revocation of a security clearance, license, contract, grant, or other benefit; or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant, or other benefit.</p>
                <p>NN. To a public or professional licensing organization when such information indicates, either by itself or in combination with other information, a violation or potential violation of professional standards, or reflects on the moral, educational, or professional qualifications of licensed professionals or those seeking to become licensed professionals.</p>
                <p>OO. To an attorney or representative (as defined in 8 CFR 1.2, 202.1, 1001.1(f), or 1202.12) who is acting on behalf of an individual covered by this system of records in connection with any proceeding before U.S. Citizenship and Immigration Services (USCIS), ICE, CBP, or EOIR, as required by law or as deemed necessary in the discretion of the Department.</p>
                <p>PP. To members of the public, with regard to disclosure of limited detainee biographical information for the purpose of facilitating the deposit of monies into detainees’ accounts for telephone or commissary services in a detention facility.</p>
                <p>QQ. To federal, state, local, tribal, or territorial government agencies seeking to verify or ascertain the citizenship or immigration status of any individual within the jurisdiction of the agency for any purpose authorized by law.</p>
                <p>RR. To federal, state, local, tribal, and territorial courts or government agencies involved in criminal investigation or prosecution, pre-trial, sentencing, parole, probation, bail bonds, or any other aspect of the criminal justice process, and to defense counsel representing an individual in a domestic criminal proceeding, to ensure the integrity and efficiency of the criminal justice system by informing these recipients of the existence of an immigration detainer or the individual’s status in removal proceedings, including removal or custodial status/location. Disclosure of the individual’s A-Number and country of birth is also authorized to facilitate these recipients’ use of the ICE Online Detainee Locator System for the purposes listed above.</p>
                <p>SS. To a foreign government to notify it concerning its citizens or residents who are incapacitated, an unaccompanied minor, or deceased.</p>
                <p>TT. To family members, guardians, committees, friends, or other agents identified by law or regulation to receive notification, decisions, and other papers as provided in 8 C.F.R. § 103.8 from DHS or EOIR following verification of a familial or agency relationship with a non-citizen when DHS is aware of indicia of incompetency or when a non-citizen has been determined to be mentally incompetent by an immigration judge.</p>
                <p>UU. To an organization or person in either the public or private sector, either foreign or domestic, when there is a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, or when the information is relevant to the protection of life, property, or other vital interests of a person.</p>
                <p>VV. To clerks and judges of courts exercising naturalization jurisdiction for the purpose of granting or revoking naturalization.</p>
                <p>WW. To federal, state, local, tribal, territorial, foreign, or international agencies, after discovery of such information, if DHS determines: (1) The information is relevant and necessary to that agency’s decision concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or other benefit; and (2) Failure to disclose the information is likely to create a substantial risk to government facilities, equipment, or personnel; sensitive information; critical infrastructure; or public safety.</p>
                <p>XX. To an appropriate federal, state, local, tribal, regional, foreign, or international law enforcement agency, where use is consistent with the official duties of the recipient agencyand the requirements set forth in a related memorandum of agreement between DHS and the recipient agency authorizing information sharing through LEISS for the purpose of criminal law enforcement, homeland security, or to support applicant background investigations for ICE law enforcement partners.</p>
                <p>YY. To an appropriate federal, state, local, tribal, territorial, foreign, or international agency and third-party organizations assisting in the repatriation of non-citizens who are returning voluntarily to their home countries.</p>
                <p>ZZ. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/ICE stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>Records may be retrieved by name, biometric identifiers, identification numbers including, but not limited to, A-Number, fingerprint identification number, Social Security number, case or record number if applicable, case related data, or a combination of other personal identifiers including, but not limited to, date of birth and nationality.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p> ICE retains records in accordance with an applicable National Archives and Records Administration (NARA) General Records Schedule (GRS) or a NARA-approved agency-specific records control schedule. ICE retains records of arrests, detentions, and removals in the Enforcement Integrated Database and its modules, such as the ENFORCE Alien Removal Module and the ICE Integrated Decision Support (IIDS), for seventy-five (75) years pursuant to the Biometric with Limited Biographical Data Schedule, DAA-563-2013-0001-0006.</p>
                <p> The Online Detainee Locator System (ODLS) uses an extract of Enforcement Integrated Database data about current detainees and detainees that were released during the last sixty (60) days. Records are retained in the Online Detainee Locator System for as long as they meet the extract criteria in accordance with the schedule, N1-567-11-7. The electronic Travel Document System (eTD) stores travel documents for twenty (20) years after the issuance of a travel document or denial letter in accordance with the schedule, DAA-0567-2017-0004. Alternatives to Detention program records are retained for seven (7) years after the individual has been removed from the Alternatives to Detention program and is no longer being monitored in accordance with the schedule, DAA-567-2018-0001-0001.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p> DHS/ICE safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS/ICE has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p> The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act, and the Judicial Redress Act if applicable, because it is a law enforcement system. However, DHS/ICE will consider individual requests to determine whether or not information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and ICE FOIA Officer whose contact information can be found at http://www.dhs.gov/foia. If an individual believes more than one component maintains Privacy Act records concerning them, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655 or electronically at https://www.dhs.gov/dhs-foia-privacy-act-request-submission-form. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about an individual may be available under the Freedom of Information Act.</p>
                <p> When seeking records about oneself from this system of records or any other Departmental system of records, an individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify their identity, meaning that they must provide their full name, current address, and date and place of birth. The individual must sign the request, and their signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, one may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, individuals should:</p>
                •	<p>Explain why they believe the Department would have information on them;</p>
                •	<p>Identify which component(s) of the Department they believe may have the information about them;</p>
                •	<p>Specify when they believe the records would have been created; and</p>
                •	<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p> For records covered by the Privacy Act or covered Judicial Redress Act records, individuals may make a request for amendment or correction of a Department record about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful to support the request. If the individual believes that the same record is in more than one system of records, the request should state this belief and be addressed to each component that maintains a system of records containing the record.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access procedure."</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. secs. 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5), (e)(8); (f); and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(k)(2), has exempted this system of records from the following provisions of the Privacy Act: 5 U.S.C. secs. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H); and (f). When a record received from another system has been exempted in that source system under 5 U.S.C. secs. 552a(j)(2) or (k)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claim any additional exemptions set forth here.</p>
                </xhtmlContent>
                </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p> 81 FR 72080 (November 18, 2016); 80 FR 24269 (April 30, 2015); 80 FR 11214 (March 2, 2015); 75 FR 23274 (May 3, 2010); 75 FR 9238 (March 1, 2010); 74 FR 20719 (May 5, 2009); 74 FR 5665 (January 30, 2009); 74 FR 4965 (January 28, 2009).</p>
            </xhtmlContent>
        </subsection>
    </section>




    <section id="ice12" toc="yes">
<systemNumber>/ICE-012</systemNumber>
<subsection type="systemName">Visa Security Program Records (VSPR).
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Classified; Controlled Unclassified Information.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the U.S. Immigration and Customs Enforcement (ICE) Headquarters in Washington, DC, ICE
field offices, and foreign embassies and consulates.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include:
</p><p>(1) Individuals who apply for U.S. visas, and
</p><p>(2) Other individuals who are identified on the visa application, such as the applicant’s spouse, individuals
traveling with applicant, application preparer’s name, and individuals identified by the applicant as the person in the
U.S. with whom the applicant will stay (hereafter, applicant point of contact).
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system may include:
</p><p>(1) Biographic, employment, contact, and other types of information provided on the visa application, or by the
applicant and others during interviews, such as name, address, phone number, e-mail address, date of birth, country of
birth, nationality, passport number, information related to applicant’s intended travel to the United States, spouse’s
name, names and relationships of individuals traveling with applicant, the application preparer’s name, and the name and
address of the applicant point of contact.
</p><p>(2) Information obtained during a visa security review from interviews, public records, foreign governments, and U.S.
government databases, such as the State Department’s visa control number, lookout records, criminal history, admission,
visa and immigration history, and records indicating a possible threat to homeland or national security due to terrorism
or other reasons.
</p><p>(3) Recommendations and/or other information provided by ICE to the State Department pertaining to visa applicants,
and the State Department’s decision on the visa application.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>8 U.S.C. 1103; 8 U.S.C. 1153-55; 8 U.S.C. 1201-1204; Section 428 of the Homeland Security Act of
2002; 22 CFR 41.122; Memorandum of Understanding between DHS, Federal Bureau of Investigation, and State Department
Bureau of Consular Affairs on Improved Information Sharing Services signed July 18, 2009; Memorandum of Understanding
Between the Secretaries of State and Homeland Security Concerning the Implementation of Section 428 of the Homeland
Security Act of 2002 signed on September 26, 2003; Memorandum of Understanding between the Department of State, Bureau of
Consular Affairs and the Department of Homeland Security, U.S. Immigration and Customs Enforcement for Cooperation in
Datasharing signed on October 6, 2006; and Memorandum of Agreement Between the Department of State and the Department of
Homeland Security Regarding the Sharing of Visa and Passport Records and Immigration and Naturalization and Citizenship
Records signed on November 18, 2008.</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>(a) To manage, review, track, investigate, document, and report on visa security reviews conducted by ICE agents
pertaining to U.S. visa applicants and to document ICE recommendations to the State Department on visa issuance;
</p><p>(b) To facilitate communication among ICE personnel on matters pertaining to visa applications, visa holders, and visa
security reviews;
</p><p>(c) To enforce the provisions of the Immigration and Nationality Act, as amended; and
</p><p>(d) To identify potential criminal activity, immigration violations, and threats to homeland security; to uphold and
enforce the law; and to ensure public safety.</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body, when:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to an individual that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, Tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to
opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection
with criminal law proceedings or in response to a subpoena.
</p><p>I. To Federal and foreign government intelligence or counterterrorism agencies when DHS reasonably believes there to
be a threat or potential threat to national or international security for which the information may be useful in
countering the threat or potential threat, when DHS reasonably believes such use is to assist in anti-terrorism efforts,
and disclosure is appropriate to the proper performance of the official duties of the person making the disclosure.
</p><p>J. To the Department of State in the processing of petitions or applications for benefits under the Immigration and
Nationality Act, and all other immigration and nationality laws including treaties and reciprocal agreements.
</p><p>K. To an organization or individual in either the public or private sector, either foreign or domestic, where there is
a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to
the extent the information is relevant to the protection of life or property and disclosure is appropriate to the proper
performance of the official duties of the person making the disclosure.
</p><p>L. To appropriate Federal, State, local, Tribal, or foreign governmental agencies or multilateral governmental
organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a
statute, rule, regulation, order, license, or treaty where DHS determines that the information would assist in the
enforcement of civil or criminal laws.
</p><p>M. To appropriate Federal, State, local, Tribal, or foreign governmental agencies or multilateral governmental
organizations where DHS is aware of a need to utilize relevant data for purposes of testing new technology and systems
designed to enhance national security or identify other violations of law.
</p><p>N. To third parties during the course of a visa security review to the extent necessary to obtain information
pertinent to the review, provided disclosure is appropriate to the proper performance of the official duties of the
person making the disclosure.
</p><p>O. To international and foreign governmental authorities in accordance with law and formal or informal international
arrangements.
</p><p>P. To a Federal, State, or local agency, or other appropriate entity or individual, or through established liaison
channels to selected foreign governments, in order to provide intelligence, counterintelligence, or other information for
the purposes of intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order,
or other applicable national security directive.
</p><p>Q. To a Federal, State, Tribal, local, international, or foreign government agency or entity for the purpose of
consulting with that agency or entity: (1) To assist in making a determination regarding redress for an individual in
connection with the operations of a DHS component or program; (2) for the purpose of verifying the identity of an
individual seeking redress in connection with the operations of a DHS component or program; or (3) for the purpose of
verifying the accuracy of information submitted by an individual who has requested such redress on behalf of another
individual.
</p><p>R. To the Federal Bureau of Investigation, the National Counter-Terrorism Center (NCTC), the Terrorist Screening
Center (TSC), or other appropriate Federal agencies, for the integration and use of such information to protect against
terrorism, if that record is about one or more individuals known, or suspected, to be or to have been involved in
activities constituting, in preparation for, in aid of, or related to terrorism. Such information may be further
disseminated by recipient agencies to Federal, State, local, territorial, Tribal, and foreign government authorities, and
to support private sector processes as contemplated in Homeland Security Presidential Directive/HSPD-6 and other
relevant laws and directives, for terrorist screening, threat-protection and other homeland security purposes.
</p><p>S. To appropriate Federal, State, local, Tribal, or foreign governmental agencies or multilateral government
organizations for the purpose of protecting the vital interests of a data subject or other persons, including to assist
such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to
combat other significant public health threats; appropriate notice will be provided of any identified health risk, as
practicable.
</p><p>T. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The electronic records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by visa applicant name, passport number, or visa control number.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions. The system maintains a real-time auditing function of individuals who access
the system.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>ICE is in the process of drafting a proposed record retention schedule for the information maintained in VSPR,
including system information maintained in VSPTS-Net. ICE anticipates retaining the following records for 25 years
after the date of review: visa security reviews where ICE has no adverse finding and does not object to the issuance of a
visa, visa security reviews where ICE does not object to the issuance of a visa but provides derogatory information to
the Department of State regarding the applicant, and visa security reviews where ICE recommends against the issuance of a
visa, with no nexus to terrorism. ICE anticipates retaining the following records for 75 years after the date of review:
visa security reviews where ICE recommends against the issuance of a visa due to a nexus to terrorism, or where ICE does
not object to the issuance of the visa but provides terrorism-related information to the State Department regarding the
applicant. ICE also anticipates that extracts of visa applicant data created for the purpose of creating VSPTS-Net
records will be retained by ICE for one week and then destroyed/deleted.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Visa Security Program Unit Chief, Office of International Affairs, U.S. Immigration and Customs Enforcement, 800
N. Capitol Street NW., Suite 300, Washington, DC 20536.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment
procedures of the Privacy Act because it is a law enforcement system. However, ICE will consider requests individual
requests to determine whether or not information may be released. Thus, individuals seeking notification of and access to
any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the
component’s FOIA Officer, whose contact information can be found at <i>http://www.dhs.gov/foia</i> under "contacts.
" If an individual believes more than one component maintains Privacy Act records concerning him or her the
individual may submit the request to the Chief Privacy Officer, Department of Homeland Security, 245 Murray Drive, SW.,
Building 410, STOP-0550, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Identify which component(s) of the Department you believe may have the information about you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) will not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information is obtained from the visa application, the visa applicant, Federal databases, foreign governments,
Interpol, Europol, employers, family members, public records, the Internet, and other individuals or entities from which
information is collected during a visa security review.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>Pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act, portions of this system are exempt from 5 U.S.C.
552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), and (e)(4)(H), (e)(5) and (e)(8); (f); and (g). Pursuant to 5
U.S.C. 552a(k)(1) and (k)(2), this system is exempt from the following provisions of the Privacy Act, subject to the
limitations set forth in those subsections: 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), and (f). In addition,
to the extent a record contains information from other exempt systems of records, DHS will rely on the exemptions claimed
for those systems.
</p></xhtmlContent></subsection></section>

    <section id="ice13" toc="yes">
        <systemNumber>/ICE-013</systemNumber>
        <subsection type="systemName">
            Alien Health Records System.
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified, For Official Use Only.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained in the ICE electronic health records (eHR) system and at detention facilities where care is provided by the ERO IHSC. IHSC provides care to aliens in all Service Processing Centers, which are ICE-operated facilities; at most contract detention facilities, which are owned and operated by a private company with which ICE contracts for detention services; and in some Intergovernmental Service Agreement (IGSA) facilities. IGSAs are facilities operated by a city, county, or state government, and ICE contracts with them for detention services, leases bed space, or both from them. Records are also maintained at ICE Headquarters in Washington, D.C., and at ICE ERO field offices.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Assistant Director, ICE Health Service Corps, Enforcement and Removal Operations, U.S. Immigration and Customs Enforcement, 500 12th Street, SW, Washington, D.C. 20536.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>5 U.S.C. sec. 301; 44 U.S.C. sec. 3101; 8 U.S.C. sec. 1103, 1222, and 1231; and 42 U.S.C. sec. 249.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to document and facilitate the provision of medical, dental, and mental health care to individuals in ICE custody in facilities where care is provided by IHSC. The system also supports the collection, maintenance, and sharing of medical information for these individuals in the interest of public health, especially in the event of a public health emergency, such as an epidemic or pandemic. Finally, this system facilitates continuity of care after individuals are discharged from ICE facilities by providing individuals with direct access to their records and disclosing records to other parties (e.g., medical providers), as appropriate.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>Two categories of individuals are covered by this system. The first category is aliens detained by ICE for civil immigration purposes. These aliens have been booked into a detention facility where IHSC provides or oversees the provision of medical care. The second category is prisoners in the custody of the U.S. Marshals Service (USMS) who are being detained in facilities operated by or on behalf of ICE pursuant to agreements made with the USMS and who also receive medical care from IHSC. Hereafter, the term "in ICE custody" will be used to refer to both the aliens detained by ICE who receive medical care from IHSC, and the USMS prisoners being housed in IHSC-staffed detention facilities.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>Categories of records in this system include:</p>
                <p>• Individual’s name and aliases;</p>
                <p>• Date of birth;</p>
                <p>• Alien Registration Number (A-Number);</p>
                <p>• USMS or Federal Bureau of Prisons Registration Number (if applicable);</p>
                <p>• Phone numbers;</p>
                <p>• Email addresses;</p>
                <p>• Addresses;</p>
                <p>• Country of Origin and Country of Citizenship;</p>
                <p>• Nationality;</p>
                <p>• Gender/Sex;</p>
                <p>• Languages spoken;</p>
                <p>• Medical history (self and family to establish medical history);</p>
                <p>• Current medical conditions and diagnoses;</p>
                <p>• Symptoms reported, including dates;</p>
                <p>• Medical examination records and medical notes;</p>
                <p>• Medical and mental health records and treatment plans;</p>
                <p>• Dental history and records, including x-rays, treatment, and procedure records;</p>
                <p>• Diagnostic data, such as tests ordered and test results;</p>
                <p>• Problem list, which contains the diagnoses and medical symptoms or problems as determined by a medical practitioner or reported by the person;</p>
                <p>• Records concerning the diagnosis and treatment of diseases or conditions that present a public health threat, including information about exposure of other individuals and reports to public health authorities;</p>
                <p>• Correspondence related to an individual’s medical, dental, and mental health care;</p>
                <p>• External healthcare provider records (emergency room, hospitalizations, specialized care, records of previous medical care or testing) including medical or healthcare records received from other correctional systems or ICE detention facilities not staffed by IHSC;</p>
                <p>• Payment authorizations for care provided by external healthcare providers and healthcare facilities;</p>
                <p>• Evaluation records, including records related to mental competency evaluations;</p>
                <p>• Prescription and over-the-counter drug records;</p>
                <p>• Records related to medical grievances filed by individuals in ICE custody;</p>
                <p>• Information about medical devices used by individuals such as hearing aids and pacemakers;</p>
                <p>• Information about special needs and accommodations for an individual with disabilities, such as requiring a cane, wheelchair, special shoes, or needing to sleep on a bottom bunk;</p>
                <p>• Physician or other medical/dental provider’s name and credentials such as medical doctor, registered nurse, and Doctor of Dental Science;</p>
                <p>• Refusal forms;</p>
                <p>• Informed consent forms;</p>
                <p>• Legal documents, such as death certificates, do-not-resuscitate orders, or advance directives (e.g., living wills); and</p>
                <p>• Login credentials used to access the Portal.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>Records are obtained from the individual, immediate family members, physicians, nurses, dentists, medical laboratories and testing facilities, hospitals, other medical and dental care providers, other law enforcement or custodial agencies, other detention facilities, and public health agencies.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agency conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. sec. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when:</p>
                <p>1. DHS determines that information from this system of records is reasonably necessary and otherwise compatible with the purpose of collection to assist another federal recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach; or</p>
                <p>2. DHS suspects or has confirmed that there has been a breach of this system of records; and (a) DHS has determined that as a result of the suspected or confirmed breach, there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (b) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To hospitals, physicians, medical laboratories and testing facilities, and other medical service providers, for the purpose of diagnosing and treating medical conditions or arranging the care of individuals in ICE custody and of individuals released or about to be released from ICE custody including, released under an order of supervision, on their own recognizance, on bond, on parole, or in another alternative to detention program.</p>
                <p>I. To prospective claimants and their attorneys for the purpose of negotiating the settlement of an actual or prospective claim against DHS or its current or former employees, in advance of the initiation of formal litigation or proceedings.</p>
                <p>J. To immediate family members and attorneys or other agents acting on behalf of an alien to assist those individuals in determining the current medical condition of an alien in ICE custody, provided they can present adequate verification of a familial or agency relationship with the alien.</p>
                <p>K. To federal, state, local, tribal, territorial, or foreign governmental agencies; multilateral governmental organizations; or other public health entities, for the purpose of protecting the vital interests of a record subject or other persons, including to assist such agencies or organizations during an epidemiological investigation, in facilitating continuity of care, preventing exposure to or transmission of a communicable or quarantinable disease of public health significance, or to combat other significant public health threats.</p>
                <p>L. To hospitals, physicians, and other healthcare providers for the purpose of protecting the health and safety of individuals who may have been exposed to a contagion or biohazard, or to assist such persons or organizations in preventing exposure to or transmission of a communicable disease, a disease that requires quarantine, or to combat other significant public health threats.</p>
                <p>M. To individuals for the purpose of determining if they have had contact in a custodial setting with a person known or suspected to have a communicable disease or disease that requires quarantine and to identify and protect the health and safety of others who may have been exposed.</p>
                <p>N. To the U.S. Marshals Service (USMS) concerning USMS prisoners who are or who will be held in detention facilities operated by or on behalf of ICE, and to federal, state, local, tribal, or territorial law enforcement or correctional agencies concerning an individual in ICE custody who is to be transferred to such agency’s custody, in order to coordinate the transportation, custody, and care of these individuals.</p>
                <p>O. To third parties to facilitate release or placement of an individual (e.g., at a group home, homeless shelter, with a family member) whose case is being considered or prepared for release from DHS custody, or who has been released from DHS custody, but only such information that is relevant and necessary to arrange housing, continuing medical care, or other social services for the individual.</p>
                <p>P. To a domestic government agency or other appropriate healthcare authority for the purpose of providing information about an individual whose case is being considered or prepared for release from DHS custody or who has been released from DHS custody who, due to a condition such as mental illness, may pose a health or safety risk to himself/herself or to the community. DHS will only disclose health information about the individual that is relevant to the health or safety risk the individual may pose, or the means to mitigate that risk (e.g., the alien’s need to remain on certain medication for a serious mental health condition).</p>
                <p>Q. To foreign governments for the purpose of coordinating and conducting the removal or return of aliens from the United States to other nations when disclosure of information about the alien’s health is necessary or advisable to safeguard the public health, to facilitate transportation of the alien, to obtain travel documents for the alien, to ensure continuity of medical care for the alien, or is otherwise required by international agreement or law. Disclosure of medical information may occur after the alien’s removal when it is necessary or advisable to assist the foreign government with the alien’s ongoing medical care.</p>
                <p>R. To the Federal Bureau of Prisons and other government agencies for the purpose of providing health information about an alien when custody of the alien is being transferred from DHS to the other agency. This will include the transfer of information about unaccompanied minor children to the U.S. Department of Health and Human Services (HHS).</p>
                <p>S. To state, local, tribal or territorial agencies or other appropriate authority for the purpose of reporting vital statistics (e.g., births, deaths).</p>
                <p>T. To a public or professional licensing organization when such information indicates, either by itself or in combination with other information, a violation or potential violation of professional standards, or reflects on the moral, educational, or professional qualifications of a healthcare provider who is licensed or is seeking to become licensed.</p>
                <p>U. To courts, magistrates, administrative tribunals, opposing counsel, parties, and witnesses, in the course of immigration, civil, or criminal proceedings (including discovery, presentation of evidence, and settlement negotiations) and when DHS determines that use of such records is relevant and necessary to the litigation before a court or adjudicative body when any of the following is a party to or have an interest in the litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity when the government has agreed to represent the employee; or</p>
                <p>4. The United States, when DHS determines that litigation is likely to affect DHS or any of its components.</p>
                <p>V. To an attorney or representative (as defined in 8 CFR 1.2, 292.1, 1001.1(f), or 1292.1) who is acting on behalf of an individual covered by this system of records in connection with any proceeding before U.S. Citizenship and Immigration Services (USCIS), ICE, or U.S. Customs and Border Protection (CBP) or the DOJ Executive Office for Immigration Review.</p>
                <p>W. To international, foreign, intergovernmental, and multinational government agencies, authorities, and organizations in accordance with law and formal or informal international arrangements.</p>
                <p>X. To a coroner for purposes of affirmatively identifying a deceased individual (whether or not such individual is deceased as a result of a crime), performance of an autopsy, or identifying cause of death.</p>
                <p>Y. Consistent with the requirements of the Immigration and Nationality Act, to HHS, the Centers for Disease Control and Prevention (CDC), or to any state or local health authorities, to ensure that all health issues potentially affecting public health and safety in the United States are being, or have been, adequately addressed.</p>
                <p>Z. To a former employee of DHS for purposes of responding to an official inquiry by federal, state, local, tribal, or territorial government agencies or professional licensing authorities; or facilitating communications with a former employee that may be relevant and necessary for personnel-related or other official purposes when DHS requires information or consultation assistance from the former employee regarding a matter within that person’s former area of responsibility.</p>
                <p>AA. To the U.S. Department of State when it requires information to consider or provide an informed response to a request for information from a foreign, international, or intergovernmental agency, authority, or organization about an alien or an enforcement operation with transnational implications.</p>
                <p>BB. To federal, state, local, tribal, territorial, or foreign government agencies or entities or multinational government agencies when DHS desires to exchange relevant data for the purpose of developing, testing, or implementing new software or technology whose purpose is related to this system of records.</p>
                <p>CC. To federal, state, local, tribal, territorial, or foreign government agencies,  medical personnel, or other individuals when DHS desires to use de-identified data for illustrative or informative purposes in training, in presentations, or for other similar purposes.</p>
                <p>DD. To medical and mental health professionals for the purpose of assessing an individual’s mental competency before the DOJ Executive Office for Immigration Review.</p>
                <p>EE. To third parties for the purpose of processing payment when external healthcare providers render medical services to individuals in ICE custody on behalf of ICE.</p>
                <p>FF. To federal, state, local, tribal, territorial, international, or foreign government agencies or entities for the purpose of consulting with that agency or entity:</p>
                <p>1. To assist in making a determination regarding redress for an individual in connection with the operations of a DHS component or program;</p>
                <p>2. To verify the identity of an individual seeking redress in connection with the operations of a DHS component or program; or</p>
                <p>3. To verify the accuracy of information submitted by an individual who has requested such redress on behalf of another individual.</p>
                <p>GG. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>

            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/ICE stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, digital media, and CD-ROM.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>Records may be retrieved by name, Alien Registration Number (A-Number), Subject ID, or USMS/Federal Bureau of Prisons Registration Number.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>NARA has approved ICE records schedules that outline the retention periods for detainee medical records. Consistent with the DAA-567-2015-002 and N1-567-08-001 records schedules:</p>
                <p>(1) Medical records for an adult will be retained for ten (10) years after an individual has been released from ICE custody, and then shall be destroyed;</p>
                <p>(2) Medical records about a minor will be retained until the minor has reached the age of twenty-seven (27) years in order to comply with state laws regarding the retention of medical records related to minors, and then shall be destroyed;</p>
                <p>(3) Annual data on detainees who have died in ICE custody that has been transferred to the Bureau of Justice Statistics (BJS) and annual reports regarding infectious diseases will be retained for ten (10) years, and then destroyed;</p>
                <p>(4) Various statistical reports will be retained permanently by NARA; and</p>
                <p>(5) Monthly and annual statistical reports, including those regarding workload operations, will be destroyed when no longer needed for business purposes.</p>
                <p>ICE is currently in the process of developing a records retention schedule with NARA for the various records covered by this SORN that consolidates DAA-567-2015-002 and N1-567-08-001.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>Individuals seeking access to and notification of any record contained in this system of records may submit a request in writing to the ICE FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provides a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                <p>When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                <p>• Explain why the individual believes the Department would have information on him/her;</p>
                <p>• Identify which component(s) of the Department the individual believes may have the information about him/her;</p>
                <p>• Specify when the individual believes the records would have been created; and</p>
                <p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>• If an individual’s request seeks records pertaining to another living individual, the first individual must include a statement from the second individual certifying his/her agreement for the first individual to access his/her records.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered JRA records, see "Record Access Procedures" above. Individuals who wish to contest the accuracy of records in this system of records should submit these requests to the ICE Office of Information Governance and Privacy – Privacy Division. Requests must comply with verification of identity requirements set forth in Department of Homeland Security Privacy Act regulations at 6 CFR 5.21(d). Please specify the nature of the complaint and provide any supporting documentation. By mail (please note substantial delivery delays exist): ICE Office of Information Governance and Privacy – Privacy Division, 500 12th Street SW., Mail Stop 5004, Washington, D.C. 20536. By email: ICEPrivacy@ice.dhs.gov. Please contact the Privacy Division with any questions about submitting a request or complaint at 202-732-3300 or ICEPrivacy@ice.dhs.gov.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures."</p>

            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>None.</p>

            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>
                    80 FR 239 (Jan. 5, 2015); 74 FR 57688 (Nov. 9, 2009).
                </p>
            </xhtmlContent>
        </subsection>
    </section>
        

            <section id="ice14" toc="yes">
<systemNumber>/ICE-014</systemNumber>
<subsection type="systemName">Homeland Security Investigations Forensic Laboratory (HSI-FL)
</subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p> Law enforcement sensitive.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p> Records are maintained at U.S. Immigration and Customs Enforcement Headquarters in Washington, D.C. and in field offices, and electronic records are maintained in Laboratory Information Management System (LIMS), Imaged Documents &amp;amp;amp;amp;amp;amp; Exemplars Library (IDEAL), and other IT systems.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
            <p> Categories of individuals covered by this system include:</p>
            <p> 1. Individuals whose information is contained on United States or international travel and identity documents, such as driver’s licenses, passports, and other forms of identification, that are maintained in the HSI-FL Library;</p>
            <p> 2. Individuals whose information is contained on United States or international travel and identity documents, such as driver’s licenses, passports, and other forms of identification, that are provided to the HSI-FL for forensic examination during a criminal or administrative law enforcement investigation;</p>
            <p> 3. Individuals who are the subjects of current or previous law enforcement investigations by other domestic or foreign agencies where the HSI-FL is providing support and assistance;</p>
            <p> 4. Individuals who are the subjects of current or previous law enforcement investigations into violations of U.S. customs and immigration laws, as well as other laws and regulations within ICE’s jurisdiction, including investigations led by other domestic or foreign agencies, where the HSI-FL is providing support and assistance; and</p>
            <p> 5. Individuals whose image or voice may be captured on video or audio files when the HSI-FL is provided the file to perform technical enhancements of the file.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p> Categories of records in this system include:</p>
            <p> 1. Biographic, descriptive, historical, and other identifying data, including: names; photographs; fingerprint identification number; date and place of birth; passport and other travel document information; nationality; aliases; Alien Registration Number (A– Number); Social Security number; other identification numbers, contact or location information (e.g., known or possible addresses, phone numbers); visa information; employment, educational, immigration, and criminal history; height, weight, eye color, hair color, and other unique physical characteristics (e.g., scars and tattoos).</p>
            <p> 2. Fingerprints or palm prints of individuals whose information is provided to the HSI-FL for forensic examination.</p>
            <p> 3. Case-related data, including: Case number, record number, and other data describing an event involving alleged violations of criminal or immigration law (such as, location, date, time, event category (event categories describe broad categories of criminal law enforcement, such as immigration worksite enforcement, contraband smuggling, and human trafficking)); types of criminal or immigration law violations alleged; types of property involved; use of violence, weapons, or assault against DHS personnel or third parties; attempted escape; and other related information. ICE case management information, including: case category; case agent; date initiated; and date completed.</p>
            <p> 4. Birth, marriage, education, employment, travel, and other information derived from affidavits, certificates, manifests, and other documents presented to or collected by ICE during immigration and law enforcement proceedings or activities. This data typically pertains to subjects, relatives, and witnesses.</p>
            <p> 5. Data concerning personnel of other agencies that arrested, or assisted or participated in the arrest or investigation of, or are maintaining custody of an individual whose arrest record is contained in this system of records. This can include: name; title; agency name; address; telephone number; and other information.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="authorityForMaintenance">
        <xhtmlContent>
            <p> 8 U.S.C. § 1103, 18 U.S.C. § 496, 18 U.S.C. § 911, 18 U.S.C. § 1001, 18 U.S.C. § 1028, 18 U.S.C. § 1425, 18 U.S.C. § 1426, 18 U.S.C. § 1427, 18 U.S.C. § 1541, 18 U.S.C. § 1543, and 18 U.S.C. § 1546.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p> The purposes of this system are to:</p>
            <p> 1. Maintain records related to the scientific authentication, examination, research, and analysis of travel and identity documents, fingerprints, and palm prints in accordance with established laboratory policies and procedures, scientific principles, and accreditation standards.</p>
            <p> 2. Maintain a library of travel and identity documents and associated reference materials for use in forensic examinations, investigations, training, and other activities.</p>
            <p> 3. Support the forensic examinations on a full range of documents, including but not limited to, passports, visas, driver’s licenses, identification cards, border crossing cards, handwritten documents, vital records, and typewritten documents. The analysis may include, but is not limited to, an examination of handwriting, hand printing, typewriting, printing processes, security features, papers, inks, and stamp impressions.</p>
            <p> 4. Maintain records facilitating the preparation of written laboratory reports and delivery of expert witness testimony in legal proceedings.</p>
            <p> 5. Support the provision of training in fraudulent document detection, creation of document intelligence alerts and reference guides, and provision of direct assistance to federal, state and local agencies, as well as foreign governments and commercial entities to combat document fraud.</p>
            <p> 6. Provide assistance within ICE and to domestic and foreign agencies to support the identification and arrest of individuals (both citizens and non-citizens) who commit violations of law.</p>
            <p> 7. To identify potential criminal activity, immigration violations, and threats to homeland security; to uphold and enforce the law; and to ensure public safety.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p> In addition to those disclosures generally permitted under 5 U.S.C. § 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. § 552a(b)(3) as follows:</p>
            <p> A. To the Department of Justice (DOJ) (including offices of the United States Attorneys) or other federal agency conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
            <p>  1. DHS or any component thereof;</p>
            <p>  2. Any employee or former employee of DHS in his/her official capacity;</p>
            <p>  3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
            <p>  4. The United States or any agency thereof.</p>
            <p> B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
            <p> C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. §§ 2904 and 2906.</p>
            <p> D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
            <p> E. To appropriate agencies, entities, and persons when:</p>
            <p> 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;</p>
            <p> 2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
            <p> 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
            <p> F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            <p>G. When a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, rule, regulation, or order, which includes criminal, civil, or regulatory violations, and such disclosure is proper and consistent with the official duties of the person making the disclosure, a disclosure may be made to the appropriate federal, state, local, tribal, territorial, international, or foreign law enforcement agencies or other appropriate authorities charged with investigating or prosecuting a violation or enforcing or implementing such law, rule, regulation, or order.</p>
            <p>H. To courts, magistrates, administrative tribunals, opposing counsel, parties, and witnesses, in the course of immigration, civil, or criminal proceedings (including discovery, presentation of evidence, and settlement negotiations) and when DHS determines that use of such records is relevant and necessary to the litigation before a court or adjudicative body when any of the following is a party to or have an interest in the litigation:</p>
            <p>1. DHS or any component thereof;</p>
            <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
            <p>3. Any employee or former employee of DHS in his/her individual capacity when the government has agreed to represent the employee; or</p>
            <p>4. The United States, when DHS determines that litigation is likely to affect DHS or any of its components.</p>
            <p>I. To federal, state, local, tribal, territorial, or foreign government agencies, as well as to other individuals and organizations during the course of an investigation by DHS or the processing of a matter under DHS’s jurisdiction, or during a proceeding within the purview of the immigration and nationality laws, when DHS deems that such disclosure is necessary to carry out its functions and statutory mandates or to elicit information required by DHS to carry out its functions and statutory mandates.</p>
            <p>J. To federal, state, local, tribal, or territorial government agencies seeking to verify or ascertain the citizenship or immigration status of any individual within the jurisdiction of the agency for any purpose authorized by law.</p>
            <p>K. To federal, state, local, tribal, or territorial government agencies, or other entities or individuals, or through established liaison channels to selected foreign governments, in order to provide intelligence, counterintelligence, or other information for the purposes of national security, intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order, or other applicable national security directive.</p>
            <p>L. To federal, state, local, tribal, territorial, or foreign government agencies or organizations, or international organizations, lawfully engaged in collecting law enforcement intelligence, whether civil or criminal, to enable these entities to carry out their law enforcement responsibilities, including the collection of law enforcement intelligence.</p>
            <p>M. To international, foreign, intergovernmental, and multinational government agencies, authorities, and organizations in accordance with law and formal or informal international arrangements.</p>
            <p>N. To federal and foreign government intelligence or counterterrorism agencies or components when DHS becomes aware of an indication of a threat or potential threat to national or international security, or when such disclosure is to support the conduct of national intelligence and security investigations or to assist in anti-terrorism efforts.</p>
            <p>O. To federal, state, local, tribal, territorial, or foreign government agencies or entities or multinational government agencies when DHS desires to exchange relevant data for the purpose of developing, testing, or implementing new software or technology whose purpose is related to this system of records.</p>
            <p>P. To federal, state, local, territorial, tribal, international, or foreign criminal, civil, or regulatory law enforcement authorities when the information is necessary for collaboration, coordination, and de-confliction of investigative matters, prosecutions, and/or other law enforcement actions to avoid duplicative or disruptive efforts, and to ensure the safety of law enforcement officers who may be working on related law enforcement matters.</p>
            <p>Q. To the Department of State in the processing of petitions or applications for benefits under the Immigration and Nationality Act, and all other immigration and nationality laws including treaties and reciprocal agreements; or when the Department of State requires information to consider and/or provide an informed response to a request for information from a foreign, international, or intergovernmental agency, authority, or organization about an alien or an enforcement operation with transnational implications.</p>
            <p>R. To the Department of State to provide read-only access of records maintained in the Imaged Documents and Exemplars Library to assist the Department of State with its validation of travel and identity documents.</p>
            <p>S. To federal, state, local, tribal, territorial, or foreign government agencies for purposes of completing and providing results of requested forensic examinations to the requesting agency.</p>
            <p>T. To the Department of Justice (including offices of the United States Attorneys) or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when necessary to assist in the development of such agency’s legal and/or policy position.</p>
            <p>U. To the U.S. Senate Committee on the Judiciary or the U.S. House of Representatives Committee on the Judiciary when necessary to inform members of Congress about an alien who is being considered for private immigration relief.</p>
            <p>V. To federal, state, local, tribal, territorial, international, or foreign government agencies or entities for the purpose of consulting with that agency or entity: (1) to assist in making a determination regarding redress for an individual in connection with the operations of a DHS component or program; (2) to verify the identity of an individual seeking redress in connection with the operations of a DHS component or program; or (3) to verify the accuracy of information submitted by an individual who has requested such redress on behalf of another individual.</p>
            <p>W. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
            <p>Disclosure to consumer reporting agencies:</p>
            <p> None.</p>
            
            </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p>Storage:</p>
            <p> ICE stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored in hard copy and electronically on magnetic disc, tape, digital media, and CD-ROM.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
            <p> ICE may retrieve records by name; identification numbers including case or record number if applicable; other personal identification numbers including Alien Registration Number (A–Number), fingerprint identification number, and other personal identification numbers; and case related data and/or combination of other personal identifiers including, but not limited to, date of birth and nationality.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
            <p> ICE safeguards records in this system in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p> The current approved ICE records disposition authority states that all case files not pertaining to war crimes be destroyed five years after the date of completion of the forensic examination. War crime case files are unscheduled at this time, and thus are deemed permanent records.</p>
            <p>              A new records schedule is currently being reviewed, and once approved, will provide lengthier retention periods than the current schedule. ICE is proposing that case files related to significant cases such as war crimes, terrorism, and homicide cases should be retained at ICE for 20 years after completion of the investigation and all actions based thereon, and then transferred to the National Archives for permanent retention.</p>
            <p> Once the schedules are approved, the SORN will be updated to reflect the changes.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p> U.S. Immigration and Customs Enforcement, Homeland Security Investigations Forensic Laboratory, Unit Chief, 8000 West Park Drive, McLean, VA 22102-3105.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p> The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act because it is a law enforcement system. However, DHS/ICE will consider individual requests to determine whether or not information may be released. Thus, individuals seeking notification of, and access to, any record contained in this system of records, or seeking to contest its content, may submit a request in writing to ICE’s Freedom of Information Act (FOIA) Officer, whose contact information can be found at http:// www.dhs.gov/foia under "Contacts."  If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive, S.W., Building 410, STOP-0655, Washington, D.C. 20528.</p>
            <p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity, meaning that you must provide your full name, current address, as well as your date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. § 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, you should:</p>
            <p>•Explain why you believe the Department would have information on you;</p>
            <p>•Identify which component(s) of the Department you believe may have the information about you;</p>
            <p>•Specify when you believe the records would have been created; and</p>
            <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
            <p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
            <p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to a lack of specificity or a lack of compliance with applicable regulations.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p> See "Notification procedure" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p> See "Notification procedure" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p> Records in the system are supplied by several sources. In general, ICE obtains information from federal, state, local, tribal, or foreign governments. More specifically, DHS/ICE–014 records are derived from the following sources:  (a) other federal, state, local, tribal, or foreign governments and government information systems; and (b) evidence, contraband, and other seized material.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p> The Secretary of Homeland Security, pursuant to 5 U.S.C. § 552a(j)(2),  has exempted this system from the following provisions of the Privacy Act 5 U.S.C. § 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (f); and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. § 552a(k)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. § 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). When a record received from another system has been exempted in that source system under 5 U.S.C. § 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions in accordance with this rule.</p>
        </xhtmlContent>
    </subsection>
</section>

    <section id="ice15 " toc="yes">
        <systemNumber>/ICE-015 </systemNumber>
        <subsection type="systemName"> LeadTrac System of Records.</subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p> Unclassified; Law Enforcement Sensitive.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p> DHS/ICE maintains records at the U.S. Immigration and Customs Enforcement (ICE) Headquarters in Washington, D.C. and field offices. Specifically, all records are maintained in the LeadTrac information technology (IT) system, except an extract of records from the legacy LeadTrac system that is maintained in an archived electronic form and stored at the National Archives and Records Administration’s (NARA) Federal Records Center.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>Categories of individuals covered by this system include: (1) individuals who are suspected of overstaying their period of admission, have had their visa revoked, or otherwise violate the terms of their visa, immigrant, or non-immigrant status (suspected status violators). This includes foreign students, exchange visitors, dependents, and other visitors to the United States; (2) associates of suspected status violators, including family members and employers, who may include U.S. citizens; (3) Designated School Officials (DSOs) and other individuals involved in the operation of suspected status violators’ institutions; and (4) Chief executives and legal counsel of Student and Exchange Visitor Program (SEVP)-certified schools, and designated exchange visitor sponsors.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>For individuals who are suspected status violators:</p>
                <p>1) Biographic and other identifying information, to include but not limited to names, dates of birth, countries of birth, countries of citizenship, gender, Social Security number (SSN), financial information, and vehicle information;</p>
                <p>2) Travel-related data, such as passport and visa information and other information related to entry and exit of the United States;</p>
                <p>3) Education data, which may include program of study, school name, school type, school address, school telephone number, school code, enrollment information, Student and Exchange Visitor Information System (SEVIS) certification date, accreditation information, and school operating authority; and</p>
                <p>4) DHS immigration benefit applications data filed with U.S. Government agencies, and data concerning matriculation at a U.S. college or university, employment, civil litigation, and/or criminal history.</p>
                <p>For a suspected status violator’s associates and family members: names, dates of birth, contact information, and other identifying numbers.</p>
                <p>For school and exchange visitor officials: names, SEVIS ID numbers, aliases, gender, dates of birth, countries of birth and citizenship, contact information, and identifying numbers, which may include, but are not limited to alien number and passport number.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>Pursuant to the Homeland Security Act of 2002 (Pub. L.107-296, Nov. 25, 2002), the Secretary of Homeland Security has the authority to enforce numerous federal criminal and civil laws.  These include, but are not limited to, laws residing in titles 8, 18, 19, 21, 22, 31, and 50 of the U.S.C.  The Secretary delegated this authority to ICE in DHS Delegation Number 7030.2, Delegation of Authority to the Assistant Secretary for the Bureau of Immigration and Customs Enforcement and the Reorganization Plan Modification for the Department of Homeland Security (January 30, 2003).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p> LeadTrac is owned by the U.S. Immigration and Customs Enforcement (ICE), Homeland Security Investigations (HSI) Counterterrorism and Criminal Exploitation Unit (CTCEU). The purpose of this system is to identify and vet visitors to the United States who overstay their period of admission or otherwise violate the terms of their visa, immigrant or non-immigrant status. LeadTrac also vets, collects, and maintains information on organizations such as schools, universities, and exchange visitor programs being investigated by CTCEU.</p>
                <p> Specifically, the information is collected and used to support the following DHS activities: investigating and determining immigration status and criminal history information about individuals and carrying out the required enforcement activity; determining the likelihood of, or confirming a suspected violator’s continued presence within the United States and assessing the associated risk level; identifying fraudulent schools and/or organizations and the people affiliated with those schools or organizations; and providing HSI and Enforcement and Removal Operations (ERO) with information to further investigate suspected status violators and carry out the required enforcement activity.</p>
                <p> This system of records also supports the identification of potential criminal activity, immigration violations, and threats to homeland security. The system is used to uphold and enforce the law, and to ensure public safety.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p> In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
                <p> A. To the DOJ, including Offices of the United States Attorneys, or other Federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when disclosure is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>  1. DHS or any component thereof;</p>
                <p>  2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>  3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
                <p>  4. The United States or any agency thereof.</p>
                <p> B. To a Congressional office from the record of an individual in response to an inquiry from that Congressional office made at the request of the individual to whom the record pertains.</p>
                <p> C. To NARA or the General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
                <p> D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p> E. To appropriate agencies, entities, and persons when:</p>
                <p> 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;</p>
                <p> 2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
                <p> 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
                <p> F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>G.  To appropriate Federal, State, local, tribal, territorial, international, or foreign law enforcement agencies or other appropriate authorities charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, rule, regulation, or order, which includes criminal, civil, or regulatory violations, and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H.  To Federal, State, local, tribal, territorial, foreign or international agencies, if the information is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or the issuance, grant, renewal, suspension, or revocation of a security clearance, license, contract, grant, or other benefit; or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant, or other benefit.</p>
                <p>I. To Federal, State, local, tribal, territorial, international, or foreign criminal, civil, or regulatory law enforcement authorities when the information is necessary for collaboration, coordination, and de-confliction of investigative matters, prosecutions, and/or other law enforcement actions to avoid duplicative or disruptive efforts and to ensure the safety of law enforcement officers who may be working on related law enforcement matters.</p>
                <p>J. To international, foreign, intergovernmental, and multinational government agencies, authorities, and organizations in accordance with law and formal or informal international arrangements.</p>
                <p>K. To Federal, State, local, tribal, territorial, foreign government agencies or organizations, or international organizations, lawfully engaged in collecting law enforcement intelligence, whether civil or criminal, to enable these entities to carry out  their law enforcement responsibilities, including the collection of law enforcement intelligence.</p>
                <p>L. To an organization or individual in either the public or private sector, either foreign or domestic, when there is a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to the extent the information is relevant to the protection of life or property.</p>
                <p>M. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation, provided disclosure is appropriate to the proper performance of the official duties of the officer making the disclosure.</p>
                <p>N. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
                <p>Disclosure to consumer reporting agencies:</p>
                <p> None.</p>
               </xhtmlContent>
    </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>Storage:</p>
                <p>DHS/ICE stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p> DHS/ICE may retrieve records by biographic information, identifying numbers, and by other key data elements contained in the system.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permission.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>Under the NARA-approved records retention schedule for LeadTrac, records must be retained for 75 years. ICE intends to request NARA approval to retain LeadTrac records for 25 years from the date the record was created. Under this schedule, records would be kept as active in LeadTrac for 20 years, and archived for an additional five-year period. After the 25-year period, the information would be destroyed or, if deemed necessary, retained further under a reset retention schedule.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p> Section Chief, Counterterrorism and Criminal Exploitation Unit (CTCEU), Homeland Security Investigations, U.S. Immigration and Customs Enforcement, 1515 Wilson Boulevard, Arlington, VA 22209.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p> Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to ICE’s Freedom of Information Act (FOIA) Officer or the Chief Privacy Officer whose contact information can be found at http://www.dhs.gov/foia under "Contacts." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive, S.W., Building 410, STOP-0655, Washington, D.C. 20528.</p>
                <p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, you should:</p>
                <p>•Explain why you believe the Department would have information on you;</p>
                <p>•Identify which component(s) of the Department you believe may have the information about you;</p>
                <p>•Specify when you believe the records would have been created; and</p>
                <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
                <p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p> See "Notification procedure" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>            Individuals who wish to contest the accuracy of records in this system of records should submit these requests to the ICE Office of Information Governance and Privacy. Requests must comply with verification of identity requirements set forth in Department of Homeland Security Privacy Act regulations at 6 CFR 5.21(d). Please specify the nature of the complaint and provide any supporting documentation. By mail (please note substantial delivery delays exist): ICE Office of Information Governance and Privacy, 500 12th Street, SW, Mail Stop 5004, Washington, D.C. 20536. By email: ICEPrivacy@ice.dhs.gov. Please contact the Office of Information Governance and Privacy with any questions about submitting a request or complaint at 202-732-3300 or ICEPrivacy@ice.dhs.gov.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>Records are obtained from key DHS systems of records to include but not limited to:</p>
                <p>Arrival and Departure Information System (ADIS). 80 FR 72,081 (November 18, 2015).</p>
                <p>•Student and Exchange Visitor Information System  (SEVIS). 75 FR 412 (January 5, 2010).</p>
                <p>•Enforcement Integrated Database (EID/ENFORCE). 80 FR 24,269 (April 30, 2015).</p>
                <p>•TECS (not an acronym). 73 FR 43,457 (July 25, 2008).</p>
                <p>•Benefits Information Systems  (BIS). 73 FR 56,596 (September 29, 2008).</p>
                <p>•Automated Biometric Identification System (IDENT). 72 FR 31,080 (June 5, 2007).</p>
                <p>Records are also obtained from the U.S. Department of State’s Consular Consolidated Database (CCD) (77 FR 65,245 (Oct. 25, 2012)), commercial databases, and public sources.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p> The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (f); and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2) has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3), (c)(4); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). When a record received from another system has been exempted in that source system under 5 U.S.C. 552a(j)(2) or (k)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here. </p>
            </xhtmlContent>
        </subsection>
    </section>
    <section id="ice17 " toc="yes">
        <systemNumber>/ICE-017 </systemNumber>
    <subsection type="systemName">
        Department of Homeland Security (DHS)/U.S. Immigration and Customs Enforcement (ICE)-017 Angel Watch Program System of Records.
    </subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p>Unclassified.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p>Records are maintained at the ICE Headquarters in Washington, D.C. and Homeland Security Investigations (HSI) Attaché offices abroad.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p>Homeland Security Investigations, Cyber Crimes Center Child Exploitation Investigations Unit, (866) 347-2423, U.S. Immigration and Customs Enforcement, 500 12th Street S.W., Washington, D.C. 20536</p>
        </xhtmlContent>
    </subsection>
    <subsection type="authorityForMaintenance">
        <xhtmlContent>
            <p> 6 U.S.C. 202-203; 18 U.S.C. 1591, 1596, 2251, 2260, 2423; 19 U.S.C. 1628, 34 U.S.C. 21503.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p>The purpose of this system is to collect information on covered sex offenders to: (1) Combat transnational child sex tourism or exploitation; (2) Share information on covered sex offenders with foreign countries to aid them in making informed decisions regarding the admissibility of travelers in their own countries; (3) Support the receipt of and response to any complaints by alleged covered sex offenders or others related to the activities of the Angel Watch Program; (4) Identify potential criminal activity; uphold and enforce criminal laws; and ensure public safety.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
            <p>Categories of individuals covered by this system are: (1) Individuals, including United States citizens, who have an NSOR record for a sexual offense against a minor and who have scheduled international travel, and (2) individuals, as well as any representative acting on their behalf, filing complaints with the Angel Watch Program concerning alleged inaccurate information. </p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p>Categories of records in this system include:</p>
            <p>1. Notification records consist of information transmitted to DHS’s foreign counterparts for situational awareness. This information may include name, date of birth, Alien Registration Number (A-Number), Social Security number, passport number, and country of birth.</p>
            <p>2. Complaints filed by individuals or their representatives concerning the sharing of their travel information under this program. This includes any information submitted by the complainant; information compiled by the agency in researching the complaint; records of an individual’s criminal history and/or status on the sex offender registry; memoranda or other communications within the agency or with other agencies related to the complaint; research conducted in DHS and other government data systems; and the agency’s response to the complaint.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p>Angel Watch Program notification records validate biographic information against the Advance Targeting System – Passenger (ATS-P), owned by U.S. Customs and Border Protection;  the National Sex Offender Registry within the National Crime Information Center, maintained by the Federal Bureau of Investigation;  domestic courts and law enforcement agencies; the U.S. Department of Justice’s National Sex Offender Public Website (NSOPW), and state, territories, and tribal sex offender registries, available through NSOPW, including the entities responsible for their maintenance;  and the U.S. Department of State from its Consular Lookout and Support System.  Information is also obtained directly from the individuals covered by this system of records or their representatives in the event a complaint is filed.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p> In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
            <p>A. To the U.S. Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other federal agencies conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
            <p>1. DHS or any component thereof;</p>
            <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
            <p>3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
            <p>4. The United States or any agency thereof.</p>
            <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
            <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
            <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
            <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
            <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
            <p>G. To an appropriate Federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
            <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            <p>I. To a foreign government to provide notice of the intended travel of a covered sex offender from the United States to the foreign country, and to assist that government in making an informed decision as to whether the offender may pose a risk of engaging in child sex tourism while in that country.</p>
            <p>J. To federal, state, tribal, territorial, local, international, or foreign government agencies or entities for the purpose of consulting with that agency or entity: (1) to assist in making a determination regarding redress for an individual in connection with the operations of a DHS component or program; (2) to verify the identity of an individual seeking redress in connection with the operations of a DHS component or program; or (3) to verify the accuracy of information submitted by an individual who has requested such redress on behalf of another individual.</p>
            <p>K. To the U.S. Marshals Service to coordinate, cooperate, and de-conflict activities related to the foreign travel of covered sex offenders.</p>
            <p>L. To the U.S. Department of State: (1) to provide notice of U.S. citizens identified as covered sex offenders who are traveling, or intend on traveling, abroad so Department of State may place a unique identifier on their passports; (2) to provide notice of those individuals no longer deemed a covered sex offender; or (3) to resolve complaints, inaccuracies, or errors.</p>
            <p>M. To other Federal Government agencies for the purpose of referring complaints received from individuals that are appropriately handled by those other agencies.</p>
            <p>N. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p>DHS/ICE stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
            <p> Records may be retrieved by name and/or name and date of birth. In the case of complaints, records may be retrieved by name or complaint number.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p> ICE is in the process of drafting a proposed record retention schedule to be submitted to NARA for approval for the information maintained by the Angel Watch Program. The proposed retention policy for notification records is seven (7) years from the year in which the travel was scheduled to occur, and for complaint records, seven years after the complaint was closed.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
            <p>DHS/ICE safeguards records in this system according to all applicable rules and policies, including all applicable DHS automated systems security and access policies. ICE has strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p>Individuals seeking access to and notification of any record contained in this system of records may submit a request in writing to the Chief Privacy Officer and ICE Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provides a right of access, certain records about you may be available under the Freedom of Information Act.</p>
            <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
            <p>•Explain why you believe the Department would have information on him/her;</p>
            <p>•Identify which component(s) of the Department the individual believes may have the information about him/her;</p>
            <p>•Specify when the individual believes the records would have been created; and</p>
            <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
            <p>•If an individual’s request is seeking records pertaining to another living individual, the first individual must include a statement from the second individual certifying his/her agreement for the first individual to access his/her records.</p>
            <p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p>For records covered by the Privacy Act or covered JRA records, see "access procedures" above. Individuals who wish to contest the accuracy of records in this system of records should submit these requests to the Privacy Division of the ICE Information Governance &amp;amp;amp;amp;amp;amp; Privacy Office. Requests must comply with verification of identity requirements set forth in Department of Homeland Security Privacy Act regulations at 6 CFR 5.21(d). Please specify the nature of the complaint and provide any supporting documentation. By mail (please note substantial delivery delays exist): ICE Information Governance &amp;amp;amp;amp;amp;amp; Privacy Office, ATTN: Privacy Division, 500 12th Street S.W., Mail Stop 5004, Washington, D.C. 20536. By email: ICEPrivacy@ice.dhs.gov.</p>
            <p>Please contact the Privacy Division with any questions about submitting a request at 202-732-3300 or ICEPrivacy@ice.dhs.gov.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p>See "Record Access Procedures".</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p>None.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="history">
        <xhtmlContent>
            <p>None.</p></xhtmlContent>
</subsection>
</section>

    <section id="ice18 " toc="yes">
        <systemNumber>/ICE-018 </systemNumber>
        <subsection type="systemName">
            <p>U.S. Department of Homeland Security (DHS)/Immigration and Customs Enforcement (ICE)-018 Analytical Records.</p>
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Classified, Unclassified, Law Enforcement Sensitive, and For Official Use Only.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained either at the ICE Headquarters in Washington, D.C. and field offices, or designated cloud computing environments.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Assistant Director for Homeland Security Investigations Operational Technology and Cyber Division, HSIOTCDTasking@ice.dhs.gov, U.S. Immigration and Customs Enforcement, 500 12th Street SW, Washington, D.C. 20536.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>6 U.S.C. sec. 236; 8 U.S.C. secs. 1103 and 1105; 8 U.S.C. secs. 1225(d)(3) and (d)(4)(A); 8 U.S.C. sec. 1324a(e)(2)(C); 8 U.S.C. sec. 1357; 8 U.S.C. sec. 1360(b); 18 U.S.C. secs. 541, 542, 545, and 554; 18 U.S.C. secs. 1956, 1957, and 1960; 18 U.S.C. sec. 2703; 19 U.S.C. sec. 1415; 19 U.S.C. secs. 1481 and 1484; 19 U.S.C. sec. 1509; 19 U.S.C. sec. 1589a; 19 U.S.C. sec. 1628; 19 CFR 161.2 and 192.14; 21 U.S.C. sec. 967; 22 U.S.C. sec. 2778; 31 U.S.C. sec. 5316; 31 CFR 1010.340; 50 U.S.C. sec. 1705; 50 U.S.C. sec. 2411(a); and, Bank Secrecy Act, Pub. L. No. 91-508, 84 Stat. 1114-24 (1970).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purposes of ICE analytical systems are:</p>
                <p> (a) to support ICE’s collection, analysis, reporting, and distribution of law enforcement, customs, immigration, terrorism, intelligence, and homeland security information in support of ICE’s mission;</p>
                <p> (b) to produce investigative leads and other actionable information to ICE’s law enforcement, customs, and immigration enforcement personnel and to other appropriate government agencies;</p>
                <p> (c) to identify potential violations of U.S. criminal, civil, and administrative laws through search, aggregation, analysis, and visualization of raw data;</p>
                <p> (d) to enhance the efficiency and effectiveness of the research and analysis process for DHS law enforcement, customs, immigration, and intelligence personnel through information technology tools that provide for advanced search and analysis of various datasets;</p>
                <p> (e) to facilitate multi-jurisdictional cooperation and collaboration on investigations into transnational activities that violate criminal and civil laws pertaining to exportation of restricted materials, cargo safety and security, immigration, trafficking, trade, financial crimes, smuggling, and fraud;</p>
                <p> (f) to support the operation of the agency’s tip line and the collection, analysis, and action on information volunteered by the public and other sources concerning suspicious and potentially illegal activity; and</p>
                <p> (g) to identify potential criminal activity, immigration violations, customs violations, and threats to homeland security; to uphold and enforce the law; and to ensure public safety.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>Categories of individuals covered by this system include:</p>
                <p>(1) individuals identified in law enforcement, intelligence, crime, and incident reports (including financial reports under the Bank Secrecy Act and law enforcement bulletins) produced by DHS and other government agencies;</p>
                <p>(2) individuals identified in U.S. passport, visa, border, immigration, and naturalization benefit data, including arrival and departure data;</p>
                <p>(3) individuals identified in DHS law enforcement, licensing, and immigration records, including records associated with the ICE Student Exchange Visitor Program;</p>
                <p>(4) individuals who, as importers, exporters, shippers, transporters, customs brokers, owners, purchasers, manufacturers, consignees, or agents thereof, participate in the import or export of goods to or from the United States or to or from nations with which the United States has entered an agreement to share trade information;</p>
                <p> (5) individuals (e.g., subjects, witnesses, associates, assigned government personnel) associated with customs enforcement, immigration enforcement, administrative actions, detainer requests, or law enforcement investigations/activities conducted by ICE, the former Immigration and Naturalization Service (INS), U.S. Customs and Border Protection (CBP), or the former U.S. Customs Service;</p>
                <p>(6) individuals associated with law enforcement investigations or activities conducted by other federal, state, tribal, territorial, local or foreign agencies where there is a potential nexus to ICE’s law enforcement, customs enforcement, and immigration enforcement responsibilities, or homeland security in general;</p>
                <p>(7) individuals known or appropriately suspected to be or have been engaged in conduct constituting, in preparation for, in aid of, or related to terrorism;</p>
                <p>(8) individuals involved in or associated with suspicious activities, threats, or other incidents reported by domestic and foreign government agencies, multinational or non-governmental organizations, critical infrastructure owners and operators, private sector entities and organizations, and individuals;</p>
                <p>(9) individuals who are subjects of government screening lists or threat assessments, such as known or suspected Transnational Organized Criminal (TOC) gang members or associates;</p>
                <p>(10) Specially Designated Nationals (SDN) as defined by 31 CFR 500.306 and individuals identified on other denied parties or screening lists; and</p>
                <p>(11) ICE personnel or personnel from partner law enforcement agencies who are mentioned in significant incident reports that concern law enforcement operations, injuries to law enforcement personnel, or other significant incidents reported within ICE.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>1. Biographic and other identifying information, including names; dates of birth; places of birth; Social Security numbers (SSN); Tax Identification Numbers (TIN); Exporter Identification Numbers (EIN); passport information (number and country of issuance); citizenship; nationality; location and contact information (e.g., home, business, and email addresses and telephone numbers); and other identification numbers (e.g., Alien Registration Number (A-number), Driver’s License Number);</p>
                <p>2. Biometric information, including facial images, iris images, fingerprints, and voice audio; and any unique numerical identifiers assigned to biometrics for administrative purposes;</p>
                <p>3. Financial data, including data reported pursuant to the Bank Secrecy Act (e.g., certain transactions over $10,000) and other financial data obtained via official investigations, legal processes, or legal settlements. Financial data includes bank account numbers, transaction numbers, and descriptions or value of financial transactions;</p>
                <p>4. Licensing information related to applications by individuals or businesses to hold or retain a customs broker’s license, operate a customs-bonded warehouse, or be a bonded carrier or bonded cartman;</p>
                <p>5. Trade analysis data, including trade identifier numbers (e.g., for manufacturers importers, exporters, and customs brokers) and bill of lading data (e.g., consignee names and addresses, shipper names and addresses, container numbers, carriers); internet protocol (IP) addresses; other financial data related to trade required for the detection and analysis of financial irregularities and crimes;</p>
                <p>6. Location-related data, including address; geotags from metadata associated with other record categories collected; and geolocation information derived from authorized law enforcement activities, ICE-owned devices, witness accounts, or commercially available data;</p>
                <p>7. Various internal operational reports, including reports of significant incidents and operations; reports concerning prospective enforcement activity; reports of outcomes and dispositions of referred leads; requests for assistance from other law enforcement agencies; agency intelligence reports; and reports of third-agency visits to ICE detention facilities;</p>
                <p>8. Law enforcement records, including TECS subject records and investigative records related to an ICE or CBP law enforcement matter, information obtained from the U.S. Department of the Treasury’s Specially Designated Nationals List, visa security information, and other trade-based and financial sanction screening lists. Law enforcement data includes names; aliases; business names; addresses; IP addresses; dates of birth; places of birth; citizenship; nationality; passport information; SSNs; TINs; Driver’s License Numbers; and vehicle, vessel, and aircraft information;</p>
                <p>9. Reports of fines, penalties, forfeitures, and seizure incidents;</p>
                <p>10. Financial and communication records obtained during the course of an ICE criminal investigation. These records can include lawfully obtained call transactions, call content, text transactions, text content, email transactions, email content, and financial wire transactions;</p>
                <p>11. Continued presence parole application records;</p>
                <p>12. Open source information - news articles or other data available to the public on the internet or in public records, including content from the dark net and publicly available information from social media;</p>
                <p>13. Commercially available data - public and proprietary records available for a subscription;</p>
                <p>14. Cargo and border crossing data – inbound/outbound shipment records and border crossing information;</p>
                <p>15. Criminal information, including lookouts, warrants, criminal history records, and other civil or criminal investigative information provided by other law enforcement agencies;</p>
                <p>16. Information from foreign governments or multinational organizations such as INTERPOL or Europol – including criminal history; immigration data; passenger, vehicle, vessel entry/exit data; passport information; vehicle, vessel, and licensing records; shipment records; telephone records; intelligence reports; investigative leads and requests; and wanted persons notices, warrants, and lookouts;</p>
                <p>17. Information related to participation in a student exchange visitor program, including education and training; school information; sponsor information; program status and activities; placement information; and any administrative or adjudicative actions related to the program;</p>
                <p>18 Investigative leads, analytical work products, and finished intelligence reports from ICE, DHS, or other agencies;</p>
                <p>19. Information or evidence seized or otherwise lawfully obtained during the course of an ICE investigation, including business records, third-agency records, public records (e.g., courts), transcripts of interviews/depositions, or records and materials seized or obtained via subpoena or other lawful process;</p>
                <p>20 Tips concerning illegal or suspicious activity from the public and other law enforcement agencies; and</p>
                <p>21.Tip data concerning child exploitation violations, such as the biographical data of the suspect or the suspect’s online identity information (e.g., user ID). Internet service provider data, domain name, credit card number and IP address, internet subscriber data (e.g., name, subscriber number, billing address, payment method, and email addresses), a log of subscriber activity, or other information such as motor vehicle data, and SSN; and</p>
                <p>22. Other information collected during the course of vetting a tip from sources such as government databases, open sources, and commercially-available data, as previously described.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>Records are obtained from individuals via tips to the ICE tip line or other public interfaces; other DHS components; U.S. Department of Commerce; U.S. Department of the Treasury; U.S. Department of State; other federal, state, and local law enforcement agencies; foreign governments pursuant to international agreements or arrangements; international entities; financial institutions; transportation companies; manufacturers; customs brokers; organizations participating in free trade zones; port authorities; and commercially and publicly available data sources. Current federal interfaces with ICE analytical systems include records covered by the following SORNs:</p>
                •	<p>DHS/ICE-001 Student Exchange Visitor Information System (SEVIS), 75 FR 412 (January 5, 2010);</p>
                •	<p>DHS/ICE-004 Bond Management Information System (BMIS), 85 Fed. Reg. 64515 (October 13, 2020);</p>
                •	<p>DHS/ICE-006 Intelligence Records System (IIRS), 75 Fed. Reg. 9233 (March 1, 2010);</p>
                •	<p>DHS/ICE-007 Criminal History and Immigration Verification (CHIVe) System of Records, 83 Fed. Reg. 20844 (May 8, 2018);</p>
                •	<p>DHS/ICE-008 Search Arrest and Seizure Records, 73 Fed. Reg. 74732 (December 9, 2008);</p>
                •	<p>DHS/ICE-009 External Investigations, 75 Fed. Reg. 404 (January 5, 2010);</p>
                •	<p>DHS/ICE-011 Criminal Arrest Records and Immigration Enforcement Records (CARIER) System of Records, 81 Fed. Reg. 72080 (October 19, 2016);</p>
                •	<p>FinCEN .003 - Bank Secrecy Act Reports System, 79 Fed. Reg. 20969 (April 14, 2014);</p>
                •	<p>DHS/CBP-006 Automated Targeting System, 77 Fed. Reg. 30297 (May 22, 2012);</p>
                •	<p>DHS/CBP-020 Export Information System, 80 Fed. Reg. 53181 (September 2, 2015);</p>
                •	<p>JUSTICE/FBI-001 National Crime Information Center (NCIC), 84 Fed. Reg. 47533 (September 10, 2019);</p>
                •	<p>DHS/ALL-041 External Biometric Records (EBR), 83 Fed. Reg. 17829 (April 24, 2018).</p>
                <p>SORNs ingested into analytical systems at ICE are subject to change based on mission need and requirements of both ICE and system owners.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To federal, state, local, tribal, territorial, foreign or international agencies, if the information is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an individual; the issuance, grant, renewal, suspension, or revocation of a security clearance, license, contract, grant, or other benefit; or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security</p>
                <p>J. To appropriate federal, state, local, tribal, territorial, or foreign government agencies or multilateral governmental organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a statute, rule, regulation, order, license, or treaty when DHS determines that the information would assist in the enforcement of civil, criminal, or regulatory laws.</p>
                <p>K. To federal, state, local, tribal, territorial, foreign government agencies, or other entities or individuals, or through established liaison channels to selected foreign governments, in order to provide intelligence, counterintelligence, or other information for the purposes of national security, intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, executive order, or other applicable national security directive.</p>
                <p>L. To federal, state, local, tribal, territorial, or foreign government agencies or organizations, or international organizations, lawfully engaged in collecting law enforcement intelligence, whether civil or criminal, to enable these entities to carry out their law enforcement responsibilities, including the collection of law enforcement intelligence.</p>
                <p>M. To international, foreign, intergovernmental, and multinational government agencies, authorities, and organizations in accordance with law and formal or informal international arrangements.</p>
                <p>N. To a court, magistrate, administrative tribunal, opposing counsel, parties, and witnesses in the course of a civil, criminal or administrative proceeding before a court or adjudicative body when DHS determines that the use of such records is relevant and necessary to the litigation or the proceeding provided that in each case, DHS determines that disclosure of the information to the recipient is a use of the information that is compatible with the purpose for which it was collected.</p>
                <p>O. To federal, state, local, tribal, territorial, or foreign government agencies, as well as to other individuals and organizations during the course of an investigation by DHS or the processing of a matter under DHS’s jurisdiction, or during a proceeding within the purview of the immigration and nationality laws, when DHS deems that such disclosure is necessary to carry out its functions and statutory mandates or to elicit information required by DHS to carry out its functions and statutory mandates.</p>
                <p> P. To federal, state, local, tribal, territorial, international, or foreign government agencies or entities for the purpose of consulting with those agencies or entities:</p>
                (1)	<p>To assist in making a determination regarding redress for an individual in connection with the operations of a DHS component or program;</p>
                (2)	<p>To verify the identity of an individual seeking redress in connection with the operations of a DHS component or program; or to verify the accuracy of information submitted by an individual who has requested redress on behalf of another individual.</p>
                <p>Q. To an organization or individual in either the public or private sector, either foreign or domestic, to the extent necessary to prevent immediate loss of life, serious bodily injury, or destruction of property.</p>
                <p>R. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation, provided disclosure is appropriate to the proper performance of the official duties of the officer making the disclosure.</p>
                <p>S. To a former employee of DHS for the purpose of responding to an official inquiry by federal, state, local, tribal, or territorial government agencies or professional licensing authorities; or facilitating communications with a former employee that may be necessary for personnel-related matters or other official purposes when DHS requires information or consultation assistance from the former employee regarding a matter within that person’s former area of responsibility.</p>
                <p>T. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS is aware of a need to use relevant data, that relate to the purpose(s) stated in this SORN, for purposes of testing new technology.</p>
                <p>U. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/ICE stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media within secure access-controlled facilities.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>DHS/ICE may retrieve records by any of the personal identifiers stored in the system including name, business address, home address, importer ID, exporter ID, broker ID, manufacturer ID, Social Security number, trade and tax identifying numbers, passport number, or account number. Records may also be retrieved by non-personal information such as transaction date, entity or institution name, description of goods, value of transactions, and other information.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>The retention period for information contained in analytical systems varies depending on the type of data. Routinely ingested data is retained in accordance with the record retention schedule of the source system. Analytical products are considered intermediary records which are destroyed upon verification of successful creation of the final document or file (such as a generated lead), or when no longer needed for a business use, whichever is later. Data uploaded to analytical systems in an ad hoc manner is associated with a case file number, to the extent possible, and retained consistent with the retention of the case file. Records associated with an ICE case file, either ad hoc uploads or designated analytical work products, are active until the case closes, and then will be retained for 20 years in accordance with legacy customs schedule N1-36-86-1-161.3 (inv 7B) from the Department of Treasury. Records associated with cases are retained for evidentiary purposes, to allow ICE to link findings to other cases, and to ensure ICE has proper auditing and oversight of its systems. ICE will develop and submit an updated schedule for investigative records to the National Archives and Records Administration (NARA) for approval. When there is no case file number, ICE tags the data as either associated with the ICE or DHS SORN related to the original collection of the information or with a retention schedule of 20 years. ICE retains system metadata for the same length of time as the record or data element they originate from or describe.</p>
                <p>Currently, the retention period for data maintained under the DHS/ICE-005 TTAR SORN is maintained in accordance with the legacy retention schedule N1-567-09-003. Case related records under this schedule will remain active until the end of the calendar year in which a case closes, after which it will be retainedfor an additional ten years, and then deleted. All other bulk financial and trade data ingested is archived at the end of the calendar year of receipt and destroyed three years thereafter. ICE intends to request NARA approval to retire the legacy retention schedule and proposes to retain all financial and trade data for ten years.</p>
                <p> This system of records will also be the official repository for tip information at ICE. The tip line application will feed records it creates directly into an analytical central storage environment. ICE analysts may manually enter other tip information into the environment. Currently tip records are unscheduled. ICE will include tip records in its submission to NARA for a new investigative records schedule. ICE will propose that standard tip records be retained for ten years from the date of the tip. Tip records concerning child exploitation crimes will be retained for 75 years in line with retention schedule N1-567-10-014.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p>DHS/ICE safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS/ICE has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act, and the Judicial Redress Act if applicable, because it is a law enforcement system. However, DHS/ICE will consider individual requests to determine whether or not information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and ICE Freedom of Information Act (FOIA) Officer whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, U.S. Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about an individual may be available under the Freedom of Information Act.</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                •	<p>Explain why he or she believes the Department would have information being requested;</p>
                •	<p>Identify which component(s) of the Department he or she believes may have the information;</p>
                •	<p>Specify when the individual believes the records would have been created; and</p>
                •	<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (f); and (g). Pursuant to 5 U.S.C. 552a(k)(2), this system is exempt from the following provisions of the Privacy Act, subject to the limitations set forth in those subsections: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H); and (f). When an analytical system receives a record from another system exempted in that source system under 5 U.S.C. sec. 552a(j)(2), ICE will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>DHS/ICE-005 Trade Transparency Analysis and Research, 79 Fed. Reg. 71112 (December 1, 2014); DHS/ICE-016 FALCON Search and Analysis, 82 Fed. Reg. 20905 (May 4, 2017).</p>
            </xhtmlContent>
        </subsection>
    </section>


    <section id="iaip1" toc="yes">
<systemNumber>/IAIP-001</systemNumber>
<subsection type="systemName">Homeland Security Operations Center Database
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Classified; sensitive
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the Homeland Security Operations Center, Office of the Undersecretary for Information
Analysis and Infrastructure Protection, Department of Homeland Security, Washington, DC 20528.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Individuals who have been linked in any manner to potential terrorism, to other domestic incidents with homeland
security implications, or whose behavior arouses reasonable suspicion of possible terrorist activity; individuals who are
the subject of information pertaining to terrorism and/or homeland security; individuals who offer information pertaining
to terrorism and/or homeland security; individuals who request assistance or information; or individuals who make
inquiries concerning possible terrorist activity. The system will also contain information about individuals who are or
have been associated with DHS homeland security operations or with DHS administrative operations.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Intelligence information obtained from agencies and components of the Federal Government, foreign governments,
organizations or entities, international organizations, state and local government agencies (including law enforcement
agencies), and private sector entities; information provided by individuals, regardless of the medium used to submit the
information; information obtained from the Terrorist Screening Center or on terrorist watch lists about individuals known
or reasonably suspected to be engaged in conduct constituting, preparing for, aiding, or relating to terrorism; results
of intelligence analysis and reporting; ongoing law enforcement investigative information; information systems security
analysis and reporting; historical law enforcement information; operational and administrative records; financial
information; and public source data such as that contained in media reports and commercial databases. Data about the
providers of information, including the means of transmission of the data, will also be retained.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301, 552, 552a; Section 201 of the Homeland Security Act of 2002, Pub. L. 107-296, 116 Stat. 2145
(Nov. 25, 2002), as amended (6 U.S.C. 121); 44 U.S.C. 3101; E.O. 12958; E.O. 9397.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>This record system is maintained to collect, access, and analyze law enforcement information, intelligence
information, and other information from agencies of the Federal Government, foreign governments, international
organizations, state and local government agencies (including law enforcement agencies), and private sector entities or
individuals; and to integrate such information in order to: detect, identify and assess the nature and scope of terrorist
or other threats to the United States; and understand such threats in light of actual and potential vulnerabilities of
the homeland.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. If the record, on its face or in conjunction with other information, indicates a violation or potential violation
of any law, regulation, rule, order, or contract, the record may be disclosed to the appropriate entity, whether federal,
state, local, joint, tribal, foreign, or international, that is charged with the responsibility of investigating,
prosecuting and/or enforcing such law, regulations, rule, order or contract.
</p><p>B. To a Federal, state, local, joint, tribal, foreign, international or other public agency or organization, or to any
person or entity in either the public or private sector, domestic or foreign, where such disclosure may promote assist or
otherwise serve homeland or national security interests.
</p><p>C. To an organization or individual in either the public or private sector, where there is a reason to believe that
the recipient is or could become the target of a particular terrorist activity or conspiracy, to the extent the
information is relevant to the protection of life or property.
</p><p>D. To recipients under circumstances and procedures as are mandated by Federal statute, treaty, or international
agreement.
</p><p>E. To the news media or members of the general public in furtherance of a function related to homeland security as
determined by the system manager where disclosure could not reasonably be expected to constitute an unwarranted invasion
of privacy.
</p><p>F. To the Department of Justice or other federal agency conducting litigation or in proceedings before any court,
adjudicative or administrative body, when: (a) DHS, or (b) any employee of DHS in his/her official capacity, or (c) any
employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee, or (d) the United
States or any agency thereof, is a party to the litigation or has an interest in such litigation.
</p><p>G. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>H. To the National Archives and Records Administration or other federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. Sections 2904 and 2906.
</p><p>I. To contractors, grantees, experts, consultants, volunteers, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for the Federal government, when necessary to accomplish an
agency function related to this system of records.
</p><p>J. To an agency, organization, or individual for the purposes of performing authorized audit or oversight operations.
</p><p>K. To a Federal, state, local, tribal, territorial, foreign, or international agency, if necessary to obtain
information relevant to a Department of Homeland Security decision concerning the hiring or retention of an employee, the
issuance of a security clearance, the reporting of an investigation of any employee, the letting of a contract, or the
issuance of a license, grant, or other benefit.
</p><p>L. To a Federal, state, local, tribal, territorial, foreign, or international agency, in response to its request, in
connection with the hiring or retention of an employee, the issuance of a security clearance, the reporting of an
investigation of an employee, the letting of a contract, or the issuance of a license, grant, or other benefit by the
requesting agency, to the extent that the information is relevant and necessary to the requesting agency’s decision on
the matter.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically at the HSOC in a secure facility. The records are stored on
magnetic disc, tape, digital media, and CD-ROM, and may also be retained in hard copy format in secure folders.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Data may be retrieved by the individual’s name or other identifier.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Information in this system is safeguarded in accordance with applicable rules and policies, including any
applicable IAIP and DHS automated systems security and access policies. Strict controls have been imposed to minimize the
risks of compromising the information that is being stored. Access to the computer system containing the records in this
system is limited to those individuals specifically authorized and granted access by DHS regulations, who hold
appropriate security clearances, and who have a need to know the information in the performance of their official duties.
The system also maintains a real-time auditing function of individuals who access the system. Classified information is
appropriately stored in a secured facility, in secured databases and containers, and in accordance with other applicable
requirements, including those pertaining to classified information. Access is limited to authorized personnel only.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>IAIP is working with the National Archives and Records Administration to obtain approval of a records retention
and disposal schedule to cover records in the HSOC database. IAIP has proposed a short retention schedule for these
records.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Director, Disclosure Office, Office of the Chief of Staff, Office of the Undersecretary for Information Analysis
and Infrastructure Protection, Department of Homeland Security, Washington, D.C. 20528.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>To determine whether this system contains records relating to you, write to the System Manager identified above.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>A request for access to records in this system may be made by writing to the System Manager, identified above, in
conformance with 6 CFR Part 5, Subpart B, which provides the rules for requesting access to Privacy Act records
maintained by DHS.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Same as "Record access procedures,"  above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information contained in this system is obtained from subject individuals, other agencies and organizations, both
domestic and foreign, media, including periodicals, newspapers, and broadcast transcripts and public and classified
reporting, privacy organizations and individuals, intelligence source documents, investigative reports, and
correspondence.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>Portions of this system are exempt under 5 U.S.C. 552a((j)(2), (k)(1), and (k)(2).
</p></xhtmlContent></subsection></section>
<section id="ia1" toc="yes">
<systemNumber>/IA-001</systemNumber>
<subsection type="systemName">Office of Intelligence &amp;amp;amp;amp;amp;amp; Analysis (I&amp;amp;amp;amp;amp;amp;A) Enterprise Records System.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>The classification of records in this system can range from UNCLASSIFIED to TOP SECRET.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained by the Office of Intelligence &amp;amp;amp;amp;amp;amp; Analysis (I&amp;amp;amp;amp;amp;amp;A), Department of Homeland Security,
Washington, DC 20528, and at remote locations where I&amp;amp;amp;amp;amp;amp;A maintains secure facilities and/or conducts its mission.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>A. Individuals who are known, reasonably believed to be, or are suspected of being, involved in or linked to:
</p><p>1. The existence, organization, capabilities, plans, communications, intentions, and vulnerabilities of, means of
finance or material support for, and activities against or threats to the United States or United States persons and
interests by, domestic, foreign or international terrorist groups and/or individuals involved in terrorism;
</p><p>2. Groups or individuals believed to be assisting or associated with domestic, foreign, or international terrorist
groups and/or individuals involved in terrorism;
</p><p>3. Activities constituting a threat to homeland security, and/or activities that are preparatory to, or facilitate or
support such activities, including:
</p><p>a. Activities related to the violation or suspected violation of immigration or customs laws and regulations of the
United States,
</p><p>b. Activities, which could reasonably be expected to assist in the development or use of a weapon of mass effect;
</p><p>c. Activities to identify, create, exploit, or undermine the vulnerabilities of the "key resources" (as
defined in section 2(9) of the Homeland Security Act of 2002) and "critical infrastructure" (as defined in 42
U.S.C. 5195c(c)) of the United States;
</p><p>d. Activities to identify, create, exploit, or undermine the vulnerabilities of the cyber and national
telecommunications infrastructure, including activities which may impact the availability of a viable national security
and emergency preparedness communications infrastructure.
</p><p>e. Activities detrimental to the security of transportation and transportation systems;
</p><p>f. Activities which violate or are suspected of violating the laws relating to counterfeiting of obligations and
securities of the United States and other financial crimes, including access device fraud, financial institution fraud,
identity theft, computer fraud; and computer-based attacks on our nation’s financial, banking, and telecommunications
infrastructure;
</p><p>g. Activities, not wholly conducted within the United States, which violate or are suspected of violating the laws
which prohibit the production, transfer, or sale of narcotics or substances controlled in accordance with Title 21 of the
United States Code, or those associated activities otherwise prohibited by Titles 21 and 46 of the United States Code;
</p><p>h. Activities which impact or concern the security, safety, and integrity of our international borders, including any
illegal activities that cross our borders such as violations of the immigration or customs laws of the United States;
</p><p>i. Activities which impact, concern, or otherwise threaten the safety and security of the President and Vice
President, their families, heads of state, and other designated individuals; the White House, Vice President’s residence,
foreign missions, and other designated buildings within the United States;
</p><p>j. Activities which impact, concern, or otherwise threaten maritime safety and security, maritime mobility and
navigation, or the integrity of the maritime environment;
</p><p>k. Activities which impact, concern, or otherwise threaten the national operational capability of the Department to
respond to natural and man-made major disasters and emergencies, including acts of terrorism, in support of impacted
communities; to coordinate all Federal emergency management response operations, response planning and logistics
programs; and to integrate Federal, State, tribal and local response programs to ensure the efficient and effective
delivery of immediate emergency assistance to individuals and communities impacted by major disasters, emergencies or
acts of terrorism.
</p><p>l. Activities involving the detection of and response to unauthorized attempts to import, possess, store, develop, or
transport nuclear or radiological material for use against the United States
</p><p>4. The capabilities, intentions, or activities of foreign governments or elements thereof, foreign organizations, or
foreign persons, where the individuals may be officers or employees of, or otherwise acting for or on behalf of, a
foreign power or organization that may be owned or controlled, directly or indirectly, by a foreign power;
</p><p>5. Intelligence activities, or other individuals known or suspected of engaging in intelligence activities, on behalf
of a foreign power or terrorist group;
</p><p>6. Activities or circumstances where the health or safety of that individual may be threatened, including information
concerning these individuals that may be necessary for identifying and implementing protective security measures or other
emergency preparedness activities;
</p><p>B. Individuals who voluntarily request assistance or information, through any means, from I&amp;amp;amp;amp;amp;amp;A, or individuals who
voluntarily provide information concerning any of the activities above, which may threaten or otherwise affect homeland
security.
</p><p>C. Individuals who are or have been associated with DHS or I&amp;amp;amp;amp;amp;amp;A activities or with the administration of the
Department, including information about individuals that is otherwise required to be maintained by law or that is
necessary for the provision of intelligence support to the Department.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>I&amp;amp;amp;amp;amp;amp;A utilizes a single records system for maintaining I&amp;amp;amp;amp;amp;amp;A’s operational and administrative records,
including:
</p><p>A. Classified and unclassified intelligence (includes national intelligence, foreign intelligence, and
counterintelligence), counterterrorism, homeland security, and related law enforcement information, including source
records and the reporting and results of any analysis of this information, obtained from all agencies, components and
organizations of the Federal government, including the IC; foreign governments, organizations or entities, and
international organizations; State, local, tribal and territorial government agencies (including law enforcement
agencies); and private sector entities;
</p><p>B. Information provided by record subjects and individual members of the public;
</p><p>C. Information obtained from the Terrorist Screening Center, the National Counterterrorism Center, or from other
organizations about individuals known or reasonably suspected of being engaged in conduct constituting, preparing for,
aiding, or relating to terrorism;
</p><p>D. Active and historical law enforcement investigative information;
</p><p>E. Information related to lawful DHS Security investigations, including authorized physical, personnel, and
communications security investigations, and information systems security analysis and reporting;
</p><p>F. Operational and administrative records, including correspondence records;
</p><p>G. Lawfully acquired financial information, when relevant to an authorized intelligence, counterterrorism, homeland
security, or related law enforcement activity;
</p><p>H. Public source data such as that contained in media, including periodicals, newspapers, broadcast transcripts, and
other public reports and commercial databases; and
</p><p>I. Data about the providers of any information otherwise contained within this system, including the means of
transmission of the data.
</p><p>Examples of information related to the "Categories of Individuals" listed above may include:
</p><p>Full name, date of birth, gender, country of citizenship, country of birth, alien number, social security number,
driver’s license numbers, passport numbers, fingerprint identification number, or other unique identifying numbers,
current and past home and work addresses, phone numbers, terrorist associations, biometric information including
fingerprints and photographs, physical description, results from intelligence analysis related to terrorism, financial
information, family members or associates, flight information, border crossing information, immigration information, or
other personally identifiable information that is relevant and necessary.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; Title II and section 892 of the Homeland Security Act of 2002, Pub. L. 107-296, 116 Stat.
2145 (Nov. 25, 2002), as amended (6 U.S.C. 121, <i>et seq.</i>); 44 U.S.C. 3101; E.O. 9397; E.O. 12333; E.O. 12958; E.O.
13356; and E.O. 13388.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>ERS replaces the applicable portions of the DHS, Homeland Security Operations Center Database (DHS/IAIP-
001) system of records notice (SORN), last published in full text on April 18, 2005 [70 F.R. 20156]. The DHS/IAIP-
001 SORN previously covered the functional and organizational aspects of I&amp;A within DHS prior to realignment by the
Secretary and Congress, respectively, in 2005 and 2006.
</p><p>The mission-specific purposes of ERS are as follows:
</p><p>A. To manage, access, analyze, integrate, and store intelligence (including national intelligence, foreign
intelligence, and counterintelligence), counterterrorism, homeland security, related law enforcement, and other
information to carry out the responsibilities of the Secretary of Homeland Security and the Under Secretary for I&amp;A,
as the official responsible for assessing and analyzing all terrorism, homeland security, and related law enforcement and
intelligence information received by the Department, under Title II of the Homeland Security Act (6 U.S.C. 121, <i>et
seq.</i>), in support of the overall DHS mission.
</p><p>B. To fulfill the need for coordinated intelligence support in all of the critical mission areas specifically
identified in the President’s National Strategy for Homeland Security or other related activities as defined by separate
Executive Order, Homeland and/or National Security Presidential Directive, or other issuance concerning the internal
management and policy of Executive Branch activities.
</p><p>C. To enable the provision of intelligence and analysis support to all DHS activities, components, and organizational
elements, and to maintain a record system from which I&amp;A can cull, analyze, and fuse intelligence and related
information properly received from other DHS components, other United States Government (USG) departments and agencies
(including law enforcement agencies), elements of the National Intelligence Community (IC), as well as our foreign,
State, local, territorial, tribal, and private sector partners.
</p><p>D. To permit the Under Secretary for I&amp;A, as Chief Intelligence Officer of the Department, to foster the
development and execution of an information sharing environment within DHS; to integrate the intelligence and information
sharing functions and activities of the DHS intelligence enterprise to provide the most valuable, actionable intelligence
and intelligence-related information for the Nation’s leadership, all components of DHS, the IC, and our other partners;
and to ensure both that the information and analysis provided by the Department is appropriate for providing security for
the homeland and that the sharing of intelligence and analysis between DHS and its Federal, State, local, territorial,
tribal, foreign, and private sector partners is sufficient to meet their respective homeland security needs.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To any Federal, State, local, tribal, territorial, foreign, or multinational government or agency, or appropriate
private sector individuals and organizations, with responsibilities relating to homeland security, including
responsibilities to counter, deter, prevent, prepare for, respond to, or recover from a natural or manmade threat,
including an act of terrorism, or to assist in or facilitate the coordination of homeland security threat awareness,
assessment, analysis, deterrence, prevention, preemption, and response;
</p><p>B. To a Federal, State, local, tribal, territorial, foreign, or multinational government or agency with the
responsibility and authority for investigating, prosecuting and/or enforcing a law (civil or criminal), regulation, rule,
order or contract, where the record, on its face or in conjunction with other information, indicates a violation or
potential violation of any such law, regulation, rule, order, or contract enforced by that government or agency;
</p><p>C. To a Federal, State, local, tribal, territorial, foreign, or multinational government or agency, or other entity,
including, as appropriate, certain private sector individuals and organizations, where disclosure is in furtherance of
I&amp;amp;amp;amp;amp;amp;A’s information sharing responsibilities under the Homeland Security Act of 2002, as amended, the Intelligence
Reform and Terrorism Prevention Act of 2004, the National Security Act of 1947, as amended, Executive Order 12333, as
amended, or any successor order, national security directive, intelligence community directive, other directive
applicable to I&amp;amp;amp;amp;amp;amp;A, and any classified or unclassified implementing procedures promulgated pursuant to such orders and
directives, or any other statute, Executive Order or directive of general applicability, and where such disclosure is
otherwise compatible with the purpose for which the record was originally acquired or created by I&amp;amp;amp;amp;amp;amp;A;
</p><p>D. To a Federal, State, local, tribal, or territorial government or agency lawfully engaged in the collection of
intelligence (including national intelligence, foreign intelligence, and counterintelligence), counterterrorism, homeland
security, law enforcement or law enforcement intelligence, and other information, where disclosure is undertaken for
intelligence, counterterrorism, homeland security, or related law enforcement purposes, as authorized by U.S. Law or
Executive Order, and in accordance with applicable disclosure policies;
</p><p>E. To any other agency within the IC, as defined in section 3.4(f) of Executive Order 12333 of December 4, 1981, as
amended, for the purpose of allowing that agency to determine whether the information is relevant and necessary to its
mission-related responsibilities and in accordance with that agency’s classified or unclassified implementing procedures
promulgated pursuant to such orders promulgated pursuant to such orders and directives, or any other statute, Executive
Order or directive of general applicability;
</p><p>F. To foreign persons or foreign government agencies, international organizations, and multinational agencies or
entities, under circumstances or for purposes mandated by, imposed by, or conferred in, Federal statute, treaty, or other
international agreement or arrangement, and in accordance with applicable foreign disclosure policies, such as the
National Security Decision Memorandum 119, "Disclosure of Classified United States Military Information to Foreign
Governments and International Organizations," which is the Presidential directive that allows for the disclosure
classified information to foreign entities, and other applicable directives;
</p><p>G. To any individual, organization, or entity, as appropriate, to notify them of a serious threat to homeland security
for the purpose of guarding them against or responding to such a threat, or where there is a reason to believe that the
recipient is or could become the target of a particular threat, to the extent the information is relevant to the
protection of life, health, or property;
</p><p>H. To any Federal government agency when documents or other information obtained from that agency are used in
compiling the particular record, the record is also relevant to the official responsibilities of that agency, and there
otherwise exists a need for that agency to know the information in the performance of its official functions;
</p><p>I. To representatives of the Department of Justice and other U.S. Government entities, to the extent necessary to
obtain their advice on any matter that is within their official responsibilities to provide;
</p><p>J. To the Department of Justice or other Federal agency conducting litigation or in proceedings before any court,
adjudicative or administrative body, when: (a) DHS, or (b) any employee of DHS in his/her official capacity, or (c) any
employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee, or (d) the United
States or any agency thereof, is a party to the litigation or has an interest in such litigation;
</p><p>K. To a congressional office with information from the record of a particular individual, and in response to an
inquiry from that congressional office made at the request of the individual to whom the record pertains;
</p><p>L. To individual members or staff of the Senate Select Committee on Intelligence and the House Permanent Select
Committee on Intelligence, and the House Homeland Security Subcommittee on Intelligence, Information Sharing, and
Terrorism Risk Assessment, in connection with the exercise of the Committees’ intelligence oversight and legislative
functions, when such disclosures are necessary to a lawful activity of the United States, and the DHS Office of the
General Counsel determines that such disclosures are otherwise lawful;
</p><p>M. To the National Archives and Records Administration or other federal government agencies for the purpose of records
management inspections being conducted under the authority of 44 U.S.C. sections 2904 and 2906;
</p><p>N. To contractors, grantees, experts, consultants, volunteers, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for the Federal government, when necessary to accomplish an
agency function related to this system of records, in compliance with the Privacy Act of 1974, as amended;
</p><p>O. To any agency, organization, or individual for the purposes of performing audit or oversight operations of DHS
and/or I&amp;amp;amp;amp;amp;amp;A authorized by law, but only such information as is necessary and relevant to such audit or oversight
function;
</p><p>P. To the President’s Foreign Intelligence Advisory Board, the Intelligence Oversight Board, any successor
organizations, and any intelligence oversight entities established by the President, when the head of I&amp;amp;amp;amp;amp;amp;A determines
that disclosure will assist these entities in the performance of their oversight functions; and
</p><p>Q. To an appropriate Federal, State, local, tribal, territorial, foreign, or international agency, if the information
is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or
issuance of a security clearance, license, contract, grant, or other benefit, or if the information is relevant and
necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the
reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant or other
benefit and when disclosure is appropriate to the proper performance of the official duties of the person making the
request.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored in paper and/or electronic format in secure facilities. Electronic storage is
on servers, CD-ROMs, DVD-ROMs, magnetic disc, tape, and digital media.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Data may be retrieved by an individual’s name or other identifier, including unique identifying numbers assigned
by I&amp;amp;amp;amp;amp;amp;A or other government agencies.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Hard copy (paper) records and information in this system are maintained in a secure facility with access limited
to only authorized personnel or an authorized and escorted visitor. Physical security includes security guards and locked
facilities requiring badges and passwords for access.
</p><p>Hard copy records are stored in vaults, safes or locked cabinets and are accessible only to authorized government
personnel and contractors who are properly screened, cleared and trained in information security and the protection of
privacy information.
</p><p>Electronic records are maintained on and only accessible from secured systems through hardware and software devices
protected by appropriate physical and technological safeguards to prevent unauthorized access, including password
protection.
</p><p>Electronic or digital records or information in this system are also safeguarded in accordance with applicable laws,
rules, and policies, including the DHS information technology security policies and the Federal Information Security
Management Act (FISMA). The protective strategies are physical, technical, administrative and environmental in nature,
which provide access control to sensitive data, physical access control to DHS facilities, confidentiality of
communications, authentication of sending parties, and personnel screening to ensure that all personnel with access to
data are screened through background investigations commensurate with the level of access required to perform their
duties.
</p><p>Strict controls have been imposed to minimize the risks of compromising the information that is being stored.
</p><p>Access to the computer system containing the records in this system is limited to those individuals specifically
authorized and granted access under DHS regulations, who hold appropriate security clearances, and who have a need to
know the information in the performance of their official duties.
</p><p>Systems are also developed with an incorporated auditing function of individual use and access.
</p><p>Classified information is appropriately stored in a secured certified and accredited facility, in secured databases
and containers, and in accordance with other applicable requirements, including those pertaining to classified
information.
</p><p>Access is strictly limited to authorized personnel only.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records in this system will be retained and disposed of in accordance with a records retention and disposal
schedule to be submitted to and approved by the National Archives and Records Administration.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Director, Information Sharing and Knowledge Management, Office of Intelligence and Analysis, Department of
Homeland Security, Washington, DC 20528.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Because this system contains classified and sensitive unclassified information related to intelligence,
counterterrorism, homeland security, and law enforcement programs, records in this system have been exempted from
notification, access, and amendment to the extent permitted by subsection (k) of the Privacy Act. A request for
notification of any non-exempt records in this system may be made by writing to the Disclosure Officer, Office of
Intelligence and Analysis, Department of Homeland Security, Washington, DC 20528, in conformance with 6 CFR Part 5,
Subpart B, which provides the rules for requesting access to Privacy Act records maintained by DHS.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Because this system contains classified and sensitive unclassified information related to intelligence,
counterterrorism, homeland security, and law enforcement programs, records in this system have been exempted from
notification, access, and amendment to the extent permitted by subsection (k) of the Privacy Act. A request for access to
non-exempt records in this system may be made by writing to the Disclosure Officer, Office of Intelligence and Analysis,
Department of Homeland Security, Washington, DC 20528, in conformance with 6 CFR Part 5, Subpart B, which provides the
rules for requesting access to Privacy Act records maintained by DHS.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Because this system contains classified and sensitive unclassified information related to intelligence,
counterterrorism, homeland security, and law enforcement programs, records in this system have been exempted from
notification, access, and amendment to the extent permitted by subsection (k) of the Privacy Act. A request to amend non-
exempt records in this system may be made by writing to the System Manager, identified above, in conformance with 6 CFR
Part 5, Subpart B, which provides the rules for requesting access to Privacy Act records maintained by DHS.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information contained in this system is obtained from individuals; other government, non-government, commercial,
public, and private agencies and organizations, both domestic and foreign; media, including periodicals, newspapers, and
broadcast transcripts; intelligence source documents; investigative reports, and correspondence.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>DHS has exempted this system from subsections (c)(3), (d), (e)(1), (e)(4)(G), (H), and (I), and (f) of the
Privacy Act, pursuant to 5 U.S.C. 552a(k)(1), (2), (3), and (5), as applicable. A Notice of Proposed Rulemaking for
exempting this record system has been promulgated in accordance with the requirements of 5 U.S.C. 553(b)(1), (2), and
(3), (c), and (e) and is being published [in 6 CFR Part 5] concurrently with publication of this Notice Establishing a
New System of Records in the <i>Federal Register</i>.
</p></xhtmlContent></subsection></section>
<section id="cbo-cis1" toc="yes">
<systemNumber>/ICE-CBP-CIS-001-03</systemNumber>
<subsection type="systemName">Enforcement Operational Immigration Records (ENFORCE/IDENT).
</subsection>
<subsection type="systemLocation"><xhtmlContent><p>Department of Homeland Security (DHS) field offices for the Bureau of Immigration and Customs Enforcement (ICE),
Bureau of Customs and Border Protection (CBP), and the United States Citizenship and Immigration Services (USCIS);
Service Centers; Border Patrol Sectors (including all offices under their jurisdiction); Ports of Entry; and Asylum
offices and other offices as published in the <i>Federal Register</i> on October 17, 2002 (67 FR 64136) and on the Web
page of each bureau (<i>i.e., http://www.ice.gov, http://www.cbp.gov,</i> and <i>http://www.uscis.gov</i>);
Transportation Security Administration, 601 S. 12th Street, Arlington, VA 22202-4220.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this consist of:
</p><p>A. Individuals or entities who relate in any manner to investigations, inspections, apprehensions, detentions,
patrols, removals, examinations, naturalizations, intelligence production, legal proceedings or other operations that
implement and enforce the Immigration and Nationality Act (INA) (8 U.S.C. 1101 <i>et seq.</i>) and related treaties,
statutes, orders and regulations. Individuals who are respondents, representatives, or witnesses in administrative, civil
penalty, or forfeiture proceedings, or defendants, representatives or witnesses in criminal prosecution or extradition
proceedings.
</p><p>B. Individuals who are obligors or representatives of obligors of bonds posted.
</p><p>C. Individuals in distress who are located during search and rescue operations, and other immigration operations.
</p><p>D. Individuals wanted by other law enforcement agencies, including Federal, state, local, tribal, foreign and
international or individuals who are the subject of inquiries, lookouts, or notices by another agency or a foreign
government.
</p><p>E. Individuals who apply for immigration benefits and/or any form of automated or other expedited inspection for
verifying eligibility to cross the borders into the United States.
</p><p>F. Non-United States citizens and Non-Lawful Permanent Residents who present themselves for entry into and/or exit
from the United States, including individuals subject to the requirements and processes of US-VISIT. Individuals
covered under US-VISIT include those who are not United States citizens or Lawful Permanent Residents at the time
of entry or exit or who are United States citizens or Lawful Permanent Residents who have not identified themselves as
such at the time of entry or exit.
</p><p>G. Nationals of countries that threaten to wage war, or are or were at war with the United States, and individuals
required to register as agents of foreign governments in the United States.
</p><p>H. Individuals who are subject to security screening by the Transportation Security Administration, which includes a
check of immigration databases, in order to have access to the sterile areas of an airport or seaport.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>The records in this system come directly from information collected from individuals during a DHS enforcement
encounter or biometric identification/screening. Records collected from enforcement encounters generally include
biographical data, including but not limited to name, aliases, date of birth, phone numbers, addresses, nationality;
personal descriptive data; biometric identifiers, including but not limited to fingerprints and photographs; any
materials, information or data related to the subject individual’s case, including but not limited to immigration
history, alien registration and other identification or record numbers. Records collected from admission screening
generally consist of biographic data, biometric data, and encounter data, including time, place, location, and travel
document information.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>8 U.S.C. 1103; 8 U.S.C. 1225(d)(3); 8 U.S.C. 1324(b)(3); 8 U.S.C. 1357(a); and 8 U.S.C. 1360(b).
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>This system of records is established and maintained to enable DHS to carry out its assigned national security,
law enforcement, immigration control, and other mission-related functions and to provide associated management reporting,
planning and analysis. Specifically, this system of records assists in identifying, investigating, apprehending, and/or
removing aliens unlawfully entering or present in the United States; preventing the entry of inadmissible aliens into the
United States; facilitating the legal entry of individuals into the United States; recording the departure of individuals
leaving the United States; maintaining immigration control; preventing aliens from obtaining benefits to which they are
not entitled; analyzing information gathered for the purpose of this and other DHS programs; or identifying,
investigating, apprehending and prosecuting, or imposing sanctions, fines or civil penalties against individuals or
entities who are in violation of INA, or other governing orders, treaties or regulations and assisting other Federal
agencies to protect national security and carry out other Federal missions.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the appropriate agency/organization/task force, regardless of whether it is Federal, state, local, foreign, or
tribal, charged with the enforcement (<i>e.g.</i>, investigation and prosecution) of a law (criminal or civil),
regulation, or treaty, of any record contained in this system of records which indicates either on its face, or in
conjunction with other information, a violation or potential violation of that law, regulation, or treaty.
</p><p>B. To other Federal, state, tribal, and local government law enforcement and regulatory agencies and foreign
governments, and individuals and organizations during the course of an investigation or the processing of a matter, or
during a proceeding within the purview of the immigration and nationality laws, to elicit information required by DHS to
carry out its functions and statutory mandates.
</p><p>C. To an appropriate Federal, state, local, tribal, international government agency in response to its request, in
connection with the hiring or retention by such an agency of an employee, the issuance of a security clearance, the
reporting of an investigation of such an employee, the letting a contract, or the issuance of a license, grant, loan, or
other benefit by the requesting agency, to the extent that the information is relevant and necessary to the requesting
agency’s decision in the matter.
</p><p>D. To an actual or potential party or to his or her attorney for the purpose of negotiation or discussion on such
matters as settlement of the case or matter, or discovery proceedings.
</p><p>E. To a Federal, state, tribal or local government agency to assist such agencies in collecting the repayment or
recovery of loans, benefits, grants, fines, bonds, civil penalties, judgments or other debts owed to them or to the
United States Government, and/or to obtain information that may assist DHS in collecting debts owed to the United States
government.
</p><p>F. To the news media and the public when there exists a legitimate public interest in the disclosure of the
information or when disclosure is necessary to preserve confidence in the integrity of the Department or is necessary to
demonstrate the accountability of the Department’s officers, employees, or individuals covered by the system, except to
the extent it is determined that release of the specific information in the context of a particular case would constitute
an unwarranted invasion of personal privacy.
</p><p>G. To a Congressional office from the record of an individual in response to an inquiry from that Congressional office
made at the request of the individual to whom the record pertains.
</p><p>H. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. Sections 2904 and 2906.
</p><p>I. To contractors, grantees, experts, consultants, students, and others performing or working on a contract, service,
grant, cooperative agreement, or other assignment for the Federal Government, when necessary to accomplish an agency
function related to this system of records.
</p><p>J. To a former employee of the Department for purposes of: responding to an official inquiry by a Federal, state, or
local government entity or professional licensing authority, in accordance with applicable department regulations; or
facilitating communications with a former employee that may be necessary for personnel-related or other official purposes
where the Department requires information and/or consultation assistance from the former employee regarding a matter
within that person’s former area of responsibility.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Information can be stored in case file folders, cabinets, safes, or a variety of electronic or computer databases
and storage media.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by name; biometrics; identification numbers (including but not limited to alien number,
fingerprint identification number, etc.); case related data and/or combination of other personal identifiers such as date
of birth, nationality, etc.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>The system is protected through multi-layer security mechanisms. The protective strategies are physical,
technical, administrative and environmental in nature and provide access control to sensitive data, physical access
control to DHS facilities, confidentiality of communications, authentication of sending parties, and personnel screening
to ensure that all personnel with access to data are screened through background investigations commensurate with the
level of access required to perform their duties.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>The following proposal for retention and disposal is pending approval with National Archives and Records
Administration (NARA):
</p><p>Records that are stored in an individual’s file will be purged according to the retention and disposition guidelines
that relate to the individual’s file (DHS/ICE/USCIS001A). Electronic records for which the statute of limitations has
expired for all criminal violations and that are older than 75 years will be purged. Fingerprint cards, created for the
purpose of entering records in the database, will be destroyed after data entry. The I-877, and copies of
supporting documentation, which are created for the purpose of special alien registration back-up procedures, will be
destroyed after data entry. Work Measurement Reports and Statistical Reports will be maintained within the guidelines set
forth in NCI-95-78-5/2 and NCI-85-78-1/2 respectively.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Program Manager, IDENT Program Management Office, US-VISIT Program, U.S. Department of Homeland Security,
Washington, DC 20528, USA.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>To determine whether this system contains records relating to you, write to the US-VISIT Privacy Officer,
US-VISIT Program, Border and Transportation Security, U.S. Department of Homeland Security, 245 Murray Lane, SW.,
Washington, DC 20528, USA.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>The major part of this system is exempted from this requirement pursuant to 5 U.S.C. 552a(j)(2) and (k)(2). To
the extent that this system of records is not subject to exemption, it is subject to access. A determination as to the
granting or denial of access shall be made at the time a request is received. Requests for access to records in this
system must be in writing, and should be addressed to the System Manager noted above or to the appropriate FOIA/PA
Officer. Such request may be submitted either by mail or in person. The envelope and letter shall be clearly marked
"Privacy Access Request."  To identify a record, the record subject should provide his or her full name, date and place
of birth; if appropriate, the date and place of entry into or departure from the United States; verification of identity
(in accordance with 8 CFR 103.21(b) and/or pursuant to 28 U.S.C. 1746, make a dated statement under penalty of perjury as
a substitute for notarization), and any other identifying information that may be of assistance in locating the record.
He or she shall also provide a return address for transmitting the records to be released.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>The major part of this system is exempted from this requirement pursuant to 5 U.S.C. 552a(j)(2) and (k)(2). To
the extent that this system of records is not subject to exemption, it is subject to access and contest. A determination
as to the granting or denial of a request shall be made at the time a request is received. An individual desiring to
request amendment of records maintained in this system should direct his or her request to the System Manager of the
appropriate office that maintains the record or (if unknown) to the appropriate FOIA/PA Officer at each bureau. The
request should state clearly what information is being contested, the reasons for contesting it, and the proposed
amendment to the information.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Basic information contained in this system is supplied by individuals covered by this system, and other Federal,
state, local, tribal, or foreign governments; private citizens, public and private organizations.
</p></xhtmlContent></subsection>
<subsection type="systemsExempted"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from subsections (c)(3) and (4), (d), (e) (1), (2),
and (3), (e)(4)(G) and (H), (e) (5) and (8), and (g) of the Privacy Act pursuant to 5 U.S.C. 552a(j)(2). In addition, the
Secretary of Homeland Security has exempted portions of this system from subsections (c)(3), (d), (e)(1), (e)(4)(G) and
(H) of the Privacy Act pursuant to 5 U.S.C. 552a(k)(2). These exemptions apply only to the extent that records in the
system are subject to exemption pursuant to 5 U.S.C. 552a(j)(2) and (k)(2).
</p></xhtmlContent></subsection></section>
<section id="nppd1" toc="yes">
<systemNumber>/NPPD-001</systemNumber>
<subsection type="systemName">NICC Records System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified, For Official Use Only, Law Enforcement Sensitive, and Classified. </p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the Department of Homeland Security (DHS) National Protection and Programs Directorate (NPPD) National Infrastructure Coordinating Center (NICC) Headquarters in Washington, DC and field locations.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by the system may include:
</p><p>• Federal, state, local, Tribal, and territorial officials; foreign government and international officials; domestic security and emergency management officials; and private sector individuals who request assistance from, provide information to, are the subject of, or participate with the NICC in activities related to all-threats and all-hazards, man-made disasters and acts of terrorism, and natural disasters related to national infrastructure;
</p><p>• Individuals who request assistance from the NICC related to all-threats and all-hazards, man-made disasters and acts of terrorism, and natural disasters related to national infrastructure;
</p><p>• Individuals who provide information to the NICC related to all-threats and all-hazards, man-made disasters and acts of terrorism, and natural disasters, including Suspicious Activity Reports (SARs) related to national infrastructure;
</p><p>• Individuals who are the subject of, or are linked in any manner to, all-threats and all-hazards, man-made disasters and acts of terrorism, and natural disasters with NICC implications;
</p><p>• Individuals participating with, involved in, or the subject of domestic security or law enforcement operations, with NICC implications, where activity is planned or has taken place;
</p><p>• Individuals participating with or involved in emergency management and first responder operations, with NICC, and where activity is planned or has taken place;
</p><p>• Individuals involved in natural disasters where activity is planned or has taken place;
</p><p>• Individuals derived from intelligence information of interest to the NICC; and
</p><p>• Individuals who make inquiries concerning all-threats and all-hazards, man-made disasters and acts of terrorism, and natural disasters related to national infrastructure.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in the system may include:
</p><p>• Full name;
</p><p>• Date and place of birth;
</p><p>• Social Security Number (Many state, local, Tribal, territorial, domestic security, emergency management, and private sector individuals, organizations and agencies collect/use SSNs as an identifier and therefore may be shared with the Department);
</p><p>• Citizenship;
</p><p>• Contact information including phone numbers and e-mail addresses;
</p><p>• Address;
</p><p>• Physical description including height, weight, eye and hair color;
</p><p>• Distinguishing marks including scars, marks, and tattoos;
</p><p>• Automobile registration information;
</p><p>• Watch list information;
</p><p>• Medical records;
</p><p>• Financial information;
</p><p>• Results of intelligence analysis and reporting;
</p><p>• Ongoing law enforcement investigative information;
</p><p>• Historical law enforcement information;
</p><p>• Information systems security analysis and reporting;
</p><p>• Public source data including commercial databases, media, newspapers, and broadcast transcripts;
</p><p>• Intelligence information including links to terrorism, law enforcement and any criminal and/or incident activity, and the date information is submitted;
</p><p>• Intelligence and law enforcement information obtained from Federal, state, local, Tribal, and territorial agencies and organizations, foreign governments and international organizations; law enforcement, domestic security and emergency management officials; and private sector entities or individuals;
</p><p>• Information provided by individuals, regardless of the medium, used to submit the information;
</p><p>• Information obtained from the Federal Bureau of Investigation’s (FBI) Terrorist Screening Center (TSC), or on terrorist watchlists, about individuals known or reasonably suspected to be engaged in conduct constituting, preparing for, aiding, or relating to terrorism;
</p><p>• Data about the providers of information, including the means of transmission of the data; (e.g., where it is determined that maintaining the identity of the source of investigative lead information may be necessary to provide an indicator of the reliability and validity of the data provided and to support follow-on investigative purposes relevant and necessary to a legitimate law enforcement or homeland security matter, such data may likely warrant retention. Absent such a need, no information on the provider of the information would be maintained);
</p><p>• Scope of terrorist, law enforcement, or natural threats to the homeland;
</p><p>• National disaster threat and activity information;
</p><p>• The date and time national disaster information is submitted, and the name of the contributing/submitting individual or agency;
</p><p>• Limited data concerning the providers of information, including the means of transmission of the data may also be retained where necessary. Such information on other than criminal suspects or subjects is accepted and maintained only to the extent that the information provides descriptive matters relevant to a criminal subject or organization and has been deemed factually accurate and relevant to ongoing homeland security situational awareness and monitoring efforts.
</p><p>• Name of the contributing or submitting agency, organization, or individual.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>The Homeland Security Act of 2002, as codified within 6 U.S.C. 321d(b)(1), &amp;amp;amp;amp;amp;#167; 515 provides DHS, including the NICC and NOC, with authority to collect the information.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to provide the mission and capabilities to assess the operational status of the nation’s 18 critical infrastructures and key resources (CIKR) sectors during normal operations and incident management activities, support information sharing with NIPP Partners, and the owners and operators of critical infrastructure.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other Federal agency conducting litigation or in proceedings before any court, adjudicative or administrative body, when it is necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and DHS determines that the records are both relevant and necessary to the litigation and the use of such records is compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, state, Tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.
</p><p>H. To appropriate Federal, state, local, Tribal, or foreign governmental agencies or multilateral governmental organizations or critical infrastructure partners for the purpose of protecting the vital interests of a data subject or other persons, including to assist such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to combat other significant public health threats; appropriate notice will be provided of any identified health threat or risk.
</p><p>I. To a Federal, state, Tribal, local or foreign government agency or organization, or international organization, lawfully engaged in collecting law enforcement intelligence information, whether civil or criminal, or charged with investigating, prosecuting, enforcing or implementing civil or criminal laws, related rules, regulations or orders, to enable these entities to carry out their law enforcement responsibilities, including the collection of law enforcement intelligence.
</p><p>J. To Federal and foreign government intelligence or counterterrorism agencies or state, local, Tribal or territorial components, and critical infrastructure partners where DHS becomes aware of an indication of a threat or potential threat to national or international security.
</p><p>K. To Federal and foreign government intelligence or counterterrorism agencies or state, local, Tribal or territorial components, and critical infrastructure partners where the information is or may be terrorism-related information and such use is to assist in anti-terrorism efforts.
</p><p>L. To an organization or individual in either the public or private sector, where there is a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to the extent the information is relevant to the protection of life or property.
</p><p>M. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’ officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Much of the data within this system does not pertain to an individual; rather, the information pertains to locations, geographic areas, facilities, and other things or objects not related to individuals. However, some personal information is captured. Personal data may be retrieved by name, social security number and other identifiers listed under the Categories of Records Section.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>The NICC is working with the NPPD and DHS Records Officer to develop a NARA approved retention schedule.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Director, National Infrastructure Coordinating Center, Department of Homeland Security, Washington, DC 20528.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security is proposing to exempt this system from the notification, access, and amendment procedures of the Privacy Act. However, DHS/NPPD will consider individual requests to determine whether or not information may be released. Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to NPPD FOIA Officer, whose contact information can be found at <i>http://www.dhs.gov/foia</i> under "contacts."
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, <i>http://www.dhs.gov</i> or 1-866-431-0486. In addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created;
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records; and
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information contained in this system is obtained from subject individuals, other Federal, state, local and Tribal agencies and organizations, domestic and foreign media, including periodicals, newspapers, and broadcast transcripts, public and classified data systems, reporting individuals, intelligence source documents, investigative reports, and correspondence.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitation set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) pursuant to 5 U.S.C. 552a(k)(1) and (k)(2).
</p></xhtmlContent></subsection></section>
<section id="nppd2" toc="yes">
<systemNumber>/NPPD-002</systemNumber>
<subsection type="systemName">Chemical Facility Anti-Terrorism Standards Personnel Surety Program System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent>
<p>Unclassified, Sensitive, For Official Use Only, Law Enforcement-Sensitive, and Classified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent>
<p>Records are maintained at the DHS and NPPD Headquarters in Washington, D.C. and field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p>(1) High-risk chemical facility personnel and unescorted visitors who have or are seeking access to restricted areas or critical assets at high-risk chemical facilities (see 6 CFR 27.230(a)(12)), referred to in this notice as "affected individuals";</p>
<p>(2) High-risk chemical facility personnel or designees who contact DHS/NPPD or a federal law enforcement entity with follow-up questions regarding submission of an individual's information to DHS/NPPD;</p>
<p>(3) Individuals listed in the TSDB against whom potential or confirmed matches have been made; and</p>
<p>(4) Individuals who have been or seek to be distinguished from individuals listed in the TSDB through redress or other means as a result of the Personnel Surety Program.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p>(1) High-risk chemical facilities are required to submit the following information on all facility personnel and unescorted visitors who have or are seeking access to restricted areas or critical assets:</p>
<p>a. U.S. Citizens and Lawful Permanent Residents</p>
<p>i. Full name;</p>
<p>ii. Date of birth; and</p>
<p>iii. Citizenship or Gender.</p>
<p>b. Non-U.S. persons</p>
<p>i. Full name;</p>
<p>ii. Date of birth;</p>
<p>iii. Citizenship; and</p>
<p>iv. Passport information and/or alien registration number.</p>
<p>(2) To reduce the likelihood of false positives in matching against the TSDB, high-risk chemical facilities may also (optionally) submit the following information on facility personnel and unescorted visitors who have or are seeking access to restricted areas or critical assets:</p>
<p>a. Aliases;</p>
<p>b. Gender (for Non-U.S. persons);</p>
<p>c. Place of birth; and</p>
<p>d. Redress Number.</p>
<p>(3) High-risk chemical facilities may submit different information on individuals who maintain DHS screening program credentials or endorsements that require TSDB checks equivalent to the checks to be performed as part of the CFATS Personnel Surety Program. Instead of submitting the information listed in category (1), above, high risk chemical facilities may submit the following information for such individuals:</p>
<p>a. Full name;</p>
<p>b. Date of birth;</p>
<p>c. Name of the DHS program that conducts equivalent vetting against the TSDB, such as the Transportation Worker Identification Credential (TWIC) Program, the Hazardous Materials Endorsement (HME) Program, or Trusted Traveler Program;</p>
<p>d. Unique number, or other program specific verifying information associated with a DHS screening program, necessary to verify an individual's enrollment, such as TWIC Serial Number for the TWIC Program, Commercial Driver's License (CDL) Number and CDL issuing state(s) for the HME Program, or PASS ID Number for the Trusted Traveler Program; and</p>
<p>e. Expiration date of the credential endorsed or issued by the DHS screening program.</p>
<p>    This alternative is optional--high-risk chemical facilities may either submit the information listed in category (1) for such individuals, or may submit the information listed in category (3) for such individuals.</p>
<p>(4) When high-risk chemical facilities choose to submit the information listed in category (3), above, they may also (optionally) submit the following information on facility personnel and unescorted visitors who have or are seeking access to restricted areas or critical assets:</p>
<p>a. Aliases;</p>
<p>b. Place of Birth;</p>
<p>c. Gender;</p>
<p>d. Citizenship; and</p>
<p>e. Redress Number.</p>
<p>(5) DHS could collect additional identifying information from a high-risk chemical facility as necessary to confirm or clear a potential match to a TSDB record. Information collected by high-risk chemical facilities and submitted to DHS for this purpose could include any information listed in categories (1) through (4), passport information, visa information, driver's license information, or other available identifying particulars, used to compare the identity of an individual being screened with information listed in the TSDB;</p>
<p>(6) In the event that a confirmed match is identified as part of the CFATS Personnel Surety Program, in addition to other records listed under the categories of records section of this SORN, DHS will obtain references to or information from other government law enforcement and intelligence databases, as well as other relevant databases that may contain terrorism information;</p>
<p>(7) Information necessary to assist in tracking submissions and transmission of records or verifying status of enrollment in another DHS program, including electronic verification that DHS has received a particular record; and</p>
<p>(8) Information provided by individuals covered by this system in support of any redress request, including DHS Redress Numbers and/or any of the above categories of records.</p>
</xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p>DHS Appropriations Act of 2007, Section 550, Public Law 109-295, 120 Stat. 1355 (October 4, 2006), as amended; and the Chemical Facility Anti-Terrorism Standards, 6 CFR Part 27.</p>

</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p>The purpose of this system is to identify persons listed in the TSDB who have or are seeking access to restricted areas or critical assets at high-risk chemical facilities.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows: </p>
<p>A.  To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other federal agencies conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
<p> 1. DHS or any component thereof;</p>
<p> 2. Any employee or former employee of DHS in his/her official capacity;</p>
<p> 3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
<p> 4. The U.S. or any agency thereof.</p>
<p>B.  To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
<p>C.  To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
<p>D.  To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
<p>E.  To appropriate agencies, entities, and persons when:</p>
<p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; </p>
<p>2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
<p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p>F.  To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records.  Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
<p>G.   To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
<p>H.  To federal, state, local, tribal, territorial, foreign, multinational, or private sector entities as appropriate to assist in coordination of terrorist threat awareness, assessment, analysis, or response.</p>
<p>I. To an appropriate federal, state, tribal, local, international, or foreign agency or other appropriate authority regarding individuals who pose, or are suspected of posing a risk to national security.</p>
<p>J. To an appropriate federal, state, tribal, local, international, foreign agency, other appropriate governmental entities or authority to:</p>
<p>1. Determine whether an individual is a positive identity match to an identity in the TSDB;</p>
<p> 2. Facilitate operational, law enforcement, or intelligence responses, if appropriate, when vetted individuals' identities match identities contained in the TSDB;</p>
<p> 3. Provide information and analysis about terrorist encounters and known or suspected terrorists to appropriate domestic and foreign government agencies and officials for counterterrorism purposes; or</p>
<p> 4. Perform technical implementation functions necessary for the CFATS Personnel Surety Program.</p>
<p>K. To high-risk chemical facilities, or their designees, for the purpose of ensuring that information on all affected individuals submitted by or on behalf of the facility who have or are seeking access to restricted areas or critical assets at a high-risk chemical facility has been appropriately submitted to the Department.  </p>
<p>L. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
<p>Disclosure to consumer reporting agencies:  </p>
<p>None.</p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>Storage:</p>
<p>DHS/NPPD stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door.  The records may be stored on magnetic disc, tape, digital media.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p>Records may be retrieved by searching any of the categories of records listed above. Records may also be retrievable by relevant chemical facility name, chemical facility location, chemical facility contact information, and by other facility-specific data points.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p>DHS/NPPD safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies.  NPPD has imposed strict controls to minimize the risk of compromising the information that is being stored.  Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p>A proposed schedule for the retention and disposal of records collected under the DHS/NPPD--002 Chemical Facility Anti-Terrorism Standards Personnel Surety Program System of Records is being developed by the DHS and NPPD Offices of Records Management for approval by NARA.</p>
<p>The length of time DHS/NPPD will retain information on individuals will depend on individual TSDB vetting results. Specifically, individuals' information will be retained as described below, based on the individuals' placements into three categories:</p>
<p>(1) Information pertaining to an individual who is not a potential or confirmed match to a TSDB record will be retained for one year after a high-risk chemical facility has notified NPPD that the individual no longer has or is seeking access to the restricted areas or critical assets of the facility;</p>
<p>(2) Information pertaining to an individual who may originally have appeared to be a match a TSDB record, but who was subsequently determined not to be a match, will be retained for seven years after completion of TSDB matching, or one year after the high-risk chemical facility that submitted that individual's information has notified DHS/</p>
<p>NPPD that the individual no longer has or is seeking access to the restricted areas or critical assets of the facility, whichever is later; and</p>
<p>(3) Information pertaining to an individual who is a positive match to a TSDB record will be retained for ninety-nine years after completion of matching activity, or seven years after DHS/NPPD learns that the individual is deceased, whichever is earlier.</p>
<p>DHS/TSA/TTAC will maintain records within its possession in accordance with the DHS/TSA-002--Transportation Security Threat Assessment System of Records, 75 FR 28046 (May 19, 2010). DHS/CBP will maintain records in its possession in accordance with the DHS/CBP-002--Global Enrollment System of Records, 71 FR 20708 (April 21, 2006).</p>
<p>DHS/NPPD will also retain records to conduct inspections or audits under 6 CFR 27.245 and 6 CFR 27.250 to ensure that high-risk chemical facilities are in compliance with CFATS. These records could include the names of individuals with access to high-risk chemical facilities' restricted areas and critical assets, the periods of time during which high-risk chemical facilities indicate that such individuals have/had access, and any other information listed elsewhere in this notice, as appropriate.</p>
<p>The retention periods for these records provide reasonable amounts of time for law enforcement, intelligence, or redress matters involving individuals who have or are seeking access to restricted areas or critical assets at high-risk chemical facilities.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent>
<p>CFATS Personnel Surety Program Manager, 250 Murray Lane, SW, Mail Stop 0610, Washington, D.C. 20528.</p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act.  However, DHS/NPPD will consider individual requests to determine whether or not information may be released.  Thus, individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and DHS or NPPD FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts."  If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive, SW, Building 410, Mail Stop 0655, Washington, D.C. 20528.</p>
<p>When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR Part 5.  You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth.  You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. § 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization.  While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486.  In addition, you should:</p>
<p>• Explain why you believe the Department would have information on you;</p>
<p>• Identify which component(s) of the Department you believe may have the information about you;</p>
<p>• Specify when you believe the records would have been created; and </p>
<p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records; </p>
<p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
<p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p>NPPD obtains records from high-risk chemical facilities and their designees.  High-risk chemical facilities must provide notice to each affected individual prior to submission of the affected individual's information to DHS/NPPD. This will include notice that additional information may be requested after the initial submission. NPPD may also obtain information from other DHS programs when DHS verifies enrollment of an affected individual in another vetting or credentialing program. Information may also be obtained from the DOJ/FBI--019 Terrorist Screening Records System, 72 FR 47073 (August 22, 2007), or from other FBI sources.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent>
<p>The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(1) and (k)(2), has exempted this system from the following provisions of the Privacy Act, 5 U.S.C. 552a(c)(3); (d); (e)(1); (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).  </p>
<p>When this system receives a record from another system exempted in that source system under 5 U.S.C. 552a(j) or (k), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.  For more information on the FBI's Terrorist Screening Records System, see DOJ/FBI - 019 Terrorist Screening Records System, 72 FR 47073 (August 22, 2007).</p>
<p>DHS does not claim any exemptions for the information high-risk chemical facilities or their designees submit to DHS as part of this system of records.</p>

</xhtmlContent></subsection></section>
<section id="ops2" toc="yes">
<systemNumber>/OPS-002</systemNumber>
<subsection type="systemName">National Operations Center Tracker and Senior Watch Officer Logs System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified, For Official Use Only, Law Enforcement Sensitive, and Classified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the Department of Homeland Security (DHS) Office of Operations Coordination and
Planning (OPS) National Operations Center (NOC) Headquarters in Washington, DC and field locations.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>May include any individual whose interactions with OPS or the NOC are tracked by the NOC or the Senior Watch
Officer. Those individuals may include: Federal, State, local, Tribal, and territorial officials; foreign government and
international officials; domestic security and emergency management officials; private sector individuals; and members of
the general public or international community.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>• Full name;
</p><p>• Date and place of birth;
</p><p>• Social Security number (many State, local, Tribal, territorial, domestic security, emergency management,
and private sector individuals, organizations and agencies collect/use SSN’s as an identifier and may be shared with the
Department);
</p><p>• Citizenship;
</p><p>• Contact information including phone numbers, e-mail addresses, and address;
</p><p>• Physical description including height, weight, eye and hair color;
</p><p>• Distinguishing marks including scars, marks, and tattoos;
</p><p>• Automobile registration information;
</p><p>• Watch list information;
</p><p>• Medical records;
</p><p>• Financial information;
</p><p>• Results of intelligence analysis and reporting;
</p><p>• Ongoing law enforcement investigative information;
</p><p>• Historical law enforcement information;
</p><p>• Information systems security analysis and reporting;
</p><p>• Public source data including commercial databases, media, newspapers, and broadcast transcripts;
</p><p>• Intelligence information including links to terrorism, law enforcement and any criminal and/or incident
activity, and the date information is submitted;
</p><p>• Intelligence and law enforcement information obtained from Federal, State, local, Tribal, and territorial
agencies and organizations, foreign governments and international organizations; law enforcement, domestic security and
emergency management officials; and private sector entities or individuals;
</p><p>• Information provided by individuals, regardless of the medium, used to submit the information;
</p><p>• Information obtained from the Federal Bureau of Investigation’s (FBI) Terrorist Screening Center (TSC), or
on terrorist watchlists, about individuals known or reasonably suspected to be engaged in conduct constituting, preparing
for, aiding, or relating to terrorism;
</p><p>• Data about the providers of information, including the means of transmission of the data; (<i>e.g.</i>
where it is determined that maintaining the identity of the source of investigative lead information may be necessary to
provide an indicator of the reliability and validity of the data provided and to support follow-on investigative purposes
relevant and necessary to a legitimate law enforcement or homeland security matter, such data may likely warrant
retention. Absent such a need, no information on the provider of the information would be maintained);
</p><p>• National disaster threat and activity information;
</p><p>• The date and time national disaster information is submitted, and the name of the contributing/submitting
individual or agency;
</p><p>• Limited data concerning the providers of information, including the means of transmission of the data may
also be retained where necessary. Such information on other than criminal suspects or subjects is accepted and maintained
only to the extent that the information provides descriptive matters relevant to a criminal subject or organization and
has been deemed factually accurate and relevant to ongoing homeland security situational awareness and monitoring
efforts;
</p><p>• Name of the contributing or submitting agency, organization, or individual.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301, 552, 552a; 44 U.S.C. 3101; 6 U.S.C. 121; Sections 201 and 514 of the Homeland Security Act of 2002,
as amended; Section 520 of the Post Katrina Emergency Management Reform Act; 44 U.S.C. 3101; Executive Order (E.O.)
12958; E.O. 9397; E.O. 12333; E.O. 13356; E.O. 13388; and Homeland Security Presidential Directive 5.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of the system, including the NOC Tracker Log, the SWO Log, their corresponding tracker numbers, and
the Incident Tracking Index is to tie together the high volume of information, requests and responses for information,
and data collection relevant to discreet events and issues as they arise, and to make that information easily accessible
in an organized form should a future event benefit from previously gathered information. The tracker numbers are used in
a wide variety of products originated by the DHS/OPS NOC.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body, when it is necessary to the
litigation and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. any employee of DHS in his/her official capacity;
</p><p>3. any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. the United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, Tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Much of the data within this system does not pertain to an individual; rather, the information pertains to
locations, geographic areas, facilities, and other things or objects not related to individuals. However, some personal
information is captured. Personal data may be retrieved by NOC or SWO tracker numbers, name, social security number and
other identifiers listed under the Categories of Records Section. Most information is stored as free text and any word,
phrase, or number is searchable.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>In accordance with NARA approved records schedule N1-563-08-23, files are maintained through
the end of the calendar year in which the data is no longer needed for current operational use and deleted or destroyed
20 years after.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Director, Office of Operations Coordination and Planning, National Operations Center, Department of Homeland
Security, Washington, DC 20528.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security is proposing to exempt this system from the notification, access, and
amendment procedures of the Privacy Act because it is a law enforcement system. However, DHS/OPS will consider individual
requests to determine whether or not information may be released. Individuals seeking notification of and access to any
record contained in this system of records, or seeking to contest its content, may submit a request in writing to OPS
FOIA Officer, whose contact information can be found at <i>http://www.dhs.gov/foia</i> under "contacts."
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, <i>http://www.dhs.gov</i> or 1
-866-431-0486. In addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created;
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records; and
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information contained in this system is obtained from subject individuals, other Federal, State, local and Tribal
agencies and organizations, domestic and foreign media, including periodicals, newspapers, and broadcast transcripts,
public and classified data systems, reporting individuals, intelligence source documents, investigative reports, and
correspondence.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act,
subject to the limitation set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f)
pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(3).

</p></xhtmlContent></subsection></section>
<section id="ops3" toc="yes">
<systemNumber>/OPS-003</systemNumber>
<subsection type="systemName">Collection, Planning, Coordination, Reporting, Analysis, and Fusion System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified, For Official Use Only, Law Enforcement Sensitive, and Classified. </p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the Department of Homeland Security (DHS) Office of Operations Coordination and
Planning (OPS) National Operations Center (NOC) Headquarters in Washington, DC and field locations.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by the system may include:
</p><p>• Federal, State, local, tribal, and territorial officials; foreign government and international officials;
domestic security and emergency management officials; and private sector individuals who request assistance from, provide
information to, are the subject of, or participate with the Department in activities related to all-threats and all-
hazards, man-made disasters and acts of terrorism, and natural disasters;
</p><p>• Individuals who request assistance from the Department related to all-threats and all-hazards, man-made
disasters and acts of terrorism, and natural disasters;
</p><p>• Individuals who provide information to the Department related to all-threats and all-hazards, man-made
disasters and acts of terrorism, and natural disasters, including Suspicious Activity Reports (SARs);
</p><p>• Individuals who are the subject of, or are linked in any manner to, all-threats and all-hazards, man-made
disasters and acts of terrorism, and natural disasters with Departmental implications;
</p><p>• Individuals participating with, involved in, or the subject of domestic security or law enforcement
operations, with Departmental implications, where activity is planned or has taken place;
</p><p>• Individuals participating with or involved in emergency management and first responder operations, with
Departmental implications, and where activity is planned or has taken place;
</p><p>• Individuals involved in natural disasters where activity is planned or has taken place;
</p><p>• Individuals derived from intelligence information of interest to the Department;
</p><p>• Individuals who make inquiries concerning all-threats and all-hazards, man-made disasters and acts of
terrorism, and natural disasters;
</p><p>• Individuals who are or have been associated with DHS operations.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in the system may include:
</p><p>• Full name;
</p><p>• Date and place of birth;
</p><p>• Social Security Number (Many state, local, tribal, territorial, domestic security, emergency management,
and private sector individuals, organizations and agencies collect/use SSN’s as an identifier and may be shared with the
Department);
</p><p>• Citizenship;
</p><p>• Contact information including phone numbers and email addresses;
</p><p>• Address;
</p><p>• Physical description including height, weight, eye and hair color;
</p><p>• Distinguishing marks including scars, marks, and tattoos;
</p><p>• Automobile registration information;
</p><p>• Watch list information;
</p><p>• Medical records;
</p><p>• Financial information;
</p><p>• Results of intelligence analysis and reporting;
</p><p>• Ongoing law enforcement investigative information;
</p><p>• Historical law enforcement information;
</p><p>• Information systems security analysis and reporting;
</p><p>• Public source data including commercial databases, media, newspapers, and broadcast transcripts;
</p><p>• Intelligence information including links to terrorism, law enforcement and any criminal and/or incident
activity, and the date information is submitted;
</p><p>• Intelligence and law enforcement information obtained from federal, state, local, tribal, and territorial
agencies and organizations, foreign governments and international organizations; law enforcement, domestic security and
emergency management officials; and private sector entities or individuals;
</p><p>• Information provided by individuals, regardless of the medium, used to submit the information;
</p><p>• Information obtained from the Federal Bureau of Investigation’s (FBI) Terrorist Screening Center (TSC), or
on terrorist watchlists, about individuals known or reasonably suspected to be engaged in conduct constituting, preparing
for, aiding, or relating to terrorism;
</p><p>• Data about the providers of information, including the means of transmission of the data; (<i>e.g.</i>
where it is determined that maintaining the identity of the source of investigative lead information may be necessary to
provide an indicator of the reliability and validity of the data provided and to support follow-on investigative purposes
relevant and necessary to a legitimate law enforcement or homeland security matter, such data may likely warrant
retention. Absent such a need, no information on the provider of the information would be maintained)
</p><p>• Scope of terrorist, law enforcement, or natural threats to the homeland;
</p><p>• National disaster threat and activity information;
</p><p>• The date and time national disaster information is submitted, and the name of the contributing/submitting
individual or agency;
</p><p>• Limited data concerning the providers of information, including the means of transmission of the data may
also be retained where necessary. Such information on other than criminal suspects or subjects is accepted and maintained
only to the extent that the information provides descriptive matters relevant to a criminal subject or organization and
has been deemed factually accurate and relevant to ongoing homeland security situational awareness and monitoring
efforts.
</p><p>• Name of the contributing or submitting agency, organization, or individual.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301, 552, 552a; 44 U.S.C. 3101; 6 U.S.C. &amp;amp;amp;amp;amp;#167; 121; &amp;amp;amp;amp;amp;#167;&amp;amp;amp;amp;amp;#167; 201 and 514 of the Homeland
Security Act of 2002, as amended; &amp;amp;amp;amp;amp;#167; 520 of the Post Katrina Emergency Management Reform Act; 44 U.S.C. 3101;
Executive Order (E.O.) 12958; E.O. 9397; E.O. 12333; E.O. 13356; E.O. 13388; and Homeland Security Presidential Directive
5.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to:
</p><p>1. <i>Collect, plan, coordinate, and analyze</i> all-threats and all-hazards, law enforcement activities, intelligence
activities, man-made disasters and acts of terrorism, natural disasters, and other information collected or received from
Federal, State, local, tribal, and territorial agencies and organizations; foreign governments and international
organizations; domestic security and emergency management officials; and private sector entities or individuals; and
</p><p>2. <i>Report, integrate, and fuse</i> such information throughout DHS in order to share information, increase
coordination, identify and assess the nature and scope of said information and understand risks in light of potential or
actual vulnerabilities to the homeland; and help deter, detect, and prevent terrorist acts as well as to prepare for,
respond to, and recover from all-threats and all-hazards, man-made disasters and acts of terrorism, and natural
disasters.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body, when it is necessary to the
litigation and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. any employee of DHS in his/her official capacity;
</p><p>3. any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. the United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To appropriate Federal, State, local, tribal, or foreign governmental agencies or multilateral governmental
organizations for the purpose of protecting the vital interests of a data subject or other persons, including to assist
such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to
combat other significant public health threats; appropriate notice will be provided of any identified health threat or
risk.
</p><p>I. To a Federal, State, tribal, local or foreign government agency or organization, or international organization,
lawfully engaged in collecting law enforcement intelligence information, whether civil or criminal, or charged with
investigating, prosecuting, enforcing or implementing civil or criminal laws, related rules, regulations or orders, to
enable these entities to carry out their law enforcement responsibilities, including the collection of law enforcement
intelligence.
</p><p>J. To Federal and foreign government intelligence or counterterrorism agencies or state, local, tribal or territorial
components where DHS becomes aware of an indication of a threat or potential threat to national or international
security.
</p><p>K. To Federal and foreign government intelligence or counterterrorism agencies or state, local, tribal or territorial
components where the information is or may be terrorism-related information and such use is to assist in anti-terrorism
efforts.
</p><p>L. To an organization or individual in either the public or private sector, where there is a reason to believe that
the recipient is or could become the target of a particular terrorist activity or conspiracy, to the extent the
information is relevant to the protection of life or property.
</p><p>M. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’ officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Much of the data within this system does not pertain to an individual; rather, the information pertains to
locations, geographic areas, facilities, and other things or objects not related to individuals. However, some personal
information is captured. Personal data may be retrieved by NOC tracker numbers, name, social security number and other
identifiers listed under the Categories of Records Section. Most information is stored as free text and any word, phrase,
or number is searchable.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>OPS is working with the DHS Records Officer to develop a NARA approved retention schedule.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Director, Office of Operations Coordination and Planning, National Operations Center, Department of Homeland
Security, Washington, DC 20528.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security is proposing to exempt this system from the notification, access, and
amendment procedures of the Privacy Act. However, DHS/OPS will consider individual requests to determine whether or not
information may be released. Individuals seeking notification of and access to any record contained in this system of
records, or seeking to contest its content, may submit a request in writing to OPS FOIA Officer, whose contact
information can be found at <i>http://www.dhs.gov/foia</i> under "contacts."
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, <i>http://www.dhs.gov</i> or 1
-866-431-0486. In addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created;
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records; and
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information contained in this system is obtained from subject individuals, other Federal, State, local and tribal
agencies and organizations, domestic and foreign media, including periodicals, newspapers, and broadcast transcripts,
public and classified data systems, reporting individuals, intelligence source documents, investigative reports, and
correspondence.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act,
subject to the limitation set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f)
pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(3).
</p></xhtmlContent></subsection></section>
<section id="ops4" toc="yes">
<systemNumber>/OPS-004</systemNumber>
<subsection type="systemName">Publicly Available Social Media Monitoring and Situational Awareness Initiative System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified, For Official Use Only, Law Enforcement Sensitive, and Classified.
</p></xhtmlContent></subsection>
<subsection type="securityClassification"><xhtmlContent>
<p> Unclassified, For Official Use Only. 
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent>
<p> Records are maintained at the Department of Homeland Security (DHS) Office of Operations Coordination and Planning (OPS) National Operations Center (NOC) Headquarters in Washington, D.C. and field locations.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent>
<p> Categories of individuals covered by the system may include: </p>
<p>U.S. and foreign individuals in extremis situations involving potential life or death circumstances; </p>
<p>Senior U.S. and foreign government officials who make public statements or provide public updates; </p>
<p>U.S. and foreign government spokespersons who make public statements or provide public updates; </p>
<p>U.S. and foreign private sector officials and spokespersons who make public statements or provide public updates; </p>
<p>Anchors, newscasters, or on-scene reporters who are known or identified as reporters in their post or article or who use traditional or social media in real time to keep their audience situationally aware and informed; </p>
<p>Current and former public officials who are victims or potential victims of incidents or activities related to Homeland Security; and</p>
<p>Known terrorists, drug cartel leaders, or other persons known to have been involved in major crimes or terror of Homeland Security interest (e.g., mass shooters such as those at Navy Yard or Los Angeles airport), who are killed or found dead.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p>Categories of records in the system may include:</p>
<p>Full name;</p>
<p>Affiliation; </p>
<p>Position or title; and</p>
<p>Publicly available user ID.</p>
</xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p>6 U.S.C. § 121; 44 U.S.C. § 3101; Executive Order (E.O.) 13388; Office of Operations Coordination and Planning Delegation 0104; and Homeland Security Presidential Directive 5.</p>
</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p> The purpose of this system is to fulfill the DHS Office of Operations and Coordination’s (OPS) statutory responsibility to provide situational awareness and establish a common operating picture for the entire Federal Government, and for state, local, and tribal governments as appropriate, and to ensure that critical disaster-related information reaches government decision makers. DHS/OPS NOC may share information with private sector and international partners when necessary, appropriate, and authorized by law. </p>
</xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p> In addition to those disclosures generally permitted under 5 U.S.C. § 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. § 552a(b)(3) as follows: </p>
<p> A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other federal agencies conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation or proceedings and one of the following is a party to the litigation or proceedings or has an interest in such litigation or proceedings:</p>
<p>  1. DHS or any Component thereof;</p>
<p>  2. Any employee or former employee of DHS in his/her official capacity;</p>
<p>  3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
<p>  4. The U.S. or any agency thereof.</p>
<p> B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
<p> C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. §§ 2904 and 2906.</p>
<p> D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
<p> E. To appropriate agencies, entities, and persons when:</p>
<p> 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; </p>
<p> 2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
<p> 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p> F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
<p>G. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations for the purpose of protecting the vital interests of a data subject or other persons, including to assist such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to combat other significant public health threats; appropriate notice will be provided of any identified health threat or risk. </p>
<p>H. To the entire federal government, to state, local, and tribal governments, and to appropriate private sector individuals within the Critical Infrastructure Key Resources Community to provide situational awareness and establish a common operating picture and to ensure that critical disaster-related information reaches government decision makers when PII lends credibility to the report or facilitates coordination with interagency or international partners.</p>
<p>Disclosure to consumer reporting agencies: </p>
<p> None. </p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>Storage:</p>
<p> DHS/OPS stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
</xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p> Much of the data within this system does not pertain to an individual; rather, the information pertains to locations, geographic areas, facilities, and other things or objects not related to individuals. However, some personal information may be captured. Most information is stored as free text and any word, phrase, or number is searchable. </p>
</xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p> DHS/OPS safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. OPS has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.   </p>
</xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p> In accordance with NARA records schedule # N1-563-08-23, OPS maintains records for 5 years.</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent>
<p> Director, Office of Operations Coordination and Planning, National Operations Center, U.S. Department of Homeland Security, Washington, D.C. 20528.</p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p> Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer or OPS Freedom of Information Act Officer (FOIA), whose contact information can be found at http://www.dhs.gov/foia under "FOIA Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief FOIA Officer, Department of Homeland Security, 245 Murray Drive, S.W., Building 410, STOP-0655, Washington, D.C. 20528.</p>
<p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the DHS Privacy Act regulations set forth in 6 CFR Part 5, Subpart B. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. § 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or (866) 431-0486. In addition, you should:</p>
<p>Explain why you believe the Department would have information on you;</p>
<p>Identify which component(s) of the Department you believe may have the information about you;</p>
<p>Specify when you believe the records would have been created; and </p>
<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records; </p><p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
<p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
</xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p> Information contained in this system is obtained from publicly available social media websites. </p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent>
<p> None. 

</p></xhtmlContent></subsection></section>
<section id="os1" toc="yes">
<systemNumber>/OS-001</systemNumber>
<subsection type="systemName">Office of Security File System.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified and Classified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>The records maintained by the Office of Security are located within the headquarters facilities of the Department
of Homeland Security (DHS), Washington, DC 20528.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Individuals involved in, or of interest to, DHS Office of Security activities, operations, or programs,
including, but not limited to: current and former DHS employees; applicants for employment with DHS (including student
interns); contractors and consultants providing services to DHS; Sate and local government personnel and private-sector
individuals who maintain an access control card permitting access to a DHS facility or access to information technology
systems that process national or homeland security information; DHS employees and contractors who may be a subject of a
counter-terrorism, counterintelligence, or counter-espionage, or law enforcement investigation; senders of unsolicited
communications that raise a security concern to the Department or its personnel; state and local government personnel and
private-sector individuals who serve on an advisory committee and board sponsored by DHS; and state and local government
personnel and private-sector individuals who are authorized by DHS to access sensitive or classified homeland security
information, classified facilities, communications security equipment, and information technology systems that process
national or homeland security classified information. The system also includes individuals accused of security violations
or found in violation.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Records relating to the management and operation of the DHS personnel security and suitability program, including
but not limited to, completed standard form questionnaires issued by the Office of Personnel Management; originals or
copies of background investigative reports; supporting documentation related to the background investigations and
adjudications; and other information relating to an individual’s eligibility for access to classified or sensitive
information.
</p><p>Records relating to management and operation of DHS programs to safeguard classified and sensitive but unclassified
information, including but not limited to, document control registries; courier authorization requests; non-disclosure
agreements; record(s) of security violations; record(s) of document transmittal(s); and requests for secure storage and
communications equipment.
</p><p>Records relating to the management and operation of DHS special security programs, including but not limited to,
requests for access to sensitive compartmented information (SCI); and foreign travel and foreign contact registries for
individuals with SCI access.
</p><p>Records relating to the management and operation of the DHS internal security program, including but not limited to,
inquiries relating to suspected security violation(s); recommended remedial actions for possible security violation(s);
reports of investigation regarding security violations; statements of individuals; affidavits; correspondence; and other
documentation pertaining to investigative or analytical efforts by the DHS Office of Security to identify threats to the
Department’s personnel, property, facilities, and information; intelligence reports and database results relating to DHS
personnel, applicants or candidates for DHS employment or a DHS contract, or other individuals interacting or having
contact with DHS personnel or contractors; foreign contact registries for individuals; or unsolicited communications with
DHS personnel or contractors that raise a security concern.
</p><p>Records relating to the management and operation of the Office of Security’s physical security, operations security,
and security training and awareness programs, including but not limited to, briefing and course registries; facility
access registries; access control card requests; and credential registries.
</p><p>Additionally, specific information from standard forms used to conduct background investigations.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>Homeland Security Act of 2002; National Security Act of 1947; 44 U.S.C. Chapters 21, 29, 31, 33, and 35; 5 U.S.C.
Sections 301, 3301, and 7902; 40 U.S.C. 1315; Executive Orders 10450,10865, 12333,12356, 12958, as amended, 12968, 13142,
13284; the Intelligence Reform and Terrorism Prevention Act of 2004, Public Law 108-458, Section 3001 (50 U.S.C.
435b).
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The records in this system are used in the management and implementation of Office of Security programs and
activities that support the protection of the Department’s personnel, property, facilities, and information. These
purposes include, but are not limited to, investigation and adjudication of personnel security and suitability
determinations and access to classified national security information and sensitive but unclassified information;
verification of access to classified national security information; determination of access to DHS facilities;
certification of storage and processing facilities for classified national security information meet required standards;
audit of contracts involving classified national security information; inventory of communications security equipment,
materials/keys for such equipment, and classified publications; analysis, identification, and addressing of efforts to
infiltrate the Department or collect classified or sensitive information; production of access control cards and audit of
access to DHS facilities; notification of DHS personnel in emergency situations; maintenance of a central databank for
investigations of misconduct involving the Department, its personnel, or its property. The records may be used to
document security violations and supervisory actions taken.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To designated officers and employees of Federal, State, local or international agencies in connection with the
hiring or continued employment of an individual, the conduct of a suitability or security investigation of an individual,
the grant, renewal, suspension, or revocation of a security clearance, or the certification of security clearances, to
the extent that DHS determines the information is relevant and necessary to the hiring agency’s decision;
</p><p>B. To designated officers and employees of Federal, State, local or international agencies maintaining civil, criminal
or other relevant enforcement information or other pertinent information, such as current licenses, if necessary for DHS
to obtain information relevant to an agency decision concerning the hiring or retention of an employee, the issuance of a
security clearance, the letting of a contract, or the issuance of a license, grant, or other benefit;
</p><p>C. Except as noted on national security questionnaires, such as Forms SF 85, 85-P, and 86, records to an
appropriate Federal, State, territorial, tribal, local, international, or foreign agency law enforcement authority
charged with investigating or prosecuting a violation or enforcing or implementing a law where a record, either on its
face or in conjunction with other information, indicates a violation or potential violation of law (<i>e.g.</i> criminal,
civil or regulatory);
</p><p>D. To a Federal, State, or local agency, or other appropriate entities or individuals, or through established liaison
channels to selected foreign governments, in order to enable an intelligence agency to carry out its responsibilities
under the National Security Act of 1947, as amended, the CIA Act of 1949, as amended, Executive Order 12333 or any
successor order, applicable national security directives, or classified implementing procedures approved by the Attorney
General and promulgated pursuant to such statutes, orders or directives.
</p><p>E. To an organization or individual in either the public or private sector where there is a reason to believe that the
recipient is or could become the target of a particular terrorist activity or conspiracy, to the extent the information
is relevant to the protection of life or property.
</p><p>F. To an authorized appeal or grievance examiner, formal complaints examiner, equal employment opportunity
investigator, arbitrator, or other duly authorized official engaged in investigation or settlement of a grievance,
complaint, or appeal filed by an employee;
</p><p>G. To the United States Office of Personnel Management, the Merit Systems Protection Board, Federal Labor Relations
Authority, or the Equal Employment Opportunity Commission when requested in the performance of their authorized duties;
</p><p>H. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains;
</p><p>I. To contractors, grantees, experts, consultants, students, and others performing or working on a contract, service,
grant, cooperative agreement, or other assignment for the Federal Government, when necessary to accomplish an agency
function related to this system of records;
</p><p>J. To the Department of Justice (DOJ) or in a proceeding before a court or adjudicative body before which DHS is
authorized to appear, when: (a) DHS, or any component thereof; or, (b) any employee of DHS in his or her official
capacity; or, (c) any employee of DHS in his or her individual capacity where the DOJ or DHS has agreed to represent the
employee; or (d) the United States, where DHS determines that litigation is likely to affect the agency or any of its
components, is a party to litigation or has an interest in such litigation, and the use of such records by the DOJ or by
DHS before a court or adjudicative body is deemed by DHS to be relevant and necessary to the litigation, provided,
however, that in each case, DHS determines that disclosure of the records is a use of the information contained in the
records that is compatible with the purpose for which the records were collected.
</p><p>K. To an agency, organization, or individual for the purposes of performing authorized audit or oversight operations.
</p><p>L. To any source or potential source from which information is requested in the course of an investigation concerning
the retention of an employee or other personnel action (other than hiring), or the retention of a security clearance,
contract, grant, license, or other benefit, to the extent necessary to identify the individual, inform the source of the
nature and purpose of the investigation, and to identify the type of information requested.
</p><p>Disclosure to consumer reporting agencies:
</p><p>Privacy Act information may be reported to consumer reporting agencies pursuant to 5 U.S.C. 552a(b)(12).
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>The records maintained by the Office of Security are located within the headquarters of DHS, Washington, DC
20528.
</p><p>The records are maintained in paper files and on electronic media.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Information in the records may be retrieved by the name of the individual, social security number, or other
unique individual identifier.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>All records are protected from unauthorized access through appropriate administrative, physical, and technical
safeguards. These safeguards include restricting access to authorized personnel who have a "need-to-know,"  utilization
of password protection features, and locks on doors and approved storage containers. Buildings have security guards and
secured doors, and all entrances are monitored by electronic surveillance equipment. Classified information is
appropriately stored in accordance with applicable requirements.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>The files are destroyed in accordance with legal requirements and the disposition instructions in the General
Records Schedule 18 issued by the National Archives and Records Administration (NARA).
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>DHS Privacy Office, Director of Departmental Disclosure, U.S. Department of Homeland Security, 245 Murray Lane,
SW., Building 410, Washington, DC 20528.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>A request for access to records in this system may be made by writing to the System Manager, the Director of
Departmental Disclosure, in conformance with 6 CFR part 5, which provides the rules for requesting access to records
maintained by the Department of Homeland Security.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Same as Notification Procedure above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Same as Notification Procedure above. State clearly and concisely the information being contested, the reasons
for contesting it, and the proposed amendment to the information sought.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information in security files may be obtained from other sources, including the following: Current and former DHS
employees (including student interns); applicants for employment with DHS; contractors and consultants providing services
to DHS; DHS personnel that maintain an access control card permitting access to a DHS facility; DHS personnel who may be
a subject of a criminal, counter-terrorism, counter-espionage, or other criminal investigation; senders of unsolicited
communications to the Department or its personnel; foreign nations who have contact with DHS, its personnel or its
offices; State and local government personnel and private-sector individuals who serve on an advisory committee and board
sponsored by DHS; State and local government personnel and private-sector individuals who are authorized by DHS to access
sensitive or classified homeland security information, classified facilities, communications security equipment, and
information technology systems which process national or homeland security classified information; State and local
government personnel and private-sector individuals who require a DHS access control device that permits access to
information technology systems which process national or homeland security classified information; law enforcement
agencies; other government agencies; previous employers, colleagues, neighbors, references, informants or other sources;
and representatives from educational institutions.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>In accordance with 5 U.S.C. 552a (k)(1), (k)(2), and (k)(5), the personnel security case files in this system of
records are exempt from subsections (c)(3); (d); (e)(1); (e)(4)(G), (H), and (I); and (f) of the Privacy Act of 1974, as
amended.
</p></xhtmlContent></subsection></section>
<section id="os2006-47" toc="yes">
<systemNumber>/OS-2006-047</systemNumber>
<subsection type="systemName">Personal Identity Verification Management System (PIVMS).
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Sensitive but unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Data covered by this system are maintained at the following location: DHS Data Center, Ashburn, VA.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>The PIVMS records will cover all DHS employees, contractors and their employees, consultants, volunteers engaged
by DHS who require long-term access to federal buildings and emergency "first responders"  who work in federally
controlled facilities. Individuals who require regular, ongoing access to agency facilities, information technology
systems, or information classified in the interest of national security.
</p><p>The system does not apply to occasional visitors or short-term guests to whom DHS will issue temporary identification
and credentials.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Records maintained on individuals issued a PIV credential by DHS include the following data fields: full name;
Social Security number; date of birth; current address; digital signature; digital color photograph; fingerprints;
biometric identifiers (two fingerprints); organization/office of assignment; employee affiliation; telephone number(s);
copies of identity source documents; signed SF 85 or equivalent; PIV card issue and expiration dates; PIV request form;
PIV registrar approval digital signature; PIV card serial number; emergency responder designation; computer system user
name; user access and permission rights, authentication certificates; digital signature information.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; Federal Information Security Act (Pub.L. 104-106, Sec. 5113); E-Government Act (Pub.L. 104
-347, sec. 203); the Paperwork Reduction Act of 1995 (44 U.S.C. 3501); and the Government Paperwork Elimination Act
(Pub.L. 105-277, 44 U.S.C. 3504); Homeland Security Presidential Directive-12 (HSPD-12); Policy for a Common
Identification Standard for Federal Employees and Contractors, August 27, 2004; Federal Property and Administrative Act
of 1949, as amended; the Intelligence Reform and Terrorism Prevention Act of 2004, P.L. 108-458, Section 3001 (50
U.S.C. 435b) and the Homeland Security Act of 2002, P.L. 107-296, as amended.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The primary purposes of the system are: (a) To ensure the safety and security of DHS facilities, systems, or
information, and our occupants and users; (b) To verify that all persons entering Federal facilities, using Federal
information resources, are authorized to do so; (c) to track and control PIV cards issued to persons entering and exiting
the DHS facilities or using DHS systems.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. Section 552a(b) of the Privacy Act, all or a
portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to
5 U.S.C. 552a(b)(3) as follows:
</p><p>A. To the Department of Justice (DOJ) when: (a) The agency or any component thereof; or (b) any employee of the agency
in his or her official capacity; (c) any employee of the agency in his or her individual capacity where agency or the
Department of Justice has agreed to represent the employee; or (d) the United States Government, is a party to litigation
or has an interest in such litigation, and by careful review, the agency determines that the records are both relevant
and necessary to the litigation and the use of such records by DOJ is therefore deemed by the agency to be for a purpose
compatible with the purpose for which the agency collected the records.
</p><p>B. To a court or adjudicative body in a proceeding when: (a) The agency or any component thereof; (b) any employee of
the agency in his or her official capacity; (c) any employee of the agency in his or her individual capacity where agency
or the Department of Justice has agreed to represent the employee; or (d) the United States Government, is a party to
litigation or has an interest in such litigation, and by careful review, the agency determines that the records are both
relevant and necessary to the litigation and the use of such records is therefore deemed by the agency to be for a
purpose that is compatible with the purpose for which the agency collected the records.
</p><p>C. Except as noted on Forms SF 85, 85-P, and 86, when a record on its face, or in conjunction with other
records, indicates a violation or potential violation of law, whether civil, criminal, or regulatory in nature, and
whether arising by general statute or particular program statute, or by regulation, rule, or order issued pursuant
thereto, disclosure may be made to the appropriate public authority, whether Federal, foreign, State, local, or tribal,
or otherwise, responsible for enforcing, investigating or prosecuting such violation or charged with enforcing or
implementing the statute, or rule, regulation, or order issued pursuant thereto, if the information disclosed is relevant
to any enforcement, regulatory, investigative or prosecutorial responsibility of the receiving entity.
</p><p>D. To a Member of Congress or to a Congressional staff member in response to an inquiry of the Congressional office
made at the written request of the constituent about whom the record is maintained.
</p><p>E. To the National Archives and Records Administration or to the General Services Administration for records
management inspections conducted under 44 U.S.C. 2904 and 2906.
</p><p>F. To agency contractors, grantees, or volunteers who have been engaged to assist the agency in the performance of a
contract service, grant, cooperative agreement, or other activity related to this system of records and who need to have
access to the records in order to perform their activity. Recipients shall be required to comply with the requirements of
the Privacy Act of 1974, as amended, 5 U.S.C. 552a.
</p><p>G. To a Federal State, local, foreign, or tribal or other public authority the fact that this system of records
contains information relevant to the retention of an employee, the retention of a security clearance, the letting of a
contract, or the issuance or retention of a license, grant, or other benefit. The other agency or licensing organization
may then make a request supported by the written consent of the individual for the entire record if it so chooses. No
disclosure will be made unless the information has been determined to be sufficiently reliable to support a referral to
another office within the agency or to another Federal agency for criminal, civil, administrative personnel or regulatory
action.
</p><p>H. To the Office of Management and Budget when necessary to the review of private relief legislation pursuant to OMB
Circular No. A-19.
</p><p>I. To a Federal State, or local agency, or other appropriate entities or individuals, or through established liaison
channels to selected foreign governments, in order to enable an intelligence agency to carry out its responsibilities
under the National Security Act of 1947, as amended, the CIA Act of 1949, as amended, Executive Order 12333 or any
successor order, applicable national security directives, or classified implementing procedures approved by the Attorney
General and promulgated pursuant to such statutes, orders or directives.
</p><p>J. To notify another Federal agency when, or verify whether, a PIV card is no longer valid.
</p><p>K. To the news media or the general public, factual information the disclosure of which would be in the public
interest and which would not constitute an unwarranted invasion of personal privacy, consistent with Freedom of
Information Act standards.
</p><p>L. To an agency, organization, or individual for the purposes of performing authorized audit or oversight operations.
</p><p>Disclosure to consumer reporting agencies:
</p><p>Privacy Act information may be reported to consumer reporting agencies pursuant to 5 U.S.C. 552a(b)(12).
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>DHS Headquarters in the Offices of Security and Human Capital and at the DHS Data Center in Ashburn, VA Records
maintain and store the records in electronic media and paper files.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by name of the individual, Social Security number and/or by any other unique individual
identifier.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>The Office of Security protects all records from unauthorized access through appropriate administrative,
physical, and technical safeguards. Access is restricted on a "need to know"  basis, utilization of SmartCard access, and
locks on doors and approved storage containers. DHS buildings have security guards and secured doors. DHS monitors all
entrances through electronic surveillance equipment. Personally identifiable information is safeguarded and protected in
conformance with all Federal statutory and OMB guidance requirements. All access has role-based restrictions, and
individuals with access privileges have undergone vetting and suitability screening. DHS encrypts data storage and
transfer. DHS maintains an audit trail and engages in random periodic reviews to identify unauthorized access. Persons
given roles in the PIV process must complete training specific to their roles to ensure they are knowledgeable about how
to protect personally identifiable information.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>This is a new program and the Records Management Office (RMO) has not finalized its retention policy. The DHS RMO
will develop a records retention schedule for approval by the NARA pertaining to this program. Once NARA has approved the
records retention schedule, DHS will amend this document to include the retention period for the records.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>DHS HSPD-12 Program Manager, Office of Security, U.S. Department of Homeland Security, 245 Murray Lane,
SW., Building 410, Washington, DC 20528.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>A request for access to records in this system may be made by writing to the System Manager, or the Director of
Departmental Disclosure, in conformance with 6 CFR part 5, which provides the rules for requesting access to records
maintained by the Department of Homeland Security.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Same as Notification Procedure above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Same as Notification Procedure above. State clearly and concisely the information being contested, the reasons
for contesting it, and the proposed amendment to the information sought.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Employee, contractor, or applicant; sponsoring agency; former sponsoring agency; other Federal agencies; contract
employer; former employer.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
    <section id="oig2" toc="yes">
        <systemNumber>/OIG-002</systemNumber>
        <subsection type="systemName">
            Department of Homeland Security/Office of Inspector General Investigative Records System of Records.
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>
                    Classified, sensitive, unclassified.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at the DHS OIG Headquarters in Washington, D.C. and field offices. Generally, OIG maintains electronic records in the OIG Enterprise Data System (EDS).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Chief System Security Officer, U.S. Department of Homeland Security, Office of Inspector General, Washington, D.C., 20528.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>6 U.S.C. sec. 113(b); 6 U.S.C. sec. 795; 6 U.S.C. sec. 142; 6 U.S.C. sec. 345; and the Inspector General Act of 1978, as amended 5 U.S.C. App. §§ 1-13.</p>
                <p> PURPOSE(S) OF THE SYSTEM:</p>
                <p>The purpose of this system is to collect and maintain records concerning DHS OIG investigations, including allegations of misconduct, violations of criminal, civil, and administrative laws and regulations pertaining to DHS programs, operations, employees, contractors, and other individuals or entities associated with DHS. This system of records is intended to support and protect the integrity of DHS OIG operations; to ensure compliance with applicable laws, regulations, and policies; and to ensure the integrity of DHS employees’ conduct and those acting on behalf of DHS.</p>
                </xhtmlContent>
                </subsection>
                <subsection type="categoriesOfIndividuals">
                    <xhtmlContent>
                        <p>Any individual filing complaints of or related to criminal, civil, or administrative violations, including employee misconduct, fraud, waste, or mismanagement; current or former DHS employees and contractors; current or former employees of other federal agencies; contractor applicants; contractors, grantees, and individuals whose association with current and former employees relate to alleged violations under investigation; witnesses, complainants, sources of information, suspects, defendants, or parties who have been identified by DHS OIG, other DHS Components, other agencies, or members of the general public in connection with complaints, audits, inspections, and/or investigations.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="categoriesOfRecords">
                    <xhtmlContent>
                        <p>Categories of records in this system include:</p>
                        	<p>Full name and aliases;</p>
                        	<p>Date of birth;</p>
                        	<p>Social Security number;</p>
                        	<p>Citizenship status;</p>
                        	<p>Driver’s license, state ID, passport, or other government-issued credential information;</p>
                        	<p>Demographic information (e.g., gender, race, ethnicity);</p>
                        	<p>Addresses;</p>
                        	<p>Contact information (e.g., phone numbers, email addresses);</p>
                        	<p>Employment information (e.g., duty station, grade, job series, entrance on duty date);</p>
                        	<p>Relevant information from background investigations;</p>
                        	<p>Education/training history;</p>
                        	<p>Medical history;</p>
                        	<p>Criminal history;</p>
                        	<p>Travel history, including passport information;</p>
                        	<p>Financial history;</p>
                        	<p>Relevant information from inspections, reviews, and inquiries, including records collected in response to an allegation, such as;</p>
                        	<p>Government emails;</p>
                        	<p>Time and attendance records;</p>
                        	<p>Government credit card bills;</p>
                        	<p>Building access logs;</p>
                        	<p>Government phone bills/records;</p>
                        	<p>Government property records;</p>
                        	<p>Government travel records;</p>
                        	<p>Computer forensic files;</p>
                        	<p>Open source or publicly available information, such as social media postings;</p>
                        	<p>Police reports; and</p>
                        	<p>Any other information gathered in the course of or relating to an integrity or disciplinary inquiry, review, inspection, or investigation of a criminal, civil, or administrative nature;</p>
                        	<p>Investigative records of a criminal, civil, or administrative nature;</p>
                        	<p>Biometrics;</p>
                        	<p>Letters, emails, memoranda, video, photograph and digital images, and reports;</p>
                        	<p>Exhibits, evidence, statements, and affidavits;</p>
                        	<p>Relatives and associates;</p>
                        	<p>Allegations received and method received;</p>
                        	<p>Incident location/date;</p>
                        	<p>Case reference numbers;</p>
                        	<p>Case status;</p>
                        	<p>Case agent/officer or supervisor;</p>
                        	<p>Any other personal information relevant to the subject matter of an OIG investigation; and</p>
                        	<p>Investigative case files containing allegations and complaints; witness statements; transcripts of electronic monitoring; subpoenas and legal opinions and advice; reports of investigations (ROI); and reports of criminal, civil, and administrative actions taken as a result of the investigation.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="recordSourceCategories">
                    <xhtmlContent>
                        <p>Records are obtained from individuals who are the subject of the investigation or inquiry, employers, law enforcement organizations, detention facilities, members of the public, witnesses, educational institutions, government agencies, nongovernmental organizations, credit bureaus, references, neighborhood checks, confidential sources, medical service providers, personal interviews, photographic images, military records, financial institutions, free and for-purchase commercial records, open source or publicly available information, citizenship records, and the personnel history and application forms of agency applicants, employees, or contractors. Records are also collected from other DHS Components.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="routineUsesOfRecords">
                    <xhtmlContent>
                        <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                        <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                        <p>1. DHS or any Component thereof;</p>
                        <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                        <p>3. Any employee or former employee of DHS in his/her individual capacity, when DOJ or DHS has agreed to represent the employee; or</p>
                        <p>4. The United States or any agency thereof.</p>
                        <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                        <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                        <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                        <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                        <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                        <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                        <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                        <p>I. To a federal, state, or local agency, or other appropriate entity or individual, or through established liaison channels to selected foreign governments, in order to provide intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order, or other applicable national security directive when the security of the borders which DHS is tasked with maintaining are at risk of being compromised.</p>
                        <p>J. To international and foreign governmental authorities in accordance with law and formal or informal international agreements.</p>
                        <p>K. To an appropriate federal, state, local, tribal, foreign, or international agency, pursuant to a request, if the information is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an individual or issues of a security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant, or other benefit and when disclosure is appropriate to the proper performance of the official duties of the person making the request.</p>
                        <p>L. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation, provided disclosure is appropriate to the proper performance of the official duties of the officer making the disclosure.</p>
                        <p>M. To the Council of the Inspectors General on Integrity and Efficiency (CIGIE) and other federal agencies, as necessary, if the records respond to an audit, investigation, or review conducted pursuant to an authorizing law, rule, or regulation, and in particular those conducted at the request of the CIGIE’s Integrity Committee pursuant to statute.</p>
                        <p>N. To complainants and victims to the extent necessary to provide such persons with information and explanations concerning the progress or results of the investigation arising from the matters of which they complained or of which they were a victim.</p>
                        <p>O. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS is aware of a need to use relevant data, that relate to the purpose(s) stated in this SORN, for purposes of testing new technology.</p>
                        <p>P. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="policiesAndPractices">
                    <xhtmlContent>
                        <p>DHS OIG stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="retrievability">
                    <xhtmlContent>
                        <p>DHS OIG may retrieve records by the individual’s name, date of birth, Social Security number, or any other unique identifier listed above.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="retentionAndDisposal">
                    <xhtmlContent>
                        <p>Records will be retained pursuant to DHS OIG National Archives and Records Administration (NARA) retention schedule N1-563-07-5 (October 11, 2007). Complaint and investigative record files that involve substantive information relating to national security or allegations against senior DHS officials, that attract national media or congressional attention, or that result in substantive changes in DHS policies or procedures are permanent and are transferred to the NARA 20 years after completion of the investigation and all actions based thereon. All other complaint and investigative record files are destroyed 20 years after completion of the investigation and all actions based thereon. Government issued investigative property records and management reports are destroyed when no longer needed for business purposes.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="safeguards">
                    <xhtmlContent>
                        <p>DHS OIG safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS OIG has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="recordAccessProcedures">
                    <xhtmlContent>
                        <p>The Secretary of Homeland Security has exempted this system from certain notification, access, and amendment procedures of the Privacy Act, and the Judicial Redress Act, if applicable. However, DHS will consider individual requests to determine whether or not information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the OIG Privacy Officer and OIG Freedom of Information Act Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, U.S. Department of Homeland Security, Washington, D.C., 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                        <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                        	<p>Explain why he or she believes the Department would have information being requested;</p>
                        	<p>Identify which component(s) of the Department he or she believes may have the information;</p>
                        	<p>Specify when the individual believes the records would have been created; and</p>
                        	<p>Provide any other information that will help the staff determine which DHS component agency may have responsive records;</p>
                        <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                        <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="contestingRecordProcedures">
                    <xhtmlContent>
                        <p>For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="notificationProcedure">
                    <xhtmlContent>
                        <p>See "Record Access Procedures" above.</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="exemptionsClaimed">
                    <xhtmlContent>
                        <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. sec. 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), e)(4)(I), (e)(5), (e)(8), (f); and (g)(1). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(k)(1), (k)(2), and (k)(5), has exempted this system from the following provisions of the Privacy Act, 5 U.S.C. sec. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f).</p>
                    </xhtmlContent>
                </subsection>
                <subsection type="history">
                    <xhtmlContent>
                        <p>80 Fed. Reg. 44372 (July 27, 2015).</p>
                    </xhtmlContent>
                </subsection>
            </section>


            <section id="oido1" toc="yes">
        <systemNumber>/oido-001</systemNumber>
        <subsection type="systemName">
            <p>U.S. Department of Homeland Security (DHS)/Office of the Immigration Detention Ombudsman (OIDO)-001 Office of the Immigration Detention Ombudsman System of Records.</p>
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at the Office of the Immigration Detention Ombudsman Headquarters in Washington, D.C., field offices, and other intake locations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Immigration Detention Ombudsman, Office of the Immigration Detention Ombudsman, U.S. Department of Homeland Security, Washington, D.C. 20528, detentionombudsman@hq.dhs.gov.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>Section 106 of the Consolidated Appropriations Act, 2020, Pub. Law No. 116-93, 133 Stat. 2504 (Dec. 20, 2019; 6 U.S.C 205.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to allow DHS/OIDO to collect and maintain records to investigate potential violations of law, individual rights, standards of professional conduct, contract terms, or policy related to immigration detention by any officer or employee of CBP, ICE, or any contracted, subcontracted, or cooperating entity personnel.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>The categories of individuals covered by this system of records include:</p>
                <p>Persons who contact OIDO to allege complaints from or about individuals in immigration detention regarding the potential violation of immigration detention standards or other potential misconduct by DHS, its employees, contractors, grantees, or others acting under the authority of the Department. These individuals may include the person currently or formerly detained or individuals who submit a complaint on behalf of that individual, including an attorney or representative. An individual may submit a complaint anonymously.</p>
                <p>DHS employees, contractors, grantees, volunteers, or others acting under the authority of the Department alleged to be involved in any such violations or misconduct.</p>
                <p>Third parties directly or indirectly involved in the alleged incident and identified as relevant persons to an investigation.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>Submitter’s full name, including any aliases;</p>
                <p>Submitter’s contact information, including mailing addresses, e-mail addresses, and phone numbers;</p>
                <p>Law Firm/Organization if the submitter is an attorney or accredited representative;</p>
                <p>Detainee’s full name, including any aliases;</p>
                <p>Detainee’s A-Number;</p>
                <p>Detainee’s contact information, including mailing addresses, e-mail addresses, and phone numbers;</p>
                <p>Detainee’s sex;</p>
                <p>Detainee’s date of birth;</p>
                <p>Detainee’s country of birth and country(s) of citizenship;</p>
                <p>Detainee’s detention history, including facility name and dates detained;</p>
                <p>Incident date;</p>
                <p>Compliant/incident number;</p>
                <p>Complaint description;</p>
                <p>Complaint category (e.g., abuse, disability accommodation, language access, legal representation, personal property, medical concerns, religious accommodation);</p>
                <p>Subject of the complaint (e.g., adult, family unit, or minor child, and names of other family members involved);</p>
                <p>Prior actions taken to remedy the problem; and</p>
                <p>Consent of the detainee for OIDO to disclose information in the file to a designated representative, if applicable.</p>
                <p>Submitters may offer more information than is specifically requested by OIDO, such as the detainee’s Visa number or Passport number as part of their submissions or descriptions of the complaint. Documentation provided to support complaints may also include legal and medical records or other records, such as those related to disability accommodations, personal property, or the conditions of detention.</p>
                <p>Throughout the course of its investigations, OIDO may also collect:</p>
                <p>Evidentiary documents and material, comments, records, photographs, and reports relating to the alleged complaint and to the resolution of the complaint;</p>
                <p>Investigation notes, including written and audio/video recordings of interviews with detainees, third parties involved in the complaint, and facility personnel;</p>
                <p>Interviewee’s full name and contact information;</p>
                <p>Interviewee’s position/title and current duty station (if applicable);</p>
                <p>Documentation concerning requests for additional information needed to complete the investigation;</p>
                <p>Letters, memoranda, and other documents alleging violation of immigration detention standards or other potential misconduct from complainants;</p>
                <p>Internal letters, memoranda, and other communications within DHS related to complaints; and</p>
                <p>Results of an investigation of a complaint.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>Records are obtained from detainees, their representatives (e.g., family, legal), or other persons submitting cases on a detainee’s behalf in person or via forms submitted by mail, email, fax, or, in the future, electronically; and by telephone. OIDO also accepts anonymous complaints. Information may be collected from DHS employees and/or contractors that are interviewed during an OIDO investigation. Additional information may be collected from other DHS components, databases, or systems (primarily ICE and CBP), and other government agencies, such as the Departments of State and Justice.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys’ Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. sec. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To an attorney or representative who is acting on behalf of an individual covered by this system of records to obtain the individual’s information submitted to OIDO.</p>
                <p>J. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS is aware of a need to use relevant data, that relate to the purpose(s) stated in this SORN, for purposes of testing new technology.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/OIDO stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>DHS/OIDO may retrieve records by any of the personal identifiers listed above, such as name, A-Number, date of birth, or complaint number.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>DHS/OIDO is in the process of drafting a proposed records retention schedule for the information maintained. DHS/OIDO is currently working with NARA to establish the records retention schedule and will adhere to it once finalized.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p> DHS/OIDO safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS/OIDO has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act, and the Judicial Redress Act if applicable, because it is a law enforcement system. However, DHS/OIDO will consider individual requests to determine whether or not information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer or Chief Freedom of Information Act Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, U.S. Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                <p>Explain why he or she believes the Department would have information being requested;</p>
                <p>Identify which component(s) of the Department he or she believes may have the information;</p>
                <p>Specify when the individual believes the records would have been created; and</p>
                <p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, individuals may seek to amend records following the "access procedures" above. DHS/OIDO, in its discretion, may choose to make the requested amendment. However, neither this system of records notice, nor DHS/OIDO making a requested amendment, confers to individuals any right to access, contest, or amend records not covered by the Privacy Act or JRA.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p> The Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(k)(2) and (k)(5), has exempted this system from the following provisions of the Privacy Act, 5 U.S.C. sec. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). Additionally, when this system receives a record from another system exempted in that source system under 5 U.S.C. sec. 552a(j)(2), (k)(2), and (k)(5), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>None.</p>
            </xhtmlContent>
        </subsection>
    </section>

    <section id="s&amp;amp;amp;t001" toc="yes">
        <systemNumber>/S&amp;amp;amp;T-001</systemNumber>
        <subsection type="systemName">
            Research, Development, Test, and Evaluation (RDT&amp;amp;amp;E) System of Records
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>
                    Unclassified and Classified.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at the S&amp;amp;amp;T Directorate Headquarters in Washington, D.C., and field offices, and at public or private institutions conducting S&amp;amp;amp;T-funded RDT&amp;amp;amp;E activities.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Under Secretary for Science and Technology, Mail Stop: 0205, U.S. Department of Homeland Security, 245 Murray Lane SW, Washington, D.C. 20528; (202) 254-7748; STPrivacy@hq.dhs.gov.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>The Homeland Security Act of 2002, Public Law 107-296, Sec. 302 (codified at 6 U.S.C. sec. 182) authorizes the S&amp;amp;amp;T to conduct "basic and applied research, development, demonstration, testing, and evaluation activities that are relevant to any or all elements of the Department, through both intramural and extramural programs." In exercising its responsibility under the Homeland Security Act, S&amp;amp;amp;T is authorized to collect information, as appropriate, to support research and development related to improving the security of the homeland. To the extent an activity meets the definition of research involving human subjects, DHS complies with the regulations set forth in 6 CFR part 46.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>Records are collected for the purposes of furthering S&amp;amp;amp;T’s mission to push innovation and development and use technology in</p>
                <p>support of homeland security. The purposes of this system are to:</p>
                	<p>Understand the motivations and behaviors of terrorists, individuals that engage in violent or criminal activities, terrorist groups, and groups that engage in violent or criminal activities;</p>
                	<p>Understand terrorist incidents and the phenomenon of terrorism and identify trends and patterns in terrorist activities;</p>
                	<p>Collect and maintain searchable records of individuals (such as subject matter experts on chemical weapons) and/or their characteristics and professional accomplishments, organized according to categories useful for the conduct of research, including research to determine the efficacy and utility of new or enhanced technologies intended for eventual transition to and use by S&amp;amp;amp;T’s customers or to provide scientific and technical expertise in support of emergency preparedness and response;</p>
                	<p>Evaluate the performance and utility to the future customer of an experimental homeland security technology or product in a laboratory or "real-world" setting;</p>
                	<p>Test the accuracy of a research hypothesis (for example, S&amp;amp;amp;T might hypothesize that an individual’s behavior changes in a detectable manner when he or she is being deceitful, and then design a research experiment to test that hypothesis);</p>
                	<p>Answer a research question (for example, "Can an experimental screening technology distinguish between threat objects and non-threat objects?");</p>
                	<p>Conduct testing and evaluation of an experimental technology at the request of or on behalf of a customer; and</p>
                	<p>Conduct research and development to solve a technical problem for a customer.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>Individuals include voluntary participants in S&amp;amp;amp;T-funded RDT&amp;amp;amp;E activities such as field exercises or assessments, voluntary participants in human subjects research (note: all S&amp;amp;amp;T-funded human subjects research is conducted in accordance with 45 CFR 46 and is reviewed by a certified Institutional Review Board); individuals whose names or other identifying information may appear in publicly available documents (e.g., newspapers, academic articles, and websites) or on social media platforms about public safety, terrorism (including terrorist and targeted violence events), counterterrorism, violent or criminal groups, or other topics related to chemical, biological, and related weapons and materials, biomedical and life sciences research, or other homeland security information of interest to DHS/S&amp;amp;amp;T in the performance of RDT&amp;amp;amp;E activities. This system of records also covers individuals whose images, biometrics, physiological features, or other information may be intentionally (with notice to and consent by the individual) or incidentally captured during testing of S&amp;amp;amp;T technologies; subject matter experts who publish articles related to terrorism, counterterrorism, chemical, biological, biomedical and life sciences research; and subject matter experts who voluntarily consent to be included in a database of experts.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>S&amp;amp;amp;T’s RDT&amp;amp;amp;E activities will vary according to the specific project. The information may include an individual’s:</p>
                	<p>Name;</p>
                	<p>SSN;</p>
                	<p>User name;</p>
                	<p>Online identifier (e.g., social media handle);</p>
                	<p>Research or other unique identifier;</p>
                	<p>Uniform Resource Locator (URL);</p>
                	<p>Internet Protocol (IP) address;</p>
                	<p>Media Access Control (MAC) Address;</p>
                	<p>Computer name;</p>
                	<p>Age;</p>
                	<p>Gender;</p>
                	<p>Contact information;</p>
                	<p>Birthplace;</p>
                	<p>Ethnicity;</p>
                	<p>Level of education;</p>
                	<p>Occupation;</p>
                	<p>Institutional or organizational affiliation;</p>
                	<p>Publication record (e.g., article and publication titles, dates and sources);</p>
                	<p>Medical history and other health-related information;</p>
                	<p>Lifestyle information (e.g., caffeine use, tobacco use);</p>
                	<p>Publicly available reports of criminal history or violence;</p>
                	<p>Video or still images;</p>
                	<p>Other images (e.g., infrared thermography, terahertz, millimeter wave);</p>
                	<p>Audio recordings;</p>
                	<p>Biometric samples (e.g., facial images, speech/voice, fingerprints, deoxyribonucleic acid (DNA), iris, human tissue, or other biometric information);</p>
                	<p>Biometric data (e.g., Fingerprint Identification Number, voice and contactless fingerprints, biometric templates, typing cadence, cardiac signature, vascular patterns); and</p>
                	<p>Physiological measurements collected using sensors (e.g., heart rate, breathing pattern, electrodermal activity).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>Records are obtained from (1) individuals directly; (2) publicly available information (e.g., social media platforms, news media outlets, Internet search engines, academic and scientific publications); (3) sensors (e.g., records collected from the individual using sensors, such as a heart rate monitor) or technologies (e.g., cameras, audio recorders, infrared thermography or other images, biometric devices); (4) federal, state, local, territorial, tribal governments and agencies; (5) other domestic agencies; (6) foreign governments and agencies; (7) multinational or nongovernmental organizations; (8) critical infrastructure owners and operators; (9) private sector entities and organizations; and (10) free or fee-based commercial data providers.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the federal government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS is aware of a need to use relevant data for purposes of testing new technology.</p>
                <p>J. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/S&amp;amp;amp;T stores records in this system electronically or on paper in secure facilities, typically, in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>S&amp;amp;amp;T may retrieve records by any of the information listed in the Categories of Records above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>All records are maintained in accordance with the appropriate NARA-approved retention schedules. Different NARA-approved records retention schedules apply to specific RDT&amp;amp;amp;E records, depending on the RDT&amp;amp;amp;E activity. For example, Technical Information Bulletins, Technical Notes, Test and Evaluation Case Files, Test and Evaluation Files, Test and Evaluation Product Packages, Test Procedures and Protocols, and Test Team Assessment Letters fall under DHS Schedule 109-026-003, Scientific and Technological Research and Innovation. DHS/S&amp;amp;amp;T must review Technical Information Bulletins and Technical Notes annually in accordance with N1-563-08-30 and delete or destroy records that have been inactive for five years. Test and Evaluation Case Files and supporting documentation is scheduled to be destroyed at the end of the calendar year five years after the completion of the test, exclusive of Test and Evaluation Final Reports, which are scheduled to be destroyed five years after the tested device, system, or equipment is removed from operation in accordance with N1-563-08-13-7. Test and Evaluation File records, excluding Final Reports, are scheduled to be destroyed at the end of the calendar year five years after completion or cancellation of a project or one year after the responsible office determines the record is no longer needed for legal, audit, administrative or business purposes. Final Reports must be reviewed annually and destroyed or deleted after five years of inactivity, in accordance with N1-563-09-4-4. DHS/S&amp;amp;amp;T destroys Test and Evaluation Product Packages 10 years after the testing and evaluation is completed as required by N1-563-08-13-8.</p>
                <p>DHS/S&amp;amp;amp;T retains other RDT&amp;amp;amp;E records on specific topics, issues, or projects in accordance with DHS Schedule 401-000-001a, Subject Files. The Subject Files are permanent and transferred to the National Archives after 10 years, in accordance with N1-563-07-13-11. DHS/S&amp;amp;amp;T retains records involving inventions or patents according to DHS Schedule 105-012-002, Intellectual Property Protection, and N1-563-07-17-9. For trademarks, DHS/S&amp;amp;amp;T destroys the records at the end of the calendar year, 20 years after the date of issuance. For patents, DHS/S&amp;amp;amp;T destroys the records at the end of the calendar year, 40 years after the date of issuance. For copyright, DHS/S&amp;amp;amp;T destroys the records at the end of the calendar year, 150 years after the date of issuance. For trade secrets, DHS/S&amp;amp;amp;T destroys the records at the end of the calendar year, 20 years after the date when developed/discovered or when the trade secret is no longer valuable, whichever is later. Research and Development-related memoranda of understanding or agreement fall within DHS Schedule 105-012-003, Intellectual Property Protection, and are destroyed or deleted three years from when the agreement is terminated under N1-563-09-11-1. Program Evaluation records including Technical Assessments and Legal and Regulatory Compliance Records fall within DHS Schedule 301-092-002, Program Evaluation, and N1-563-08-30-5. DHS/S&amp;amp;amp;T is required to destroy or delete Technical Assessment project files, excluding Final Reports, at end of the calendar year five years after completion or cancelation of assessment or one year after the responsible office determines the records are no longer needed for legal, audit, administrative, or business purposes. DHS/S&amp;amp;amp;T must destroy Program Evaluation legal and regulatory compliance records when the records are five years old.</p>
                <p>Given the scope of RDT&amp;amp;amp;E activities, additional NARA-approved schedules apply to S&amp;amp;amp;T records. Some records are permanent records and other records are temporary records. The records have different disposition instructions based on the applicable records retention schedule.</p>
                <p>DHS/S&amp;amp;amp;T also has RDT&amp;amp;amp;E records schedule requests pending, for example, for DHS/S&amp;amp;amp;T National Laboratory research and development files, not used in law enforcement cases, and records that document compliance with standards-organization requirements to carry out test and calibration. Records subject to pending records schedule requests shall be retained until a records retention schedule has been approved by NARA.</p>
                <p>Researchers may retain aggregated research data indefinitely, as it may help inform future RDT&amp;amp;amp;E efforts.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p>DHS/S&amp;amp;amp;T safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. S&amp;amp;amp;T has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Component Privacy Officer or Component Freedom of Information Act Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, U.S. Department of Homeland Security, Washington, D.C. 20528-0655, or electronically at https://www.dhs.gov/dhs-foia-privacy-act-request-submission-form. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about him or her may be available under the Freedom of Information Act.</p>
                <p>When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. An individual may obtain more information about this process at http://www.dhs.gov/foia. In addition, the individual should, whenever possible:</p>
                	<p>Describe the records sought, including any circumstances or reasons why the Department would have information being requested;</p>
                	<p>Identify which component(s) of the Department or Department Headquarters Office he or she believes may have the information;</p>
                	<p>Specify the timeline when the individual believes the records would have been created; and</p>
                	<p>Provide any other information that will help the FOIA staff determine which DHS Headquarters Office or component agency may have responsive records;</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include a statement from the living individual verifying the identity of the individual, as described in the verification steps above, and provide a statement from the living individual certifying the individual’s agreement that records concerning the individual may be released to you.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, individuals may seek to amend records following the "Record Access Procedures" above. DHS/S&amp;amp;amp;T, in its discretion, may choose to make the requested amendment. However, neither this system of records notice, nor DHS/S&amp;amp;amp;T’s making a requested amendment, confers to individuals any right to access, contest, or amend records not covered by the Privacy Act or Judicial Redress Act.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>None. When this system receives a record from another system exempted in that source system under 5 U.S.C. sec. 552a, DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>78 Fed. Reg. 3019 (January 15, 2013).</p>
            </xhtmlContent>
        </subsection>
    </section>

    <section id="s&amp;amp;amp;T002" toc="yes">
        <systemNumber>/S&amp;amp;amp;T-002</systemNumber>
        <subsection type="systemName">
            The Directorate of Science &amp;amp;amp; Technology Personnel Radiation Exposure Records.
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>
                    Unclassified.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>
                    Records are maintained at the S&amp;amp;amp;T Headquarters in Washington, DC and field offices.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>
                    Categories of individuals covered by this system include DHS/S&amp;amp;amp;T personnel, contractor personnel, and any
                    other persons who have access to certain DHS/S&amp;amp;amp;T facilities and have been exposed to radiation.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>
                    Categories of records in this system include:
                </p>
                <p>
                     Individual’s name;
                </p>
                <p>
                     Social security number;
                </p>
                <p>
                     Date of birth;
                </p>
                <p>
                     Gender;
                </p>
                <p>
                     Alphanumeric code assigned as part of radiation analysis;
                </p>
                <p>
                     Accident/investigation records
                </p>
                <p>
                    ● Film badges used to measure radiation exposure;
                </p>
                <p>
                     Dosimetry records;
                </p>
                <p>
                     Previous employee records;
                </p>
                <p>
                     Individual’s radiation exposure record, including date(s) of exposure;
                </p>
                <p>
                     Other records in connection with registries of uranium, transuranics, or other elements encountered in the
                    nuclear industry.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>
                    5 U.S.C. 301; the Federal Records Act, 44 U.S.C. 3101.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>
                    The purpose of this system is to document personnel and other individuals who are exposed to radiation, uranium,
                    transuranics, and other elements encountered in the nuclear industry while at a DHS/S&amp;amp;amp;T facility.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>
                    In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
                    of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
                    552a(b)(3) as follows:
                </p>
                <p>
                    A. To the Department of Justice or other Federal agency conducting litigation or in proceedings before any court,
                    adjudicative or administrative body, when it is necessary to the litigation and one of the following is a party to the
                    litigation or has an interest in such litigation:
                </p>
                <p>
                    1. DHS or any component thereof;
                </p>
                <p>
                    2. Any employee of DHS in his/her official capacity;
                </p>
                <p>
                    3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
                </p>
                <p>
                    4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
                    DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
                    compatible with the purpose for which DHS collected the records.
                </p>
                <p>
                    B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
                    made at the request of the individual to whom the record pertains.
                </p>
                <p>
                    C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
                    management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
                </p>
                <p>
                    D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
                    by law, but only such information as is necessary and relevant to such audit or oversight function.
                </p>
                <p>
                    E. To appropriate agencies, entities, and persons when:
                </p>
                <p>
                    1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
                    compromised;
                </p>
                <p>
                    2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
                    economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
                    systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the
                    compromised information; and
                </p>
                <p>
                    3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
                    DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
                </p>
                <p>
                    F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
                    service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
                    related to this system of records. Individuals provided information under this routine use are subject to the same
                    Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
                </p>
                <p>
                    G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other
                    appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
                    regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
                    or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
                    consistent with the official duties of the person making the disclosure.
                </p>
                <p>
                    H. To the U.S. Navy to monitor radiation exposure of Naval and other personnel at Navy activities.
                </p>
                <p>
                    I. To the Department of Energy (DOE), States departments of labor, and industry groups to monitor radiation exposure
                    of personnel.
                </p>
                <p>
                    J. To the Department of Defense to identify DOD and DOD-contractor personnel exposed to ionizing radiation during
                    nuclear testing, and for conducting epidemiological studies of radiation effects on identified individuals.
                </p>
                <p>
                    K. To the National Academy of Sciences, Center for Disease Control, National Institute of Occupational Safety and
                    Health, the Department of Health and Human Services, the National Council on Radiation Protection and Measurements, and
                    other organizations focused on this subject matter, to conduct epidemiological studies of the effects of radiation on
                    individuals exposed to ionizing radiation.
                </p>
                <p>
                    L. To the National Institute of Occupational Safety and Health to conduct epidemiological studies of workers at DOE’s
                    Portsmouth Gaseous Diffusion Plant in Piketon, Ohio.
                </p>
                <p>
                    M. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to
                    opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection
                    with criminal law proceedings or in response to a subpoena from a court of competent jurisdiction.
                </p>
                <p>
                    N. To appropriate Federal, State, local, tribal, or foreign governmental agencies or multilateral governmental
                    organizations for the purpose of protecting the vital interests of data subjects or other persons, including to assist
                    such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to
                    combat other significant public health threats; appropriate notice will be provided of any identified health threat or
                    risk.
                </p>
                <p>
                    O. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
                    there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
                    preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
                    employees, or individuals covered by the system, except to the extent it is determined that release of the specific
                    information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
                </p>
                <p>
                    Disclosure to consumer reporting agencies:
                </p>
                <p>
                    None.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>Storage:</p>
                <p>
                    Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
                    locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>
                    Records may be retrieved by name, alphanumeric code (an identifier assigned to an individual by the vendor who
                    performs the analysis of the radiation monitor), date(s) of exposure, and social security number.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p>
                    These records are protected by employing a multi-layer security approach to prevent unauthorized access to
                    sensitive data through appropriate administrative, physical, and technical safeguards. Protective strategies such as
                    implementing physical access controls at DHS facilities; ensuring confidentiality of communications using tools such as
                    encryption, authentication of sending parties, and compartmentalizing databases; and employing auditing software and
                    personnel screening to ensure that all personnel with access to data are screened through background investigations
                    commensurate with the level of access required to perform their duties. All S&amp;amp;amp;T electronic records are secured in
                    full compliance with the requirements of DHS IT Security Program Handbook. This handbook establishes a comprehensive
                    information security program.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>
                    S&amp;amp;amp;amp;amp;amp;T has submitted a proposed records retention and disposal schedule to NARA to maintain the records for
                    seventy-five years. Health problems caused by radiation (such as cancer) can take years to manifest and can reoccur
                    multiple times during an individual’s life. Therefore, S&amp;amp;amp;amp;amp;amp;T will retain the records for 75 years so that, if an
                    individual has problems they believe are attributable to radiation exposure received as a government employee, the
                    government will have those records available and will be able to provide an accurate accounting of an individual’s
                    exposure. Until NARA approves a records retention and disposal schedule, S&amp;amp;amp;T will retain the records indefinitely.
                    Upon receiving the approved schedule, S&amp;amp;amp;amp;amp;amp;T will dispose of records according to NARA’s instructions.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>
                    S&amp;amp;amp;T Safety, Health, Environmental, &amp;amp;amp; Energy Programs Manager, Mail Stop: 2100, Department of Homeland
                    Security, 245 Murray Lane, SW., Washington, DC 20528.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>
                    Individuals seeking notification of and access to any record contained in this system of records, or seeking to
                    contest its content, may submit a request in writing to S&amp;amp;amp;T FOIA Coordinator, Mail Stop: 2100, Department of Homeland
                    Security, 245 Murray Lane, SW., Washington, DC 20528. Specific FOIA contact information can be found at <i>
                        http://www.dhs.gov/foia
                    </i> under "contacts."
                </p>
                <p>
                    When seeking records about yourself from this system of records or any other S&amp;amp;amp;T system of records your request
                    must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning
                    that you must provide your full name, current address and date and place of birth. You must sign your request, and your
                    signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under
                    penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this
                    purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
                    addition you should provide the following:
                </p>
                <p>
                    ● An explanation of why you believe the Department would have information on you,
                </p>
                <p>
                    ● Specify when you believe the records would have been created,
                </p>
                <p>
                    ● If your request is seeking records pertaining to another living individual, you must include a statement
                    from that individual certifying his/her agreement for you to access his/her records.
                </p>
                <p>
                    Without this bulleted information the S&amp;amp;amp;amp;amp;amp;T may not be able to conduct an effective search, and your request may be
                    denied due to lack of specificity or lack of compliance with applicable regulations.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>
                    See "Notification procedure" above.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>
                    See "Notification procedure" above.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>
                    Individual, accident/incident investigations, film badges, dosimetry records, and previous employee records.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>
                    None.
                </p>
            </xhtmlContent>
        </subsection>
    </section>
    <section id="s&amp;amp;amp;T003" toc="yes">
        <systemNumber>/S&amp;amp;amp;T-003</systemNumber>
        <subsection type="systemName">
            <p>U.S. Department of Homeland Security (DHS)/Science &amp;amp;amp; Technology Directorate (S&amp;amp;amp;T)-003 National Bioforensic Analysis Center Laboratory Elimination Database System of Records.</p>
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified and Classified.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at NBFAC within NBACC at Ft. Detrick, MD.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p> Director, Office of National Laboratories, Science &amp;amp;amp; Technology Directorate, U.S. Department of Homeland Security, Room #10-027, S&amp;amp;amp;amp;amp;T Division, Mail Stop: 0205, 245 Murray Lane S.W., Washington, D.C. 20528-0205, (202)-254-8227.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>The Homeland Security Act of 2002, Public Law 107-296, Sec. 302 (codified at 6 U.S.C. sec. 182); National Security Presidential Memorandum 14, Support for National Biodefense, and the National Biodefense Strategy; the Intelligence Reform and Terrorism Prevention Act of 2004, Pub. L. No. 108-458, 118 Stat. 3638, sec. 8306 (Dec. 2004), 6 U.S.C. sec. 112 note, 6 CFR Part 46, and 42 U.S.C. sec. 300v-1, and 45 CFR Part 46, Subpart A, to the extent an activity meets the definition of research on human subjects.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to determine whether a contamination event may have occurred related to NBFAC’s operational casework or RDT&amp;amp;amp;amp;amp;E activities; and if so, which individual or individuals may be the source of an unintended contaminant present within a controlled environment, experiment, or scientific process, and to prevent the recurrence of the nonconformity that led to contamination event.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>NBFAC personnel and non-NBFAC personnel that have access to the laboratory, including maintenance, instrument service personnel and visitors, and non-NBFAC personnel that may have had contact with items prior to the commencement of the controlled activities.</p>
                <p>The NBFAC individuals include: (1) NBFAC evidence handlers, chain of custody staff, technicians, principal investigators, engineers, safety staff, security staff, maintenance staff, and internal auditors that handle evidence items, or biological material derived from evidence items, or access DNA-sensitive NBFAC laboratories; and (2) FBI staff that handle evidence items, or biological material derived from evidence items, or access DNA-sensitive NBFAC laboratories.</p>
                <p>Individuals external to NBFAC include non-NBFAC personnel who are evidence collectors and handlers and casework technicians who handle evidence or derived biological materials prior to their arrival at NBFAC, engineers and technicians that access DNA-sensitive NBFAC laboratories to install or maintain equipment, auditors/inspectors that access DNA-sensitive NBFAC laboratories, and visitors granted access to DNA-sensitive NBFAC laboratories.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>●Individual’s full name;</p>
                <p>●Unique NBFAC identifier for the individual;</p>
                <p>●An external partner’s personal identifier for information about an individual, other than a name, (e.g., employee identification number or badge number);</p>
                <p>●Institutional or organizational affiliation;</p>
                <p>●Institutional or organizational position;</p>
                <p>●Contact information including, phone numbers, email addresses, physical addresses;</p>
                <p>●Individual’s biological sex;</p>
                <p>●Individual’s collected DNA sample and the sample’s physical location information (stored and maintained in the database); and</p>
                <p>●Individual’s DNA sequence data, but not the full genome sequence.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>Records are obtained from NBFAC and non-NBFAC personnel. External partner agencies may provide information about their personnel who have been in contact or proximity to NBFAC DNA-sensitive laboratories or its biological samples or material.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the federal government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To a federal agency for a statistical or research purpose, including the development of methods or resources to support statistical or research activities, provided that the records support DHS programs and activities that relate to the purpose(s) stated in this SORN, and will not be used in whole or in part in making any determination regarding an individual’s rights, benefits, or privileges under federal programs, or published in any manner that identifies an individual.</p>
                <p>J. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, when 1) the NBACC has entered into an agreement with such agency to process samples on behalf of the agency, 2) either NBACC or the partner agency has reason to believe a contamination event has occurred, and 3) the partner agency demonstrates to NBACC that the contamination event relates to or affects a law enforcement investigation, and 4) NBACC determines that release of the records would assist in identifying and resolving a contamination event.</p>
                <p>K. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS is aware of a need to use relevant data, that relate to the purpose(s) stated in this SORN, for purposes of testing new technology.</p>
                <p>L. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/S&amp;amp;amp;amp;amp;T typically stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>DHS/S&amp;amp;amp;amp;amp;T may retrieve records by name, NBFAC identifier, or other personal identifier.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>DHS/S&amp;amp;amp;amp;amp;T has proposed a records retention schedule to NARA. DHS/S&amp;amp;amp;T proposes a 20-year retention period for (1) records generated for use in law enforcement cases, with the potential for appeal; and (2) records in research and development files or projects, not used in law enforcement cases, to allow time to evaluate their historic significance.</p>
                <p>In some instances, DHS/S&amp;amp;amp;T seeks permanent retention for records in significant law enforcement cases or projects involving novel or complex issues, public interest, media attention, or congressional scrutiny and a five-year retention period for records that document compliance with International Organization for Standardization (ISO) 17025 requirements to carry out tests and/or calibrations, including sampling.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p>DHS/S&amp;amp;amp;amp;amp;T safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS/S&amp;amp;amp;amp;amp;T has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Component Privacy Officer or Component Freedom of Information Act Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, or if the request is for records maintained at a DHS Headquarters office, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, U.S. Department of Homeland Security, Washington, D.C. 20528-0655, or electronically at https://www.dhs.gov/dhs-foia-privacy-act-request-submission-form. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. An individual may obtain more information about this process at http://www.dhs.gov/foia. In addition, the individual should, whenever possible:</p>
                <p>●Describe the records sought, including any circumstances or reasons why the Department would have information being requested;</p>
                <p>●Identify which component(s) of the Department or Department Headquarters Office he or she believes may have the information;</p>
                <p>●Specify the timeline when the individual believes the records would have been created; and</p>
                <p>●Provide any other information that will help the FOIA staff determine which DHS Headquarters Office or component agency may have responsive records;</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include a statement from the living individual verifying the identity of the individual, as described in the verification steps above, and provide a statement from the living individual certifying the individual’s agreement that records concerning the individual may be released to you.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, individuals may seek to amend records following the "access procedures" above. DHS/S&amp;amp;amp;amp;amp;T, in its discretion, may choose to make the requested amendment. However, neither this system of records notice, nor DHS/S&amp;amp;amp;amp;amp;T’s making a requested amendment, confers to individuals any right to access, contest, or amend records not covered by the Privacy Act or Judicial Redress Act.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>None. When this system receives a record from another system exempted in that source system under 5 U.S.C. sec. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>N/A.</p>
            </xhtmlContent>
        </subsection>
    </section>

    <section id="tsa1" toc="yes">
<systemNumber>/TSA-001</systemNumber>
    <subsection type="systemName">
        Department of Homeland Security (DHS) Transportation Security Administration (TSA)-001 Transportation Security Enforcement Record System System of Records.
    </subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p>Classified, sensitive.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p>Records are maintained at the TSA Headquarters offices, 601 South 12th Street, Arlington, Virginia,20598 and at various TSA field offices.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p>Information Systems Program Manager, IT_System_owner@tsa.dhs.gov,  Office of Information Technology, TSA Headquarters, TSA-11, 601 South 12th Street, Arlington, VA 20598.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="authorityForMaintenance">
        <xhtmlContent>
            <p>49 U.S.C. sec. 114(d), 44901, 44903, 44916, 46101, and 46301.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p>The purpose of this system is to maintain an enforcement and inspections system for all modes of transportation for which TSA has security-related duties and to maintain records related to the investigation or prosecution of violations or potential violations of Federal, State, local, or international criminal law. They may be used, generally, to identify, review, analyze, investigate, and prosecute violations or potential violations of transportation security laws, regulations, and directives or other laws as well as to identify and address potential threats to transportation security. They may also be used to record the details of TSA security-related activity, such as passenger or property screening.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
            <p>Current and former owners, operators, and employees, including TSA personnel, in all modes of transportation for which DHS/TSA has security-related duties; individuals reported or investigated as insider threat risks (that is, individuals who are, or present themselves to be, current or former transportation sector workers (including both TSA and private sector personnel) and individuals employed or otherwise engaged in providing services requiring authorized access to transportation facilities, assets, or infrastructure who intend to cause harm to the transportation domain); individuals who have access to SSI and are "covered persons" under the Sensitive Security Information regulation, 49 CFR Part 1520; witnesses and other third parties who provide information; individuals undergoing screening of their person (including identity verification) or property; individuals against whom investigative, administrative, or civil or criminal enforcement action has been initiated for violation of certain TSA regulations or security directives, relevant provisions of 49 U.S.C. sec. 449, or other laws; and individuals who communicate security incidents, potential security incidents, or otherwise suspicious activities.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p>Information related to the screening of property and the security screening and identity verification of individuals, including identification media and identifying information such as:</p>
            <p>●Individual’s name;</p>
            <p>●Address;</p>
            <p>●Date and place of birth;</p>
            <p>●Gender;</p>
            <p>●Contact information (e.g., email addresses, phone numbers);</p>
            <p>●Social Security number;</p>
            <p>●Government-issued identification (e.g., Passport information, Driver’s License number, Alien Registration number);</p>
            <p>●Citizenship;</p>
            <p>●Fingerprints or other biometric identifiers;</p>
            <p>●Physical description, photographs or video;</p>
            <p>●Travel information or boarding passes;</p>
            <p>●Results of any law enforcement, criminal history record, intelligence, immigration, public records or open source checks;</p>
            <p>●Military status (branch, traveling on orders);</p>
            <p>●Employment information and work history;</p>
            <p>●Security and access clearances and background investigations information.</p>
            <p>●TSA Information technology network activity information; and</p>
            <p>●Information from other agencies (e.g., FBI, Financial Crimes Enforcement Network (FinCEN)).</p>
            <p>Additionally, information related to the investigation or prosecution of any alleged violation; place of violation; Enforcement Investigative Reports (EIR); security incident reports, screening reports, suspicious-activity reports, and other incident or investigative reports; statements of alleged violators, witnesses, and other third parties who provide information; proposed penalty; investigators’ analyses and work papers; enforcement actions taken; findings; documentation of physical evidence; correspondence of TSA employees and others in enforcement cases; pleadings and other court filings; legal opinions and attorney work papers; and information obtained from various law enforcement or prosecuting authorities relating to the enforcement of laws or regulations.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p>Records are obtained from the alleged violator, TSA employees or contractors, witnesses to the alleged violation or events surrounding the alleged violation, other third parties who provided information regarding the alleged violation, State and local agencies, and other Federal agencies.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
            <p>A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other Federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
            <p>1. DHS or any component thereof;</p>
            <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
            <p>3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
            <p>4. The United States or any agency thereof.</p>
            <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
            <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. sec. 2904 and 2906.</p>
            <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
            <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of this system of records; and (2) DHS has determined that as a result of the suspected or confirmed breach, there is a risk of harm to individuals, harm to DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
            <p>F. To another Federal agency or Federal entity when DHS determines that information from this system of records is reasonably necessary to assist another Federal recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
            <p>G. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            <p>H. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
            <p>I. To the United States Department of Transportation, its operating administrations, or the appropriate State or local agency, when relevant or necessary to:</p>
            <p>1. Ensure safety and security in any mode of transportation;</p>
            <p>2. Enforce safety- and security-related regulations and requirements;</p>
            <p>3. Assess and distribute intelligence or law enforcement information related to transportation security;</p>
            <p>4. Assess and respond to threats to transportation;</p>
            <p>5. Oversee the implementation and ensure the adequacy of security measures at airports and other transportation facilities;</p>
            <p>6. Plan and coordinate any actions or activities that may affect transportation safety and security or the operations of transportation operators; or</p>
            <p>7. Issue, maintain, or renew a license, certificate, contract, grant, or other benefit.</p>
            <p>J. To the appropriate Federal, State, local, tribal, territorial, foreign, or international agency, regarding individuals who pose, or are suspected of posing, a risk to transportation or national security.</p>
            <p>K. To federal, state, local, tribal, territorial, foreign, or international agencies, if the information is relevant and necessary to a requesting agency's decision concerning the hiring or retention of an individual, or the issuance, grant, renewal, suspension, or revocation of a security clearance, license, contract, grant, or other benefit; or to the extent necessary to obtain information relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant or other benefit.</p>
            <p>L. To international and foreign governmental authorities in accordance with law and formal or informal international agreement.</p>
            <p>M. To third parties during the course of an investigation into any matter before DHS/TSA to the extent necessary to obtain information pertinent to the investigation.</p>
            <p>N. To airport operators, aircraft operators, and maritime and surface transportation operators, indirect air carriers, and other facility operators about individuals who are their employees, job applicants, or contractors, or persons to whom they issue identification credentials or grant clearances to secured areas in transportation facilities when relevant to such employment, application, contract, or the issuance of such credentials or clearances.</p>
            <p>O. To any agency or instrumentality charged under applicable law with the protection of the public health or safety under circumstances in which the public health or safety is at risk.</p>
            <p>P. With respect to members of the armed forces who may have violated transportation security or safety requirements and laws, to disclose the individual’s identifying information and details of their travel on the date of the incident in question to the appropriate branch of the armed forces to the extent necessary to determine whether the individual was performing official duties at the time of the incident. Members of the armed forces include active duty and reserve members, and members of the National Guard. This routine use is intended to permit TSA to determine whether the potential violation must be referred to the appropriate branch of the armed forces for action pursuant to 49 U.S.C. sec. 46301(h).</p>
            <p>Q. To the DOJ, U.S. Attorney’s Office, or other Federal agencies for further collection action on any delinquent debt when circumstances warrant.</p>
            <p>R. To a debt collection agency for the purpose of debt collection.</p>
            <p>S. To airport operators, aircraft operators, air carriers, maritime, and surface transportation operators, indirect air carriers, or other facility operators when appropriate to address a threat or potential threat to transportation security or national security, or when required for administrative purposes related to the effective and efficient administration of transportation security laws.</p>
            <p>T. To a former employee of DHS, in accordance with applicable regulations, for purposes of responding to an official inquiry by a Federal, State, or local government entity or professional licensing authority; or facilitating communications with a former employee that may be necessary for personnel-related or other official purposes where the Department requires information or consultation assistance from the former employee regarding a matter within that person’s former area of responsibility.</p>
            <p>U. To a court, magistrate, or administrative tribunal when a Federal agency is a party to the litigation or administrative proceeding in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations, or in connection with criminal law proceedings.</p>
            <p>V. To the public, on the TSA website at www.tsa.gov, final agency and Administrative Law Judge decisions in criminal enforcement and other administrative matters, except that personal information about individuals will be deleted if release of that information would constitute an unwarranted invasion of privacy, including but not limited to medical information.</p>
            <p>W. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            <p>X. To the appropriate Federal, State, local, tribal, territorial, foreign, or international agency responsible for investigating, prosecuting, enforcing, or implementing a statute, rule, regulation, order, license, or treaty, when DHS/TSA determines that the information would assist in the enforcement of a civil or criminal law.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p>DHS/TSA stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p>Retention and disposal varies depending on the type of record. Passenger, baggage, and cargo screening incident reports that are not referred for investigation are maintained for three years from the end of the fiscal year in which they were created, in accordance with NARA authority, N1-560-12-002. Security incident reports are cut off at the end of involvement and destroyed four years after cut-off (N1-560-03-6). Items that are referred for investigation within TSA or to an outside agency are destroyed 25 years after the case is closed (N1-560-03-6). Insider Threat information and inquiry records are destroyed no sooner than five years after an inquiry is opened and 25 years after a case is closed, in accordance with NARA authority DAA-GRS-2017-0006.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act, and the Judicial Redress Act if applicable, because it is a law enforcement system. However, DHS/TSA will consider individual requests to determine whether or not information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and the TSA Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief FOIA Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under FOIA.</p>
            <p>When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify your identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign his/her request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief FOIA Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
            <p>•Explain why he or she believes the Department would have information on him/her;</p>
            <p>•Identify which component(s) of the Department the individual believes may have the information about him/her;</p>
            <p>•Specify when the individual believes the records would have been created; and</p>
            <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
            <p>If an individual’s request is seeking records pertaining to another living individual, the first individual must include a statement from the second individual certifying his/her agreement for you to access his/her records.</p>
            <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p>For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p>See "Record Access Procedures."</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(j)(2), has exempted portions of this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(3), (e)(4)(G), (H), and (I); and (f). Portions of the system pertaining to investigations or prosecutions of violations of criminal law are exempt under 5 U.S.C. sec. 552a(j)(2). Further, the Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(k)(1) and (k)(2), has exempted portions of this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (H), and (I); and (f).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="history">
        <xhtmlContent>
            <p>78 FR 73868 (Dec. 9, 2013); 75 FR 28042 (May 19, 2010); 71 FR 44223 (Aug. 4, 2006).</p>
        </xhtmlContent></subsection></section>
<section id="tsa2" toc="yes">
<systemNumber>/TSA-002</systemNumber>
 <subsection type="systemName">Transportation Security Administration Transportation Security Threat Assessment System (T-STAS).
</subsection>
<subsection type="securityClassification"><xhtmlContent>
<p>Classified, Sensitive.</p>
</xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent>
<p>Records are maintained at the Transportation Security Administration (TSA) Headquarters, 601 South 12th Street, Arlington, VA 20598 and TSA field offices. Records may also be maintained at the offices of TSA contractors.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent>
<p>Individuals who undergo a security threat assessment, employment investigation, or other evaluation performed for security purposes or in order to obtain access to the following:  transportation infrastructure or assets, such as terminals, facilities, pipelines, railways, mass transit, vessels, aircraft, or vehicles; restricted airspace; passenger baggage; cargo; shipping venues; or other facilities or critical infrastructure over which  DHS exercises authority; Sensitive Security Information or Classified information provided in connection with transportation security matters; or transportation-related instruction or training (such as flight training).  This includes, but is not limited to, the following individuals:</p>
<p>(a) Individuals who require or seek access to airports, or maritime or surface transportation facilities, or facilities over which DHS exercises authority. </p>
<p>(b) Individuals who have or are seeking responsibility for screening individuals or carry-on baggage, and those persons serving as immediate supervisors and the next supervisory level to those individuals, other than employees of the DHS/TSA who perform or seek to perform these functions.</p>
<p>(c) Individuals who have or are seeking responsibility for screening checked baggage or cargo, and their immediate supervisors, and the next supervisory level to those individuals, other than employees of the DHS/TSA who perform or seek to perform these functions.</p>
<p>(d) Individuals who have or are seeking the authority to accept checked baggage for transport on behalf of an aircraft operator that is required to screen passengers.</p>
<p>(e) Pilots, copilots, flight engineers, flight navigators, and airline personnel authorized to fly in the cockpit, relief or deadheading crewmembers, cabin crew, and other flight crew for an aircraft operator or foreign air carrier that is required to adopt and carry out a security program.</p>
<p>(f) Flight crews and passengers who request waivers of temporary flight restrictions (TFR) or other restrictions pertaining to airspace.</p>
<p>(g) Other individuals who are connected to the transportation industry for whom DHS/TSA conducts security threat assessments to ensure transportation security.</p>
<p>(h) Individuals who have or are seeking unescorted access to cargo in the transportation system.</p>
<p>(i) Individuals who are owners, officers, or directors of an indirect air carrier or a business seeking to become an indirect air carrier.</p>
<p>(j) Aliens or other individuals designated by DHS/TSA who apply for flight training or recurrent training.</p>
<p>(k) Individuals transported on all-cargo aircraft, including aircraft operator or foreign air carrier employees and their family members and persons transported for the flight.</p>
<p>(l) Individuals seeking to become, or qualified as, known shippers or Certified Cargo Screening Program validators.</p>
<p>(m)   Individuals who are owners, operators, or directors of any transportation mode facilities, services, or assets.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p>DHS/TSA's system may contain any, or all, of the following information regarding individuals covered by this system:</p>
<p>(a) Name (including aliases or variations of spelling).</p>
<p>(b) Gender.</p>
<p>(c) Current and historical contact information (including, but not limited to, address information, telephone number, and e-mail).</p>
<p>(d) Government-issued licensing or identification information (including, but not limited to, Social Security number; pilot certificate information, including number and country of issuance; current and past citizenship information; immigration status; alien registration numbers; visa information; and other licensing information for modes of transportation).</p>
<p>(e) Date and place of birth.</p>
<p>(f) Name and information, including contact information and identifying number (if any) of the airport, aircraft operator, indirect air carrier, maritime or land transportation operator, or other employer or entity that is employing the individual, submitting the individual's information, or sponsoring the individual's background check/threat assessment.</p>
<p>(g) Physical description, fingerprint and/or other biometric identifier, and photograph.</p>
<p>(h) Date, place, and type of flight training or other instruction.</p>
<p>(i) Control number or other unique identification number assigned to an individual or credential.</p>
<p>(j) Information necessary to assist in tracking submissions, payments, and transmission of records.</p>
<p>(k) Results of any analysis performed for security threat assessments and adjudications.</p>
<p>(l) Other data as required by Form FD 258 (fingerprint card) or other standard fingerprint cards used by the Federal Government.</p>
<p>(m)  Information provided by individuals covered by this system in support of their application for an appeal or waiver.</p>
<p>(n) Flight information, including crew status on board.</p>
<p>(o) Travel document information (including, but not limited to, passport information, including number and country of issuance; and current and past citizenship information and immigration status, any alien registration numbers, and any visa information).</p>
<p>(p) Criminal history records.</p>
<p>(q) Data gathered from foreign governments or entities that is necessary to address security concerns in the aviation, maritime, or land transportation systems.</p>
<p>(r) Other information provided by federal, state, and local government agencies or private entities.</p>
<p>(s) The individual's level of access at an airport or other transportation facility, including termination or expiration of access.</p>
<p>(t) Military service history.</p>
<p>(u) Suitability testing and results of such testing.</p>
<p>(v) The individual’s status as a known or suspected terrorist identified in the Terrorist Screening Database (TSDB) of the Federal Bureau of Investigation’s (FBI) Terrorist Screening Center (TSC); an individual identified by DHS/TSA to the TSDB because he or she poses a threat to civil aviation or national security; and an individual in classified and unclassified governmental terrorist, law enforcement, immigration, or intelligence databases, including databases maintained by the Department of Defense, National Counterterrorism Center, or Federal Bureau of Investigation.</p>
<p>(w) The individual who has or seeks to be distinguished from individuals on a watch list through a redress process, or other means.</p>
</xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p>49 U.S.C. 114, 5103a, 40103(b)(3), 40113(a), 44903(b), 44936, 44939, and 46105.</p>
</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p>The purposes of this system are: </p>
<p>(a) Performance of security threat assessments, employment investigations, and evaluations performed for security purposes that federal statutes and/or DHS/TSA regulations authorize for the individuals identified in "Categories of individuals covered by the system," above.</p>
<p>(b) To assist in the management and tracking of the status of security threat assessments, employment investigations, and evaluations performed for security purposes.</p>
<p>(c) To permit the retrieval of the results of security threat assessments, employment investigations, and evaluations performed for security purposes; including criminal history records checks and searches in other governmental, commercial, and private data systems, performed on the individuals covered by this system.</p>
<p>(d) To permit the retrieval of information from other terrorist-related, law enforcement, immigration and intelligence databases on the individuals covered by this system.</p>
<p>(e) To track the fees incurred, and payment of those fees, by the airport operators, aircraft operators, maritime and land transportation operators, flight students, and others, when appropriate, for services related to security threat assessments, employment investigations, and evaluations performed for security purposes.</p>
<p>(f) To facilitate the performance of security threat assessments and other investigations that DHS/TSA may conduct.  </p>
<p>(g) To enable DHS to carry out DHS’s national security, law enforcement, immigration, intelligence, or other homeland security functions. </p>
</xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p>In addition to those disclosures generally permitted under 5 U.S.C. 522a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 522a(b)(3) as follows: </p>
<p>A. To the Department of Justice (DOJ), including offices of U.S. Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation or proceedings and one of the following is a party to the litigation or proceedings or has an interest in such litigation or proceedings: </p>
<p>1. DHS or any component thereof;</p>
<p>2. Any employee or former employee of DHS in his/her official capacity; </p>
<p>3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or </p>
<p>4. The United States or any agency thereof.</p>
<p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
<p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
<p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
<p>E. To appropriate agencies, entities, and persons when:</p>
<p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;</p>
<p>2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
<p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records.  Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
<p>G. To an appropriate federal, state, tribal, local, territorial, or foreign government law enforcement agency, or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
<p>H. To the U.S. Department of Transportation, its operating administrations, or the appropriate state or local agency, when relevant or necessary to:</p>
<p>1. Ensure safety and security in any mode of transportation;</p>
<p>2. Enforce safety- and security-related regulations and requirements;</p>
<p>3. Assess and distribute intelligence or law enforcement information related to transportation security;</p>
<p>4. Assess and respond to threats to transportation;</p>
<p>5. Oversee the implementation and ensure the adequacy of security measures at airports and other transportation facilities;</p>
<p>6. Plan and coordinate any actions or activities that may affect transportation safety and security or the operations of transportation operators; or</p>
<p>7. Issue, maintain, or renew a license, endorsement, certificate, contract, grant, or other benefit.</p>
<p>I. To an appropriate federal, state, local, tribal, territorial, or foreign agency regarding individuals who pose, or are suspected of posing, a risk to transportation or national security.</p>
<p>J. To a federal, state, local, tribal, territorial, or foreign agency, when such agency has requested information relevant to or necessary for the hiring or retention of an individual; or the issuance of a security clearance, license, endorsement, contract, grant, waiver, credential, or other benefit.</p>
<p>K. To a federal, state, local, tribal, territorial, or foreign agency, if necessary to obtain information relevant to a DHS/TSA decision concerning the initial or recurrent security threat assessment; the hiring or retention of an employee; the issuance of a security clearance, license, endorsement, contract, grant, waiver, credential, or other benefit; and to facilitate any associated payment and accounting.</p>
<p>L. To foreign governmental and international authorities, in accordance with law and formal or informal international agreement.</p>
<p>M. To third parties during the course of a security threat assessment, employment investigation, or adjudication of a waiver or appeal request, to the extent necessary to obtain information pertinent to the assessment, investigation, or adjudication.</p>
<p>N. To airport operators, aircraft operators, maritime and surface transportation operators, indirect air carriers, and other facility operators about individuals who are their employees, job applicants or contractors, or persons to whom they issue identification credentials or grant clearances to secured areas in transportation facilities when relevant to such employment, application, contract, training, or the issuance of such credentials or clearances.  </p>
<p>O. To a former employee of DHS, in accordance with applicable regulations, for purposes of responding to an official inquiry by a federal, state, or local government entity or professional licensing authority; or facilitating communications with a former employee that may be necessary for personnel-related or other official purposes when the Department requires information or consultation assistance from the former employee regarding a matter within that person's former area of responsibility. </p>
<p>P. To a court, magistrate, or administrative tribunal when a federal agency is a party to the litigation or administrative proceeding in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection with criminal law proceedings.</p>
<p>Q. To the appropriate federal, state, local, tribal, territorial, foreign, or international agency responsible for investigating, prosecuting, enforcing, or implementing a statute, rule, regulation, order, license, or treaty, when DHS/TSA determines that the information would assist in the enforcement of civil or criminal laws.  </p>
<p>R. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers, employees or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy. </p>
<p>Disclosure to consumer reporting agencies:</p>
<p>None.</p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>Storage:</p>
<p>DHS/TSA stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door.  The records may be stored on magnetic disc, tape or digital media.    </p>
</xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p>DHS/TSA may retrieve records by name, Social Security number, identifying number of the submitting or sponsoring entity, other case number assigned by DHS/TSA or other entity/agency, biometric, or a unique identification number, or any other identifying particular assigned or belonging to the individual.</p>
</xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p>DHS/TSA safeguards records in this system in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies.  Strict controls have been imposed to minimize the risk of compromising the information that is being stored.  DHS/TSA limits access to the computer system containing the records in this system to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
</xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p>In accordance with National Archives and Records Administration approved retention and disposal policy N1-560-06, for individuals who were not identified as possible security threat, records will be destroyed one year after DHS/TSA is notified that access based on security threat assessment is no longer valid; when an individual was identified as a possible security threat and subsequently cleared, records will be destroyed seven years after completion of the security threat assessment or one year after being notified that access based on the security threat assessment is no longer valid, whichever is longer; and when the individual is an actual match to a watchlist, records will be destroyed 99 years after the security threat assessment or seven years after DHS/TSA is notified the individual is deceased, whichever is shorter.</p>
</xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent>
<p>Assistant Director for Compliance, Office of Intelligence &amp;amp;amp;amp;amp;amp; Analysis, TSA-10, Transportation Security Administration, 601 South 12th Street, Arlington, VA 20598.</p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act because it is a law enforcement system.  However, DHS/TSA will consider individual requests to determine whether or not information may be released.  Thus, individuals seeking notification and access to any record contained in the system of records, or seeking to contest its content, may submit a request in writing to the DHS/TSA’s FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts."  If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive, S.W., Building 410, STOP-0655, Washington, DC 20528.  </p>
<p>When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR Part 5.  You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth.  You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization.  While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov, or by calling 1-866-431-0486.  In addition, you should:</p>
<p>• Explain why you believe the Department would have information on you;</p>
<p>• Identify which component(s) of the Department you believe may have the information about you;</p>
<p>• Specify when you believe the records would have been created;</p>
<p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records; and </p>
<p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
<p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
</xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p>See "Notification Procedure" above. </p>
</xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p>See "Notification Procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p>Records are obtained from individuals subject to a security threat assessment, employment investigation, or other security analysis; from aviation, maritime, and land transportation operators, flight schools, or other persons sponsoring the individual; and any other persons, including commercial entities that may have information that is relevant or necessary to the assessment or investigation.  Information about individuals is also used or collected from domestic and international intelligence sources and other governmental, private, and public databases.  The sources of information in the criminal history records obtained from the Federal Bureau of Investigation are set forth in the Privacy Act system of records notice Department of Justice Federal Bureau of Investigation – 009 Fingerprint Identification Records System (64 FR 52347, September 28, 1999).</p>
</xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent>
<p>The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(1) and (k)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f).  When a record received from another system has been exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.

</p></xhtmlContent></subsection></section>
<section id="tsa3" toc="yes">
<systemNumber>/TSA-003</systemNumber>
<subsection type="systemName">Employee Transportation Facilitation Records
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified, sensitive.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained in the Office of Real Estate Services, TSA Headquarters in Arlington, Virginia; at various
TSA field offices, the DOT Headquarters Parking and Transit Office in Washington, DC; and at a digital safe site managed
by a government contractor.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Applicants or holders of parking permits, members of carpools and vanpools, applicants for ridesharing
information, applicants or recipients of transit benefits, applicants or recipients of parking subsidies issued under the
Parking Information Payment System (PIPS).
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Records of holders of parking permits; records of carpool and vanpool members; records and reports of the status
of rideshare applications; applications and certifications of fare subsidy recipients; records and reports of
disbursements to fare subsidy recipients; information collected related to the payment of parking subsidies; records and
reports of disbursements to parking subsidy recipients; information necessary to establish direct debit payment when
appropriate. These records may include an individual’s name, title, social security number, duty station, commuter costs,
method of commute, subsidy amount, bank account information, and the identities of other carpool members.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; 49 U.S.C. 114; E.O. 13150; E.O. 9397.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>Records are maintained to facilitate management of parking resources, transportation resources and subsidy
benefits, to create and enlarge carpools and vanpools, to ensure employee eligibility for any benefits received, to
contact employees regarding matters related to these programs, and to prevent the misuse of government resources.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>(1) To contractors, grantees, experts, consultants, or other like persons when necessary to perform a function or
service related to this system of records for which they have been engaged. Such recipients are required to comply with
the Privacy Act, 5 U.S.C. 552a, as amended.
</p><p>(2) To transportation facility operators when necessary to perform a function or service related to this system of
records or to determine program eligibility.
</p><p>(3) To the Department of Transportation (DOT) or other Federal, State, local, tribal, or territorial agencies when
necessary to perform a function or service related to this system of records or to determine program eligibility, which
may involve the use of an authorized computer matching program.
</p><p>(4) To the appropriate Federal, State, local, tribal, territorial, foreign, or international agency responsible for
investigating, prosecuting, enforcing, or implementing a statute, rule, regulation, or order, where TSA becomes aware of
an indication of a violation or potential violation of civil or criminal law or regulation.
</p><p>(5) To the Department of Justice (DOJ) or other Federal agency in the review, settlement, defense, and prosecution of
claims, complaints, and lawsuits involving matters over which TSA exercises jurisdiction or when conducting litigation or
in proceedings before any court, adjudicative or administrative body, when: (a) TSA, or (b) any employee of TSA in
his/her official capacity, or (c) any employee of TSA in his/her individual capacity where DOJ or TSA has agreed to
represent the employee, or (d) the United States or any agency thereof, is a party to the litigation or has an interest
in such litigation, and TSA determines that the records are both relevant and necessary to the litigation and the use of
such records is compatible with the purpose for which TSA collected the records.
</p><p>(6) To a congressional office from the record of an individual in response to an inquiry from that congressional
office made at the request of the individual.
</p><p>(7) To the National Archives and Records Administration or other appropriate Federal agency in records management
inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>(8) To other Federal employees or persons voluntarily participating in ridesharing programs only to the extent
necessary for the operation of these programs.
</p><p>(9) To the Department of Justice, United States Attorney’s Office, or other Federal agencies for further collection
action on any delinquent debt when circumstances warrant, or to a debt collection agency for the purpose of debt
collection.
</p><p>Disclosures to consumer reporting agencies:
</p><p>Pursuant to 5 U.S.C. 552a(b)(12), disclosures may be made from this system to consumer reporting agencies
collecting on behalf of the United States Government.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records are stored in hard copy or in electronic format on a system database.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records are retrieved by name, address, social security number, permit number, or other assigned identifier of
the individual on whom the records are maintained.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Except for carpool listings, access is accorded only to parking and fare subsidy management offices. Printouts of
carpool listings contain only name, agency, and work telephone number. Information in this system is safeguarded in
accordance with applicable laws, rules and policies. All records are protected from unauthorized access through
appropriate administrative, physical, and technical safeguards. Control measures are enforced to ensure that access to
sensitive information in these records, such as Social Security Numbers, is based on a "need to know."
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records in this system will be retained in accordance with a schedule to be approved by the National Archives and
Records Administration.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Transportation Benefits Coordinator, Office of Real Estate Services, TSA Headquarters, TSA-17, 601 South
12th Street, Arlington, VA 22202-4220.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>To determine whether this system contains records relating to you, write to the System Manager identified above.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Same as "Notification Procedure,"  above. Provide your full name and a description of information that you seek,
including the time frame during which the record(s) may have been generated. Individuals requesting access must comply
with the Department of Homeland Security Privacy Act regulations on verification of identity (6 CFR 5.21(d)).
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Same as "Notification procedure"  and "Record access procedure,"  above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information contained in this system is obtained from employees participating in parking, ridesharing, and
transit benefits programs, from notifications from other Federal agencies in the program, and from periodic
certifications and reports regarding fare subsidies.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="tsa4" toc="yes">
<systemNumber>/TSA-004</systemNumber>
<subsection type="systemName">Personnel Background Investigation File System
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Classified, Sensitive.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the offices of the Transportation Security Administration Headquarters located in
Arlington, Virginia. Some records may also be maintained at the offices of a TSA contractor or in TSA field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Current and former TSA employees, applicants for TSA employment, and TSA contract employees.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>The system contains an index reference record used to track the status of an applicant’s background
investigation, Standard Form 85P--" Questionnaire For Public Trust Positions,"  investigative summaries and
compilations of criminal history record checks, and administrative records and correspondence incidental to the
background investigation process.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 3301, 3302; 49 U.S.C. 114, 44935; 5 CFR Parts 731, 732, and 736; and Executive Orders 10450, 10577, and
12968.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The system will maintain investigative and background records used to make suitability and eligibility
determinations for the individuals listed under "Categories of individuals."
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>(1) To the United States Department of Transportation, its operating administrations, or the appropriate state or
local agency when relevant or necessary to (a) ensure safety and security in any mode of transportation; (b) enforce
safety- and security-related regulations and requirements; (c) assess and distribute intelligence or law enforcement
information related to transportation security; (d) assess and respond to threats to transportation; (e) oversee the
implementation and ensure the adequacy of security measures at airports and other transportation facilities; (f) plan and
coordinate any actions or activities that may affect transportation safety and security or the operations of
transportation operators; or (g) the issuance, maintenance, or renewal of a license, certificate, contract, grant, or
other benefit.
</p><p>(2) Except as noted in Question 14 of the Questionnaire for Public Trust Positions, to the appropriate Federal, State,
local, tribal, territorial, foreign, or international agency responsible for investigating, prosecuting, enforcing, or
implementing a statute, rule, regulation, or order, where TSA becomes aware of an indication of a violation or potential
violation of civil or criminal law or regulation.
</p><p>(3) To the appropriate Federal, State, local, tribal, territorial, foreign, or international agency regarding
individuals who pose or are suspected of posing a risk to transportation or national security.
</p><p>(4) To contractors, grantees, experts, consultants, or other like persons when necessary to perform a function or
service related to this record for which they have been engaged. Such recipients shall be required to comply with the
Privacy Act, 5 U.S.C. 552a, as amended.
</p><p>(5) To a Federal, State, local, tribal, territorial, foreign, or international agency, where such agency has requested
information relevant or necessary for the hiring or retention of an individual, or the issuance of a security clearance,
license, contract, grant, or other benefit.
</p><p>(6) To a Federal, State, local, tribal, territorial, foreign, or international agency, if necessary to obtain
information relevant to a TSA decision concerning the hiring or retention of an employee, the issuance of a security
clearance, license, contract, grant, or other benefit.
</p><p>(7) To international and foreign governmental authorities in accordance with law and formal or informal international
agreement.
</p><p>(8) To third parties during the course of an investigation into violations or potential violations of transportation
security laws to the extent necessary to obtain information pertinent to the investigation.
</p><p>(9) To airport operators, aircraft operators, and maritime and land transportation operators about individuals who are
their employees, job applicants, or contractors, or persons to whom they issue identification credentials or grant
clearances to secured areas in transportation facilities when relevant to such employment, application, contract, or the
issuance of such credentials or clearances.
</p><p>(10) To the Department of Justice (DOJ) or other Federal agency in the review, settlement, defense, and prosecution of
claims, complaints, and lawsuits involving matters over which TSA exercises jurisdiction or when conducting litigation or
in proceedings before any court, adjudicative or administrative body, when: (a) TSA, or (b) any employee of TSA in
his/her official capacity, or (c) any employee of TSA in his/her individual capacity where DOJ or TSA has agreed to
represent the employee, or (d) the United States or any agency thereof, is a party to the litigation or has an interest
in such litigation, and TSA determines that the records are both relevant and necessary to the litigation and the use of
such records is compatible with the purpose for which TSA collected the records.
</p><p>(11) To a congressional office from the record of an individual in response to an inquiry from that congressional
office made at the request of the individual.
</p><p>(12) To the National Archives and Records Administration or other appropriate Federal agency in records management
inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records are maintained on paper and in computer-accessible storage media. Records are also stored on microfiche
and roll microfilm.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records are retrieved by name, address, and social security account number or other assigned tracking identifier
of the individual on whom the records are maintained.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Access to TSA working and storage areas is restricted to employees on a "need to know"  basis. Strict control
measures are enforced to ensure that access to these records is also based on "need to know."  Generally, TSA file areas
are locked after normal duty hours and the facilities are protected from the outside by security personnel.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Paper records and information stored on electronic storage are destroyed upon notification of death or not later
than 5 years after separation or transfer of employee or no later than 5 years after contract relationship expires,
whichever is applicable.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Director of Transportation Credentialing, TSA Headquarters, TSA-19, 601 South 12th Street, Arlington, VA
22202-4220.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>To determine whether this system contains records relating to you, write to the System Manager identified above.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Same as "Notification Procedure"  above. Provide your full name and a description of information that you seek,
including the time frame during which the record(s) may have been generated. Individuals requesting access must comply
with the Department of Homeland Security Privacy Act regulations on verification of identity (6 CFR 5.21(d)).
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Same as "Notification procedure"  and "Record access procedure,"  above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information contained in this system is obtained from the job applicant on the Questionnaire For Public Trust
Positions, law enforcement and intelligence agency record systems, publicly available government records and commercial
databases.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>Portions of this system are exempt under 5 U.S.C. 552a(k)(1) and (k)(5).
</p></xhtmlContent></subsection></section>
<section id="tsa5" toc="yes">
<systemNumber>/TSA-005</systemNumber>
<subsection type="systemName">Internal Investigation Record System (IIRS)
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Classified, sensitive.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained in the Office of the Assistant Administrator for Internal Affairs and Program Review and
the Office of the Assistant Administrator for Human Resources, Transportation Security Administration (TSA) Headquarters
in Arlington, Virginia. Records may also be maintained at TSA’s Office of Chief Counsel, the Office of the Assistant
Administrator for Aviation Operations, or at various TSA field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>(a) Current and former TSA employees and current and former consultants, contractors, and subcontractors with
whom the agency has done business, and their employees; (b) Witnesses, complainants, and other individuals who have been
identified as relevant to the investigation; (c) Individuals who have been identified as relevant to investigations of
security-related incidents or reviews of TSA programs and operations.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>(a) Information relating to investigations conducted by TSA regarding or relevant to covered individuals,
including but not limited to identifying information of relevant parties (e.g., subject, complainants, witnesses);
correspondence; memoranda (including legal opinions or advice provided by agency counsel); statements and other
information provided by investigation subjects, complainants, witnesses, or others; details of security-related incidents
or alleged criminal, civil, or administrative misconduct, or that are indicative of such misconduct; and records
concerning an individual’s employment status or conduct while employed by TSA. "Investigation"  may include action that
is taken in response to complaints or inquiries regarding covered individuals.
</p><p>(b) Files and reports pertaining to investigations prepared by the Office of Internal Affairs and Program Review or
other TSA offices, to include all related material such as exhibits, statements, affidavits, records obtained during the
course of the investigation (including those obtained from other sources, such as Federal, State, local, international,
or foreign investigatory or law enforcement agencies and other government agencies), and records involving the
disposition of the investigation and any resulting agency action (e.g., criminal prosecutions, civil proceedings,
administrative action).
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>49 U.S.C. 114.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>(a) To facilitate and assist in the management, tracking, and retrieval of investigations of allegations or
appearances of misconduct (and related incidents) of current or former TSA employees or contractors and investigations of
security-related incidents or reviews of TSA programs and operations.
</p><p>(b) To promote economy, efficiency, and effectiveness of the Internal Investigation system, to conduct and supervise
investigations covered by this system, and to detect fraud and abuse in the investigations program.
</p><p>(c) To provide support for any adverse action or counseling that may occur as a result of the findings of the
investigation.
</p><p>(d) To monitor case assignment, disposition, status, and results of investigations.
</p><p>(e) To permit the retrieval of investigation results performed on the individuals covered in this system.
</p><p>(f) To take action on or respond to a complaint or inquiry concerning a TSA employee or contractor.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>(1) To the United States Department of Transportation, its operating administrations, or the appropriate state or
local agency when relevant or necessary to (a) ensure safety and security in any mode of transportation; (b) enforce
safety- and security-related regulations and requirements; (c) assess and distribute intelligence or law enforcement
information related to transportation security; (d) assess and respond to threats to transportation; (e) oversee the
implementation and ensure the adequacy of security measures at airports and other transportation facilities; (f) plan and
coordinate any actions or activities that may affect transportation safety and security or the operations of
transportation operators; or (g) the issuance, maintenance, or renewal of a license, certificate, contract, grant, or
other benefit.
</p><p>(2) To the appropriate Federal, State, local, tribal, territorial, foreign, or international agency responsible for
investigating, prosecuting, enforcing, or implementing a statute, rule, regulation, or order, where TSA becomes aware of
an indication of a violation or potential violation of civil or criminal law or regulation.
</p><p>(3) To the appropriate Federal, State, local, tribal, territorial, foreign, or international agency regarding
individuals who pose or are suspected of posing a risk to transportation or national security.
</p><p>(4) To contractors, grantees, experts, consultants, or other like persons when necessary to perform a function or
service related to this system of records for which they have been engaged. Such recipients are required to comply with
the Privacy Act, 5 U.S.C. 552a, as amended.
</p><p>(5) To a Federal, State, local, tribal, territorial, foreign, or international agency, where such agency has requested
information relevant or necessary for the hiring or retention of an individual, or the issuance of a security clearance,
license, contract, grant, or other benefit.
</p><p>(6) To a Federal, State, local, tribal, territorial, foreign, or international agency, if necessary to obtain
information relevant to a TSA decision concerning the hiring or retention of an employee, the issuance of a security
clearance, license, contract, grant, or other benefit.
</p><p>(7) To international and foreign governmental authorities in accordance with law and formal or informal international
agreement.
</p><p>(8) To third parties during the course of an investigation into violations or potential violations of transportation
security laws to the extent necessary to obtain information pertinent to the investigation.
</p><p>(9) To airport operators, aircraft operators, and maritime and land transportation operators about individuals who are
their employees, job applicants, or contractors, or persons to whom they issue identification credentials or grant
clearances to secured areas in transportation facilities when relevant to such employment, application, contract, or the
issuance of such credentials or clearances.
</p><p>(10) To the Department of Justice (DOJ) or other Federal agency in the review, settlement, defense, and prosecution of
claims, complaints, and lawsuits involving matters over which TSA exercises jurisdiction or when conducting litigation or
in proceedings before any court, adjudicative or administrative body, when: (a) TSA, or (b) any employee of TSA in
his/her official capacity, or (c) any employee of TSA in his/her individual capacity where DOJ or TSA has agreed to
represent the employee, or (d) the United States or any agency thereof, is a party to the litigation or has an interest
in such litigation, and TSA determines that the records are both relevant and necessary to the litigation and the use of
such records is compatible with the purpose for which TSA collected the records.
</p><p>(11) To a congressional office from the record of an individual in response to an inquiry from that congressional
office made at the request of the individual.
</p><p>(12) To the National Archives and Records Administration or other appropriate Federal agency in records management
inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>(13) To complainants to the extent necessary to provide such persons with relevant information and explanations
concerning the progress and/or results of the investigation or case arising from the matters about which they complained.
</p><p>(14) To professional organizations or associations with which individuals covered by this system of records may be
affiliated, such as law enforcement disciplinary authorities, to meet those organizations’ responsibilities in connection
with the administration and maintenance of standards of conduct and discipline.
</p><p>(15) To airport operators, aircraft operators, and/or maritime and land transportation operators when appropriate to
address a threat or potential threat to transportation security, or when required for administrative purposes related to
the effective and efficient administration of transportation security laws.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>In electronic storage media and hard copy.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by name, unique numbers assigned to the matter, or other assigned tracking identifier of
the individual on whom the records are maintained.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Information in this system is safeguarded in accordance with applicable laws, rules and policies. All records are
protected from unauthorized access through appropriate administrative, physical, and technical safeguards. These
safeguards include restricting access to those authorized with a need to know and using locked cabinets, alarms, and
passwords. TSA file areas are locked after normal duty hours and the facilities are protected from the outside by
security personnel.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>National Archives and Records Administration approval is pending for the records in this system. The request
states that paper records and information stored on electronic storage media are maintained within the Office of Internal
Affairs and Program Review for 3 years and then forwarded to the Federal Records Center. Records are destroyed after 15
years. The disposition period for records maintained in other offices is still under consideration.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Management Analyst, Office of Internal Affairs and Program Review, TSA Headquarters, TSA-13, 601 South 12th
Street, Arlington, VA 22202-4220.
</p><p>Deputy Assistant Administrator for Operations, TSA Office of Human Resources, TSA Headquarters, TSA-21, 601
South 12th Street, Arlington, VA 22202-4220.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>To determine whether this system contains records relating to you, write to the System Managers identified above.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Same as "Notification Procedure"  above. Provide your full name and a description of information that you seek,
including the time frame during which the records(s) may have been generated and, if applicable the airport to which the
covered individual was assigned at the time of the conduct or incident under investigation. Individuals requesting access
must comply with the Department of Homeland Security’s Privacy Act regulations on verification of identity (6 CFR
5.21(d)).
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Same a "Notification procedure"  and "Record access procedure,"  above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information maintained in this system is primarily obtained from individuals associated with TSA investigations
including investigations of alleged misconduct of TSA employees or contractors and investigations of security-related
incidents or reviews of TSA programs and operations. "Individuals"  include TSA employees or contractors, witnesses to
the alleged violation or events surrounding the alleged misconduct or other third parties who provided information
regarding the alleged misconduct and passengers or others relevant to security-related incidents or reviews of TSA
programs and operations. Information may also be collected from documents such as incident reports and audit reports, and
from other sources, such as law enforcement, financial institutions, employers, state and local agencies, and other
Federal agencies.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>Portions of this system are exempt under 5 U.S.C. 552a(j)(2), (k)(1), and (k)(2).
</p></xhtmlContent></subsection></section>
<section id="tsa6" toc="yes">
<systemNumber>/TSA-006</systemNumber>
<subsection type="systemName">Correspondence and Matters Tracking Records (CMTR).
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Sensitive, Classified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the TSA Office of the Executive Secretariat, TSA Headquarters in Arlington, Virginia.
Records may also be located at the Office of Legislative Affairs, Office of Civil Rights and Liberties, Redress Office,
and the Office of the Ombudsman (which includes the Consumer Response Center (CRC)), to the extent those offices maintain
matter tracking information. Records may also be maintained in other offices at TSA Headquarters and the various TSA
field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>To the extent not covered by any other system, this system covers individuals who submit inquiries, comments,
complaints, or claims to TSA in writing, in person, or by telephone, for response and resolution and those with any
matter pending before TSA. This includes TSA employees, Members of Congress and their staff, officers and employees of
other Executive branch agencies and the White House, tort and property claimants who have filed claims against the
Government or TSA, stakeholders, passengers in transportation, and members of the public.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Correspondence and information related thereto, including name, address, and telephone number of individuals
contacting TSA; records of contacts made by or on behalf of individuals, including inquiries, comments, complaints,
resumes and letters of reference; staff reports; TSA’s responses to correspondence and calls; and staff recommendations
on actions requiring approval or action by a TSA official. The system also includes records, including those prepared by
TSA employees, related to matters under consideration by TSA.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301, 28 U.S.C. 1346(b), 1402(b), 2401(b), 2412(c), 2671-80; 31 U.S.C. 3325, 3332, 3701, 3711,
3721; 49 U.S.C. 114.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>(a) To facilitate and assist in the management, tracking, retrieval, and response to incoming correspondence,
inquiries, claims, and complaints associated with all subject matters over which TSA exercises jurisdiction.
</p><p>(b) To monitor assignment, disposition, status, and results of correspondence, inquiries, claims, and complaints sent
to TSA and, generally, to review, analyze, investigate, and study trends identified by the concerns expressed.
</p><p>(c) To facilitate and assist in the management, tracking, and retrieval of information associated with matters and
issues under consideration by TSA.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>A. To the Department of Justice (DOJ) (including United States Attorney offices) or other federal agency in
anticipation of or conducting litigation or in proceedings before any court, adjudicative or administrative body, when it
is necessary to the litigation and one of the following is a party to the litigation or has an interest in such
litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any current or former employee of DHS in his/her official capacity, or
</p><p>3. Any current or former employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the
employee, or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS when necessary to perform an agency function related
to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act
requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate federal, state, tribal, local, international, or foreign agency, including law enforcement, or
other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law,
rule, regulation, or order, where a record, either on its face or in conjunction with other information, indicates a
violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is
proper and consistent with the official duties of the person making the disclosure.
</p><p>H. To the United States Department of Transportation and its operating administrations when relevant or necessary to
</p><p>1. Ensure safety and security in any mode of transportation;
</p><p>2. Enforce safety- and security-related regulations and requirements;
</p><p>3. Assess and distribute intelligence or law enforcement information related to transportation security;
</p><p>4. Assess and respond to threats to transportation;
</p><p>5. Oversee the implementation and ensure the adequacy of security measures at airports and other transportation
facilities;
</p><p>6. Plan and coordinate any actions or activities that may affect transportation safety and security or the operations
of transportation operators; or
</p><p>7. The issuance, maintenance, or renewal of a license, certificate, contract, grant, or other benefit.
</p><p>I. To a federal, state, local, tribal, territorial, foreign, or international agency, in response to queries regarding
persons who may pose a risk to transportation or national security; a risk of air piracy or terrorism or a threat to
airline or passenger safety; or a threat to aviation safety, civil aviation, or national security.
</p><p>J. To a federal, state, local, tribal, territorial, foreign, or international agency, where such agency has requested
information relevant or necessary for the hiring or retention of an individual, or the issuance of a security clearance,
license, contract, grant, or other benefit.
</p><p>K. To a federal, state, local, tribal, territorial, foreign, or international agency, if necessary to obtain
information relevant to a DHS/TSA decision concerning initial or recurrent security threat assessment, the hiring or
retention of an employee; the issuance of a security clearance, license, endorsement, contract, grant, waiver,
credential, or other benefit and to facilitate any associated payment and accounting.
</p><p>L. To international and foreign governmental authorities in accordance with law and formal or informal international
agreement.
</p><p>M. To third parties during the course of an investigation into any matter before DHS/TSA to the extent necessary to
obtain information pertinent to the investigation.
</p><p>N. To airport operators, aircraft operators, and maritime and surface transportation operators, indirect air carriers,
and other facility operators about individuals who are their employees, job applicants, or contractors, or persons to
whom they issue identification credentials or grant clearances to secured areas in transportation facilities when
relevant to such employment, application, contract, or the issuance of such credentials or clearances.
</p><p>O. To a debt collection agency for the purpose of debt collection.
</p><p>P. To a former employee of DHS, in accordance with applicable regulations, for purposes of responding to an official
inquiry by a federal, state or local government entity or professional licensing authority; or facilitating
communications with a former employee that may be necessary for personnel-related or other official purposes where the
Department requires information or consultation assistance from the former employee regarding a matter within that
person’s former area of responsibility.
</p><p>Q. To a court, magistrate, or administrative tribunal where a federal agency is a party to the litigation or
administrative proceeding in the course of presenting evidence, including disclosures to opposing counsel or witnesses in
the course of civil discovery, litigation or settlement negotiations or in connection with criminal law proceedings.
</p><p>R. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel,
where there exists a legitimate public interest in the disclosure of the information except to the extent it is
determined that release of the specific information in the context of a particular case would constitute an unwarranted
invasion of personal privacy or a risk to transportation or national security.
</p><p>Disclosure to consumer reporting agencies:
</p><p>Privacy Act information may be reported to consumer reporting agencies pursuant to 5 U.S.C. 552a(b)(12) for the
purpose of collecting a debt on behalf of the United States Government.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records may be maintained on paper, audio, and video recordings, and in computer accessible storage media.
Records may also be stored on microfiche and roll microfilm. Records that are sensitive or classified are safeguarded in
accordance with agency procedures and applicable Executive Orders and statutes.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records are retrieved by name, Social security number or other assigned identifier of an individual covered by
this system.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Information in this system is safeguarded in accordance with applicable laws, rules and policies. All records are
protected from unauthorized access through appropriate administrative, physical, and technical safeguards. These
safeguards include restricting access to authorized personnel who have a need-to-know and password protection
identification features. TSA file areas are locked after normal duty hours and the facilities are protected from the
outside by security personnel.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>In accordance with NARA approved records schedule, N1-560-03-4, Contact Center and Ombudsman
inquiries are destroyed after three years; correspondence files including Congressional correspondence are retained
permanently; redress records are retained for seven years for individuals who were cleared as possible matches, and 99
years for individual who were actual matches.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Director, Office of the Executive Secretariat, TSA Headquarters, 601 S. 12th Street, Arlington, VA 20598.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment
procedures of the Privacy Act because it is a law enforcement system as reflected in the final rule published on June 25,
2004 (69 FR 35536). However, TSA will consider individual requests to determine whether or not information may be
released. This, individuals seeking notification of and access to any record contained in this system of records, or
seeking to contest its content, may submit a request in writing to the Headquarters or component’s FOIA Officer, whose
contact information can be found at <i>http://www.dhs.gov/foia</i> under "contacts." TSA’s FOIA office may be
reached by mail at Transportation Security Administration, TSA-20, FOIA Office, 601 S. 12th Street, Arlington, VA
20598. If an individual believes more than one component maintains Privacy Act records concerning him/her the individual
may submit the request to the Chief Privacy Officer, Department of Homeland Security, 245 Murray Drive, SW., Building
410, STOP-0655, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system or records you
request must conform with the privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity,
meaning that you must provide your full name, current address and data and place of birth. You must sign your request,
and your signature must be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under
penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this
purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Identify which component(s) of the Department you believe may have the information about you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records,
</p><p>• If your request is seeking records pertaining to other living individual, you must include a statement
from the individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Same as "Notification Procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Same as "Notification Procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are obtained from calls and correspondence from or on behalf of individuals who contact TSA with
inquiries, comments, complaints, or claims, as well as from TSA employees or contractors and witnesses, and other third
parties who provide pertinent information where applicable. Information may also be collected from documents such as
records of the contact made with TSA, incident reports, and from other sources, such as employers, state and local
agencies, other federal agencies, and related material for background as appropriate.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>Portions of this system are exempt under 5 &amp;amp;amp;amp;amp;#167;&amp;amp;amp;amp;amp;#167; 552a(k)(1) and (k)(2) as reflected in the final rule
published on June 25, 2004 (69 FR 35536).
</p></xhtmlContent></subsection></section>
<section id="tsa7" toc="yes">
<systemNumber>/TSA-007</systemNumber>
<subsection type="systemName">Freedom of Information Act and Privacy Act Record System.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Classified, sensitive.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>This system of records is located in the Freedom of Information Act Office, Office of Law Enforcement and
Security Liaison, Transportation Security Administration (TSA) Headquarters in Arlington, Virginia. Records will also be
maintained at various TSA field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>All individuals who submit Freedom of Information Act (FOIA) and Privacy Act (PA) requests to TSA; individuals
whose requests and/or records have been referred to TSA by other agencies; and in some instances, attorneys or other
persons representing individuals submitting such requests and appeals, individuals who are the subjects of such requests,
and/or TSA personnel assigned to handle such requests or appeals.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Records received, created, or compiled in response to FOIA/PA requests or appeals, including: The original
requests and administrative appeals; intra- or inter-agency memoranda, correspondence, notes and other documentation
related to the processing of the FOIA/PA request; correspondence with the individuals or entities that submitted the
requested records, including when those records might contain confidential business information or personal information;
and copies of the requested records. Types of information in the records may include: requesters’ and their attorneys’ or
representatives’ names, addresses, telephone numbers, and TSA FOIA case numbers; names, office telephone numbers, and
office routing symbols of TSA employees; and names, telephone numbers, and addresses of the submitter of the information
requested.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; 5 U.S.C. 552; 5 U.S.C. 552a; 44 U.S.C. 3101.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The system is maintained for the purpose of processing access requests and administrative appeals under the FOIA
and access and amendment requests and appeals under the PA; for the purpose of participating in litigation arising from
such requests and appeals; and for the purpose of assisting TSA in carrying out any other responsibilities under the FOIA
or the PA.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>(1) To the United States Department of Transportation and its operating administrations when relevant or
necessary to (a) ensure safety and security in any mode of transportation; (b) enforce safety- and security-related
regulations and requirements; (c) assess and distribute intelligence or law enforcement information related to
transportation security; (d) assess and respond to threats to transportation; (e) oversee the implementation and ensure
the adequacy of security measures at airports and other transportation facilities; (f) plan and coordinate any actions or
activities that may affect transportation safety and security or the operations of transportation operators; or (g) the
issuance, maintenance, or renewal of a license, certificate, contract, grant, or other benefit.
</p><p>(2) To the appropriate Federal, State, local, tribal, territorial, foreign, or international agency responsible for
investigating, prosecuting, enforcing, or implementing a statute, rule, regulation, or order, where TSA becomes aware of
an indication of a violation or potential violation of civil or criminal law or regulation.
</p><p>(3) To contractors, grantees, experts, consultants, or volunteers when necessary to perform a function or service
related to this system of records for which they have been engaged. Such recipients are required to comply with the
Privacy Act, 5 U.S.C. 552a, as amended.
</p><p>(4) To a Federal, State, local, tribal, territorial, foreign, or international agency, in response to queries
regarding persons who may pose a risk to transportation or national security; a risk of air piracy or terrorism or a
threat to airline or passenger safety; or a threat to aviation safety, civil aviation, or national security.
</p><p>(5) To the Department of State and other Intelligence Community agencies to further the mission of those agencies
relating to persons who may pose a risk to transportation or national security; a risk of air piracy or terrorism or a
threat to airline or passenger safety; a threat to aviation safety, civil aviation, or national security.
</p><p>(6) To a Federal, State, territorial, tribal, local, international, or foreign agency or entity for the purpose of
consulting with that agency or entity to assist TSA to make a determination regarding access to or amendment of
information, or for the purpose of verifying the identity of an individual or the accuracy of information submitted by an
individual who has requested access to or amendment of information.
</p><p>(7) To a Federal agency or entity that furnished the record or information for the purpose of permitting that agency
or entity to make a decision regarding access to or correction of the record or information, or to a federal agency or
entity for purposes of providing guidance or advice regarding the handling of particular requests.
</p><p>(8) To the Department of Justice (DOJ) in review, settlement, defense, and prosecution of claims, complaints, and law
suits involving matters over which TSA exercises jurisdiction.
</p><p>(9) To the DOJ or other Federal agency conducting litigation or in proceedings before any court, adjudicative or
administrative body, when: (a) TSA, or (b) any employee of TSA in his/her official capacity, or (c) any employee of TSA
in his/her individual capacity where DOJ or TSA has agreed to represent the employee, or (d) the United States or any
agency thereof, is a party to the litigation or has an interest in such litigation, and TSA determines that the records
are both relevant and necessary to the litigation and the use of such records is compatible with the purpose for which
TSA collected the records.
</p><p>(10) To a congressional office from the record of an individual in response to an inquiry from that congressional
office made at the request of the individual.
</p><p>(11) To the General Services Administration and the National Archives and Records Administration in records management
inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>(12) To the DOJ, United States Attorney’s Office, or other federal agencies for further collection action on any
delinquent debt when circumstances warrant.
</p><p>(13) To a debt collection agency for the purpose of debt collection.
</p><p>(14) To the submitter or subject of a record or information to assist TSA in making a determination as to access or
amendment.
</p><p>Disclosure to consumer reporting agencies:
</p><p>Privacy Act information may be reported to consumer reporting agencies pursuant to 5 U.S.C. 552a(b)(12), for the
purpose of collecting a debt on behalf of the United States.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are on paper and/or in electronic form.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records are retrieved by the name of the requester/appellant or the attorney or other individual representing the
requester, or other identifier assigned to the request or appeal.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Information in this system is safeguarded in accordance with applicable laws, rules and policies. All records are
protected from unauthorized access through appropriate administrative, physical, and technical safeguards. These
safeguards include restricting access to authorized personnel who have a need-to-know; using locks, and password
protection identification features. Classified information is appropriately stored in accordance with applicable
requirements. TSA file areas are locked after normal duty hours and the facilities are protected from the outside by
security personnel.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records are retained and disposed of in accordance with the National Archives and Records Administration’s
General Records Schedule 14. Files may be retained from 2 to 6 years, depending on the type of file. For requests that
result in litigation, the files related to that litigation will be retained for 3 years after final court adjudication.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Associate Director, Freedom of Information/Privacy Act Division, Office of Law Enforcement &amp;amp;amp;amp;amp;amp; Security
Liaison, TSA Headquarters, West Tower, 10th Floor, TSA-20, 601 S. 12th Street, Arlington, VA 22202-4220.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>To determine whether this system contains records relating to you, write to the System Manager identified above.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Same as "Notification procedures"  above. Provide your full name and a description of information that you seek,
including the time frame during which the record(s) may have been generated. Individuals requesting access must comply
with the Department of Homeland Security’s Privacy Act regulations on verification of identity (6 CFR 5.21(d)).
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Same as "Notification procedure"  and "Record access procedures"  above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information contained in this system is obtained from those individuals who submit requests and administrative
appeals pursuant to the FOIA and the PA; the agency records searched and identified as responsive in the process of
responding to such requests and appeals; Departmental personnel assigned to handle such requests and appeals; other
agencies or entities that have referred to TSA requests concerning TSA records, or that have consulted with TSA regarding
handling of particular requests; and submitters or subjects of records or information that have provided assistance to
TSA in making access or amendment determinations.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>Portions of this system are exempt under 5 U.S.C. 552a(k)(1) and (k)(2).
</p></xhtmlContent></subsection></section>
<section id="tsa8" toc="yes">
<systemNumber>/TSA-008</systemNumber>
<subsection type="systemName">Transportation Security Administration Notification Contact Lists
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified, sensitive.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>The records of this system are electronically maintained in a digital safe site at TSA Headquarters in Northern
Virginia.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>TSA employees and individuals who interact with TSA in providing transportation security services, including
land, air, and maritime carrier and facility operators, local government officials, law enforcement officials, and
emergency response personnel. Members of the public or the news media who ask to receive TSA travel alert notifications
and news releases.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Personal and business contact information, which includes but is not limited to name, work title, work location,
work phone numbers, pager numbers, cellular phone numbers, home phone numbers, e-mail addresses, and home addresses.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301, 49 U.S.C. 114, Pub. L. 107-347.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The system of records is designed to allow TSA to relay information throughout the organization, to
transportation security emergency first responders, and to those individuals who ask to receive TSA travel alert
notifications and news releases.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>(1) To the United States Department of Transportation, its operating administrations, or the appropriate state or
local agency when relevant or necessary to (a) ensure safety and security in any mode of transportation; (b) enforce
safety- and security-related regulations and requirements; (c) assess and distribute intelligence or law enforcement
information related to transportation security; (d) assess and respond to threats to transportation; (e) oversee the
implementation and ensure the adequacy of security measures at airports and other transportation facilities; (f) plan and
coordinate any actions or activities that may affect transportation safety and security or the operations of
transportation operators; or (g) the issuance, maintenance, or renewal of a license, certificate, contract, grant, or
other benefit.
</p><p>(2) To contractors, grantees, experts, consultants, or other like persons when necessary to perform a function or
service related to this system of records for which they have been engaged. Such recipients are required to comply with
the Privacy Act, 5 U.S.C. 552a, as amended.
</p><p>(3) To the National Archives and Records Administration or other appropriate Federal agency in records management
inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>(4) To any agency or instrumentality charged under applicable law with the protection of the public health or safety
under exigent circumstances where the public health or safety is at risk.
</p><p>(5) To the appropriate Federal, State, local, tribal, territorial, foreign, or international agency responsible for
investigating, prosecuting, enforcing, or implementing a statute, rule, regulation, or order, where TSA becomes aware of
an indication of a violation or potential violation of civil or criminal law or regulation.
</p><p>(6) To airport operators, aircraft operators, and/or maritime and land transportation operators when appropriate to
address a threat or potential threat to transportation security, or when required for administrative purposes related to
the effective and efficient administration of transportation security laws.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records are maintained in computer-accessible storage media and hardcopy format.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records are retrieved by name, address, or other assigned identifier of the individual on whom the records are
maintained.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Information in this system is safeguarded in accordance with applicable laws, rules and policies. All records are
protected from unauthorized access through appropriate administrative, physical, and technical safeguards. These
safeguards include restricting access to authorized personnel who have a need-to-know by using locks, alarm devices,
passwords, and encrypting data communications. Electronic access is limited by computer security measures that are
strictly enforced. TSA file areas are locked after normal duty hours and facilities are protected by security personnel.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records in this system will be retained in accordance with a schedule to be approved by the National Archives and
Records Administration. Individuals who ask to receive TSA notifications and news releases will be deactivated from the
contact list upon their own request.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>TSA Office of Information Technology, Office of the Chief Information Officer, TSA Headquarters, TSA-11,
601 South 12th Street, Arlington, VA 22202-4220 (TSA Employee Contact List and TSA Alert Notification System). TSA
Public Affairs Office, TSA Headquarters, TSA-4, 601 South 12th Street, Arlington, VA 22202-4220 (Public
Affairs News Releases). TSA Transportation Security Policy Office, TSA Headquarters, TSA-9, 601 South 12th Street,
Arlington, VA 22202-4220 (E-mail Travel Alert Notification List).
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>To determine whether a contact list within this system contains records relating to you, write to the appropriate
System Manager(s) identified above.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Same as "Notification Procedure,"  above. Provide your full name and a description of information that you seek,
including the time frame during which the record(s) may have been generated. Individuals requesting access must comply
with the Department of Homeland Security Privacy Act regulations on verification of identity (6 CFR 5.21(d)).
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Same as "Notification procedure"  and "Record access procedure,"  above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information contained in this system is obtained from TSA Human Resources, TSA employees or contractors, other
government agencies, and by individuals who voluntarily sign-up to receive TSA notifications or news releases.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="tsa9" toc="yes">
<systemNumber>/TSA-009</systemNumber>
<subsection type="systemName">General Legal Records (GLR).
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Sensitive, classified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>This system of records is located in the Office of the Chief Counsel, Transportation Security Administration
(TSA) Headquarters in Arlington, Virginia. Records will also be maintained at various TSA field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>TSA employees and former employees, other Federal agency employees, members of the public, individuals involved
in litigation with TSA or involving TSA, witnesses, and to the extent not covered by any other system, tort and property
claimants who have filed claims against the Government and individuals who are the subject of an action requiring
approval or action by a TSA official, such as appeals, actions, training, awards, foreign travel, promotions, selections,
grievances, delegations, etc.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>To the extent not covered by another system, records relating to litigation by or against the U.S. Government (or
litigation in which the U.S. Government is not a party, but has an interest) resulting from questions concerning TSA
authority, criminal actions, claims, torts, employment and sex discrimination, Rehabilitation Act, personnel matters,
contracts, foreclosures, actions against TSA officials, criminal actions, titles to real property, other civil matters,
and records relating to requests for TSA records or the testimony of TSA employees in state law criminal or civil
litigation in which TSA is not a party. Included are statements of claims, documentary evidence, copies of condemnation
or foreclosure proceedings and decisions, lists of witnesses, supporting documents, correspondence, legal opinions and
memoranda and related records. The system also includes claims by or against the Government, other than litigation cases,
arising from a transaction with TSA, and documents related thereto, including demographic information, vouchers, witness
statements, legal decisions, and related material pertaining to such claims.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; 5 U.S.C 7301; 5 U.S.C. 7501; 28 U.S.C. 1346(b), (c), 1402(b), 2401(b), 2412(c), 2671-80; 31
U.S.C. 3701, 3721; 42 U.S.C. 20003 et seq.; 44 U.S.C. 3101; 49 U.S.C. 114.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The system is maintained to assist attorneys in the Office of the Chief Counsel in providing legal advice to TSA
management on a wide variety of legal issues; to respond to claims by employees, former employees, and other individuals;
to assist in the settlement of claims against the government; to represent TSA during litigation, and to maintain
internal statistics.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>(1) To the United States Department of Transportation and its operating administrations when relevant or
necessary to (a) ensure safety and security in any mode of transportation; (b) enforce safety- and security-related
regulations and requirements; (c) assess and distribute intelligence or law enforcement information related to
transportation security; (d) assess and respond to threats to transportation; (e) oversee the implementation and ensure
the adequacy of security measures at airports and other transportation facilities; (f) plan and coordinate any actions or
activities that may affect transportation safety and security or the operations of transportation operators; or (g) the
issuance, maintenance, or renewal of a license, certificate, contract, grant, or other benefit.
</p><p>(2) To the appropriate Federal, State, local, tribal, territorial, foreign, or international agency responsible for
investigating, prosecuting, enforcing, or implementing a statute, rule, regulation, or order, where TSA becomes aware of
an indication of a violation or potential violation of civil or criminal law or regulation.
</p><p>(3) To contractors, grantees, experts, consultants, or volunteers when necessary to perform a function or service
related to this system of records for which they have been engaged. Such recipients are required to comply with the
Privacy Act, 5 U.S.C. 552a, as amended.
</p><p>(4) To a Federal, state, local, tribal, territorial, foreign, or international agency, in response to queries
regarding persons who may pose a risk to transportation or national security; a risk of air piracy or terrorism or a
threat to airline or passenger safety; or a threat to aviation safety, civil aviation, or national security.
</p><p>(5) To the Department of State and other Intelligence Community agencies to further the mission of those agencies
relating to persons who may pose a risk to transportation or national security; a risk of air piracy or terrorism or a
threat to airline or passenger safety; a threat to aviation safety, civil aviation, or national security.
</p><p>(6) To a Federal, State, local, tribal, territorial, foreign, or international agency, where such agency has requested
information relevant or necessary for the hiring or retention of an individual, or the issuance of a security clearance,
license, contract, grant, or other benefit.
</p><p>(7) To a Federal, State, local, tribal, territorial, foreign, or international agency, if necessary to obtain
information relevant to a TSA decision concerning the hiring or retention of an employee, the issuance of a security
clearance, license, contract, grant, or other benefit.
</p><p>(8) To international and foreign governmental authorities in accordance with law and formal or informal international
agreement.
</p><p>(9) To third parties during the course of an investigation into violations or potential violations of transportation
security laws to the extent necessary to obtain information pertinent to the investigation.
</p><p>(10) To airport operators, aircraft operators, and maritime and land transportation operators about individuals who
are their employees, job applicants, or contractors, or persons to whom they issue identification credentials or grant
clearances to secured areas in transportation facilities when relevant to such employment, application, contract, or the
issuance of such credentials or clearances.
</p><p>(11) To the Department of Justice (DOJ) in review, settlement, defense, and prosecution of claims, complaints, and law
suits involving matters over which TSA exercises jurisdiction.
</p><p>(12) To the DOJ or other Federal agency conducting litigation or in proceedings before any court, adjudicative or
administrative body, when: (a) TSA, or (b) any employee of TSA in his/her official capacity, or (c) any employee of TSA
in his/her individual capacity where DOJ or TSA has agreed to represent the employee, or (d) the United States or any
agency thereof, is a party to the litigation or has an interest in such litigation, and TSA determines that the records
are both relevant and necessary to the litigation and the use of such records is compatible with the purpose for which
TSA collected the records.
</p><p>(13) To a congressional office from the record of an individual in response to an inquiry from that congressional
office made at the request of the individual.
</p><p>(14) To the General Services Administration and the National Archives and Records Administration in records management
inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>(15) To the Attorney General of the United States or his/her official designee, when information indicates that an
individual meets any of the disqualifications for receipt, possession, shipment, or transport of a firearm under the
Brady Handgun Violence Prevention Act. In case of a dispute concerning the validity of the information provided by TSA to
the Attorney General, or his/her designee, it shall be a routine use of the information in this system of records to
furnish records or information to the national Background Information Check System, established by the Brady Handgun
Violence Prevention Act, as may be necessary to resolve such dispute.
</p><p>(16) To the DOJ, United States Attorney’s Office, or other federal agencies for further collection action on any
delinquent debt when circumstances warrant.
</p><p>(17) To a debt collection agency for the purpose of debt collection.
</p><p>Disclosure to consumer reporting agencies:
</p><p>Privacy Act information may be reported to consumer reporting agencies pursuant to 5 U.S.C. 552a(b)(12)
collecting on behalf of the United States Government.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are on paper and/or in electronic form. Records that are classified are stored in
accordance with applicable executive orders and statutes.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records are retrieved by the name of an individual or by a case number.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Information in this system is safeguarded in accordance with applicable laws, rules and policies. All records are
protected from unauthorized access through appropriate administrative, physical, and technical safeguards. These
safeguards include restricting access to authorized personnel who have an official need for access in order to perform
their duties and using locks and password protection identification features. Classified information is appropriately
stored in secured safes in accordance with applicable requirements. During normal hours of operation, all records of the
Office of the Chief Counsel are maintained in areas accessible only to authorized personnel of TSA. TSA file areas are
locked after normal duty hours and the facilities are protected from the outside by security personnel.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>National Archives and Records Administration approval is pending for the records in this system. The records will
be retained and disposed of in accordance with the applicable provisions of the records schedule for the Office of the
Chief Counsel. Chief Counsel office files are generally retained from 3 to 15 years, depending on the type of file.
Formal legal files and significant litigation files are retained permanently for eventual transfer to the National
Archives of the United States.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Director of Operations, Office of the Chief Counsel, TSA Headquarters, West Building, Floor 8, TSA-2 (Chief
Counsel), 601 S. 12th Street, Arlington, VA 22202-4220.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>To determine whether this system contains records relating to you, write to the System Manager identified above.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Same as "Notification Procedures"  above. Provide your full name and a description of information that you seek,
including the time frame during which the record(s) may have been generated. Individuals requesting access must comply
with the Department of Homeland Security’s Privacy Act regulations on verification of identity (6 CFR 5.21(d)).
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Same as "Notification procedure,"  and "Record access procedures"  above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information in this system of records is obtained from Federal employees and former employees and other
individuals involved in litigation or other action or matter in which TSA is a party or has an association. Information
also is obtained from documents related to such litigation, action, or matter.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>Portions of this system are exempt under 5 U.S.C. 552a(k)(1) and (k)(2).
</p></xhtmlContent></subsection></section>
<section id="tsa11" toc="yes">
<systemNumber>/TSA-011</systemNumber>
<subsection type="systemName">Transportation Security Intelligence Service (TSIS) Operations Files.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Classified, sensitive.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the Transportation Security Administration’s Office of the Transportation Security
Intelligence Service in Arlington, Virginia and field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Individuals identified in intelligence, counterintelligence, transportation security, or information system
security reports and supporting materials, including but not limited to individuals involved in matters of intelligence,
law enforcement or transportation security, information systems security, the compromise of classified information, or
terrorism.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Records include biographic and biometric information; intelligence requirements, analysis, and reporting;
information systems security analysis and reporting; articles, public-source data, and other published information on
individuals and events of interest to TSA; actual or purported compromises of classified intelligence; countermeasures in
connection therewith; identification of classified source documents and distribution thereof; records related to
transportation security matters (<i>e.g.,</i> reports of security-related incidents), and law enforcement records as they
pertain to issues involving transportation security.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>49 U.S.C. 114; National Security Act of 1947, as amended, 50 U.S.C. 403-3(d); National Security Agency Act
of 1959, Pub. L. 86-36, as amended, 50 U.S.C. 402. <i>Note:</i> E.O. 12333; E.O. 13292 and 12958; E.O. 9397; and National
Security Directive 42.</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>To maintain records on intelligence, counterintelligence, transportation security, and information systems
security matters as they relate to TSA’s mission of protecting the nation’s transportation systems. To identify potential
threats to transportation security, uphold and enforce the law, and ensure public safety.</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the privacy act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (DOJ) (including United States attorney Offices) or other Federal agency in
anticipation of conducing, or conducting litigation or in proceedings before any court, adjudicative or administrative
body, when it is necessary to the litigation and one of the following is a party to the litigation or has an interest in
such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any current or former employee of DHS in his/her official capacity, or
</p><p>3. Any current or former employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the
employee, or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal agencies pursuant to records management
inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. DHS has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or
property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or
programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information;
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, or others performing or working on a contract,
service, grant cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, Tribal, local, international, or foreign agency, including law enforcement, or
other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law,
rule, regulation, or order, where a record, either on its face or in conjunction with other information, indicates a
violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is
proper and consistent with the official duties of the person making the disclosure.
</p><p>H. To the United States Department of Transportation, its operating administrations, or the appropriate State or local
agency when relevant or necessary to:
</p><p>1. Ensure safety and security in any mode of transportation;
</p><p>2. Enforce safety- and security-related regulations and requirements;
</p><p>3. Assess and distribute intelligence or law enforcement information related to transportation security;
</p><p>4. Assess and respond to threats to transportation;
</p><p>5. Oversee the implementation and ensure the adequacy of security measures at airports and other transportation
facilities;
</p><p>6. Plan and coordinate any actions or activities that may affect transportation safety and security or the operations
of transportation operators; or
</p><p>7. The issuance, maintenance, or renewal of a license, certificate, contract, grant, or other benefit.
</p><p>I. To Federal, State, local, Tribal, territorial, foreign, or international agencies to provide intelligence,
counterintelligence, information systems and transportation security information, and other information for the purpose
of counterintelligence or antiterrorism activities authorized by U.S. law or Executive Order or for the purpose of
enforcing laws that protect national security of the U.S.
</p><p>J. To U.S. Government agencies regarding compromises of classified information including the document(s) apparently
compromised, implications of disclosure of intelligence sources and methods, investigative data on compromises, and
statistical and substantive analysis of the data.
</p><p>K. To any U.S. Government organization in order to facilitate any security, employment, detail, liaison, or
contractual decision by any U.S. Government organization, or to facilitate access to any U.S. Government information
system.
</p><p>L. To U.S. agencies involved in the protection of intelligence sources and methods to facilitate such protection and
to support intelligence analysis and reporting.
</p><p>M. To a Federal, State, local, Tribal, territorial, foreign, or international agency, where such agency has requested
information relevant or necessary for the hiring or retention of an individual, or the issuance of a security clearance,
license, contract, grant, or other benefit.
</p><p>N. To a Federal, State, local, Tribal, territorial, foreign, or international agency, if necessary to obtain
information relevant to a DHS/TSA decision concerning the hiring or retention of an employee, the issuance of a security
clearance, license, contract, grant, or other benefit.
</p><p>O. To international and foreign governmental authorities in accordance with law and formal or informal international
agreement.
</p><p>P. To third parties during the course of or as follow-up to an investigation into violations or potential violations
of the law, or an investigation related to the hiring or retention of an individual, or the issuance of a security
clearance, license, contract, grant, or other benefit, to the extent necessary to obtain information pertinent to the
follow-up inquiry or investigation.
</p><p>Q. To airport operators, aircraft operators, maritime and surface transportation operators, indirect air carriers, and
other facility operators about individuals who are their employees, job applicants, or contractors, or persons to whom
they issue identification credentials or grant clearances to secured areas in transportation facilities when relevant to
such employment, application, contract, training or the issuance of such credentials or clearances.
</p><p>R. To the appropriate Federal, State, local, Tribal, territorial, foreign, or international agency regarding
individuals who pose or are suspected of posing a risk to transportation or national security.
</p><p>S. To airport operators, aircraft operators, maritime and surface transportation operators, indirect air carriers, or
other facility operators when appropriate to address a threat or potential threat to transportation security, or when
required for administrative purposes related to the effective and efficient administration of transportation security
laws.
</p><p>T. To a court, magistrate, or administrative tribunal where a Federal agency is a party to the litigation or
administrative proceeding in the course of presenting evidence, including disclosures to opposing counsel or witnesses in
the course of civil discovery, litigation, or settlement negotiations or in connection with criminal law proceedings.
</p><p>U. To a former employee of DHS, in accordance with applicable regulations, for purposes of responding to an official
inquiry by a Federal, State, or local government entity or professional licensing authority; or facilitating
communications with a former employee that may be necessary for personnel-related or other official purposes where the
Department requires information or consultation assistance from the former employee regarding a matter within that
person’s former area of responsibility.
</p><p>V. To the news media and the public, with the approval of the DHS Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information except to the extent it is determined that
release of the specific information in the context of a particular case would constitute an unwarranted invasion of
personal privacy or a risk to transportation or national security.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records may be maintained on paper, audio and video recordings, and in computer-accessible storage media. Records
may also be stored on microfiche and roll microfilm. Records that are sensitive or classified are safeguarded in
accordance with agency procedures, and applicable Executive Orders and statutes.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by the individual’s name, Social Security number, or other assigned personal identifier.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Pursuant to the approved National Archives and Records Administration records retention schedule N1-560
-04-12, routine and insignificant case files are destroyed after thirty years; significant case files are
retained permanently; watch logs are destroyed after thirty years; watchlists are destroyed 99 years after date of entry
or seven years after confirmation of death, whichever is sooner.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Transportation Security Administration, Special Assistant, Office of Intelligence, TSA-10, 601 South 12th
Street, Arlington, VA 20598.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment
procedures of the Privacy Act because it is a law enforcement system. However, the Transportation Security Administration
will consider individual requests to determine whether or not information may be released. Thus, individuals seeking
notification and access to any record contained in the system of records, or seeking to contest its content, may submit a
request in writing to the Headquarters or component’s FOIA Officer, whose contact information can be found at <i>
https://www.dhs.gov/foia</i> under "contacts." TSA’s FOIA Officer is located at: Freedom of Information Act
Office, TSA-20, 601 S. 12th Street, 11th Floor, East Tower, Arlington, VA 20598-6020, 1-866-FOIA
-TSA or 571-227-2300, Fax: 571-227-1406, E-mail: <i>foia.tsa@dhs.gov</i>. If an individual
believes more than one component maintains Privacy Act records concerning him or her the individual may submit the
request to the Chief Privacy Officer, Department of Homeland Security, 245 Murray Drive, SW., Building 410, STOP-
0655, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Identify which component(s) of the Department you believe may have the information about you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information contained in this system is obtained from subject individuals; other Federal, State, local and
foreign agencies and organizations; hard-copy media, including periodicals, newspapers, and broadcast transcripts, and
commercial and public record databases and Web sites; public and classified reporting, intelligence source documents,
investigative reports, and correspondence.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>Portions of this system are exempt under 5 U.S.C. 552a(j)(2), (k)(1), (k)(2), and (k)(5) as reflected in the
final rule published on August 4, 2006, in 71 FR 44223.
</p></xhtmlContent></subsection></section>
<section id="tsa12" toc="yes">
<systemNumber>/TSA-012</systemNumber>
<subsection type="systemName">Transportation Worker Identification Credentialing (TWIC) System.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records will be maintained in a secure, centralized location for selected transportation facilities within three
geographic regions: Delaware River and Bay, Los Angeles/Long Beach, California, and the State of Florida. Locations
within the Los Angeles/Long Beach region include Carson, CA; Terminal Island, CA; Oakland, CA; San Pedro, CA; Long Beach,
CA; and Los Angeles, CA. Locations within the Delaware River and Bay area include Philadelphia, PA; Islip, NY; Camden,
NJ; and Wilmington, DE. Locations within Florida include Pensacola, Panama City, St. Joe, Amelia Island, Jacksonville,
Tampa, St. Petersburg, Palmetto, Cape Canaveral, Ft. Pierce, Riviera Beach, Fort Lauderdale, Miami, and Key West.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Transportation workers and individuals, and/or authorized visitors, participating in the Prototype Phase of the
Transportation Worker Identification Credential (TWIC) Program who are authorized unescorted entry to secure
transportation areas.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>This system will contain a minimum amount of information during the TWIC Prototype Phase and may include: (1)
Individual’s name; (2) other demographic data to include: address, phone number, social security number, date of birth,
and place of birth; (3) administrative identification codes and unique card serial number; (4) systems identification
codes; (5) company/organization or affiliation; (6) issue date; (7) biometric data and digital photograph; (8) access
level information; (9) copies of documents that verify address and identity, such as birth certificates, government photo
identification, drivers licenses and the like, and (10) expiration date.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>49 U.S.C. 114; 49 U.S.C. 44903(g); 46 U.S.C. 70105.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>In cooperation with transportation facility operators, the records are maintained to evaluate and test certain
technologies and business processes in the Prototype Phase of TSA’s pilot project to develop a TWIC to improve identity
management and access control for transportation workers requiring unescorted access to secure areas of transportation
facilities. Additionally, TSA will use certain data elements to support the development and operation of site specific
security plans at local transportation facilities. This system is not intended to cover security threat assessments that
will be conducted on individuals who seek to obtain a TWIC. Records pertaining to security threat assessments conducted
on volunteers of this pilot are maintained in DHS/TSA 002, the Transportation Security Threat Assessment System (T-
STAS).
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>(1) To the appropriate Federal, State, local, tribal, territorial, foreign, or international agency responsible
for investigating, prosecuting, enforcing, or implementing a statute, rule, regulation, or order, where TSA becomes aware
of an indication of a violation or potential violation of civil or criminal law or regulation.
</p><p>(2) To a Federal, State, local, tribal, territorial, foreign, or international agency, where such agency has requested
information relevant or necessary for the hiring or retention of an individual as an employee or a contractor, or the
issuance of a security clearance or license.
</p><p>(3) To a Federal, State, local, tribal, territorial, foreign, or international agency, if necessary to obtain
information relevant to a TSA decision concerning the hiring or retention of an employee, the issuance of a security
clearance, license, contract, grant, or other benefit.
</p><p>(4) To a congressional office from the record of an individual in response to an inquiry from that congressional
office made at the request of the individual.
</p><p>(5) To international and foreign governmental authorities in accordance with law and formal or informal international
agreement.
</p><p>(6) To the Department of Justice (DOJ) or other Federal agency in the review, settlement, defense, and prosecution of
claims, complaints, and lawsuits involving matters over which TSA exercises jurisdiction or when conducting litigation or
in proceedings before any court, adjudicative or administrative body, when: (a) TSA, or (b) any employee of TSA in
his/her official capacity, or (c) any employee of TSA in his/her individual capacity where DOJ or TSA has agreed to
represent the employee, or (d) the United States or any agency thereof, is a party to the litigation or has an interest
in such litigation, and TSA determines that the records are both relevant and necessary to the litigation and the use of
such records is compatible with the purpose for which TSA collected the records.
</p><p>(7) To the National Archives and Records Administration or other appropriate Federal agency pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>(8) To the United States Department of Transportation, its operating administrations, or the appropriate state or
local agency when relevant or necessary to: (a) Ensure safety and security in any mode of transportation; (b) enforce
safety- and security-related regulations and requirements; (c) assess and distribute intelligence or law enforcement
information related to transportation security; (d) assess and respond to threats to transportation; (e) oversee the
implementation and ensure the adequacy of security measures at airports and other transportation facilities; (f) plan and
coordinate any actions or activities that may affect transportation safety and security or the operations of
transportation operators; or (g) the issuance, maintenance, or renewal of a license, certificate, contract, grant, or
other benefit.
</p><p>(9) To TSA contractors, agents, grantees, experts, consultants, or other like persons when necessary to perform a
function or service related to this system of records for which they have been engaged. Such recipients are required to
comply with the Privacy Act, 5 U.S.C. 552a, as amended.
</p><p>(10) To third parties during the course of an investigation into violations or potential violations of transportation
security laws to the extent necessary to obtain information pertinent to the investigation.
</p><p>(11) To airport operators, aircraft operators, and maritime and land transportation operators and contractors about
individuals who are their employees, job applicants, or contractors, or persons to whom they issue identification
credentials or grant clearances or access to secured areas in transportation facilities when relevant to such employment,
application, contract, the issuance of such credentials or clearances, or access to such secure areas.
</p><p>(12) To the appropriate Federal, State, local, tribal, territorial, foreign, or international agency regarding
individuals who pose or are suspected of posing a risk to transportation or national security.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Paper, bar code, magnetic stripe, optical memory, disk, integrated circuit chip (ICC), and electronic media.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Data records contained within bar codes, magnetic stripe, optical memory stripe, disk, ICC, and/or electronic
media may be retrieved by the individuals’ name, unique card number, or organization; paper records, where applicable,
are retrieved alphabetically by name.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Unauthorized personnel are denied physical access to the location where records are stored. For computerized
records, safeguards established in accordance with generally acceptable information security guidelines via use of
security codes, passwords, Personal Identification Numbers (PINs), etc. Data security and integrity safeguards will be
observed during data transmission to the database using strong encryption and digital signing methodologies.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Record disposition authority for these records is pending at the National Archives and Records Administration.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Assistant Director for Compliance, Credentialing Program Office, TSA Headquarters, TSA-19, 601 S. 12th
Street, Arlington, VA 22202-4220.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>To determine if this system contains a record relating to you, write to the system manager at the address
indicated above and provide your full name, current address, date of birth, place of birth, and a description of
information that you seek, including the time frame during which the record(s) may have been generated. You may also
provide your Social Security Number or other unique identifier(s) but you are not required to do so. Individuals
requesting access must comply with the Department of Homeland Security’s Privacy Act regulations on verification of
identity (6 CFR 5.21(d)).
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Same as "Notification procedure,"  above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Same as "Notification procedure,"  above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>TSA obtains information in this system from the individuals who are covered by the system, their employers, or
their transportation facility.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="tsa13" toc="yes">
<systemNumber>/TSA-013</systemNumber>
<subsection type="systemName">Federal Flight Deck Officer Record System (FFDORS).
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Classified, sensitive.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Federal Flight Deck Officer (FFDO) Program Records are maintained at the offices of the Transportation Security
Administration (TSA) Headquarters in Reston, Virginia.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include:
</p><p>1. All individuals who volunteer to participate in the FFDO program,
</p><p>2. FFDO program participants, <i>i.e.,</i> those volunteers who are accepted into the FFDO training program and
deputized as FFDOs, and
</p><p>3. former FFDO program participants.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>This system includes all records required in connection with an individual’s voluntary participation in the
program, including records associated with FFDO application, selection, training, participation, retention and
requalification. FFDORS includes records about individuals who applied but were not accepted into the program. Such
records may include, but are not limited to the following:
</p><p>(a) Volunteer forms prepared by applicants for program participation containing such information as work history,
education, military service, certificates of specialized training, awards and honors;
</p><p>(b) Copies of correspondence between the applicant and TSA, and between TSA and other agencies, applicant places of
employment, and educational institutions, for the purposes of verifying information provided to TSA by the applicant;
</p><p>(c) The FD-258 Fingerprint card, investigative summaries, and compilations of criminal history record checks, to
include administrative records and correspondence incidental to the background investigation process, obtained from
various law enforcement authorities;
</p><p>(d) Results of written cognitive and noncognitive assessments and information regarding how the volunteer form was
rated, prepared by TSA employees or contract psychologists;
</p><p>(e) Records regarding the TSA’s final decision to accept or reject volunteers for the FFDO program for suitability or
medical reasons, including records prepared by TSA employees, and responses to and results of approved psychological
assessments or similar tests administered by TSA;
</p><p>(f) Results of telephonic or in-person interviews with program volunteers, including summary recommendations regarding
the individual’s participation in the program, prepared by TSA employees;
</p><p>(g) Records prepared by TSA employees related to the selection or rejection of volunteer applicants (to include
records generated as a result of any administrative appeal of TSA’s determination to reject an applicant), and records
related to recertification and decertification;
</p><p>(h) Records prepared by TSA employees related to training, including academic and firearms performance; and
</p><p>(i) Records prepared by TSA employees related to requalification and deputation renewal.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>49 U.S.C. 114, 44921.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to maintain records necessary for the assessment and acceptance of volunteers, and
the training, participation and recertification of deputized volunteer pilots of air carriers providing commercial air
transportation as federal law enforcement to defend the flight decks of aircraft of such air carriers against acts of
criminal violence or air piracy.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>A. To the Department of Justice (DOJ) (including United States Attorney Offices) or other federal agency in
anticipation of, or conducting litigation, or in proceedings before any court, adjudicative or administrative body, when
it is necessary to the litigation and one of the following is a party to the litigation or has an interest in such
litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any current or former employee of DHS in his/her official capacity;
</p><p>3. Any current or former employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the
employee, or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant cooperative agreement or other assignment for DHS, when necessary to accomplish an agency function related
to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act
requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate federal, state, tribal, local, international, or foreign agency, including law enforcement, or
other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law,
rule, regulation, or order, where a record, either on its face or in conjunction with other information, indicates a
violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is
proper and consistent with the official duties of the person making the disclosure.
</p><p>H. To the United States Department of Transportation, its operating administrations, or the appropriate state or local
agency when relevant or necessary to:
</p><p>1. Ensure safety and security in any mode of transportation;
</p><p>2. Enforce safety- and security-related regulations and requirements;
</p><p>3. Assess and distribute intelligence or law enforcement information related to transportation security;
</p><p>4. Assess and respond to threats to transportation;
</p><p>5. Oversee the implementation and ensure the adequacy of security measures at airports and other transportation
facilities;
</p><p>6. Plan and coordinate any actions or activities that may affect transportation safety and security or the operations
of transportation operators; or
</p><p>7. The issuance, maintenance, or renewal of a license, certificate, contract, grant, or other benefit.
</p><p>I. To a Federal, State, local, tribal, territorial, foreign, or international agency, in response to queries regarding
persons who may pose a risk to transportation or national security; a risk of air piracy or terrorism or a threat to
airline or passenger safety; or a threat to aviation safety, civil aviation, or national security.
</p><p>J. To the appropriate Federal, State, local, tribal, territorial, foreign, or international agency regarding
individuals who pose or are suspected of posing a risk to transportation or national security.
</p><p>K. To a Federal, State, local, tribal, territorial, foreign, or international agency, where such agency has requested
information relevant or necessary for the hiring or retention of an individual, or the issuance of a security clearance,
license, contract, grant, or other benefit.
</p><p>L. To a Federal, State, local, tribal, territorial, foreign, or international agency, if necessary to obtain
information relevant to a DHS/TSA decision concerning the hiring or retention of an employee, the issuance of a security
clearance, license, contract, grant, or other benefit.
</p><p>M. To international and foreign governmental authorities in accordance with law and formal or informal international
agreement.
</p><p>N. To third parties to the extent necessary to obtain information pertinent to the individual’s fitness and
qualifications for the FFDO program.
</p><p>O. To airport operators, aircraft operators, and maritime and surface transportation operators, indirect air carriers,
and other facility operators about individuals who are their employees, job applicants, or contractors, or persons to
whom they issue identification credentials or grant clearances to secured areas in transportation facilities when
relevant to such employment, application, contract, training or the issuance of such credentials or clearances.
</p><p>P. To the DOJ in review, settlement, defense, and prosecution of claims, complaints, and lawsuits involving matters
over which DHS/TSA exercises jurisdiction.
</p><p>Q. To a former employee of DHS, in accordance with applicable regulations, for purposes of responding to an official
inquiry by a Federal, State, or local government entity or professional licensing authority; or facilitating
communications with a former employee that may be necessary for personnel-relate or other official purposes where the
Department requires information or consultation assistance from the former employee regarding a matter within that
person’s former area of responsibility.
</p><p>R. To a court, magistrate, or administrative tribunal where a Federal agency is a party to the litigation or
administrative proceeding in the course of presenting evidence, including disclosures to opposing counsel or witnesses in
the course of civil discovery, litigation or settlement negotiations or in connection with criminal law proceedings.
</p><p>S. To the appropriate Federal, State, local, tribal, territorial, foreign, or international agency responsible for
investigating, prosecuting, enforcing, or implementing a statute, rule, regulation, order, license, or treaty, where
DHS/TSA determines that the information would assist in the enforcement of a civil or criminal laws.
</p><p>T. To the news media and the public, with the approval of the DHS Chief Privacy Officer in consultation with counsel,
when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy or a risk to
transportation or national security.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system may be maintained on paper and in computer-accessible storage media. Records may also be
stored on microfiche and roll microfilm. Records that are sensitive or classified are safeguarded in accordance with
agency procedures, and applicable Executive Orders and statutes.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Information can be retrieved by name, address, social security, and account number or other assigned tracking
identifier of the individual on whom the records are maintained.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Information in this system is safeguarded in accordance with applicable laws, rules and policies. All records are
protected from unauthorized access through appropriate administrative, physical, and technical safeguards. These
safeguards include restricting access to authorized personnel who have a need-to-know; using locks, alarm devices, and
passwords; and encrypting data communications. TSA file areas are locked after normal duty hours and security personnel
protect the facilities from the outside.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records associated with the assessment of FFDO’s will be destroyed one year after TSA is notified that access
based on security threat assessment is no longer valid; where an individual was a possible match to a watchlist, records
will be destroyed seven years after completion of the security threat assessment or one year after being notified that
access based on the security threat assessment is no longer valid, whichever is longer; and where the individual is an
actual match to a watchlist records will be destroyed 99 years after the security threat assessment or seven years after
TSA is notified the individual is deceased, whichever is shorter.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Transportation Security Administration, Office of Law Enforcement/Federal Air Marshal Service. 1900 Oracle Way,
Suite 500, Reston, VA 20190.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment
procedures of the Privacy Act because it is a law enforcement system. However, TSA will consider individual requests to
determine whether or not information may be released. Thus, individuals seeking notification and access to any record
contained in the system of records, or seeking to contest its content, may submit a request in writing to the
Headquarters or component’s FOIA Officer, whose contact information can be found at <i>https://www.dhs.gov/foia</i> under
"contacts." TSA’s FOIA Officer is located at: Freedom of Information Act Office, TSA-20, 601 S. 12th
Street, 11th Floor, East Tower, Arlington, VA 20598-6020, 1-866-FOIA-TSA or 571-227-
2300, Fax: 571-227-1406, E-mail: <i>foia.tsa@dhs.gov.</i> If an individual believes more than one component
maintains Privacy Act records concerning him or her the individual may submit the request to the Chief Privacy Officer,
Department of Homeland Security, 245 Murray Drive, SW., Building 410, STOP-0655, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Identify which component(s) of the Department you believe may have the information about you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information maintained in this system is primarily obtained from the FFDO volunteer form or derived from
information the applicant supplied, reports from medical personnel on physical and psychological results of examinations,
training records, and law enforcement and intelligence agency record systems, commercial and public databases and Web
sites and individuals interviewed as part of the background investigation.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>Portions of this system are exempt under 5 U.S.C. 552a(k)(1), (k)(2) and (k)(6) as reflected in the final rule
published on June 25, 2004.
</p></xhtmlContent></subsection></section>
<section id="tsa14" toc="yes">
<systemNumber>/TSA-014</systemNumber>
<subsection type="systemName">Telecommunications Usage Detail Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified, sensitive.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained in the Office of Information Technology at TSA Headquarters in Arlington, Virginia and at
various TSA field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Employees and contractor personnel who use or are assigned government telephones, cell phones, facsimile
machines, computers connected to the Internet, or other telecommunications equipment.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Records relating to the use of government telecommunications equipment; records indicating assignment of
telecommunications equipment to individuals, which may include the individual’s name, duty title, address, social
security number, assigned equipment identifying information, and assigned phone number; and records relating to the
location of government telecommunications equipment.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; 49 U.S.C. 114; E.O. 9397 (Social Security Number).
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>Records are maintained to facilitate the management of telecommunications equipment, to prevent the misuse of
government resources, and to serve as the basis for appropriate disciplinary action in the event government resources
have been misused.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>(1) To contractors, grantees, experts, consultants, or volunteers when necessary to perform a function or service
related to this system of records for which they have been engaged. Such recipients are required to comply with the
Privacy Act, 5 U.S.C. 552a, as amended.
</p><p>(2) To the appropriate Federal, State, local, tribal, territorial, foreign, or international agency responsible for
investigating, prosecuting, enforcing, or implementing a statute, rule, regulation, or order, where TSA becomes aware of
an indication of a violation or potential violation of civil or criminal law or regulation.
</p><p>(3) To the Department of Justice (DOJ) or other Federal agency conducting litigation or in proceedings before any
court, adjudicative or administrative body, when: (a) TSA, or (b) any employee of TSA in his/her official capacity, or
(c) any employee of TSA in his/her individual capacity where DOJ or TSA has agreed to represent the employee, or (d) the
United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and TSA
determines that the records are both relevant and necessary to the litigation and the use of such records is compatible
with the purpose for which TSA collected the records.
</p><p>(4) To a congressional office from the record of an individual in response to an inquiry from that congressional
office made at the request of the individual.
</p><p>(5) To the General Services Administration and the National Archives and Records Administration in records management
inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>(6) To the Department of Justice, United States Attorney’s Office, or other agency for debt collection action on any
delinquent debt when circumstances warrant.
</p><p>(7) To respond to a Federal agency’s request made in connection with the hiring or retention of an employee, the
letting of a contract, or issuance of a grant, license or other benefit by the requesting agency, but only to the extent
that the information disclosed is relevant and necessary to the requesting agency’s decision on the matter.
</p><p>(8) To a telecommunications company providing telecommunications support to permit servicing of the account.
</p><p>(9) To third parties during the course of an investigation into violations or potential violations of relevant laws,
regulations, or policies to the extent necessary to obtain information pertinent to the investigation.
</p><p>Disclosures to consumer reporting agencies:</p>
<p>Pursuant to 5 U.S.C. 552a(b)(12), disclosures may be made from this system to consumer reporting agencies collecting
on behalf of the United States Government.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records are stored in hard copy or in electronic format on a system database.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records are retrieved by name, duty title, address, social security number, equipment number, phone number, or
other assigned identifier of the individual on whom the records are maintained.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Information in this system is safeguarded in accordance with applicable laws, rules, and policies. All records
are protected from unauthorized access through appropriate administrative, physical, and technical safeguards. Control
measures are enforced to ensure that access to sensitive information in these records, such as Social Security Numbers,
is based on a "need to know."
</p><p>Retention and disposal:
</p><p>Records in this system will be retained in accordance with a schedule to be approved by the National Archives and
Records Administration.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Telecommunications Equipment Manager, Office of Information Technology, TSA Headquarters, TSA-11, 601 S.
12th Street, Arlington, VA 22202-4220.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>To determine whether this system contains records relating to you, write to the System Manager identified above.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Same as "Notification Procedure,"  above. Provide your full name and a description of information that you seek,
including the time frame during which the record(s) may have been generated. Individuals requesting access must comply
with the Department of Homeland Security Privacy Act regulations on verification of identity (6 CFR 5.21(d)).
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Same as "Notification Procedure"  and "Record Access Procedure,"  above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information contained in this system is obtained from employees and contractor personnel who use or are assigned
government telecommunications equipment, telecommunications equipment assignment lists, call detail log entries (which
include but are not limited to whom the call was made, from where the call was made, and call duration), and the results
of inquiries related to the assignment of responsibility for the misuse of government telecommunications equipment or the
placement of unofficial calls or transmissions.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="tsa15" toc="yes">
<systemNumber>/TSA-015</systemNumber>
<subsection type="systemName">Registered Traveler (RT) Operations Files.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Classified, sensitive.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records will be maintained at TSA Headquarters in Arlington, Virginia, at other authorized TSA or DHS secure
facilities as necessary, and at a digital safe site managed by a government contractor.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>(a) Individuals who voluntarily apply to participate in the RT Pilot Program, who agree to provide personal
information to TSA that may be used as part of a security assessment, and who may or may not meet the eligibility
criteria as determined by TSA;
 (b) Authorized Federal law enforcement officers (LEOs); and (c) Individuals who participate in the Federal Flight Deck
 Officer (FFDO) program. 
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Information in the system includes some or all of the following: Full name, current home address, current home
phone number, current cell phone number (if applicable), social security number, date of birth, place of birth,
nationality, gender, prior home addresses, arrival date in United States (non-U.S. citizens only), digital photo,
reference biometric (i.e., fingerprint(s), iris scan, facial geometry, hand geometry, handwriting/signature, others),
unique identification record number, unique token or credential serial number, security assessments, information
pertaining to adjudication results, RT eligibility status, token or credential issue date, token or credential expiration
date, information and data provided by Federal, State, and local government agencies and foreign governments that is
necessary to conduct a security assessment to determine if an individual poses a potential threat to aviation security.
Authorized Federal LEOs may have a Federal LEO code name and unique administrative code number.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>49 U.S.C. 114; Section 109(a)(3), Aviation and Transportation Security Act (ATSA), Public Law 107-71.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The system utilized during the RT Pilot Program will facilitate the development, testing, and administration of
the RT concept, including conducting security assessments on program applicants; additional security assessments may or
may not be conducted on authorized LEOs, FFDOs, and other authorized government officials. The purpose of the RT pilot
program is to </p>
	<p>(1) pre-screen and positively identify volunteer travelers using advanced identification technologies,
including biometrics, which may expedite the pre-boarding process for the traveler and improve the allocation of TSA’s
security resources on individuals who may pose a security threat;</p>
	<p>(2) prevent potential threats from individuals who are
impersonating Federal LEOs and seek to board commercial aircraft while armed; </p><p>(3) assist in the management and tracking
of the status of security assessments for applicants and those deemed eligible for the Registered Traveler Pilot Program;</p><p>
(4) permit the retrieval of the results of security assessments, including criminal history records checks and searches
in other governmental identification systems, performed on the individuals covered by this system; </p><p>(5) permit the
retrieval of information from other law enforcement and intelligence databases on individuals covered by this system; and</p><p>
(6) identify potential threats to transportation security, uphold and enforce the law, and ensure public safety.</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>(1) To the United States Department of Transportation, its operating administrations, or the appropriate state or
local agency when relevant or necessary to (a) ensure safety and security in any mode of transportation; (b) enforce
safety and security related regulations and requirements; (c) assess and distribute intelligence or law enforcement
information related to transportation security; (d) assess and respond to threats to transportation; (e) oversee the
implementation and ensure the adequacy of security measures at airports and other transportation facilities; (f) plan and
coordinate any actions or activities that may affect transportation safety and security or the operations of
transportation operators; or (g) the issuance, maintenance, or renewal of a license, certificate, contract, grant, or
other benefit.</p>
<p>(2) To the appropriate Federal, State, local, tribal, territorial, foreign, or international agency responsible for
investigating, prosecuting, enforcing, or implementing a statute, rule, regulation, or order, where TSA becomes aware of
an indication of a violation or potential violation of civil or criminal law or regulation.</p>
<p>(3) To contractors, grantees, experts, consultants, or volunteers when necessary to perform a function or service
related to this system of records for which they have been engaged. Such recipients are required to comply with the
Privacy Act, 5 U.S.C. 552a, as amended.</p>
<p>(4) To airports and aircraft operators to the extent necessary to identify Registered Travelers and ensure the proper
ticketing, security screening, and boarding of those passengers.</p>
<p>(5) To a Federal, State, local, tribal, territorial, foreign, or international agency, in response to queries
regarding persons who may pose a risk to transportation or national security; a risk of air piracy or terrorism or a
threat to airline or passenger safety; or a threat to aviation safety, civil aviation, or national security.</p>
<p>(6) To the Department of State and other Intelligence Community agencies to further the mission of those agencies
relating to persons who may pose a risk to transportation or national security; a risk of air piracy or terrorism or a
threat to airline or passenger safety; a threat to aviation safety, civil aviation, or national security.</p>
<p>(7) To international and foreign governmental authorities in accordance with law and formal or informal international
agreement.</p>
<p>(8) To authorized law enforcement and other government agencies, as necessary, to conduct the security assessments
and, if applicable, to facilitate payment and accounting.</p>
<p>(9) To the Department of Justice in review, settlement, defense, and prosecution of claims, complaints, and lawsuits
involving matters over which TSA exercises jurisdiction.</p>
<p>(10) To the DOJ or other Federal agency conducting litigation or in proceedings before any court, adjudicative or
administrative body, when: (a) TSA, or (b) any employee of TSA in his/her official capacity, or (c) any employee of TSA
in his/her individual capacity where DOJ or TSA has agreed to represent the employee, or (d) the United States or any
agency thereof, is a party to the litigation or has an interest in such litigation, and TSA determines that the records
are both relevant and necessary to the litigation and the use of such records is compatible with the purpose for which
TSA collected the records.</p>
<p>(11) To a congressional office from the record of an individual in response to an inquiry from that congressional
office made at the request of the individual.</p>
<p>(12) To the General Services Administration and the National Archives and Records Administration in records management
inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
<p>(13) To the Attorney General of the United States or his/her official designee, when information indicates that an
individual meets any of the disqualifications for receipt, possession, shipment, or transport of a firearm under the
Brady Handgun Violence Prevention Act. In case of a dispute concerning the validity of the information provided by TSA to
the Attorney General, or his/her designee, it shall be a routine use of the information in this system of records to
furnish records or information to the national Background Information Check System, established by the Brady Handgun
Violence Prevention Act, as may be necessary to resolve such dispute.</p>
<p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records may be stored on magnetic disc, tape, digital media, CD-ROM, bar code, magnetic stripe, optical memory
stripe, disk, integrated circuit chip, and/or other approved technologies and may also be retained in hard copy format in
secure file folders.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by the applicant’s name, unique identification record number, or other unique
administrative identifier; paper records, where applicable, are retrieved alphabetically by name or other unique
administrative identifier.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Information in this system is safeguarded in accordance with applicable rules and policies, including any
applicable TSA and DHS automated systems security and access policies. The computer system from which records could be
accessed is policy and security based, meaning access is limited to those individuals who require it to perform their
official duties. The system also maintains a real-time auditing function of individuals who access the system. Classified
information is appropriately stored in a secured facility, secured databases, and containers and in accordance with other
applicable requirements, including those pertaining to classified information.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records in this system will be retained in accordance with a schedule to be approved by the National Archives and
Records Administration.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Registered Traveler Program Manager, Credentialing Program Office, TSA Headquarters, TSA-19, East Tower,
601 S. 12th Street, Arlington, VA 22202-4220.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>To determine if this system contains a record relating to you, write to the system manager at the address
indicated above and provide your full name, current address, date of birth, place of birth, and a description of
information that you seek, including the time frame during which the record(s) may have been generated. You may also
provide your Social Security Number or other unique identifier(s) but you are not required to do so. Individuals
requesting access must comply with the Department of Homeland Security’s Privacy Act regulations on verification of
identity (6 CFR 5.21(d)).
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Same as "Notification procedure,"  above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Same as "Notification procedure,"  above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information contained in this system may be obtained from the RT applicant, law enforcement and intelligence
agency record systems, government and commercial databases, military and National Guard records, and other Department of
Homeland Security systems.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>Portions of this system are exempt from 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (H), and (I), and (f)
pursuant to 5 U.S.C. 552a(k)(1) and (k)(2).
</p></xhtmlContent></subsection></section>
<section id="tsa16" toc="yes">
<systemNumber>/TSA-016</systemNumber>
<subsection type="systemName">Transportation Security Technology Testing System.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records will be maintained at TSA Headquarters in Arlington, Virginia, at various TSA field offices, at
transportation facilities where technology testing takes place, and at digital safe sites operated by government
contractors.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>TSA employees, contractors, transportation workers, and other individuals who participate in transportation
security technology testing programs.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Records may include (1) individual’s name; (2) demographic data to include age, gender, primary language spoken,
and ethnicity; (3) administrative identification codes; (4) systems identification codes; (5) company, organization, or
affiliation; (6) issue date and other enrollment information; (7) physical descriptors, biometric data, and digital
photograph; (8) facility access level information; (9) job title and function; (10) expiration date; and (11) access
dates and times.
</p><p>Authorities for maintenance of the system:
</p><p>49 U.S.C. 114; 49 U.S.C. 44903; 49 U.S.C. 44912.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The records are maintained to document the research, development, and testing of emerging transportation security
technologies, to improve access control into transportation facilities and modes of transportation, to improve ticketing
and baggage control for passengers and crew, to improve cargo tracking capabilities, and to improve transportation
facility security plans.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>(1) To the appropriate Federal, State, local, tribal, territorial, foreign, or international agency responsible
for investigating, prosecuting, enforcing, or implementing a statute, rule, regulation, or order, where TSA becomes aware
of an indication of a violation or potential violation of civil or criminal law or regulation.
</p><p>(2) To TSA contractors, agents, grantees, experts, consultants, or other like persons when necessary to perform a
function or service related to this system of records for which they have been engaged. Such recipients are required to
comply with the Privacy Act, 5 U.S.C. 552a, as amended.
</p><p>(3) To airport operators, aircraft operators, and maritime and land transportation operators about individuals who are
their employees, job applicants, or contractors, or persons to whom they issue identification credentials or grant
clearances or access to secured areas in transportation facilities when relevant to such employment, application,
contract, the issuance of such credentials or clearances, or access to such secure areas.
</p><p>(4) To a congressional office from the record of an individual in response to an inquiry from that congressional
office made at the request of the individual.
</p><p>(5) To the Department of Justice (DOJ) or other Federal agency in the review, settlement, defense, or prosecution of
claims, complaints, and law suits involving matters over which TSA exercises jurisdiction or when conducting litigation
or in proceedings before any court, adjudicative or administrative body, when: (a) TSA, or (b) any employee of TSA in
his/her official capacity, or (c) any employee of TSA in his/her individual capacity where DOJ or TSA has agreed to
represent the employee, or (d) the United States or any agency thereof, is a party to the litigation or has an interest
in such litigation, and TSA determines that the records are both relevant and necessary to the litigation and the use of
such records is compatible with the purpose for which TSA collected the records.
</p><p>(6) To the National Archives and Records Administration or other authorized Federal agency in records management
inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>(7) To the United States Department of Transportation, its operating administrations, or the appropriate state or
local agency when relevant or necessary to (a) ensure safety and security in any mode of transportation; (b) enforce
safety-and security-related regulations and requirements; (c) assess and distribute intelligence or law enforcement
information related to transportation security; (d) assess and respond to threats to transportation; (e) oversee the
implementation and ensure the adequacy of security measures at airports and other transportation facilities; (f) plan and
coordinate any actions or activities that may affect transportation safety and security or the operations of
transportation operators; or (g) the issuance, maintenance, or renewal of a license, certificate, contract, grant, or
other benefit.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Paper, bar code, magnetic stripe, optical memory stripe, disk, video, integrated circuit chip, and electronic
media.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Data records contained within bar codes, magnetic stripe, optical memory stripe, disk, video, integrated circuit
chip, and/or electronically stored may be retrieved by employee name, unique card number, or other personal identifier;
paper records, where applicable, are retrieved alphabetically by name.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Information in this system is protected from unauthorized access through appropriate administrative, physical and
technical safeguards. Unauthorized personnel are denied physical access to the location where records are stored. For
computerized records, safeguards are in accordance with generally acceptable information security guidelines via use of
security codes, passwords, Personal Identification Numbers (PINs), and other similar safeguards.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Record disposition authority for these records is pending National Archives and Records Administration approval.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Office of Security Technology and Chief Technology Officer, TSA Headquarters, TSA-20, 601 S. 12th Street,
Arlington, VA 22202-4220.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>To determine if this system contains a record relating to you, write to the system manager at the address
indicated above and provide your full name, current address, date of birth, place of birth, and a description of
information that you seek, including the time frame during which the record(s) may have been generated. You may also
provide your Social Security Number or other unique identifier(s) but you are not required to do so. Individuals
requesting access must comply with the Department of Homeland Security’s Privacy Act regulations on verification of
identity (6 CFR 5.21(d)).
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Same as "Notification procedure,"  above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Same as "Notification procedure,"  above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>TSA obtains information in this system from the individuals who are covered by the system, their employers, or
the participating transportation facility.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="tsa17" toc="yes">
<systemNumber>/TSA-017</systemNumber>
<subsection type="systemName">Secure Flight Test Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Classified, sensitive.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at: the Office of Transportation Vetting and Credentialing (OTVC), Transportation Security
Administration (TSA), Department of Homeland Security, P.O. Box 597, Annapolis Junction, MD 20701-0597; the OTVC
assessment facility in Colorado Springs, Colorado; and at EagleForce Associates, Inc., McLean, VA.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>(a) Individuals traveling within the United States by passenger air transportation on certain domestic flights
completed in June 2004;
</p><p>(b) Individuals identified in commercial data purchased and held by a TSA contractor for purposes of comparing such
data with the June 2004 Passenger Name Records and testing the Secure Flight program;
</p><p>(c) Individuals known or reasonably suspected to be or have been engaged in conduct constituting, in preparation for,
in aid of, or related to terrorism.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>(a) Passenger Name Records (PNRs) for certain passenger air transportation flights completed in June 2004
provided by aircraft operators in response to the Transportation Security Administration Order issued November 15, 2004
(69 FR 65625), (the June 2004 PNRs), the specific contents of which often vary by aircraft operator;
</p><p>(b) Information obtained from the Terrorist Screening Center about individuals known or reasonably suspected to be or
to have been engaged in conduct constituting, in preparation for, in aid of, or related to terrorism;
</p><p>(c) Authentication scores and codes obtained from commercial data providers;
</p><p>(d) PNRs that were enhanced with certain fields of information obtained from commercial data--full name, address,
date of birth, gender--and that were provided to TSA for purposes of testing the Secure Flight program;
</p><p>(e) Commercial data purchased and held by a TSA contractor for purposes of comparing such data with June 2004 PNRs and
testing the Secure Flight program;
</p><p>(f) Results of comparisons of individuals identified in PNRs to watch lists obtained from the Terrorist Screening
Center.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>49 U.S.C. 114, 44901, and 44903.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The system will be used to test the Secure Flight program. The purpose of the program is to enhance the security
of domestic air travel by identifying passengers who warrant further scrutiny prior to boarding an aircraft. The purposes
of testing the Secure Flight program are: (1) To test the Government’s ability to process and compare passenger
information against terrorist watch list information held by the Terrorist Screening Center (TSC) in the Terrorist
Screening Database (TSDB); (2) to test the Government’s ability to operate a streamlined version of the rule set used
under the existing computer-assisted passenger prescreening system (CAPPS) currently used by aircraft operators; and (3)
to test the Government’s ability to verify the identities of passengers using commercial data and to improve the efficacy
of watch list comparisons by making passenger information more complete and accurate using commercial data. For more
detail on the purposes and conduct of the Secure Flight testing, please see the revised PIA for the Secure Flight Test
Phase, which is published below.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>(1) To the Federal Bureau of Investigation where TSA becomes aware of information that may be related to an
individual identified in the Terrorist Screening Database as known or reasonably suspected to be or having been engaged
in conduct constituting, in preparation for, in aid of, or related to terrorism.
</p><p>(2) To contractors, grantees, experts, consultants, or other like persons when necessary to perform a function or
service related to the Secure Flight program or the system of records for which they have been engaged. Such recipients
are required to comply with the Privacy Act, 5 U.S.C. 552a, as amended.
</p><p>(3) To the Department of Justice (DOJ) or other Federal agency in the review, settlement, defense, and prosecution of
claims, complaints, and lawsuits involving matters over which TSA exercises jurisdiction or when conducting litigation or
in proceedings before any court, adjudicative or administrative body, when: (a) TSA; or (b) any employee of TSA in
his/her official capacity; or (c) any employee of TSA in his/her individual capacity, where DOJ or TSA has agreed to
represent the employee; or (d) the United States or any agency thereof, is a party to the litigation or has an interest
in such litigation, and TSA determines that the records are both relevant and necessary to the litigation and the use of
such records is compatible with the purpose for which TSA collected the records.
</p><p>(4) To the National Archives and Records Administration (NARA) or other Federal agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>(5) To a Congressional office from the record of an individual in response to an inquiry from that Congressional
office made at the request of the individual.
</p><p>(6) To an agency, organization, or individual for the purposes of performing authorized audit or oversight operations.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records are stored electronically in a secure facility at the Office of Transportation Vetting and Credentialing
(OTVC), Transportation Security Administration (TSA), Department of Homeland Security, P.O. Box 597, Annapolis Junction,
MD 20701-0597; the OTVC assessment facility in Colorado Springs, Colorado; and at EagleForce, Inc., McLean, VA. The
records are stored on magnetic disc, tape, digital media, and CD-ROM, and may also be retained in hard copy format
in secure file folders.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Data are retrievable by the individual’s name or other identifier, as well as non-identifying information.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Information in this system is safeguarded in accordance with applicable rules and policies, including any
applicable OTVC, TSA, and DHS automated systems security and access policies. Access to computer systems containing the
records in this system of records is limited and can be accessed only by those individuals who require it to perform
their official duties. Safeguards also include a real time auditing function of individuals who access computer systems
containing the records in this system of records. Classified information, if any, will be appropriately stored in a
secured facility, in secured databases and containers, and in accordance with other applicable requirements, including
those pertaining to classified information.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>TSA has determined that the records contained in the Secure Flight Test records system are covered by NARA
General Records Schedule (GRS) 20, which applies to electronic records. It covers electronic files or records created
solely to test system performance, as well as hard-copy printouts and related documentation for the electronic
files/records. Under GRS 20, an agency may delete or destroy such records when the agency determines that they are no
longer needed for administrative, legal, audit, or other operational purposes. In accordance with GRS 20, TSA has
destroyed certain copies of the original PNRs provided by the air carriers. In addition, in accordance with applicable
law, TSA plans to direct and document the destruction of the remaining PNRs and commercial data in its possession or in
the possession of EagleForce as testing activities and analyses are completed.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Assistant Administrator, Secure Flight/Registered Traveler, Transportation Security Administration, P.O. Box 597,
Annapolis Junction, MD 20701-0597.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>See "Record access procedure" .
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>DHS has determined that all persons may request access to information about them contained in the system by
sending a written request to the TSA Privacy Officer, Transportation Security Administration (TSA-9), 601 South
12th Street, Arlington, VA 22202.
</p><p>To the extent permitted by law, such access will be granted. Individuals requesting access must comply with the
Department of Homeland Security Privacy Act regulations on verification of identity (6 CFR 5.21(d)). Individuals must
submit their full name, current address, and date and place of birth. Individuals must sign the request and the signature
must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of
perjury as a substitute for notarization.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="tsa19" toc="yes">
<systemNumber>/TSA-019</systemNumber>
<subsection type="systemName">Secure Flight Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent>
<p> Unclassified; Sensitive Security Information .</p>
</xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent>
<p> Records are maintained at the Transportation Security Administration (TSA), 601 South 12th Street, Arlington, VA, and at other secure TSA facilities in Annapolis Junction, Maryland and Colorado Springs, Colorado.  Records may also be maintained at the secured facilities of contractors or other parties performing functions under the Secure Flight program.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent>
<p> (a) Individuals who attempt to make reservations for travel on, who have traveled on, or who have reservations to travel on a flight operated by a U.S. aircraft operator; or a flight into, out of, or overflying the United States that is operated by a foreign air carrier; or flights operated by the U.S. Government, including flights chartered or leased by the U.S. Government;</p>
<p> (b) Non-traveling individuals who seek to obtain authorization from an aircraft or airport operator to enter the sterile area of an airport; </p>
<p> (c) For flights that TSA grants a request by the operators of leased or charter aircraft with a maximum take-off weight over 12,500 pounds to screen the individuals using Secure Flight, the following individuals:  (1) individuals who seek to charter or lease an aircraft with a maximum take-off weight over 12,500 pounds or who are proposed to be transported on or operate such charter aircraft; and (2) owners or operators of such chartered or leased aircraft; </p>
<p> (d)(1) Known or suspected terrorists identified in the Terrorist Screening Database (TSDB) maintained by the Terrorist Screening Center (TSC); and (2) individuals identified on classified and unclassified governmental databases such as law enforcement, immigration, or intelligence databases; </p>
<p> (e) Individuals who have been distinguished from individuals on a watch list through a redress process or by other means; and</p>
<p> (f) Individuals who are identified as Known Travelers for whom the Federal Government conducted a security threat assessment and determined that they do not pose a security threat. </p>
</xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p>(a) Records containing passenger and flight information (e.g., full name, date of birth, gender, redress number, known traveler number, passport information, frequent flyer designator code or other identity authentication or verification code obtained from aircraft operators, and itinerary); records containing assessments generated by aircraft operators under the Computer-Assisted Passenger Prescreening System (CAPPS); records containing the results of risk-based analysis in the TSA passenger prescreening system including boarding pass printing results; records containing information about non-traveling individuals seeking access to an airport sterile area for a purpose approved by TSA; and records containing information about individuals who seek to charter, lease, operate or be transported on aircraft with a maximum take-off weight over 12,500 pounds if TSA grants the request of an aircraft owner or operator to use Secure Flight;</p>
<p>(b) Records containing information from an individual’s form of identification or a physical description of the individual;</p>
<p> (c) Records obtained from the TSC of known or suspected terrorists in the TSDB; and records regarding individuals identified on classified and unclassified governmental watch lists;  </p>
<p> (d) Records containing the matching analyses and results of comparisons of individuals to the TSDB and other classified and unclassified governmental watch lists.</p>
<p> (e) Records related to communications between or among TSA and aircraft operators, airport operators, owners or operators of leased or charter aircraft with a maximum take-off weight over 12,500 pounds, TSC, law enforcement agencies, intelligence agencies, and agencies responsible for airspace safety or security regarding the screening status of passengers or non-traveling individuals and any operational responses to individuals identified in the TSDB; </p>
<p> (f) Records of the redress process that include information on known misidentified persons, including any Redress Number assigned to those individuals;  (g) Records that track the receipt, use, access, or transmission of information as part of the Secure Flight program; </p>
<p>(h) Electronic System for Travel Authorization status code generated by U.S. Customs and Border Protection (CBP) for international travelers; and</p>
<p>(i) Records containing information about individuals who are identified as Known Travelers. </p>
</xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p> 49 U.S.C.114, 40113, 44901, 44903, and 44909.</p>
</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p>The Secure Flight Records system are used to identify and protect against potential and actual threats to transportation security and support the Federal Government’s counterterrorism efforts by assisting in the identification of individuals who warrant further scrutiny prior to boarding an aircraft or seek to enter a sterile area or who warrant denial of boarding or denial of entry to a sterile area on security grounds.  It is also used to identify individuals who are lower-risk and therefore may be eligible for expedited security screening at the airport checkpoints.  These functions are designed to facilitate the secure travel of the public.   </p>
</xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p> (1) To the TSC in order to:  (a) Determine whether an individual is a positive identity match to an individual identified as a known or suspected terrorist in the watch list; (b) allow redress of passenger complaints; (c) facilitate an operational response (if one is deemed appropriate) for individuals who are a positive identity match to an individual identified as a known or suspected terrorist in the watch list; (d) provide information and analysis about terrorist encounters and known or suspected terrorist associates to appropriate domestic and foreign government agencies and officials for counterterrorism purposes; and (e) perform technical implementation functions necessary for the Secure Flight program.</p>
<p> (2) To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
<p> (3) To aircraft operators, foreign air carriers, airport operators, the Department of Transportation, and the Department of Defense or other U.S. Government agencies or institutions  to communicate individual screening status and facilitate an operational response (where appropriate) to individuals who pose or are suspected of posing a risk to transportation or national security.</p>
<p> (4) To owners or operators of leased or charter aircraft to communicate individual screening status and facilitate an operational response (where appropriate) to individuals who pose or are suspected of posing a risk to transportation or national security.</p>
<p> (5) To the appropriate federal, state, local, tribal, territorial, or foreign, agency regarding or to identify individuals who pose, or are under reasonable suspicion of posing a risk to transportation or national security.</p>
<p> (6) To the Department of Justice (DOJ) or other Federal agencies for purposes of conducting litigation or administrative proceedings, when:  (a) the Department of Homeland Security (DHS), or (b) any employee or former employee of DHS in his or her official capacity, or (c) any employee or former employee of DHS in his or her individual capacity where the DOJ or DHS has agreed to represent the employee, or (d) the United States or any agency thereof, is a party to the litigation or proceeding or has an interest in such litigation or proceeding.</p>
<p> (7) To the National Archives and Records Administration (NARA) or other Federal agencies pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
<p> (8) To a congressional office in response to an inquiry from that congressional office made at the request of the individual.</p>
<p> (9) To the Government Accountability Office or other agency, organization, or individual for the purposes of performing authorized audit or oversight operations, but only such information as is necessary and relevant to such audit and oversight functions.</p>
<p> (10) To the appropriate federal, state, local, tribal, territorial, or foreign agency responsible for investigating, prosecuting, enforcing, or implementing a statute, rule, regulation, or order regarding a violation or potential violation of civil or criminal law, regulation, or order when such disclosure is proper and consistent with the performance of the official duties of the person making the disclosure.</p>
<p> (11) To international and foreign governmental authorities in accordance with law and formal or informal international agreements when such disclosure is proper and consistent with the performance of the official duties of the person making the disclosure. </p>
<p> (12) To appropriate agencies, entities, and persons when (a) TSA suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; (b) TSA has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by TSA or another agency or entity) that rely upon the compromised information; and (c) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with TSA’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p> (13) To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, including the World Health Organization, for purposes of assisting such agencies or organizations in preventing exposure to or transmission of communicable or quarantinable disease or for combating other significant public health threats; appropriate notice will be provided of any identified health threat or risk. </p>
<p>Disclosure to consumer reporting agencies:</p>
<p> None.</p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>
Storage:</p>
<p> Records are maintained at the Transportation Security Administration, 601 South 12th Street, Arlington, VA, and at other secure TSA facilities in Annapolis Junction, Maryland and Colorado Springs, Colorado.  Records also may be maintained at the secured facilities of contractors or other parties that perform functions under the Secure Flight program.  The records are stored on magnetic disc, tape, digital media, and CD–ROM, and may also be retained in hard copy format in secure file folders or safes.</p>
</xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p> Data are retrievable by the individual’s name or other identifier, as well as non-identifying information such as itinerary.</p>
</xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p> All records are protected from unauthorized access through appropriate administrative, physical, and technical safeguards.  The system is also protected through a multi-layer security approach.  The protective strategies are physical, technical, administrative, and environmental in nature and provide role-based access control to sensitive data, physical access control to DHS facilities, confidentiality of communications, including encryption, authentication of sending parties, compartmentalizing databases; auditing software and personnel screening to ensure that all personnel with access to data are screened through background investigations commensurate with the level of access required to perform their duties. </p>
<p> Information in this system is safeguarded in accordance with applicable rules and policies, including any applicable TSA and DHS automated systems security and access policies.  The system will be in compliance with Office of Management and Budget and National Institute of Standards and Technology guidance.  Access to the computer system containing the records in this system of records is limited to those individuals who require it to perform their official duties.  The computer system also maintains a real-time audit of individuals who access the system.  </p>
</xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p> Records relating to an individual determined by the automated matching process to be neither a match nor a potential match to a watch list are destroyed within seven days after completion of the last leg of the individual’s directional travel itinerary.  Records relating to an individual determined by the automated matching process to be a potential watch list match are retained for seven years after the completion of the individual’s directional travel itinerary.  Records relating to an individual determined to be a confirmed watch list match are retained for 99 years after the date of match confirmation.</p>
<p> Lists of individuals stored in Secure Flight, such as individuals identified as Known Travelers and individuals who have been disqualified from eligibility to receive expedited screening as a result of their involvement in certain security incidents, are deleted or destroyed when superseded by an updated list.</p>
</xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent>
<p> Secure Flight Mission Support Branch Manager, Transportation Security Administration, TSA-19, 601 South 12th Street, Arlington, VA, 20598-6019.</p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p> To determine whether this system contains records relating to you, write to the Freedom of Information Act Office, Transportation Security Administration, TSA–20, 601 South 12th Street, Arlington, VA 20598-6020. </p>
</xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p> Requests for records access must be in writing and should be addressed to the Freedom of Information Act Office, Transportation Security Administration, TSA–20, 601 South 12th Street, Arlington, VA, 20598-6020.  Requests should conform to the requirements of 6 C.F.R. Part 5, Subpart B, which provides the rules for requesting access to Privacy Act records maintained by DHS.  The envelope and letter should be clearly marked "Privacy Act Access Request."  The request should include a general description of the records sought and must include the requester’s full name, current address, and date and place of birth.  The request must be signed and either notarized or submitted under penalty of perjury.  Some information may be exempt from access provisions.  An individual who is the subject of a record in this system may access those records that are not exempt from disclosure.  A determination whether a record may be accessed will be made at the time a request is received.</p>
<p> Individuals who believe they have been improperly denied entry by CBP, refused boarding for transportation, or identified for additional screening may submit a redress request through the DHS Traveler Redress Program ("TRIP").  See 72 FR 2294 (Jan. 18, 2007).  TRIP is a single point of contact for individuals who have inquiries or seek resolution regarding difficulties they experienced during their travel screening at transportation hubs such as airports and train stations, or crossing U.S. borders.  Through TRIP a traveler can correct erroneous data stored in Secure Flight and other data stored in other DHS databases through one application.  Additionally, for further information on the Secure Flight program and the redress options please see the accompanying Privacy Impact Assessment for Secure Flight published on the DHS website at www.dhs.gov/privacy.  Redress requests should be sent to:  DHS Traveler Redress Inquiry Program (TRIP), TSA–901, 601 South 12th Street, Arlington, VA 20598-6036 or online at http://www.dhs.gov/trip.</p>
</xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p> Same as "Notification Procedure" and "Record Access Procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p> Information contained in the system is obtained from U.S. aircraft operators, foreign air carriers, the owners and operators of leased or charter aircraft with a maximum take-off weight over 12,500 pounds who request TSA screening, the TSC, TSA employees, airport operators, Federal executive branch agencies, Federal judicial and legislative branch entities, State, local, international, and other governmental agencies, private entities for Known Traveler program participants, and the individuals to whom the records in the system pertain.  </p>
</xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent>
<p>No exemption will be asserted with respect to identifying information, or flight information, obtained from passengers, non-travelers, and aircraft owners or operators. This system, however, may contain records or information recompiled or created from information contained in other systems of records, which are exempt from certain provisions of the Privacy Act.  For these records of information only, in accordance with 5 U.S.C. 552a(j)(2) and (k)(2), TSA claims the following exemptions for these records or information from subsections (c)(3) and (4); (d)(1), (2), (3), and (4); (e)(1), (2), (3), (4)(G) through (I), (5), and (8); (f); and (g) of the Privacy Act of 1974, as amended, as necessary and appropriate to protect such information.  Certain portions or all of these records may be exempt from disclosure pursuant to these exemptions.

</p></xhtmlContent></subsection></section>
<section id="tsa20" toc="yes">
<systemNumber>/TSA-020</systemNumber>
<subsection type="systemName">Safety Information System (SIS).
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>TSA’s Information Technology contractor maintains and stores official records in electronic form on secure
servers at their office locations. TSA occupational safety and health personnel may access the official records from
their individual workstations at TSA field locations or Headquarters offices at 601 South 12th Street, Arlington, VA
22202-4220.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>TSA employees and contractors under direct supervision of TSA, who are involved in or report an incident
resulting in an occupationally-caused injury, illness, or death; employees and contractors involved in or reporting
incidents not resulting in, but having the potential to have caused damage, injury, or death; employees and contractors
(or their survivors) who file a claim for benefits under the Federal Employees’ Compensation Act; and employees and
contractors who report unsafe or unhealthful working conditions.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Records may include: Reports of occupational injuries and illnesses; workers’ compensation claims information
filed by, or on behalf of, injured employees or contractors; medical bill payment records; notes of telephone
conversations conducted in connection with claims; general information relating to the status of vocational and/or
medical rehabilitation. Specific data elements may include personally identifying information, such as: Name, Social
Security Number, birth date, gender, home address, occupation, and salary (for employees of the Department only); date
and location of the incident; and information received from various investigative agencies.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301, 7902; 29 U.S.C. 651 et seq.; 49 U.S.C. 114; E.O. 12196 (45 FR 12769, Feb. 27, 1980), 3 CFR, 1980
Comp., p. 145; 29 CFR part 1960.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>TSA will use this system to:
</p><p>(1) Provide an information source for compliance with the Occupational Safety and Health Act and other legal
requirements;
</p><p>(2) Provide a documented record of job-related incidents, injuries, and illnesses for measuring safety and health
programs’ effectiveness;
</p><p>(3) Provide summary data of accident, injury, and illness information to TSA and DHS management in a number of formats
for analytical purposes in establishing programs to reduce or eliminate loss producing hazards or conditions; and
</p><p>(4) Use as a reference when adjudicating tort and employee claims.
</p><p>TSA will use the summary data of occupational injuries or illnesses maintained in this system for analytical purposes
to improve TSA’s accident prevention policies, procedures, standards, and operations, as well as ensure internal data
quality assurance.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>(1) To the appropriate Federal, State, local, tribal, territorial, foreign, or international agency responsible
for investigating, prosecuting, enforcing, or implementing a statute, rule, regulation, or order, where TSA becomes aware
of an indication of a violation or potential violation of civil or criminal law or regulation.
</p><p>(2) To contractors, grantees, experts, consultants, or other like persons, when necessary, to perform a function or
service related to this system of records for which they have been engaged. Such recipients are required to comply with
the Privacy Act, 5 U.S.C. 552a, as amended.
</p><p>(3) To a Federal, State, local, tribal, territorial, foreign, or international agency, where such agency has requested
information relevant or necessary for the hiring or retention of an individual, or the issuance of a security clearance,
license, contract, grant, or other benefit.
</p><p>(4) To a Federal, State, local, tribal, territorial, foreign, or international agency, if necessary, to obtain
information relevant to a TSA decision concerning the hiring or retention of an employee, the issuance of a security
clearance, license, contract, grant, or other benefit.
</p><p>(5) To third parties during the course of an investigation into any matter associated with an occupationally-related
accident, injury, or illness, to the extent necessary to obtain information pertinent to the investigation.
</p><p>(6) To the Department of Justice (DOJ) or other Federal agency for purposes of conducting litigation or proceedings
before any court, adjudicative or administrative body, when (a) DHS, or (b) any employee of DHS in his/her official
capacity, or (c) any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the
employee, or (d) the United States or any agency thereof, is a party to the litigation or proceeding, or has an interest
in such litigation or proceeding.
</p><p>(7) To a congressional office from the record of an individual in response to an inquiry from that congressional
office made at the request of the individual.
</p><p>(8) To the National Archives and Records Administration or other appropriate Federal agency, in records management
inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>(9) To any agency or instrumentality charged under applicable law with the protection of the public health or safety
under exigent circumstances where the public health or safety is at risk.
</p><p>(10) To the Department of Justice, United States Attorney’s Office, or other appropriate Federal agency for further
collection action on any delinquent debt when circumstances warrant, or to a debt collection agency for the purpose of
debt collection.
</p><p>(11) To prepare periodic statistical reports on employees’ health and injury status for transmission to and review by
the Department of Labor;
</p><p>(12) To the Secretary of Labor or an authorized representative under duly promulgated regulations;
</p><p>(13) To the Office of Personnel Management, Merit Systems Protection Board, Equal Employment Opportunity Commission,
and/or similar agencies as required to litigate or otherwise process individual claims;
</p><p>(14) To physicians, the Department of Labor, various state departments of labor and industry groups, and contractors
who use information to: (a) Ascertain suitability of an employee for job assignments with regard to health (b) provide
benefits under Federal programs or contracts, and (c) maintain a record of occupational injuries or illnesses and the
performance of regular diagnostic and treatment services to patients.
</p><p>(15) To doctors, pharmacies, and other health care providers for the purpose of treating the injured party
investigating the claim, conducting medical examinations, physical rehabilitation or other services, or obtaining medical
evaluations.
</p><p>(16) To public or private rehabilitation agencies to whom the injured party has been referred for vocational
rehabilitation services so that they may properly evaluate the injured party’s experience, physical limitations and
future employment capabilities.
</p><p>(17) To Federal, state, and local agencies conducting similar or related investigations to verify whether prohibited
dual benefits were provided, whether benefits have been or are being paid properly, including whether dual benefits
prohibited by Federal law are being paid; and salary offset and debt collection procedures including those actions
required by the Debt Collection Act of 1982.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Contractors maintain and store official records in electronic form in the system location office. Employees or
contractors designated to enter and access data create and update the information on their individual workstations, and
make it accessible to TSA occupational safety and health personnel.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Personnel may retrieve data records electronically stored by employee name, social security number or other
personal identifier, or case number; and paper records, where applicable, by case number or alphabetically by name. TSA
field offices will access and retrieve information maintained in the system pertaining only to employees under their
supervision. TSA Headquarters personnel responsible for administration of the Occupational Safety and Health program will
have access to SIS data.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Information in this system is protected from unauthorized access through appropriate administrative, physical,
and technical safeguards. Unauthorized personnel are denied physical access to the location where records are stored. For
computerized records, safeguards are in accordance with generally acceptable information security guidelines via use of
security codes, passwords, Personal Identification Numbers (PINs), and other similar safeguards.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Employee case files are destroyed when 30 years old in accordance with TSA Records Schedule 2400 et seq. Computer
files are deleted after the expiration of the retention period authorized for the disposal of the hard copy file or when
no longer needed, whichever is later.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Director, Occupational Safety, Health, and Environment, Office of Administration, TSA-17, 701 South 12th
Street, Arlington, VA 22202-4220.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>To determine if this system contains a record relating to you, write to the system manager at the address
indicated above and provide your full name, current address, date of birth, place of birth, and a description of
information that you seek, including the time frame during which the record(s) may have been generated. You may also
provide your social security number or other unique identifier(s), but you are not required to do so. Individuals
requesting access must comply with the Department of Homeland Security’s Privacy Act regulations on verification of
identity (6 CFR 5.21(d)).
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Same as "Notification procedure"  above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Same as "Notification procedure"  above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>(1) The individual or their representative;
</p><p>(2) Their dependents;
</p><p>(3) Witnesses;
</p><p>(4) Employing agency;
</p><p>(5) Medical personnel and institutions;
</p><p>(6) Departmental Records;
</p><p>(7) Office of Workers’ Compensation Program;
</p><p>(8) Office of Personnel Management;
</p><p>(9) State and Federal records;
</p><p>(10) Motor Vehicle Accident Reports (SF-91); and
</p><p>(11) Excerpts of police reports, witness statements, and general correspondence.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="tsa21" toc="yes">
<systemNumber>/TSA-021</systemNumber>
 <subsection type="systemName">DHS/TSA-021 TSA Pre&amp;amp;amp;amp;amp;#9745; &amp;amp;amp;amp;amp;#0174; Application Program
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Classified, unclassified, Sensitive Security Information.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records will be maintained at the Transportation Security Administration (TSA), 601 South 12th Street,
Arlington, VA 20598, and at TSA facilities in Annapolis Junction, Maryland, and Colorado Springs, Colorado.
Records also may be maintained at other authorized TSA or DHS facilities, or by TSA contractors or other
parties that perform functions under this program.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Individuals who apply to, or participate in the TSA Pre&amp;amp;amp;amp;amp;#9745; &amp;amp;amp;amp;amp;#0174; Application Program.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>This system may contain any, or all, of the following information regarding individuals covered by this
system:
</p><p>(a) Name (including aliases or variations of spelling);
</p><p>(b) Gender;
</p><p>(c) Current and historical contact information (including, but not limited to, address, telephone number,
and email address);
</p><p>(d) Date and place of birth;
</p><p>(e) Physical description, fingerprint and/or other biometric identifier, including photograph;
</p><p>(f) Control number, Social Security Number (SSN), or other unique identification number assigned to an
individual;
</p><p>(g) Information necessary to assist in tracking submissions, payments, and transmission of records;
</p><p>(h) Other data as required by Form FD-258 (fingerprint card) or other standard fingerprint cards used
by the federal government;
</p><p>(i) Information provided by individuals covered by this system in support of their application, such as
driver’s license, passport or other documents used to verify identity, confirm immigration status, or other
eligibility requirements;
</p><p>(j) Criminal history records;
</p><p>(k) Records obtained from the Terrorist Screening Center of known or suspected terrorists in the Terrorist
Screening Database; and records regarding individuals identified on classified and unclassified governmental
watch lists used or maintained by TSA;
</p><p>(l) Records containing the matching analyses and results of comparisons of individuals to the TSDB and
other classified and unclassified governmental databases, such as law enforcement, immigration, or
intelligence databases, and individuals who have been distinguished from individuals on a watch list through a
redress process or other means;
</p><p>(m) Other information provided by federal, state, local, tribal, territorial, and foreign government
agencies or other entities relevant to the security threat assessment and adjudication of the application;
</p><p>(n) Results of any analysis performed for security threat assessments and adjudications; and
</p><p>(o) Communications between TSA and applicants regarding the results of the security threat assessments and
adjudications.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>Section 109(a)(3) of the Aviation and Transportation Security Act, Public L. 107-71 (Nov. 19, 2001,
codified at 49 U.S.C. 114 note).
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of the TSA Pre&amp;amp;amp;amp;amp;#9745; &amp;amp;amp;amp;amp;#0174;  Application Program is to:</p>
<p>(a) perform security threat assessments and to identify individuals who are a low risk to transportation or
national security and are therefore eligible to receive expedited security screening;
</p><p>(b) assist in the management and tracking of the status of security threat assessments of individuals who
apply to the TSA Pre&amp;amp;amp;amp;amp;#9745; &amp;amp;amp;amp;amp;#0174;  Application Program;</p>
<p>(c) permit the retrieval of the results of security threat assessments, including criminal history records
checks and searches in other governmental data systems, performed on the individuals covered by this system;
</p><p>(d) permit the retrieval of information from other terrorist-related, law enforcement, immigration, and
intelligence databases on the individuals covered by this system; and
</p><p>(e) track the fees incurred, and payment of those fees, when appropriate, for services related to security
threat assessments.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a
portion of the records or information contained in this system may be disclosed outside DHS as a routine use
pursuant to 5 U.S.C. 552a(b)(3) as follows:
</p><p>A. To the Department of Justice (DOJ), including U.S. Attorney Offices, or other federal agencies
conducting litigation or in proceedings before any court, or adjudicative or administrative body, when it is
relevant or necessary to the litigation and one of the following is a party to the litigation or has an
interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee or former employee of DHS in his/her official capacity;
</p><p>3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to
represent the employee; or
</p><p>4. The United States or any agency thereof.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that
congressional office made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant
to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of
records has been compromised;
</p><p>2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of
identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the
security or integrity of this system or other systems or programs (whether maintained by DHS or another agency
or entity) that rely upon the compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in
connection with DHS’ efforts to respond to the suspected or confirmed compromise and prevent, minimize, or
remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a
contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an
agency function related to this system of records. Individuals provided information under this routine use are
subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers
and employees.
</p><p>G. To an appropriate federal, state, tribal, local, territorial, or foreign government law enforcement
agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or
implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other
information, indicates a violation or potential violation of law, including criminal, civil, or regulatory
violations, and such disclosure is proper and consistent with the official duties of the person making the
disclosure.
</p><p>H. To the TSC in order to:
</p><p>1. determine whether an individual is a positive identity match to an individual identified as a known or
suspected terrorist in the watch list;
</p><p>2. allow redress for passenger complaints;
</p><p>3. facilitate an operational response, if one is deemed appropriate, for individuals who are a positive
identity match to an individual identified as a KST in the watch list;
</p><p>4. provide information and analysis about terrorist encounters and KST associates to appropriate domestic
and foreign government agencies and officials for counterterrorism purposes; and
</p><p>5. perform technical implementation functions necessary for the TSA Pre&amp;amp;amp;amp;amp;#9745; &amp;amp;amp;amp;amp;#0174;  Application
Program.</p>
<p>I. To the appropriate federal, state, local, tribal, territorial, foreign governments, or other appropriate
authority, regarding or to identify individuals who pose, or are under reasonable suspicion of posing, a risk
to transportation or national security.
</p><p>J. To foreign governmental and international authorities, in accordance with law and formal or informal
agreements.
</p><p>K. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with
counsel, when there exists a legitimate public interest in the disclosure of the information or when
disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the
accountability of DHS officers, employees, or individuals covered by the system, except to the extent it is
determined that release of the specific information in the context of a particular case would constitute an
unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:
</p><p>The records in this system are stored in secure facilities on paper and in computer-accessible storage, and
may be retained in hard copy format in secure file folders or safes.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by the individual’s name, SSN, other case number assigned by DHS/TSA or other
entity/agency, biometric, or a unique identification number, or any other identifying particular assigned or
belonging to the individual.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all
applicable DHS automated systems security and access policies. Strict controls have been imposed to minimize
the risk of compromising the information that is being stored. Access to the computer system containing the
records in this system is limited to those individuals who have a need to know the information for the
performance of their official duties and who have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>TSA intends to use existing information technology infrastructure and systems, and other established
processes to collect information and conduct the security threat assessment for the TSA Pre&amp;amp;amp;amp;amp;#9745; &amp;amp;amp;amp;amp;#0174;
 Application Program. In accordance with NARA approved retention and disposal policy
N1-560-06-006, records for individuals who:</p>
<p>A. were not identified as a possible security threat will be destroyed one year after DHS/TSA is notified
that access based on security threat assessment is no longer is valid;
</p><p>B. were identified as a possible security threat and subsequently cleared will be destroyed seven years
after completion of the security threat assessment or one year after being notified that access to the TSA
Pre&amp;amp;amp;amp;amp;#9745; &amp;amp;amp;amp;amp;#0174;Application Program based on the security threat assessment is no longer is valid,
whichever is later; and</p>
<p>C. were an actual match to a watchlist or otherwise identified as a potential or actual threat to
transportation security will be destroyed 99 years after the security threat assessment or seven years after
DHS/TSA is notified the individual is deceased, whichever is earlier.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>TSA Pre&amp;amp;amp;amp;amp;#9745; &amp;amp;amp;amp;amp;#0174; Application Program Manager, Transportation Security Administration,
TSA-19, 601 South 12th Street, Arlington, VA 20598-6019.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted certain records from this system from the notification,
access, and amendment procedures of the Privacy Act because it may contain records or information related to
law enforcement or national security purposes. However, DHS/TSA will consider individual requests to determine
whether or not information may be released. Thus, individuals seeking notification and access to any record
contained in the system of records, or seeking to contest its content, may submit a request in writing to the
DHS/TSA FOIA Officer. Written requests may be submitted to DHS/TSA FOIA Officer, Freedom of Information Act
Office, Transportation Security Administration, TSA-20, 601 South 12th Street, Arlington, VA
20598-6020; or to <i>foia.tsa@dhs.gov.</i> If an individual believes more than one
component maintains Privacy Act records concerning him or her, the individual may submit the request to the
Acting Chief Privacy Officer and Acting Chief Freedom of Information Act Officer, Department of Homeland
Security, 245 Murray Drive, SW., Building 410, STOP-0655, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of
records, your request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first
verify your identity, meaning that you must provide your full name, current address, and date and place of
birth. You must sign your request, and your signature either must be notarized or submitted under 28 U.S.C.
1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization.
While no specific form is required, you may obtain forms for this purpose from the Acting Chief Privacy
Officer and Acting Chief Freedom of Information Act Officer, <i>http://www.dhs.gov</i> or
1-866-431-0486. In addition, you should:
</p><p>• Explain why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created; and
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component
agency may have responsive records.
</p><p>If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without the above information, the component(s) may not be able to conduct an effective search, and your
request may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information contained in this system may be obtained from TSA Pre&amp;amp;amp;amp;amp;#9745; &amp;amp;amp;amp;amp;#0174; Application
Program applicants, the TSC, law enforcement, immigration, and intelligence agency record systems, other
government databases, and other DHS systems. The sources of information in the criminal history records
obtained from the Federal Bureau of Investigation are set forth in the Privacy Act system of records notice
entitled Department of Justice Federal Bureau of Investigation-009 Fingerprint Identification Records
System (72 FR 3410, January 1, 2007).
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>Portions of this system will be exempted from 5 U.S.C. 552a(c)(3); (d); (e)(1); (e)(4)(G), (H), and (I);
and (f) pursuant to 5 U.S.C. 552a(k)(1) and (k)(2). In addition, to the extent a record contains information
from other exempt systems of records, TSA will rely on the exemptions claimed for those systems. TSA will
publish a notice of proposed rulemaking for exemptions to accompany this system of records notice.
</p></xhtmlContent></subsection></section>
<section id="tsa22" toc="yes">
<systemNumber>/TSA-022</systemNumber>
<subsection type="systemName">National Finance Center Payroll Personnel System (NFC).
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Sensitive, Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Paper records are maintained by the Transportation Security Administration, 601 South 12th Street, Arlington, VA
22202; and at other secure TSA facilities in Reston, Virginia, and Mays Landing, New Jersey. Computerized data is located
at the U.S. Department of Agriculture (USDA), National Finance Center, New Orleans, LA 70129.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Current and former employees of the Transportation Security Administration. Only those individuals employed by
TSA at the time of the migration will have their records transferred to the NFC.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>All official personnel actions, basic benefits, pay, cash awards, and leave records of TSA employees. This
includes, but is not limited to, employee information; such as: Name, date of birth, social security number (SSN), home
and mailing addresses, grade, employing organization, salary, pay plan, number of hours worked, overtime, compensatory
time, leave accrual rate, leave usage and balances, Civil Service Retirement and Federal Retirement System contributions,
FICA withholdings, Federal, State, and city tax withholdings, Federal Employee Health Benefits withholdings,
garnishments, savings bonds allotments, union dues withholdings, deductions for Internal Revenue Service levies, court
ordered child support levies, Federal salary offset deductions, and information on the Leave Transfer Program and the
Leave Bank Program.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301, 2302(b)(10), 7311, 7313; E.O. 10450 (18 FR 2489, Apr. 29, 1953), 3 CFR, 1949-1953 Comp., p.
936; 5 CFR 731.103.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>Records are maintained to control and facilitate payment of salaries and benefits to TSA civilian employees.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>(1) To the Merit Systems Protection Board, the Office of Special Counsel, the Equal Employment Opportunity
Commission, the Social Security Administration, the Office of Personnel Management, the Department of Labor, the
Department of Treasury, the Internal Revenue Service, or the Federal Labor Relations Authority, in connection with
functions vested in those agencies.
</p><p>(2) To the parties or complainants, their representatives, and impartial referees, examiners, administrative judges,
or other decisionmakers in proceedings under grievance procedures, Equal Employment Opportunity procedures, Merit Systems
Protection Board, or similar procedures.
</p><p>(3) To contractors, grantees, experts, consultants, or volunteers, when necessary, to perform a function or service
related to this system of records for which they have been engaged. Such recipients are required to comply with the
Privacy Act, 5 U.S.C. 552a, as amended.
</p><p>(4) To the Department of Justice (DOJ) or other Federal agency for purposes of conducting litigation or proceedings
before any court, adjudicative, or administrative body when--
</p><p>(a) DHS; or
</p><p>(b) Any employee of DHS in his/her official capacity; or
</p><p>(c) Any employee of DHS in his/her individual capacity, where DOJ or DHS has agreed to represent the employee; or
</p><p>(d) The United States or any agency thereof, is a party to the litigation or proceeding, or has an interest in such
litigation or proceeding.
</p><p>(5) To the appropriate Federal, State, local, tribal, territorial, foreign, or international agency responsible for
investigating, prosecuting, enforcing, or implementing a statute, rule, regulation, or order; where TSA becomes aware of
an indication of a violation or potential violation of civil or criminal law or regulation.
</p><p>(6) To a Federal, State, local, tribal, territorial, foreign, or international agency, where such agency has requested
information relevant or necessary for the hiring or retention of an individual, or the issuance of a security clearance,
license, contract, grant, or other benefit.
</p><p>(7) To a Federal, State, local, tribal, territorial, foreign, or international agency, if necessary, to obtain
information relevant to a TSA decision concerning the hiring or retention of an employee, the issuance of a security
clearance, license, contract, grant, or other benefit.
</p><p>(8) To the Office of Management and Budget in connection with private relief legislation.
</p><p>(9) To a Federal, State, or local agency so that the agency may adjudicate an individual’s eligibility for a benefit.
</p><p>(10) To the Office of Federal Employee’s Group Life Insurance to support a claim for life insurance benefits.
</p><p>(11) To Federal, State, and local taxing authorities as required by law.
</p><p>(12) To the Civil Service Retirement System to report earnings for members of that system.
</p><p>(13) To courts to report earnings when garnishments are served, or in bankruptcy or wage earner proceedings.
</p><p>(14) To financial institutions and employee organizations to transmit payroll deduction information.
</p><p>(15) To officials of labor organizations as to the identity of employees contributing union dues each pay period, and
the amount of dues withheld from each employee.
</p><p>(16) To multi-employer health and welfare and pension funds, as reasonably necessary and appropriate, for proper
administration of the plan of benefits.
</p><p>(17) To the Federal, State, or local agencies for use in locating individuals and identifying their income sources to
establish paternity, establish and modify orders of support, and for enforcement action.
</p><p>(18) To the Office of Child Support Enforcement for the release to the Social Security Administration of verifying
social security numbers, in connection with the operation of the Federal Parent Locator System.
</p><p>(19) To Federal agencies as a data source for management information through he production of summary descriptive
statistics and analytical studies, in support of the functions for which the records are maintained for related studies.
</p><p>(20) To the Combined Federal Campaign in connection with payroll deductions for charitable purposes.
</p><p>(21) To requesting agencies or non-Federal entities under approved computer matching efforts to improve program
integrity, and to collect debts and other money owed under those programs (<i>e.g.</i>, matching for delinquent loans or
other indebtedness to the Government). Computer matching efforts are limited only to those data elements considered
relevant to making a determination of eligibility under particular benefit programs administered by those agencies or
entities, or by the Department of Treasury, or any constituent unit of the Department.
</p><p>(22) To a congressional office from the record of an individual, in response to an inquiry from that congressional
office made at the request of the individual.
</p><p>(23) To the National Archives and Records Administration, or other appropriate Federal agency, in records management
inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>(24) To the Department of Justice, United States Attorney’s Office, or other Federal agencies, for further collection
action on any delinquent debt when circumstances warrant.
</p><p>(25) To a debt collection agency for the purpose of debt collection.
</p><p>Disclosure to consumer reporting agencies:
</p><p>Privacy Act information may be disclosed pursuant to 5 U.S.C. 552a (b)(12) and section 3 of the Debt Collection
Act of 1982, Pub. L. 97-365. Debt information concerning a Government claim against an individual is also furnished
to consumer agencies in order to encourage repayment of an overdue debt. Disclosures may be made to a consumer reporting
agency as defined in the Fair Credit Reporting Act, 15 U.S.C. 1681a(f); or the Federal Claims Collection Act of 1966, 31
U.S.C. 701(a)(3).</p>
<p>To the U.S. Department of the Treasury when disclosure of the information is relevant to review payment and award eligibility through the Do Not Pay Working System for the purposes of identifying, preventing, or recouping improper payments to an applicant for, or recipient of, Federal funds, including funds disbursed by a state (meaning a state of the United States, the District of Columbia, a territory or possession of the United States, or a federally recognized Indian tribe) in a state-administered, federally funded program.</p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored on paper, in official personnel folders, located at TSA and its approved
storage sites. Computerized records are stored on an IBM z900 mainframe, with an IBM Shark RAID DASD system, for direct
access storage; and in STK 9840 tape silos for long-term data storage, which resides at the NFC.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records are retrievable by the individual’s name or SSN.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>The National Finance Center is located in a secured Federal complex. Within this secured building, the Computer
Operations Center is located in a controlled access room. Specific employees have been identified as system and database
administrators having specific responsibilities allowing access to TSA personnel and payroll data. Security is embedded
within the software in both the operating system and at the application level. Individuals not granted access rights
cannot view or change data. The database is monitored by software applications that provide audits of log-ins, both
successful and failed.
</p><p>Output documents from the system are maintained as hard copy documents by TSA and are safeguarded in secured cabinets
within secured rooms.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Some records are retained and disposed of in accordance with the National Archives and Records Administration’s
General Records Schedule 1 (Civilian Personnel Records). Other records are retained and disposed of in accordance with
General Records Schedule 2 (Payrolling and Pay Administration Records).
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>The TSA and the USDA National Finance Center share responsibility for system management. The first point of
contact is the Director, Human Resources IT and Decision Support, TSA-21, Transportation Security Administration
(TSA), 601 South 12th Street, Arlington, VA 22202.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>To determine whether this system contains records relating to you, write to the System Manager identified above.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Same as "Notification procedures"  above. Provide your full name and a description of information that you seek,
including the time frame during which you may have generated the records. Individuals requesting access must comply with
the Department of Homeland Security Privacy Act regulations on verification of identity (6 CFR 5.21(d)).
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Same as "Notification Procedure"  and "Record Access Procedure,"  above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information contained in the system is obtained from the USDA National Finance Center Payroll/Personnel System,
the employee’s supervisors, and the employee.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="tsa23" toc="yes">
<systemNumber>/TSA-023</systemNumber>
<subsection type="systemName">Transportation Security Administration Workplace Violence Prevention Program System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at TSA Headquarters in Arlington, Virginia and field locations.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include: Current and former employees and contractors of TSA and
members of the public who have been involved in workplace violence at TSA facilities, or while on or because of their
official duty, or who are being or have been assisted or counseled by their Workplace Violence Prevention Program.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Individual’s full name;
</p><p>• Date of birth;
</p><p>• Social Security number;
</p><p>• Work and home address;
</p><p>• Work, home and cell numbers;
</p><p>• Job title, duty station and work shift;
</p><p>• Leave and attendance records;
</p><p>• Performance records;
</p><p>• Supervisor’s name and contact information;
</p><p>• Investigative reports including:
</p><p>• Documentation of alleged inappropriate behavior;
</p><p>• Video or audio recordings; or
</p><p>• Photographs;
</p><p>• Court records;
</p><p>• Documentation of management or local assessment and response team actions.
</p><p>• Medical or mental health records including:
</p><p>• Evaluations or reports;
</p><p>• Attendance at treatment or counseling programs; or
</p><p>• Substance abuse records and prognosis.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>5 U.S.C. 301; 44 U.S.C. 3101; Aviation and Transportation Security Act, Public Law 107-71; 5 U.S.C. 7361,
7362, 7901, 7904; 42 U.S.C. 290dd-2; Executive Order 9397; and Executive Order 12564.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>This record system will maintain information gathered by and in the possession of the Workplace Violence
Prevention Program, an internal TSA program designed to prevent and respond to workplace violence.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>Note:</p><p>Records of identity, diagnosis, prognosis, or treatment of any client/patient, irrespective of whether
or when he/she ceases to be a client/patient, maintained in connection with the performance of any alcohol or drug abuse
prevention and treatment function conducted, regulated or directly or indirectly assisted by any department or agency of
the United States, shall, except as provided therein, be confidential and be disclosed only for the purposes and under
the circumstances expressly authorized in 42 U.S.C. 290dd-2. This statute takes precedence over the Privacy Act of
1974 in regard to accessibility of such records except to the individual to whom the record pertains. The routine uses
listed below do not apply to these types of records.
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body when it is necessary to the
litigation, and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where the Department of Justice or DHS has agreed to represent
the employee; or
</p><p>4. The United States or any agency thereof, and DHS determines that the records are both relevant and necessary to the
litigation and the use of such records is compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>E. To appropriate state and local authorities to report, under state law, incidents of suspected child abuse or
neglect to the extent described under 42 CFR 2.12.
</p><p>F. To any individual or entity, including medical or mental health personnel or law enforcement, when an individual
poses a risk of harm to himself/herself or others, or when relevant to medical or mental health counseling, treatment or
evaluation.
</p><p>G. To the appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental
organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a
statute, rule, regulation, order, license, or treaty where DHS determines that the information would assist in the
enforcement of civil or criminal laws.
</p><p>H. To designated officers and employees of federal, state, local, or international agencies in connection with the
hiring or continued employment of an individual, the conduct of a suitability or security investigation of an individual,
the grant, renewal, suspension, or revocation of a security clearance, or the certification of security clearances, to
the extent that DHS determines the information is relevant and necessary to the agency’s decision.
</p><p>I. To airport operators, aircraft operators, maritime and surface transportation operators, indirect air carriers, and
other facility operators on individuals who are their employees, prospective employees (job applicants), contractors, or
persons to whom they issue identification credentials or grant clearances to secured areas in transportation facilities
when relevant to such employment, application, contract, or the issuance of such credentials or clearances.
</p><p>J. To a court, magistrate, or administrative tribunal where a federal agency is a party to the litigation or
administrative proceeding in the course of presenting evidence, including disclosures to opposing counsel or witnesses in
the course of civil discovery, litigation, or settlement negotiations, or in connection with criminal law proceedings.
</p><p>K. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information except to the extent it is determined that
release of the specific information in the context of a particular case would constitute an unwarranted invasion of
personal privacy or a risk to transportation or national security.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records may be maintained on paper, audio and video recordings, and in computer-accessible storage media. Records
may also be stored on microfiche and roll microfilm. Records that are sensitive or classified are safeguarded in
accordance with agency procedures, and applicable Executive Orders and statutes.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Data may be retrieved by an individual’s name, social security number, date of birth, and/or other personal
identifier related to his/her specific case.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
automated systems security and access policies. Strict controls have been imposed to minimize the risk of compromising
the information that is being stored. Access to the computer system containing the records in this system is limited to
those individuals who have a need to know the information for the performance of their official duties and who have
appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>The Department is proposing to retain records for seven years after administrative action has been taken. Records
associated with this system will be maintained until the National Archives and Records Administration has approved the
proposed records disposition schedule.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Program Manager, National Workplace Violence Prevention, TSA-18, Transportation Security Administration,
601 S. 12th St., Arlington, VA 20598-6018.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment
procedures of the Privacy Act because it is a law enforcement system. However, TSA will consider individual requests to
determine whether or not information may be released. Individuals seeking notification of and access to any record
contained in this system of records, or seeking to contest its content, may submit a request in writing to the TSA FOIA
Officer, whose contact information can be found at <i>http://www.dhs.gov/foia</i> under "contacts."
</p><p>When seeking records about yourself from this system of records, your request must conform with the Privacy Act
regulations set forth in 6 CFR Part 5. You must first verify your identity, meaning that you must provide your full name,
current address and date and place of birth. You must sign your request, and your signature must either be notarized or
submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for
notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer
and Chief Freedom of Information Act Officer, <i>http://www.dhs.gov</i> or 1-866-431-0486. In addition
you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created;
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records; and
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Same as "Notification procedure" above. Provide your full name and a description of information that
you seek, including the time frame during which the record(s) may have been generated. Individuals requesting access must
comply with the Department of Homeland Security Privacy Act regulations on verification of identity (6 CFR 5.21(d)).
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Same as "Notification procedure" and "Record Access Procedure," above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information originates from personnel seeking assistance, TSA and its offices, counselors, treatment facilities,
and coworkers.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security has exempted portions of this system from the following provisions of the
Privacy Act, subject to the limitations set forth in (c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) of the
Privacy Act pursuant to 5 U.S.C. 552a(k)(2).
</p></xhtmlContent></subsection></section>


    <section id="uscis1" toc="yes">
        <systemNumber>/USCIS-001</systemNumber>
    <subsection type="systemName and Number">
               <p>Department of Homeland Security (DHS) U.S. Citizenship and Immigration Services (USCIS), U.S. Immigration and Customs Enforcement (ICE), U.S. Customs and Border Protection (CBP)-001 Alien File, Index, and National File Tracking System of Records.</p>
    </subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
           <p>Unclassified, sensitive, for official use only, and classified. The data may be retained in classified paper A-File or on classified networks. The nature and character of the underlying classification of these records will not change unless it is combined with classified information.</p>
        </xhtmlContent>
        </subsection>
            <subsection type="systemLocation">
                <xhtmlContent>
                    <p>Records are maintained in (1) paper A-Files; (2) electronic A-Files in EDMS and USCIS ELIS; (3) Central Index System (CIS); (4) MiDAS; and (5) National File Tracking System (NFTS). Other applications, as Enterprise Citizenship and Immigrations Services Centralized Operational Repository (eCISCOR) and the Person Centric Query Service (PCQS), may retrieve information from the aforementioned applications.</p>
                    <p> Paper A-Files: Paper A-Files are primarily located at the National Records Center in Lee’s Summit, Missouri and component field offices. Paper A-Files may also be located at Headquarters, Regional, District, and other USCIS File Control Offices (FCO) throughout the United States and foreign countries as detailed on the agency’s website, http://www.uscis.gov. A-Files may also be located at ICE and CBP offices and facilities.</p>
                    <p> EDMS: EDMS contains electronic A-Files.</p>
                    <p> USCIS ELIS: USCIS ELIS contains electronic A-Files. USCIS ELIS is an online, electronic account and case management system that stores information submitted or integrated into the system for the processing of specific applications, petitions, or requests. Submissions may originate in an electronic format or be converted to an electronic format from paper and include forms, supporting documentation associated with each submission notices of agency action (e.g., appointment notices, requests for evidence or originals, notices of intent to deny, or withdrawal notice and other final agency decisions) on a specific application, petition, or request, whether filed directly online or received by USCIS in a paper format and subsequently scanned for integration into the USCIS ELIS. USCIS ELIS also stores the USCIS Online Account Number and biographic information about the individual filing a request for an immigration decision or agency action that can be used to retrieve information about other immigration requests that may have been filed by the individual.</p>
                    <p> CIS: CIS serves as a DHS-wide index of key information for A-Files (whether paper or electronic). CIS contains information on individuals who interact with DHS. The system contains biographic information on those individuals which can be used to retrieve additional information from other systems. However, A-Files are not contained in CIS.</p>
                    <p> MiDAS: MiDAS contains digitized copies of immigration-related records that were created between 1893 and 1975.</p>
                    <p> NFTS: NFTS has the location information for all A-File records (whether paper or electronic). NFTS allows DHS to track and log the movement of paper A-Files in a centralized database, and provide timely and accurate access to the immigration case file location. This system facilitates USCIS’ ability to efficiently manage and streamline access to immigration files under its control.</p>
                    <p> The databases maintaining the above information are located within the DHS data center in the Washington, D.C. metropolitan area as well as throughout the country. Access to these electronic systems is possible at USCIS sites at Headquarters and in the field offices throughout the United States, at appropriate facilities under the jurisdiction of DHS, and other locations at which officers of DHS component agencies may be posted or operate to facilitate DHS’s homeland security mission.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="systemManager">
                <xhtmlContent>
                    <p>Associate Director, Immigration Records and Identity Services, U.S. Citizenship and Immigration Services, Department of Homeland Security, 20 Massachusetts Avenue N.W., Washington, D.C. 20529.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="authorityForMaintenance">
                <xhtmlContent>
                    <p>Authority for maintaining this system is in Sections 103 and 290 of the Immigration and Nationality Act (INA), as amended (8 U.S.C. 1103 and 1360), and the regulations issued pursuant thereto; and Section 451 of the Homeland Security Act of 2002 (Pub. L. 107-296), codified at 6 U.S.C. 271.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="purpose">
                <xhtmlContent>
                    <p>The purpose of this system of records is to facilitate administration of benefits and enforcement of provisions under the INA and related immigration statutes. A-Files (whether paper or electronic), immigration case files, CIS, MiDAS, and NFTS are used primarily by DHS employees for immigration processing and adjudication, protection of national security, and administering and enforcing immigration and nationality laws and related regulations and policy. These records also assist DHS with detecting violations of immigration and nationality laws; supporting the referral of such violations for prosecution or other appropriate enforcement action; supporting law enforcement efforts and inspection processes at the U.S. borders; as well as to carry out DHS enforcement, immigration, intelligence, and or other homeland security functions.</p>
                    <p>The purpose of the A-File is to document and maintain the official record of an individual’s immigration applications, petitions, and requests, as well as enforcement transactions as he or she passes through the U.S. immigration process. The official records in the A-Files consist of paper and electronic records of the individual’s transactions through the immigration process including records of immigration benefit requests and requests for agency action filed with USCIS, but does not include all case processing and decisional data.</p>
                    <p>The purpose of the EDMS is to store the A-File electronically and to share the A-File more efficiently within DHS and with external agencies.</p>
                    <p>The purpose of USCIS ELIS is to maintain the A-File of certain paper- and electronically-filed benefit request forms with USCIS, in addition its electronic case processing, adjudication, and management functions. The associated information and data for cases maintained in USCIS ELIS for case processing, adjudication, and management functions are covered under other USCIS SORNs.</p>
                    <p>The purpose of CIS is to maintain a repository of electronic data that summarizes the history of an immigrant or non-immigrant in the adjudication process. In addition, CIS maintains information about individuals of interest to the U.S. Government for investigative purposes. Information contained within CIS is used for immigration benefit determination and for immigration law enforcement operations by USCIS, ICE, and CBP.</p>
                    <p>The purpose of MiDAS is to maintain a repository of historical immigration case files for use by government agencies for mission-related purposes such as assisting in the determination to grant or deny a government benefit or to conduct law enforcement or other investigations. Furthermore, USCIS makes records of deceased subjects available to members of the public who request them for genealogy and other historical research purposes.</p>
                    <p>The purpose of NFTS is to account for the specific location of immigration files, and to track the request and transfer of immigration files.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="categoriesOfIndividuals">
                <xhtmlContent>
                    <p>•Lawful permanent residents;</p>
                    <p>•Naturalized U.S. citizens;</p>
                    <p>•Individuals when petitioning for benefits under the INA, as amended, on behalf of another individual;</p>
                    <p>•Individuals acting as legal guardians or designated representatives in immigration proceedings involving an individual who has a physical or developmental disability or mental impairment (as authorized under the INA);</p>
                    <p>•Individuals who receive benefits under the INA;</p>
                    <p>•Individuals who are subject to the enforcement provisions of the INA;</p>
                    <p>•Individuals who are subject to the INA and:</p>
                    <p>o are under investigation by DHS for possible national security threats or threats to the public safety,</p>
                    <p>o were investigated by DHS in the past,</p>
                    <p>o are suspected of violating immigration-related criminal or immigration-related civil provisions of treaties, statutes, regulations, Executive Orders, and Presidential Proclamations administered by DHS, or</p>
                    <p>o are witnesses and informants having knowledge of such violations;</p>
                    <p>•Relatives and associates of any of the individuals listed above who are subject to the INA;</p>
                    <p>•Individuals who have renounced their U.S. citizenship;</p>
                    <p>•Civil Surgeons who are required to conduct and certify medical examinations for immigration benefits; and law enforcement officers who certify a benefit requestor’s cooperation in the investigation or prosecution of a criminal activity;</p>
                    <p>•Preparers assisting an individual seeking an immigration benefit or agency action under the INA;</p>
                    <p>•Interpreters assisting an individual seeking an immigration benefit or agency action under the INA;</p>
                    <p>•Attorneys or representatives recognized by USCIS or accredited by the BIA; or</p>
                    <p>•Law enforcement officers who certify a benefit requestor’s cooperation in the investigation or prosecution of a criminal activity.</p>
                    <p>Note: Individuals may fall within one or more of these categories.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="categoriesOfRecords">
                <xhtmlContent>
                    <p>A. A-Files contain official record material about each individual for whom DHS has created a record under the INA such as: naturalization certificates; various documents and attachments (e.g., birth and marriage certificates); applications, petitions, and requests for immigration determinations or agency action under the immigration and nationality laws; reports of arrests and investigations; statements; other reports; records of proceedings before or filings made with the U.S. immigration courts and any administrative or federal district court or court of appeal; correspondence; and memoranda. Specific data elements may include:</p>
                    <p>•A-Numbers;</p>
                    <p>•Receipt file number(s);</p>
                    <p>•Full name and any aliases used;</p>
                    <p>•Physical and mailing addresses (to include U.S. and foreign);</p>
                    <p>•Phone numbers and email addresses;</p>
                    <p>•Social Security number (SSN);</p>
                    <p>•Date of birth;</p>
                    <p>•Place of birth (city, state, and country);</p>
                    <p>•Country of citizenship;</p>
                    <p>•Country of nationality;</p>
                    <p>•Country of residence;</p>
                    <p>•Gender;</p>
                    <p>•Physical characteristics (height, weight, race, eye and hair color, photographs, fingerprints);</p>
                    <p>•Government-issued identification information (i.e., passport, driver’s license):</p>
                    <p>o Document type;</p>
                    <p>o Issuing organization;</p>
                    <p>o Document number; and</p>
                    <p>o Expiration date;</p>
                    <p>•Military membership and/or status;</p>
                    <p>•Arrival/Departure information (record number, expiration date, class of admission, etc.);</p>
                    <p>•Federal Bureau of Investigation (FBI) Identification Number/Universal Control Number;</p>
                    <p>•Fingerprint Identification Number;</p>
                    <p>•Immigration enforcement history, including, but not limited to, arrests and charges, immigration proceedings and appeals, and dispositions including removals or voluntary departures;</p>
                    <p>•Immigration status;</p>
                    <p>•Family history;</p>
                    <p>•Travel history;</p>
                    <p>•Education history;</p>
                    <p>•Employment history;</p>
                    <p>•Criminal history;</p>
                    <p>•Professional accreditation information;</p>
                    <p>•Medical information;</p>
                    <p>•Information regarding the status of Department of Justice (DOJ), Executive Office of Immigration Review (EOIR) and (BIA) proceedings, if applicable;</p>
                    <p>•Specific benefit eligibility information as required by the benefit being sought;</p>
                    <p>•Social media handles and aliases, associated identifiable information, and search results; and</p>
                    <p>•Cassette/audio tapes, audio-visual/videotapes, CDs, DVDs, or transcripts of immigration interviews.</p>
                    <p>B. CIS contains information on those individuals who during their interactions with DHS have been assigned an A-Number. The system contains biographic information on those individuals, allowing DHS employees to quickly review the individual’s immigration status. The information in the system can then be used to retrieve additional information on the individual from other systems. The information in the system can be used to request the paper A-File from the USCIS FCO that has custody of the A-File. Specific data elements may include:</p>
                    <p>•A-Number(s);</p>
                    <p>•Full name and any aliases used;</p>
                    <p>•SSN;</p>
                    <p>•Date of birth;</p>
                    <p>•Place of birth (city, state, and country);</p>
                    <p>•Country of citizenship;</p>
                    <p>•Country of nationality;</p>
                    <p>•Gender;</p>
                    <p>•Government issued identification information (i.e., passport, driver’s license):</p>
                    <p>•Document type;</p>
                    <p>•Issuing organization;</p>
                    <p>•Document number;</p>
                    <p>•Expiration date;</p>
                    <p>•Arrival/Departure information (record number, expiration date, class of admission, etc.);</p>
                    <p>•Immigration status;</p>
                    <p>•Father and Mother’s first name;</p>
                    <p>•FBI Identification/Identification Universal Control Number;</p>
                    <p>•Fingerprint Identification Number;</p>
                    <p>•Immigration enforcement history, including arrests and charges, immigration proceedings and appeals, and dispositions including removals or voluntary departures; and</p>
                    <p>•NFTS file location and status information.</p>
                    <p>C. EDMS contains official record material about each individual for whom DHS has created a record pursuant to the INA and the same information as contained in the as a paper A-File except for material that cannot be scanned from the paper A-File (e.g., cassette/audio tapes, audio-visual/video tapes, CDs, or DVDs).</p>
                    <p>D. USCIS ELIS contains official record information and material used to determine an outcome on an immigration application, petition, or request or request agency action, such as supporting documentation, and notices of agency action on the specific immigration request. USCIS ELIS also stores the USCIS Online Account Number biographic information about the individual seeking an immigration benefit or requesting agency action that can be used to retrieve information about other requests filed by the individual, and the electronic copy of the naturalization or certificate of citizenship. Specific data elements may include, but are not limited to:</p>
                    <p>•Full Name;</p>
                    <p>•Aliases;</p>
                    <p>•Physical and mailing addresses;</p>
                    <p>•A-Number;</p>
                    <p>•USCIS Online Account Number;</p>
                    <p>•SSN;</p>
                    <p>•Date of birth and/or death;</p>
                    <p>•Country of citizenship;</p>
                    <p>•Country of nationality;</p>
                    <p>•Country of residence;</p>
                    <p>•Place of birth;</p>
                    <p>•Gender;</p>
                    <p>•Marital status;</p>
                    <p>•Military membership or status;</p>
                    <p>•Phone and fax numbers (including mobile phone numbers);</p>
                    <p>•Email address;</p>
                    <p>•Immigration status;</p>
                    <p>•Biometric information (e.g., fingerprints, photographs, signature) and other information used to conduct background and security checks;</p>
                    <p>•Physical description (e.g., height, weight, eye color, hair color, race, ethnicity, identifying marks like tattoos or birthmarks);</p>
                    <p>•Government issued identification information (i.e., passport, driver’s license):</p>
                    <p>o Document type;</p>
                    <p>o Issuing organization;</p>
                    <p>o Document number; and</p>
                    <p>o Expiration date;</p>
                    <p>•Immigration benefit type and/or agency action requested (e.g., deferred action);</p>
                    <p>•Supporting documentation as necessary (e.g. birth, marriage, and divorce certificates; licenses; academic diplomas and transcripts; appeals, requests for rehearing, and motions to reopen or reconsideration; explanatory statements; and unsolicited information submitted voluntarily by the individual seeking an immigration benefit or requesting agency action or family members in support of the request);</p>
                    <p>•Notices and communications, including:</p>
                    <p>o Requests for evidence;</p>
                    <p>o Notices of intent to deny, fine, or terminate; and</p>
                    <p>o Proofs of benefit (e.g., Employment Authorization Card, Permanent Resident Card);</p>
                    <p>•Signature;</p>
                    <p>•Fee payment information (e.g., credit card number, Pay.gov Payment Tracking Number);</p>
                    <p>•Audio-visual recordings, including interviews and naturalization ceremonies;</p>
                    <p>•Travel history;</p>
                    <p>•Education history;</p>
                    <p>•Work history;</p>
                    <p>•Records regarding organization membership or affiliation;</p>
                    <p>•Family relationships (e.g., parent, spouse, sibling, child, other dependents);</p>
                    <p>•Information regarding the status of DOJ, EOIR and BIA proceedings, if applicable;</p>
                    <p>•Case processing information such as the date an immigration request was filed or received by USCIS; status of such a request; location of record; other control number when applicable; and fee receipt data;</p>
                    <p>•Representative information, including:</p>
                    <p>o Name;</p>
                    <p>o Law Firm/recognized organization;</p>
                    <p>o Physical and mailing addresses;</p>
                    <p>o Phone and fax numbers;</p>
                    <p>o Email address;</p>
                    <p>o Attorney Bar Card Number or equivalent;</p>
                    <p>o Bar membership;</p>
                    <p>o BIA representative accreditation authorization and expiration dates;</p>
                    <p>o Law practice restriction(s) explanation; and</p>
                    <p>o Signature.</p>
                    <p>•Preparer and Interpreter information, including:</p>
                    <p>o Full Name;</p>
                    <p>o Business or Organization name;</p>
                    <p>o Physical and mailing addresses;</p>
                    <p>o Phone and fax numbers;</p>
                    <p>o Email address; and</p>
                    <p>o Signature.</p>
                    <p>E. NFTS contains the location of the A-File whether paper or electronic. Specific data elements include:</p>
                    <p>•A-Number;</p>
                    <p>•Receipt File Number;</p>
                    <p>•Primary immigration file tracking number (e.g., A-Number, Receipt File Number, Certificate Number (C-Number), and Temporary Number (T-Number));</p>
                    <p>•Location of the paper A-File and Receipt File within the USCIS FCO, as well as the history of who has maintained the paper A-File, including the component, section, and employee; and</p>
                    <p>•Name of the USCIS FCO that has jurisdiction over a case maintained in USCIS ELIS and any transfer of jurisdiction to another USCIS office.</p>
                    <p>F. MiDAS is an online interactive application system that provides an automated means for searching an index to legacy immigrant records opened or indexed prior to 1975. The MiDAS Search Engine includes the Flexoline Index, documenting the issuance of A-Numbers to individuals between August 1940 and 1948, as well as a card index to physical A-Files opened between April 1, 1944 and 1975. MiDAS index data may be used to create or update a CIS record of an A-Number issued or A-File opened prior to 1975. Specific A-File index data elements may include, but are not limited to:</p>
                    <p>•A-Number;</p>
                    <p>•C-Number;</p>
                    <p>•Full name;</p>
                    <p>•Date of birth; and</p>
                    <p>•Place of birth (city, state, and country).</p>
                </xhtmlContent>
            </subsection>
            <subsection type="recordSourceCategories">
                <xhtmlContent>
                    <p>Basic information contained in DHS records is supplied by individuals on Department of State (DOS) and DHS applications and forms. Other information comes from publicly available information obtained from the internet, public records, public institutions, interviewees, commercial data aggregators, inquiries or complaints from members of the general public and members of Congress, referrals of inquiries or complaints directed to the President or Secretary of Homeland Security, information shared through information sharing agreements, reports of investigations, sworn statements, correspondence, official reports, memoranda, and written referrals from other entities, including federal, state, and local governments, various courts and regulatory agencies, foreign government agencies, and international organizations.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="routineUsesOfRecords">
                <xhtmlContent>
                    <p>Information in this system of records contains information relating to persons who have pending or approved benefit requests for special protected classes and should not be disclosed pursuant to a routine use unless disclosure is otherwise permissible under the confidentiality statutes, regulations, or policies applicable to that information. For example, information relating to persons who have pending or approved benefit requests for protection under the Violence Against Women Act, Seasonal Agricultural Worker or Legalization claims, the Temporary Protected Status of an individual, and information relating to nonimmigrant visas protected under special confidentiality provisions should not be disclosed pursuant to a routine use unless disclosure is otherwise permissible under the confidentiality statutes, regulations, or policies applicable to that information. These confidentiality provisions do not prevent DHS from disclosing information to the DOJ and Offices of the United States Attorney as part of an ongoing criminal or civil investigation.</p>
                    <p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
                    <p>A. To DOJ, including Offices of the U.S. Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                    <p>1. DHS or any component thereof;</p>
                    <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                    <p>3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
                    <p>4. The United States or any agency thereof.</p>
                    <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                    <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
                    <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                    <p>E. To appropriate agencies, entities, and persons when:</p>
                    <p>1. DHS determines that information from this system of records is reasonably necessary and otherwise compatible with the purpose of collection to assist another federal recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach; or</p>
                    <p>2. DHS suspects or has confirmed that there has been a breach of this system of records; and (a) DHS has determined that as a result of the suspected or confirmed breach, there is a risk of harm to individuals, harm to DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (b) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                    <p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                    <p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                    <p>H. To appropriate Federal, State, tribal, local, or foreign governmental agencies or multilateral governmental organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a statute, rule, regulation, order, or license, when DHS believes the information would assist in enforcing applicable civil or criminal laws.</p>
                    <p>I. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation.</p>
                    <p>J. To an organization or person in either the public or private sector, either foreign or domestic, when there is a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, or when the information is relevant to the protection of life, property, or other vital interests of a person.</p>
                    <p>K. To clerks and judges of courts exercising naturalization jurisdiction for the purpose of granting naturalization and administering naturalization oaths, and to enable such courts to determine eligibility for naturalization or grounds for revocation of naturalization.</p>
                    <p>L. To courts, magistrates, administrative tribunals, opposing counsel, parties, and witnesses, in the course of immigration, civil, or criminal proceedings before a court or adjudicative body when it is necessary or relevant to the litigation or proceeding and the following is a party to the proceeding or has an interest in the proceeding:</p>
                    <p>1. DHS or any component thereof; or</p>
                    <p>2. Any employee of DHS in his or her official capacity; or</p>
                    <p>3. Any employee of DHS in his or her individual capacity when the</p>
                    <p>DOJ or DHS has agreed to represent the employee; or</p>
                    <p>4. The United States or any agency thereof.</p>
                    <p>M. To an attorney or representative (as defined in 8 CFR 1.2) who is acting on behalf of an individual covered by this system of records in connection with any proceeding before USCIS, ICE, or CBP or the DOJ EOIR, as required by law or as deemed necessary in the discretion of the Department.</p>
                    <p>N. To DOJ (including Offices of the United States Attorneys) or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when necessary to assist in the development of such agency’s legal and/or policy position.</p>
                    <p>O. To DOS in the processing of petitions or applications for benefits under the INA, and all other immigration and nationality laws including treaties and reciprocal agreements; or when DOS requires information to consider and/or provide an informed response to a request for information from a foreign, international, or intergovernmental agency, authority, or organization about an alien or an enforcement operation with transnational implications.</p>
                    <p>P. To appropriate Federal, State, local, tribal, territorial, or foreign governments, as well as to other individuals and organizations during the course of an investigation by DHS or the processing of a matter under DHS’s jurisdiction, or during a proceeding within the purview of the immigration and nationality laws, when DHS deems that such disclosure is necessary to carry out its functions and statutory mandates.</p>
                    <p>Q. To an appropriate Federal, State, local, tribal, territorial, or foreign government agency or organization, or international organization, lawfully engaged in collecting law enforcement intelligence, whether civil or criminal, or charged with investigating, prosecuting, enforcing, or implementing civil or criminal laws, related rules, regulations, or orders, to enable these entities to carry out their law enforcement responsibilities, including the collection of law enforcement intelligence and the disclosure is appropriate to the proper performance of the official duties of the person receiving the information.</p>
                    <p>R. To an appropriate Federal, State, local, tribal, territorial, foreign, or international agency, if the information is relevant to a requesting agency’s decision concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or other benefit, or if the information is relevant to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant, or other benefit.</p>
                    <p>S. To an appropriate Federal, State, local, tribal, territorial, foreign, or international agency, if DHS determines: (1) the information is relevant and necessary to that agency’s decision concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or other benefit; and (2) failure to disclose the information is likely to create a substantial risk to government facilities, equipment, or personnel; sensitive information; critical infrastructure; or public safety.</p>
                    <p>T. To appropriate Federal, State, local, tribal, or foreign governmental agencies or multilateral governmental organizations for the purpose of protecting the vital interests of a data subject or other persons, including to assist such agencies or organizations in preventing exposure to, or transmission of a communicable or quarantinable disease or to combat other significant public health threats; appropriate notice will be provided of any identified health threat or risk.</p>
                    <p>U. To an individual’s current employer to the extent necessary to determine employment eligibility or to a prospective employer or government agency to verify whether an individual is eligible for a government-issued credential that is a condition of employment.</p>
                    <p>V. To a former employee of DHS, in accordance with applicable regulations, for purposes of: responding to an official inquiry by a federal, state, or local government entity or professional licensing authority; or facilitating communications with a former employee that may be necessary for personnel-related or other official purposes when DHS requires information or consultation assistance from the former employee regarding a matter within that person’s former area of responsibility.</p>
                    <p>W. To the Office of Management and Budget (OMB) in connection with the review of private relief legislation as set forth in OMB Circular No. A-19 at any stage of the legislative coordination and clearance process as set forth in the Circular.</p>
                    <p>X. To the U.S. Senate Committee on the Judiciary or the U.S. House of Representatives Committee on the Judiciary when necessary to inform members of Congress about an alien who is being considered for private immigration relief.</p>
                    <p>Y. To a Federal, State, tribal, or local government agency and/or to domestic courts to assist such agencies in collecting the repayment of loans, or fraudulently or erroneously secured benefits, grants, or other debts owed to them or to the U.S. Government, or to obtain information that may assist DHS in collecting debts owed to the U.S. Government.</p>
                    <p>Z. To an individual or entity seeking to post or arrange, or who has already posted or arranged, an immigration bond for an alien, to aid the individual or entity in (1) identifying the location of the alien; (2) posting the bond; (3) obtaining payments related to the bond; or (4) conducting other administrative or financial management activities related to the bond.</p>
                    <p>AA. To a coroner for purposes of affirmatively identifying a deceased individual (whether or not such individual is deceased as a result of a crime).</p>
                    <p>BB. Consistent with the requirements of the INA, to the Department of Health and Human Services (HHS), the Centers for Disease Control and Prevention (CDC), or to any state or local health authorities, to:</p>
                    <p>1. Provide proper medical oversight of DHS-designated Civil Surgeons who perform medical examinations of both arriving aliens and of those requesting status as lawful permanent residents; and</p>
                    <p>2. Ensure that all health issues potentially affecting public health and safety in the United States are being or have been, adequately addressed.</p>
                    <p>CC. To a Federal, State, local, tribal, or territorial government agency seeking to verify or ascertain the citizenship or immigration status of any individual within the jurisdiction of the agency for any purpose authorized by law.</p>
                    <p>DD. To the Social Security Administration (SSA) for the purpose of issuing a SSN and card to an alien who has made a request for a SSN as part of the immigration process and in accordance with any related agreements in effect between the SSA, DHS, and DOS entered into pursuant to 20 CFR 422.103(b)(3), 422.103(c)(3), and 422.106(a), or other relevant laws and regulations.</p>
                    <p>EE. To Federal and foreign government intelligence or counterterrorism agencies or components when DHS becomes aware of an indication of a threat or potential threat to national or international security, or when such use is to conduct national intelligence and security investigations or assist in anti-terrorism efforts.</p>
                    <p>FF. To third parties to facilitate placement or release of an individual (e.g., at a group home, homeless shelter) who has been or is about to be released from DHS custody, but only such information that is relevant and necessary to arrange housing or continuing medical care for the individual.</p>
                    <p>GG. To an appropriate domestic government agency or other appropriate authority for the purpose of providing information about an individual who has been or is about to be released from DHS custody who, due to a condition such as mental illness, may pose a health or safety risk to himself/herself or to the community. DHS will only disclose information about the individual that is relevant to the health or safety risk they may pose and/or the means to mitigate that risk (e.g., the individual’s need to remain on certain medication for a serious mental health condition).</p>
                    <p>HH. To foreign governments for the purpose of coordinating and conducting the removal of individuals to other nations under the INA; and to international, foreign, and intergovernmental agencies, authorities, and organizations in accordance with law and formal or informal international arrangements.</p>
                    <p>II. To a Federal, State, local, territorial, tribal, international, or foreign criminal, civil, or regulatory law enforcement authority when the information is necessary for collaboration, coordination, and de-confliction of investigative matters, prosecutions, and/or other law enforcement actions to avoid duplicative or disruptive efforts and to ensure the safety of law enforcement officers who may be working on related law enforcement matters.</p>
                    <p>JJ. To the DOJ Federal Bureau of Prisons and other Federal, State, local, territorial, tribal, and foreign law enforcement or custodial agencies for the purpose of placing an immigration detainer on an individual in that agency’s custody, or to facilitate the transfer of custody of an individual from DHS to the other agency. This will include the transfer of information about unaccompanied minor children to HHS to facilitate the custodial transfer of such children from DHS to HHS.</p>
                    <p>KK. To Federal, State, local, tribal, territorial, or foreign governmental or quasi-governmental agencies or courts to confirm the location, custodial status, removal, or voluntary departure of an alien from the United States, in order to facilitate the recipients’ exercise of responsibilities pertaining to the custody, care, or legal rights (including issuance of a U.S. passport) of the removed individual's minor children, or the adjudication or collection of child support payments or other debts owed by the removed individual.</p>
                    <p>LL. To a Federal, State, tribal, territorial, local, international, or foreign government agency or multilateral governmental organization for the purpose of consulting with that agency or entity: (1) to assist in making a determination regarding redress for an individual in connection with the operations of a DHS component or program; (2) for the purpose of verifying the identity of an individual seeking redress in connection with the operations of a DHS component or program; or (3) for the purpose of verifying the accuracy of information submitted by an individual who has requested such redress on behalf of another individual.</p>
                    <p>MM. To family members, guardians, committees, friends, or other agents identified by law or regulation to receive notification, decisions, and other papers as provided in 8 CFR 103.8 from DHS or EOIR following verification of a familial or agency relationship with an alien when DHS is aware of indicia of incompetency or when an immigration judge determines an alien is mentally incompetent.</p>
                    <p>NN. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
                    <p>OO. To domestic governmental agencies seeking to determine the immigration status of persons who have applied to purchase/obtain a firearm in the United States, pursuant to checks conducted on such persons under the Brady Handgun Violence Prevention Act or other applicable laws.</p>
                    <p>To the U.S. Department of the Treasury when disclosure of the information is relevant to review payment and award eligibility through the Do Not Pay Working System for the purposes of identifying, preventing, or recouping improper payments to an applicant for, or recipient of, Federal funds, including funds disbursed by a state (meaning a state of the United States, the District of Columbia, a territory or possession of the United States, or a federally recognized Indian tribe) in a state-administered, federally funded program.</p>
                    </xhtmlContent>
            </subsection>
            <subsection type="policiesAndPractices">
                <xhtmlContent>
                    <p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="retrievability">
                <xhtmlContent>
                    <p>•A-Number;</p>
                    <p>•Full name;</p>
                    <p>•Alias;</p>
                    <p>•Sounds-like name with or without date of birth;</p>
                    <p>•Certificate of Citizenship or Naturalization Certificate number;</p>
                    <p>•Driver’s License number;</p>
                    <p>•FBI Identification/Universal Control Number;</p>
                    <p>•Fingerprint Identification Number;</p>
                    <p>•I-94 admission number;</p>
                    <p>•Passport number;</p>
                    <p>•SSN; or</p>
                    <p>•Travel Document number.</p>
                    <p>DHS/USCIS retrieves records by searching electronic A-Files in EDMS by any of the following fields alone or in any combination:</p>
                    <p>•A-Number;</p>
                    <p>•Last name;</p>
                    <p>•First name;</p>
                    <p>•Middle name;</p>
                    <p>•Aliases;</p>
                    <p>•Date of birth;</p>
                    <p>•Country of birth;</p>
                    <p>•Gender; and</p>
                    <p>•Through a full text-based search of records contained in the electronic A-File (based on optical character recognition of the scanned images).</p>
                    <p>DHS/USCIS retrieves records by searching in USCIS ELIS using the following data alone or in any combination:</p>
                    <p>•Full Name;</p>
                    <p>•Aliases;</p>
                    <p>•A-Number;</p>
                    <p>•USCIS Online Account Number;</p>
                    <p>•Date of birth;</p>
                    <p>•Immigration benefit type and/or agency action requested (e.g., deferred action);</p>
                    <p>•Fee receipt data;</p>
                    <p>•Date benefit request was filed;</p>
                    <p>•Date benefit request was received;</p>
                    <p>•Representative name;</p>
                    <p>•Preparer name; and</p>
                    <p>•Interpreter name.</p>
                    <p>DHS/USCIS retrieves the location of A-Files, whether paper or electronic, by searching in NFTS using the following data:</p>
                    <p>•A-Number;</p>
                    <p>•USCIS Online Account Number; or</p>
                    <p>•Receipt File Number.</p>
                    <p>DHS/USCIS retrieves genealogy records and requests in MiDAS by searching the following data alone or in any combination:</p>
                    <p>•Requestor’s first name;</p>
                    <p>•Requestor’s last name;</p>
                    <p>•Requestor’s Case and/or Control Number;</p>
                    <p>•Record subject’s A-Number or immigration case file number;</p>
                    <p>•Record subject’s first name;</p>
                    <p>•Record subject’s last name; and</p>
                    <p>•Record subject’s alias.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="retentionAndDisposal">
                <xhtmlContent>
                    <p>The official A-File record may take three possible forms: (1) records contained within the paper A-File; (2) records contained within the electronic record from EDMS or USCIS ELIS; or (3) a combination of paper and electronic records and supporting documentation. A-File records are maintained in accordance with N1-566-08-11. DHS/USCIS transfers A-Files to the custody of NARA 100 years after the individual’s date of birth.</p>
                    <p> CIS records are maintained in accordance with N1-566-10-01. CIS is an internal DHS-mission critical system that contains records that serve as a finding aid to agency case files. Records in CIS are permanently retained because they are the index of the A-File, summarize the history of an immigrant in the adjudication process, and identify the A-File location(s).</p>
                    <p> NFTS records are maintained in accordance with N1-566-06-01. NFTS records are temporary and deleted when they are no longer needed for agency business. NFTS records associated with an A-File will be retained on a permanent basis even after the A-File has been retired to NARA to retain accurate recordkeeping. Other immigration case files with a shorter retention period will have the associated NFTS record destroyed or deleted once the file has been destroyed.</p>
                    <p> MiDAS information (data and electronic images) pertaining to correspondence with the public and government requestor is retained and disposed every six years in accordance with the NARA General Records Schedules 4.2 and 14. The immigration case files contained in MiDAS are retained permanently. Records are transferred to NARA after 100 years after the last completed action.</p>
                    <p> Records replicated on the unclassified and classified networks for analysis and vetting will follow the same retention schedule.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="safeguards">
                <xhtmlContent>
                </xhtmlContent>
            </subsection>
            <subsection type="recordAccessProcedures">
                <xhtmlContent>
                    <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act, and those of the Judicial Redress Act (JRA) if applicable, because it is a law enforcement system. However, DHS/USCIS will consider individual requests to determine whether or not information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and USCIS Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the FOIA.</p>
                    <p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, you should:</p>
                    <p>•Explain why you believe the Department would have information on you;</p>
                    <p>•Identify which component(s) of the Department you believe may have the information about you;</p>
                    <p>•Specify when you believe the records would have been created; and</p>
                    <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
                    <p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
                    <p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="contestingRecordProcedures">
                <xhtmlContent>
                    <p>For records covered by the Privacy Act or covered JRA records, see "access procedures" above.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="notificationProcedure">
                <xhtmlContent>
                    <p>See "Record Access procedure."</p>
                    
                        
                        </xhtmlContent>
            </subsection>
            <subsection type="exemptionsClaimed">
                <xhtmlContent>
                    <p>The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act pursuant to 5 U.S.C. 552a(j)(2): 5 U.S.C. 552a(c)(3), (c)(4), (d), (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8), (e)(12), (f), (g)(1), and (h). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act pursuant to 5 U.S.C. 552a(k)(1) and (k)(2): 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f).</p>
                    <p>When this system receives a record from another system exempted in that source system under 5 U.S.C. sec. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.</p>
                    
                        
                        </xhtmlContent>
            </subsection>
            <subsection type="history">
                <xhtmlContent>
                    <p>
                        DHS/USCIS/ICE/CBP-001 Alien File, Index, and National File Tracking System of Records, 78 FR 69864 (Nov. 21, 2013); Alien File, Index, and National File Tracking SORN, 76 FR 34233l (Jun. 13, 2011); Alien File (A-File) and Central Index System (CIS) Systems of Records 78 FR 1755 (Jan. 16, 2007).
                    
                    </p></xhtmlContent></subsection></section>

    <section id="uscis4" toc="yes">
        <systemNumber>/USCIS-004</systemNumber>
        <subsection type="systemName">Department of Homeland Security (DHS)/U.S. Citizenship and Immigration Services (USCIS)-004 Systematic Alien Verification for Entitlements Program System of Records.</subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified</p>
                </xhtmlContent></subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at the USCIS Headquarters in Camp Springs, MD and at DHS/USCIS field offices. Electronic records for Verification Data Integration Service are stored in a secure, cloud hosted environment.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Chief, Verification Division, SAVE.help@uscis.dhs.gov, U.S. Citizenship and Immigration Services, Department of Homeland Security, 5900 Capital Gateway Drive, Mail Stop 2620, Camp Springs, MD 20588-0009.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>Authority for having a system for verification of citizenship and immigration status is found in Immigration and Nationality Act, Pub. L. 82-414, 66 Stat. 163 (June 27, 1952), as amended, Immigration Reform and Control Act, Pub. L. 99-603, 100 Stat. 3359 (Nov. 6, 1986); Personal Responsibility and Work Opportunity Reconciliation Act, Pub. L. 104-193, 110 Stat. 2105 (Aug. 22, 1996); Illegal Immigration Reform and Immigrant Responsibility Act, Pub. L. 104-208, 110 Stat. 3009 (Sept. 30, 1996); (8 U.S.C. 1373(c)); the REAL ID Act of 2005, Pub. L. 109-13, 119 Stat. 231 (May 11, 2005); Patient Protection and Affordable Care Act, Pub. L. 111-148, 124 Stat. 119 (Mar. 23, 2010), as amended by the Health Care and Education Reconciliation Act of 2010, Pub. L. 111-152, 124 Stat. 1029 (Mar. 30, 2010); and the Federal Aviation Administration (FAA) Extension, Safety, and Security Act of 2016, Pub. L. 114-190, 130 Stat. 615 (July 15, 2016), 8 CFR Part 213a (Affidavits of Support on Behalf of Immigrants).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to provide a service (fee-based for federal agencies) that assists federal, state, territorial, tribal, and local benefit-granting agencies, licensing bureaus, and other authorized entities for any legally mandated purpose in accordance with an authorizing statute to verify the U.S. citizenship and immigration status of individual, to include naturalized, derived, and U.S. citizens by birth, within their jurisdiction applying for benefits, and to otherwise efficiently administer their programs, to the extent that such disclosure is necessary to enable these agencies and entities to make decisions related to (1) determining eligibility for a federal, state, territorial, tribal, or local public benefit; (2) issuing a license or grant; (3) issuing a government credential; (4) conducting a background investigation; (5) voter verification or (6) any other lawful purpose. This system is also used for USCIS bond management purposes under section 213 of the Immigration and Nationality Act.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p> Categories of individuals covered by this system include: (1) individuals who have filed, for themselves or on the behalf of others, applications or other requests for federal, state, territorial, tribal or local licenses or benefits; (2) individuals who are U.S. citizens, including those who are U.S. citizens by birth, and naturalized or acquired U.S. citizens; (3) individuals who have applied for or received other immigration benefits pursuant to 8 U.S.C. 1103 et seq. or other applicable law; (4) sponsors and household members listed on the Form I-864 or I-864EZ, Affidavit of Support Under C Member; Section 213A of the Act or Form I-864A, Contract Between Sponsor and Household Member; (5) individuals subject to certain background investigations; (6) individuals accessing SAVE Case Check; (7) users and administrators who access the system to facilitate U.S citizenship and immigration status verification; and (8) other individuals whose information is verified with SAVE pursuant to an agreement between a user agency and SAVE (e.g., SAVE Memorandum of Agreement). All references to "sponsor" or "sponsors" include sponsors, joint sponsors, and substitute sponsors, as defined in the regulations at 8 CFR part 213a.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>Information collected from the benefit applicant by the user agency to facilitate U.S citizenship and immigration status verification may include the following:</p>
                <p>Individual’s full name (maiden name if applicable);</p>
                <p>Date of birth;</p>
                <p>Country of birth;</p>
                <p>Citizenship or nationality;</p>
                <p>Alien Registration Number (A-Number)/USCIS number;</p>
                <p>Other immigration number/enumerator (e.g., Employment Authorization Document card number, naturalization certificate number, citizenship certificate number);</p>
                <p>Form I-94, Arrival/Departure Record number;</p>
                <p>Visa number;</p>
                <p>Receipt number/card number;</p>
                <p>Student and Exchange Visitor Information System Identification number;</p>
                <p>Foreign Passport number and country of issuance;</p>
                <p>Social Security number (full and truncated) or other alternate number issued by the SSA (e.g. Individual Tax Identification Number (ITIN);</p>
                <p>U.S Passport number;</p>
                <p>Driver’s license number;</p>
                <p>Agency Data Universal Numbering System (DUNS) number;</p>
                <p>Benefit type sought (e.g., background check, driver’s license/state identification, education grant/loan/work study, Employment Authorization, housing assistance, Medicaid/Medical Assistance, Social Security number issuance, and voter verification); and</p>
                <p>Copies of original immigration documents.</p>
                <p>Information collected from the user agency who accesses the system to facilitate U.S citizenship and immigration status verification may include the following:</p>
                <p>Agency name;</p>
                <p>Address;</p>
                <p>Names of agency points(s) of contact;</p>
                <p>Title of agency point(s) of contact;</p>
                <p>Contact telephone number;</p>
                <p>Fax number;</p>
                <p>Email address;</p>
                <p>User identification; and</p>
                <p>Type of license/benefit(s) the agency issues (e.g., Unemployment Insurance, Educational Assistance, Driver Licensing, and Social Security Enumeration)</p>
                <p>Information collected from the Social Security Administration used by SAVE to verify U.S. citizenship or immigration status of an applicant on behalf of a SAVE user agency:</p>
                <p>Social Security number match (True/False);</p>
                <p>Name match (True/False);</p>
                <p>Date of birth match (True/False);</p>
                <p>Death indicator (Yes Deceased/Not Deceased);</p>
                <p>Citizenship indicator;</p>
                <p>"A" - U.S. citizen;</p>
                <p>"B" - Legal alien, eligible to work;</p>
                <p>"C" - Legal alien, not eligible to work;</p>
                <p>"D" – Other;</p>
                <p>"E" - Alien student - restricted work authorized; and</p>
                <p>"F" - Conditionally legalized alien.</p>
                <p>Foreign Born Indicator (Citizenship code is not present, but individual was foreign born);</p>
                <p>Alien Registration Number (Alien Number or A-Number) (where applicable); and</p>
                <p>Error code descriptions (transaction and record levels).</p>
                <p>System-generated responses because of the SAVE verification process may include:</p>
                <p>Verification case number; and</p>
                <p>SAVE response.</p>
                <p>Information collected from the benefit-granting agency about actions that an agency adjudicating Federal means-tested public benefits takes to deem sponsor income as part of applicant income for purposes of Federal means-tested benefits eligibility and to seek reimbursement from sponsors for the value of benefits provided to sponsored applicants may include:</p>
                <p>Whether the benefit-granting agency approved or denied the application for the means-tested public benefit;</p>
                <p>If the benefit-granting agency denied the application, whether the denial was based upon the information that SAVE provided in its response to the citizenship and immigration status verification request from the benefit-granting agency;</p>
                <p>Whether the benefit-granting agency deemed sponsor/household member income and, if not, the exception or reason for not doing so;</p>
                <p>Whether the benefit-granting agency sent the sponsor a reimbursement request letter (yes/no);</p>
                <p>Whether the sponsor complied with his or her reimbursement obligation; and</p>
                <p>Whether the benefit-granting agency conducted a collection action or other proceedings if the sponsor did not comply with his or her reimbursement obligation (yes/no and if yes, the status, court or forum, and docket or matter number).</p>
                <p>Individual information that may be used by SAVE to verify U.S citizenship and immigration status and provide a SAVE response includes:</p>
                <p>Full name;</p>
                <p>Date of birth;</p>
                <p>Country of birth;</p>
                <p>Alien Registration Number (Alien Number or A-Number);</p>
                <p>Social Security number;</p>
                <p>Photograph;</p>
                <p>U.S. passport;</p>
                <p>Driver’s license number or State identification number;</p>
                <p>Receipt number/card number (e.g., Form I-551, Lawful Permanent Resident Card, Form I-766, Employment Authorization Document);</p>
                <p>Other unique identifying numbers (e.g., Student and Exchange Visitor Information System Identification number, Form I-94 number, etc.);</p>
                <p> Visa number;</p>
                <p>Government-issued identification (e.g., foreign passport);</p>
                <p>Document type;</p>
                <p>Country of issuance (COI);</p>
                <p>Document number; and</p>
                <p>Expiration date.</p>
                <p>Entry/Departure date;</p>
                <p>Port of entry;</p>
                <p>Alien status change date;</p>
                <p>Naturalization date;</p>
                <p>Date admitted until;</p>
                <p>Country of citizenship;</p>
                <p>Document grant date;</p>
                <p>Document receipt number;</p>
                <p>Codes (e.g., class of admission, file control office, provision of law cited for employment authorization);</p>
                <p>Employment Authorization Document (EAD) history;</p>
                <p>Beneficiary information (e.g., full name, Alien Registration Number, date of birth, country of birth, Social Security number);</p>
                <p>Petitioner information (e.g., full name, Alien Registration Number, Social Security number, Individual Taxpayer Identification Number, Naturalization Certificate number); and</p>
                <p>Sponsor(s) and household member(s) information (e.g., Full Name, Address, Social Security number).</p>
                <p>SAVE may also access immigration case history for other individuals, including:</p>
                <p>Spouse information (e.g., full name, Alien Registration Number, date of birth, country of birth, country of citizenship, class of admission, date of admission, receipt number, phone number, marriage date and location, naturalization date and location);</p>
                <p>Children information (e.g., full name, Alien Registration Number, date of birth, country of birth, class of admission);</p>
                <p>Employer information (e.g., full name, address, supervisor's name, supervisor's phone number); and</p>
                <p>Individuals associated with background checks information (e.g., full name, Alien Registration Number, date of birth, country of birth).</p>
                <p>Case history information may include:</p>
                <p>Alert(s);</p>
                <p>Case summary comments;</p>
                <p>Case category;</p>
                <p>Date of encounter;</p>
                <p>Encounter information;</p>
                <p>Custody actions and decisions;</p>
                <p>Case actions and decisions;</p>
                <p>Bonds;</p>
                <p>Photograph;</p>
                <p>Asylum applicant receipt date;</p>
                <p>Airline and flight number;</p>
                <p>Country of residence;</p>
                <p>City (e.g., where boarded, where visa was issued);</p>
                <p>Date visa issued;</p>
                •	<p>Address in United States;</p>
                <p>Nationality;</p>
                <p>Decision memoranda; investigatory reports and materials compiled for the purpose of enforcing immigration laws;</p>
                <p>Exhibits;</p>
                <p>Transcripts; and</p>
                <p>Other case-related papers concerning aliens, alleged aliens, or lawful permanent residents brought into the administrative adjudication process.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>Records are obtained from several sources including: (A) agencies and entities seeking to determine U.S citizenship or immigration status of benefit applicants; (B) individuals seeking public licenses, benefits, or credentials; (C) other DHS components assisting with enrollment and system maintenance processes; (D) information created by SAVE; (E) state or national organizations issuing and maintaining driver’s license or state identification information such as the NLETS; and (F) information collected and covered by the following USCIS, DHS, and other federal agency systems of records:</p>
                <p>DHS/USCIS/ICE/CBP-001 Alien File, Index, and National File Tracking System of Records, September 18, 2017 (Fed. Reg.82 Fed. Reg. 43556);</p>
                <p>DHS/USCIS-007 Benefits Information System, October 10, 2019 (84 Fed. Reg. 54622);</p>
                <p>DHS/USCIS-010 Asylum Information and Pre-Screening System of Records, November 30, 2015 (80 Fed. Reg. 74781);</p>
                <p>DHS/USCIS-018 Immigration Biometric and Background Check (IBBC) Records System of Records, July 31, 2018 (83 Fed. Reg. 36950);</p>
                <p>DHS/CBP-005 Advance Passenger Information System (APIS), March 13, 2015 (80 Fed. Reg. 13407);</p>
                <p>DHS/CBP-006 Automated Targeting System, May 22, 2012 (77 Fed. Reg. 30297);</p>
                <p>DHS/CBP-007 CBP Border Crossing Information (BCI), December 13, 2016 (81 Fed. Reg. 89957);</p>
                <p>DHS/CBP-011 U.S. Customs and Border Protection TECS, December 19, 2008 (73 Fed. Reg. 77778);</p>
                <p>DHS/CBP-016 Nonimmigrant Information System, March 13, 2015 (80 Fed. Reg. 13398);</p>
                <p>DHS/CBP-021 Arrival and Departure Information System (ADIS), November 18, 2015 (80 Fed. Reg. 72081);</p>
                <p>DHS/ICE-001 DHS/ICE-001 Student and Visitor Exchange Program (SEVP), December 8, 2021 (86 Fed. Reg. 69663);</p>
                <p>DHS/ICE-011 Criminal Arrest Records and Immigration Enforcement Records (CARIER) System of Records, July 5, 2024 (89 Fed. Reg. 55638);</p>
                <p>DHS/ALL-003 Department of Homeland Security General Training Records, November 25, 2008 (73 Fed. Reg.71656);</p>
                <p>DHS/ALL-016 Correspondence Records, September 26, 2018 (83 Fed. Reg. 48645);</p>
                <p>JUSTICE/EOIR-002, Office of the Chief Administrative Hearing Officer (OCAHO) Case Management System (CMS) August 16, 2019 (84 Fed. Reg. 42016);</p>
                <p>STATE-05 Overseas Citizens Services Records and Other Overseas Records, November 20, 2023 (88 Fed. Reg. 80804);</p>
                <p>STATE-26 Passport Records, March 24, 2015 (80 Fed. Reg.15653);</p>
                <p>STATE-39 Visa Records, November 8, 2021 (86 Fed. Reg. 61822) and</p>
                <p>SSA-60-0058 Master Files of Social Security Number Holders and Social Security Number Applications, February 20, 2025 (90 Fed. Reg. 10025)</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agency conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. sec. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS's efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, territorial, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To approved federal, state, territorial, tribal, and local government agencies for any legally mandated purpose (e.g. benefits, licensing, voter verification) in accordance with their authorizing statute or law and when an approved agreement (e.g., Memorandum of Agreement (MOA) or Computer Matching Agreement (CMA) is in place between DHS and the entity.</p>
                <p>J. To a federal, state, territorial, tribal, or local government agency that oversees or administers Federal means-tested public benefits for purposes of seeking reimbursement from sponsors for the value of benefits provided to sponsored applicants, as well as reporting on overall sponsor deeming and agency reimbursement efforts to appropriate administrative and oversight agencies.</p>
                <p>K. To airport operators to determine the eligibility of individuals seeking unescorted access to any Security Identification Display Area of an airport, as required by the Federal Aviation Administration (FAA) Extension, Safety, and Security Act of 2016.</p>
                <p>L. To the Social Security Administration and other federal, state, tribal, territorial, local, governments and other authorized entities to assist user agencies determine U.S. citizenship and immigration status of an individual when a DHS approved agreement is in place between DHS and the entity.</p>
                <p>M. To federal, state, territorial, tribal, local, and other entities that have legal authority to provide oversight to programs and benefits supported by SAVE for auditing of program requirements and when a DHS-approved agreement (e.g. Memorandum of Agreement (MOA) or Computer Matching Agreement (CMA)) is in place between DHS and the entity.</p>
                <p>N. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS's officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p> DHS/USCIS stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic discs, tapes, and digital media. Additionally, information is located within the USCIS Verification Data Integration Service SAVE Program.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p> DHS/USCIS retrieves records by name of applicant or other unique identifier including, but not limited to Verification Case Number, Alien Registration Number (Alien Number or A-Number), I-94 Number, Social Security number, Passport number, Driver’s license number, Visa number, Student and Exchange Visitor Information System Identification number, or by the submitting agency name.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>SAVE records are covered by NARA-approved records retention and disposal schedule, N1-566-08-07. Records collected in the process of enrolling in SAVE and in verifying U.S. citizenship or immigration status are stored and retained in SAVE for ten (10) years from the date of the completion of verification. However, if the records are part of an ongoing investigation, they will be retained until completion of the investigation and pursuant to the records retention schedule associated with the investigation. This initial 10-year period is based on the statute of limitations for most types of misuse or fraud possible using SAVE (under 18 U.S.C. 3291, the statute of limitations for false statements or misuse regarding passports, citizenship, or naturalization documents).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p> DHS/USCIS safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. USCIS has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>Absent an authorized exception for disclosure exists, the U.S. Department of Homeland Security protects and withholds the Privacy Act of 1974/Judicial Redress Act of 2015 covered records by law for U.S. citizens, lawful permanent residents, and Judicial Redress Act covered persons from covered countries.</p>
                <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request online at https://first.uscis.gov/ or submit a request in writing to the Chief Privacy Officer and to the USCIS FOIA/Privacy Act Officer whose contact information can be found at http://www.dhs.gov/foia under "Contacts Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, DC 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about him or her may be available under the Freedom of Information Act.</p>
                <p>When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual's request must conform with the Privacy Act regulations set forth in 6 CFR part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual's signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                <p>Explain why the individual believes the Department would have information on him/her;</p>
                <p>Identify which component(s) of the Department the individual believes may have the information about him/her;</p>
                <p>Specify when the individual believes the records would have been created; and</p>
                <p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
                <p>If an individual's request is seeking records pertaining to another living individual, the first individual must include a statement from the second individual certifying his/her agreement for the first individual to access his/her records.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual's request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered the Judicial Redress Act records, see "Record Access Procedures" above. For records not covered by the Privacy Act or Judicial Redress Act, individuals may still amend their records at a USCIS Field Office by contacting the USCIS Contact Center at 1-800-375-5283 (TTY 800-767-1833) to request an appointment.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures."</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>None. However, when this system receives a record from another system exempted in that source system under 5 U.S.C. 552a, DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>85 Fed. Reg. 31798 (May 27, 2020); 81 Fed. Reg. 78619 (November 8, 2016); 76 Fed. Reg. 58525 (September 21, 2011); 73 Fed. Reg. 75445 (December 11, 2008); 73 Fed. Reg. 10793 (February 28, 2008); 72 Fed. Reg. 17569 (April 9, 2007); 67 Fed. Reg. 64134 (October 17, 2002); and 66 Fed. Reg. 46812 (September 7, 2001).</p>
            </xhtmlContent>
        </subsection>
    </section>


    <section id="(USCIS)-005 " toc="yes">
        <systemNumber>USCIS-005 </systemNumber>
        <subsection type="systemName">
            DHS/United States Citizenship and Immigration Services (USCIS)-005 Intercountry Adoptions Security
        </subsection>


        <p>Security classification:</p>
        <p> Unclassified, Sensitive.</p>
        <p>System location:</p>
        <p> Intercountry adoption records are maintained in the ACMS or CAMINO IT systems and associated electronic and paper files located at the USCIS NBC, service centers, and domestic and international field offices.</p>
    
    
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p> Categories of individuals covered by this system include:</p>
                <p>1) All individuals, including the applicant or petitioner (and spouse, if married), seeking an intercountry adoption through the Hague Adoption Convention process or non-Hague orphan process;</p>
                <p>2) All individuals who meet the definition of an adult member of the household; </p>
                <p>3) Any other individual whose presence in the applicant’s or petitioner’s residence is relevant to the suitability of the prospective adoptive parent(s) suitability to adopt;</p>
                <p>4) Representatives, including attorneys, adoption service providers, and form preparers, of the prospective adoptive parent(s);</p>
                <p>5) Children being adopted; and</p>
                <p>6) Birth mothers, fathers, or custodians of adopted children.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>Information about the prospective adoptive parent(s) may include:</p>
                <p>•Full Name;</p>
                <p>•Alias(es);</p>
                <p>•Gender;</p>
                <p>•Physical and mailing address;</p>
                <p>•Address abroad;</p>
                <p>•Email address;</p>
                <p>•Telephone number;</p>
                <p>•Physical Description (e.g., height, weight, eye color, hair color, race, ethnicity, identifying marks like tattoos or birthmarks);</p>
                <p>•Biometric (i.e., fingerprints and photographs) and other information (i.e., race, ethnicity, weight, height, eye color, hair color) collected to conduct background checks;</p>
                <p>•Date of birth;</p>
                <p>•Country of birth;</p>
                <p>•City of birth;</p>
                <p>•State or Province of birth;</p>
                <p>•Citizenship status;</p>
                <p>•Naturalization history;</p>
                <p>•Certificate of Citizenship or Certificate of Naturalization Number;</p>
                <p>•Residence status;</p>
                <p>•Marital history and status;</p>
                <p>•Spouse’s immigration status;</p>
                <p>•USCIS Online Account Number;</p>
                <p>•Social Security number (SSN);</p>
                <p>•A-Number;</p>
                <p>•USCIS Receipt/Case Number;</p>
                <p>•Passport number;</p>
                <p>•Country of adoption;</p>
                <p>•Adoption filing history;</p>
                <p>•Payments made and anticipated future payments in relation to the adoption;</p>
                <p>•Criminal history;</p>
                <p>•Photographs;</p>
                <p>•Accommodations/Disabilities;</p>
                <p>•Home study;</p>
                <p>•Medical and Social History (e.g., vaccinations, referrals, communicable diseases, physical or mental disorders); </p>
                <p>•Financial Information (e.g., income, expenses, scholarships, savings, assets, property, financial support, supporter information, life insurance, debts, encumbrances, tax records);</p>
                <p>•Supporting Documentation as necessary (e.g., birth, marriage, divorce certificates; licenses; academic diplomas; academic transcripts; appeals or motions to reopen or reconsider decisions; explanatory statements; deoxyribonucleic acid (DNA) results; and unsolicited information submitted voluntarily by the benefit requestor or family members in support of a benefit request);</p>
                <p>•Proof of Citizenship (i.e., unexpired passport, citizenship/naturalization certificate, school records, census records, church records, and affidavits);</p>
                <p>•Proof of Marriage and termination of previous marriages;</p>
                <p>•Criminal and National Security Background Check Results;</p>
                <p>•Case Decision; and</p>
                <p>•Signature.</p>
                <p>Information about any adult members of the household may include:</p>
                <p>•Full Name;</p>
                <p>•Alias(es);</p>
                <p>•Gender;</p>
                <p>•Mailing address;</p>
                <p>•Email address;</p>
                <p>•Telephone number;</p>
                <p>•Date of birth;</p>
                <p>•County of birth;</p>
                <p>•State or Province of birth;</p>
                <p>•City, Town, or Village of Birth;</p>
                <p>•A-Number;</p>
                <p>•SSN;</p>
                <p>•Passport number;</p>
                <p>•Relationship to Prospective adoptive parent(s);</p>
                <p>•Photographs;</p>
                <p>•Physical Description (e.g., height, weight, eye color, hair color, race, ethnicity, identifying marks like tattoos or birthmarks);</p>
                <p>•Biometric (i.e., fingerprints and photographs) and other information (i.e., race, ethnicity, weight, height eye color, hair color) collected to conduct background checks;</p>
                <p>•Criminal and National Security background check results;</p>
                <p>•Accommodations/Disabilities;</p>
                <p>•Signature; and</p>
                <p>•Email Address.</p>
                <p>Information about the adoptive beneficiary may include:</p>
                <p>•Full Name at Birth;</p>
                <p>•Full Name at Present;</p>
                <p>•Alias;</p>
                <p>•Date of birth;</p>
                <p>•Gender;</p>
                <p>•Country of birth</p>
                <p>•City/Town/Village of Birth;</p>
                <p>•Place of habitual residency;</p>
                <p>•Present legal custodian;</p>
                <p>•Present address;</p>
                <p>•Address where the beneficiary will reside;</p>
                <p>•Parental history and custody information (e.g., birthmothers, fathers, or custodians of adopted children);</p>
                <p>•Date of adoption;</p>
                <p>•Country/Place of adoption;</p>
                <p>•Physical or mental afflictions;</p>
                <p>•Accommodations/disabilities;</p>
                <p>•A-Number;</p>
                <p>•Passport number;</p>
                <p>•Relationship to prospective adoptive parent, if any;</p>
                <p>•Article 16 Report, which is an official report from countries that are party to the Hague Adoption Convention, on a child’s psychological, social, medical history, and reasons the child is in need of an adoptive placement;</p>
                <p>•Supporting Documentation as Necessary (e.g., birth certificate, appeals or motions to reopen or reconsider decisions, DNA results); and</p>
                <p>•Case decision.</p>
                <p>Information about birth mothers, fathers, or custodians of adopted children:</p>
                <p>•Name;</p>
                <p>•Date of birth;</p>
                <p>•Relationship to adopted child(ren) (e.g., living birth parent, surviving birth parent, sole birth parent); and</p>
                <p>•Supporting documentation (identity information, death certificates, DNA test results, description of how the child beneficiary was abandoned or released for adoption, consent to adoption, adoption documentation, etc.).</p>
                <p>Information about the adoption service providers and home study preparers may include:</p>
                <p>•Name;</p>
                <p>•Organization name;</p>
                <p>•Mailing address;</p>
                <p>•Phone and Fax numbers;</p>
                <p>•Email address;</p>
                <p>•Accreditation or Approval status; and</p>
                <p>•Signature.</p>
                <p>Information about the preparer may include:</p>
                <p>•Full name;</p>
                <p>•Organization or Business name;</p>
                <p>•Business State ID number;</p>
                <p>•Employer Tax Identification Number;</p>
                <p>•Physical and Mailing addresses;</p>
                <p>•Email address;</p>
                <p>•Phone and fax numbers;</p>
                <p>•Relationship to benefit requestor; and</p>
                <p>•Signature.</p>
                <p>Information about the representative may include:</p>
                <p>•Name;</p>
                <p>•Law firm/Recognized organization name;</p>
                <p>•Physical and Mailing addresses;</p>
                <p>•Phone and fax numbers;</p>
                <p>•Email address;</p>
                <p>•USCIS Online Account Number;</p>
                <p>•Attorney Bar Card Number or equivalent;</p>
                <p>•Bar Membership;</p>
                <p>•Accreditation date;</p>
                <p>•Source of Accreditation;</p>
                <p>•Board of Immigration Appeals Representative Accreditation;</p>
                <p>•Expiration date;</p>
                <p>•Law Practice Restriction Explanation; and</p>
                <p>•Signature.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p> The legal authorities for intercountry adoption from Hague Adoption Convention countries include the Hague Adoption Convention, the Intercountry Adoption Act of 2000, 8 U.S.C. 1101(b)(1)(G) (INA 101(b)(1)(G)), and 8 CFR 204.300-204.314. The legal authorities for intercountry adoption for non-Hague Adoption Convention countries include the Intercountry Adoption Universal Accreditation Act of 2012, Consolidated Appropriations Act of 2014 sec. 7083, 8 U.S.C. 1101(b)(1)(F) (INA 101(b)(1)(F)), and 8 CFR 204.3.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p> USCIS collects information on prospective adoptive parents and other associated individuals in order to assess the suitability and eligibility of the prospective adoptive parent(s) to adopt. USCIS also collects information pertaining to the child to be adopted to determine whether he or she is eligible to immigrate as an immediate relative of a U.S. citizen under INA sec. 101(b)(1)(F) or (G). USCIS collects information on organizations that facilitate the adoption process, including law firms, home study preparers, accredited agencies, approved persons, exempted providers, supervised providers, and other adoption service providers so that USCIS can track and verify those entities that are authorized to participate in the adoption process. Finally, as a fraud monitoring tool, USCIS collects available biographic information relating to the birth parents and the custodians of the children being adopted.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p> Except as permitted by the Privacy Act, 5 U.S.C. 552a and applicable routine uses, USCIS may not disclose or give access to any information or record relating to any applicant, petitioner, spouse (if married), or adult member of the household to any individual or entity other than that person, including an accredited agency, approved person, exempted provider, supervised provider, or other adoption service provider, absent written consent, as provided by the Privacy Act, 5 U.S.C. 552a.</p>
                <p> In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3). Even when a valid routine use permits disclosure of information from this system of records to a third party, in some cases such disclosure may not be permissible because of confidentiality laws and policies that limit the sharing of information regarding individuals applying for certain immigration benefits. These confidentiality provisions may be subject to certain exceptions which would allow for disclosure, such as in the case of a criminal or civil investigation.</p>
                <p> A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other federal agencies conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>  1. DHS or any component thereof;</p>
                <p>  2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>  3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
                <p>  4. The United States or any agency thereof.</p>
                <p> B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p> C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
                <p> D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p> E. To appropriate agencies, entities, and persons when:</p>
                <p> 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;</p>
                <p> 2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
                <p> 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
                <p> F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>G. To an appropriate federal, state, local, tribal, territorial, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation, enforcing, or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To clerks and judges of courts exercising naturalization jurisdiction to enable such courts to determine eligibility for naturalization and grounds for revocation of naturalization.</p>
                <p>I. To DOS in the processing of visas, applications, or petitions for benefits under the INA, and all other immigration and nationality laws including treaties and reciprocal agreements.</p>
                <p>J. To an attorney or representative (as defined in 8 CFR 1.2) who is acting on behalf of an individual covered by this system of records.</p>
                <p>K. To appropriate federal, state, tribal, and local government law enforcement and regulatory agencies, foreign governments, and international organizations for example the Department of Defense, the DOS, the Department of the Treasury, the United Nations, and INTERPOL and individuals and organizations during the course of an investigation by DHS or the processing of a matter under DHS's jurisdiction, or during a proceeding within the purview of the immigration and nationality laws, when necessary to elicit information required by DHS to carry out its functions and statutory mandates.</p>
                <p>L. To an appropriate federal, state, tribal, local, or foreign government agency or organization, or international organization, lawfully engaged in collecting law enforcement intelligence, whether civil or criminal, or charged with investigating, prosecuting, enforcing, or implementing civil or criminal laws, related rules, regulations or orders, to enable these entities to carry out their law enforcement responsibilities, including the collection of law enforcement intelligence, and the disclosure is appropriate to the proper performance of the official duties of the person making the disclosure.</p>
                <p>M. To an appropriate federal, state, local, tribal, territorial, foreign, or international agency, if the information is relevant and necessary to a requesting agencies decision concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant, or other benefit and when disclosure is appropriate to the proper performance of the official duties of the person making the request.</p>
                <p>N. To a federal, state, or local government agency, or employer seeking to verify or ascertain the citizenship or immigration status of any individual within the jurisdiction of the agency or employer for any purpose authorized by law.</p>
                <p>O. To the Social Security Administration (SSA) for the purpose of issuing a Social Security number and card to an alien who has made a request for a Social Security number as part of the immigration process and in accordance with any related agreements in effect between the SSA, DHS, and the DOS entered into pursuant to 20 CFR 422.103(b) (3); 422.103(c); and 422.106(a), or other relevant laws and regulations.</p>
                <p>P. To federal and foreign government intelligence or counterterrorism agencies or components when DHS becomes aware of an indication of a threat or potential threat to national or international security, or when the information is needed to assist in anti-terrorism efforts and disclosure is appropriate to the proper performance of the official duties of the person making the disclosure.</p>
                <p>Q. To officials of other federal, state, and local government agencies and adoption agencies and social workers to elicit information required for making a final determination of the prospective adoptive parent’s ability to care for a beneficiary or the beneficiary’s immigration eligibility.</p>
                <p>R. To the Department of Health and Human Services to obtain information about children who are under its legal custody and/or protection.</p>
                <p>S. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
                <p>Disclosure to consumer reporting agencies:</p>
                <p> None.</p>
                
                </xhtmlContent>
    </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>Storage:</p>
                <p> DHS/USCIS stores records in this system electronically or on paper in secure facilities in a locked drawer or behind a locked door. The records may be stored on magnetic disc, tape, cloud services, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p> Records may be retrieved by an individual’s name, date of birth, address, A-Number, Receipt Number, SSN, or a combination thereof.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p> DHS/USCIS safeguards records according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS/USCIS has imposed strict controls imposed to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p> DHS/USCIS stores the physical documents (paper forms) and supplemental documentation in the Alien File and processes applications and petitions in the respective DHS/USCIS case management system. Physical applications and supplemental documentation is stored in the Alien File. The A-File records are permanent whether hard copy or electronic. USCIS transfers the A-Files to the custody of NARA 100 years after the individual’s date of birth.</p>
                <p> Electronic benefits information is archived and disposed of in accordance with NARA-approved retention schedule for the respective USCIS case management systems (CAMINO and ACMS):</p>
                <p>•Electronic data pertaining to intercountry applications and petitions filed internationally are electronically stored in CAMINO. NARA approved the CAMINO retention schedule [N1-566-12-06] on April 17, 2013. CAMINO retains records 25 years from the last completed action.</p>
                <p>•Electronic data pertaining to intercountry applications and petitions filed domestically are stored in ACMS. USCIS is working with NARA to develop a retention and disposal schedule for data contained within ACMS. USCIS proposal for retention and disposal of these records is to store and retain adoption related records for 15 years, during which time the records will be archived. The 15 year retention period is derived from the length of time USCIS may interact with a customer.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p> Assistant Center Director, Adoptions, National Benefits Center, Overland Park, KS 66213; and Director, Refugee, Asylum, and International Operations Directorate, 20 Massachusetts Avenue NW, Washington, D.C. 20529.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the National Records Center (NRC) FOIA/PA Office, P.O. Box 648010, Lee’s Summit, MO 64064-8010. The NRC can be found at http://www.dhs.gov/foia under "Contacts." If an individual believes more than one component maintains Privacy Act (PA) records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act (FOIA) Officer, Department of Homeland Security, 245 Murray Drive, S.W., Building 410, STOP-0655, Washington, D.C. 20528.</p>
                <p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, you should:</p>
                <p>•Explain why you believe the Department would have information on you;</p>
                <p>•Identify which component(s) of the Department you believe may have the information about you;</p>
                <p>•Specify when you believe the records would have been created; and</p>
                <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
                <p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p> See "Notification procedure" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p> See "Notification procedure" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>  Information contained in this system of records is primarily supplied by prospective adoptive parents and adult members of the household on forms associated with either the Hague Adoption Convention process or the orphan intercountry adoption process. These application and petition forms include:</p>
                <p>•Form I-600, Petition to Classify Orphan as an Immediate Relative</p>
                <p>•Form I-600A, Application for Advance Processing of Orphan Petition</p>
                <p>•Form I-600A/Form I-600, Supplement 1 (Listing of Adult Member of the Household)</p>
                <p>•Form I-800, Petition to Classify Convention Adoptee as an Immediate Relative</p>
                <p>•Form I-800A, Application for Determination of Suitability to Adopt a Child from Convention Country</p>
                <p>•Form I-800A Supplement 1 (Listing of Adult Member of the Household)</p>
                <p>•Form I-800A Supplement 2 (Consent to Disclose Information)</p>
                <p>•Form I-800A Supplement 3 (Request for Action on Approved Form I-800A)</p>
                <p>Information contained in this system of records is also obtained through representatives of prospective adoptive parents and other organizations involved in an intercountry adoption case including information from the child’s country of origin; the home study prepared by an authorized home study preparer submitted to USCIS in furtherance of the intercountry adoption immigration process; interviews performed by authorized USCIS and DOS personnel of individuals seeking to adopt; and data obtained from other DHS and non-DHS federal agency’s systems and databases, including the Federal Bureau of Investigation, DOS, and U.S. Customs and Border Protection.</p>
                <p> Specifically, Intercountry Adoptions Security stores and uses information from the following USCIS, DHS, and other federal agency systems of records:</p>
                <p>•DHS/USCIS/ICE/CBP-001 Alien File, Index, and National File Tracking System of Records, 78 FR 69864 (November 21, 2013);</p>
                <p>•DHS/USCIS-002 Background Check Service, 72 FR 31082 (June 5, 2007);</p>
                <p>•DHS/USCIS-003 Biometric Storage System, 72 FR 17172 (April 6, 2007);</p>
                <p>•DHS/USCIS-006 Fraud Detection and National Security Records (FDNS) 77 FR 47411 (August 8, 2012);</p>
                <p>•DHS/USCIS-007 Benefit Information System, 81 FR 72069, (October 19, 2016)</p>
                <p>•DHS/CBP-011 U.S. Customs and Border Protection TECS, 73 FR 77778 (December 19, 2008);</p>
                <p>•DHS/CBP-021 Arrival and Departure Information System (ADIS), 80 FR 72081 (November 18, 2015);</p>
                <p>•DHS/NPPD-004 DHS Automated Biometric Identification System (IDENT), 72 FR 31080 (June 5, 2007);</p>
                <p>•JUSTICE/FBI-002 The FBI Central Records System, 72 FR 3410 (January 25, 2007);</p>
                <p>•JUSTICE/FBI-009 Fingerprint Identification Records System (FIRS), 72 FR 3410 (January 25, 2007);</p>
                <p>•STATE-05 Overseas Citizens Services Records, 73 FR 24343 (May 2, 2008);</p>
                <p>•STATE-26 Passport Records, 76 FR 34966 (July 6, 2011); and</p>
                <p>•STATE-39 Visa Records, 77 FR 65245 (October 25, 2012).</p>
                
                </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
    <xhtmlContent>
    <p>claimed for the system:</p>
                <p> None.</p>
            </xhtmlContent>
        </subsection>
    


    
    <systemNumber>/USCIS-006</systemNumber>
<subsection type="systemName">Fraud Detection and National Security Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained in the IT system FDNS-DS, other information technology systems developed to support
FDNS, and paper files at the USCIS Headquarters in Washington, DC and field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include: (1) Individuals who are the subjects of administrative
and/or criminal investigations; (2) individuals who have submitted potentially fraudulent petitions and applications for
immigration benefits; (3) individuals whose petitions or applications have been randomly selected for assessment of the
effectiveness of fraud detection programs; (4) individuals of concern based on possible national security reasons, public
safety concerns, or criminal activity; (5) preparers, representatives, and petitioning organizations that may have
submitted applications or petitions on behalf of individuals noted in the above four categories; (6) individuals who are
associated with an application but are not actually applying for a benefit; and (7) individuals associated with cases
that were investigated but determined not to pose any concern.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Individual’s name;
</p><p>• Alias(es);
</p><p>• Social Security Number (SSN);
</p><p>• Alien Number (A-Number);
</p><p>• Associated A-Numbers of close relatives and associates;
</p><p>• Application Receipt Number;
</p><p>• Address (home and business);
</p><p>• Date of birth;
</p><p>• Place of birth;
</p><p>• Driver’s License number;
</p><p>• Country of citizenship;
</p><p>• Citizenship status;
</p><p>• Gender;
</p><p>• Telephone number(s);
</p><p>• Email address;
</p><p>• Place of employment and employment history;
</p><p>• Associated organizations (e.g., corporate information relating to employing entity if employment-based
immigration benefits are being sought, and place of business or place of worship if such organization is sponsoring the
applicant);
</p><p>• Family lineage;
</p><p>• Bank account information and/or financial transaction history;
</p><p>• Marriage record;
</p><p>• Civil or criminal history information;
</p><p>• Information on social media Web sites and other information publicly available on the Internet;
</p><p>• Education record;
</p><p>• Information from commercial data providers in order to verify information provided on the application;
</p><p>• Biometric identifiers (e.g., photographic facial image, fingerprints, signature, etc);
</p><p>• Investigation or background check information generated by DHS/CBP TECS National Crime Information Center,
other government agencies, and other data and analysis generated as part of the adjudication process;
</p><p>• Other unique identifying numbers or characteristics such as passport number(s), visa number(s), account
numbers, and other identifiers associated with travel; and
</p><p>• Representative and Preparer information maintained in the G-28, Notice of Entry of Appearance as an
Attorney or Accredited Representative
</p><p>• Name
</p><p>• Address
</p><p>• Phone number
</p><p>• Fax number
</p><p>• Email address
</p><p>• Bar number
</p><p>• State of bar membership
</p><p>• Date of filing
</p><p>• Associated client case information
</p><p>Note: </p><p>FDNS may gather additional data on Representatives or Preparers that are the subject or associated with a
fraud, public safety, or national security concern based on applications submitted on behalf of individuals seeking an
immigration benefit.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>The Immigration and Nationality Act of 1952, as amended (INA), 8 U.S.C. 1101, <i>et seq.</i> provides the legal
authority to collect information used for the adjudication of immigration benefits. In addition to other delegations, the
Secretary of Homeland Security in Homeland Security Delegation No. 0150.1 paragraphs (H), (I), (J), (M), and (S) has
delegated the following authorities to USCIS:
</p><p>• Authority under section 103(a)(1) of the INA, 8 U.S.C. 1103(a)(1), to administer the immigration laws (as
defined in section 101(a)(17) of the INA).
</p><p>• Authority to investigate alleged civil and criminal violations of the immigration laws, including but not
limited to alleged fraud with respect to applications or determinations within the Bureau of Citizenship and Immigration
Services (BCIS) [predecessor to USCIS] and make recommendations for prosecutions or other appropriate action when deemed
advisable.
</p><p>• Authority to fingerprint and register aliens.
</p><p>• Authority to maintain files and records systems as necessary.
</p><p>• Authority to take and consider evidence.
</p><p>In addition, the joint USCIS-ICE anti-fraud strategy was recommended by the <i>Conference Report, FY 2005
Appropriations Act.</i> The Appropriations Act authorized USCIS to conduct law enforcement and background checks on every
applicant, beneficiary, and petitioner prior to granting immigration benefits.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to support USCIS’ efforts to strengthen the integrity of the nation’s legal
immigration system and to ensure that immigration benefits are not granted to individuals who may pose a threat to
national security and/or public safety. In addition, FDNS is responsible for detecting, deterring, and combatting
immigration benefit fraud.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body, when it is relevant or necessary to
the litigation and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof.
</p><p>B. To a congressional office from the record of an individual in response to a written inquiry from that congressional
office made pursuant to a Privacy Act waiver from the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or General Services Administration pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but
only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. DHS has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or
property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or
programs (whether maintained by DHS or another agency or entity) or harm to the individuals who rely upon the compromised
information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To federal and foreign government intelligence or counterterrorism agencies when USCIS reasonably believes there to
be a threat or potential threat to national or international security for which the information may be useful in
countering the threat or potential threat, when DHS reasonably believes such use is to assist in anti-terrorism efforts.
</p><p>I. To the Department of State in the processing of petitions or applications for benefits under the Immigration and
Nationality Act, and all other immigration and nationality laws including treaties and reciprocal agreements.
</p><p>J. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by utilizing multiple data points that include an individual’s last name, A-
Number, Application Receipt Number, Date of Birth, or other unique identifier.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions. FDNS-DS maintains a real-time auditing function of individuals who
access the system.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>FDNS records have a retention period of 15 years from the date of the last interaction between FDNS personnel and
the individual after which time the record will be deleted from FDNS. The 15-year retention schedule provides FDNS with
access to information that is critical to the investigation of suspected or confirmed fraud, criminal activity, egregious
public safety, and/or national security concerns. Upon closure of a case, any information that is needed to make an
adjudicative decision (such as a statement of findings report), whether there was or was not an indication of fraud,
criminal activity, egregious public safety, and/or national security concerns, will be transferred to the A-File
and maintained under the A-File retention period of 100 years after the individual’s date of birth.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Associate Director of FDNS, United States Citizenship and Immigration Services, 111 Massachusetts Avenue NW.,
Washington, DC 20529.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the notification, access, amendment, and certain
accounting procedures of the Privacy Act. These exemptions also apply to the extent that information in this system of
records is recompiled or is created from information contained in other systems of records. As noted below, where a
record received from a law enforcement system has been exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will
claim the same exemptions for those records that are claimed for the original primary systems of records from which they
originated and claims any additional exemptions in accordance with this rule. Individuals seeking notification of and
access to any record contained in this system of records, or seeking to contest its content, may submit a request in
writing to National Records Center, FOIA/PA Office P.O. Box 648010 Lee’s Summit, MO 64064-8010. If an individual
believes more than one component maintains Privacy Act records concerning him or her the individual may submit the
request to the Chief Privacy Officer, Department of Homeland Security, 245 Murray Drive SW., Building 410, STOP-
0655, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide:
</p><p>• Provide an explanation of why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created; and
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records.
</p><p>If your request seeks records pertaining to another living individual, you must include a statement from that
individual certifying his/her agreement for you to access his/her records.
</p><p>Without the above bulleted information DHS may not be able to conduct an effective search, and your request may be
denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Parties who file USCIS applications supply the basic information contained in this system. Other information
comes from petitions, law enforcement and intelligence agencies, public institutions, interviews of witnesses, public
records, sworn statements, official reports, commercial data aggregators, publicly available information on the Internet,
and from members of the general public.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act
pursuant to 5 U.S.C. 552a(k)(2): 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).
Additionally, many of the functions in this system require retrieving records from law enforcement systems. Where a
record received from another system has been exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will claim the
same exemptions for those records that are claimed for the original primary systems of records from which they originated
and claims any additional exemptions in accordance with this rule.
</p></xhtmlContent></subsection></section>
<section id="uscis7" toc="yes">
<systemNumber>/USCIS-007</systemNumber>
    <subsection type="systemName">
        Department of Homeland Security (DHS)/U.S. Citizenship and Immigration Services (USCIS)-007 Benefits Information System.
    </subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p>Unclassified and Classified.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p> Records are maintained at the U.S. Citizenship and Immigration Services Headquarters in Washington, D.C., and DHS/USCIS service centers and domestic and international field offices. Records are also maintained in DHS/USCIS information technology (IT) systems (e.g., Computer Linked Application Information Management System (CLAIMS) 3, USCIS Electronic Immigration System (ELIS), Case and Activity Management for International Operations (CAMINO)).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p> Chief, Immigration Records and Identity Services, Identity and Information Management Division (IIMD), fieldrequests@uscis.dhs.gov, U.S. Citizenship and Immigration Services, Department of Homeland Security, 20 Massachusetts Avenue NW, Washington, D.C. 20529.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="authorityForMaintenance">
        <xhtmlContent>
            <p>Sections 103 and 290 of the Immigration and Nationality Act, as amended (8 U.S.C. secs. 1103 and 1360), the regulations issued pursuant thereto; and Section 451 of the Homeland Security Act of 2002 (Pub. L. 107-296).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p>The purpose of this system is to permit USCIS’s collection, use, maintenance, dissemination, and storage of paper and electronic immigration-related request information, including case processing and decisional data. These records assist in the processing of immigrant and nonimmigrant benefit requests and other immigration-related requests from the time when USCIS collects the information from the immigration-related requestor until the case receives a final decision in the relevant case management system.  This system of records enables DHS/USCIS to process benefit requests electronically, determine the status of pending benefit requests, account for and control the receipt and disposition of any fees and refunds collected, conduct searches pursuant to requests under the Freedom of Information Act (FOIA) and Privacy Act, and locate related physical and automated files to support DHS/USCIS responses to inquiries about these records. This system of records may also be used in support of monitoring employee performance and production reporting purposes, including tracking an employee or contractor’s workload and efficiency in processing a particular benefit request, managing workloads, and providing statistical analyses to USCIS leadership.</p>
            <p>DHS/USCIS maintains a replica of some or all of the data in application databases on DHS unclassified and classified networks to allow for analysis and vetting consistent with the above stated purposes and this published notice.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
            <p> Categories of individuals covered by this system include (1) individuals who have filed, for themselves or on the behalf of others (benefit requestors and beneficiaries and other immigration-related requestors), requests for immigration benefits and other requests under the Immigration and Nationality Act as amended, and/or who have submitted fee payments or received refunds from such requests; (2) current, former, and potential derivatives of requestors (family members); (3) sponsors (e.g., employers, law enforcement officers, or other individuals); (4) attorneys; (5) prospective representatives seeking recognition from and current accredited representatives recognized by USCIS and/or by the Board of Immigration Appeals (Representatives); (6) interpreters; (7) individuals who assist in the preparation of the immigration-related request forms (Preparers); (8) individuals who make fee payments on behalf of the immigration-related requestor; (9) physicians who conduct immigration-related medical examinations; and (10) obligors (surety) and their agents.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p>Information about benefit requestors, beneficiaries, and family members may include: </p>
            <p>•  Full name;</p>
            <p>•  Alias(es);</p>
            <p>•  Physical, destination, and mailing addresses (including foreign and domestic);</p>
            <p>•  Unique Identifying Numbers (e.g., Alien Number, USCIS Online Account Number, Social Security number (SSN), and Data Universal Numbering System (DUNS) Number);</p>
            <p>•  Date of birth and/or death;</p>
            <p>•  Nationality and/or Place of Birth (including city, region, and country of birth);</p>
            <p>•  Country or countries of citizenship;</p>
            <p>•  Country of Residence;</p>
            <p>•  Gender and/or sex;</p>
            <p>•  Marital status;</p>
            <p>•  Military status;</p>
            <p>•  Phone and fax numbers;</p>
            <p>•  Email address;</p>
            <p>•  Immigration status;</p>
            <p>•  Publicly available social media information and information from public-facing websites;</p>
            <p>•  Responses to questions on immigration benefit forms (e.g., have you ever claimed to be a U.S. citizen; do you owe any federal, state, or local taxes)</p>
            <p>•  Government-issued identification (e.g., passports, driver’s license, national ID):</p>
            <p>o Document type;</p>
            <p>o Issuing country and/or organization;</p>
            <p>o Document number;</p>
            <p>o Issue Date;</p>
            <p>o Expiration date;</p>
            <p>•  Notices and communications, including:</p>
            <p>o Receipt notices;</p>
            <p>o Requests for Evidence;</p>
            <p>o Notices of Intent to Deny;</p>
            <p>o Proofs of benefit;</p>
            <p>•  Type of benefit requested;</p>
            <p>•  Signature (wet and digital);</p>
            <p>•  Immigration-related request fee payment information (e.g., credit card number, Pay.gov Payment Tracking Number); and</p>
            <p>•  Audio-visual recordings, including interviews and naturalization ceremonies.</p>
            <p>Benefit-specific eligibility information about benefit requestor, beneficiaries, and family members may include:</p>
            <p>•  Other unique identifying numbers (e.g., Department of State (DOS)-Issued Personal Identification Number, ICE Student and Exchange Visitor Number, USCIS E-Verify Company Identification Number);</p>
            <p>•  Arrival/Departure Information;</p>
            <p>•  Immigration history (e.g., citizenship/naturalization certificate number, apphrensions, removals, explanations);</p>
            <p>•  Familial relationships (e.g., parent, spouse, sibling, child, other dependents);</p>
            <p>•  Relationship Practices (e.g., polygamy, custody, guardianship);</p>
            <p>•  USCIS Receipt/Case Number;</p>
            <p>•  Personal background information (e.g., involvement with national security threats; criminal offenses; Communist Party membership; participation in torture, genocide, killing, injuring, forced sexual contact, limiting or denying others religious beliefs, weapons distribution, or combat training; service in military or other armed groups, work in penal or detention systems);</p>
            <p>•  Records regarding organization membership or affiliation;</p>
            <p>•  Health information (e.g., vaccinations, referrals, communicable diseases, physical or mental disorders or disabilities, prostitution, drug or alcohol abuse);</p>
            <p>•  Travel history;</p>
            <p>•  Education history;</p>
            <p>•  Employment history;</p>
            <p>•  Professional accreditation information;</p>
            <p>•  Financial information (e.g., credit scores and reports, income, expenses, scholarships, savings, assets, property, financial support, supporter information, life insurance, debts, encumbrances, and tax records);</p>
            <p>•  Public benefit information (e.g., applications and receipt, as well as certication of receipt of pubic benefits);</p>
            <p>•  Supporting documentation as necessary (e.g., birth, marriage, and divorce certificates; licenses; academic diplomas; academic transcripts; appeals or motions to reopen or reconsider decisions; explanatory statements; deoxyribonucleic acid (DNA) results; and unsolicited information submitted voluntarily by the benefit requestor or family members in support of a benefit request);</p>
            <p>•  Physical description (e.g., height, weight, eye color, hair color, race, ethnicity, identifying marks like tattoos or birthmarks);</p>
            <p>•  Description of relationships between benefit requestors, representatives, preparers, and family members;</p>
            <p>•  Information regarding the status of Department of Justice (DOJ), Executive Office of Immigration Review (EOIR) proceedings, if applicable; and</p>
            <p>•  Case processing information such as date benefit requests were filed or received by USCIS, benefit request status, location of record, other control number when applicable, and fee receipt data.</p>
            <p>Information about Benefit Sponsors may include:</p>
            <p>•  Full name;</p>
            <p>•  Gender and/or sex;</p>
            <p>•  Physical and mailing addresses;</p>
            <p>•  Phone and fax numbers;</p>
            <p>•  Country of domicile;</p>
            <p>•  Date of birth;</p>
            <p>•  Place of birth;</p>
            <p>•  Citizenship information;</p>
            <p>•  SSN;</p>
            <p>•  A-Number;</p>
            <p>•  USCIS Online Account Number;</p>
            <p>•  Employment information;</p>
            <p>•  Financial information (e.g., income, expenses, scholarships, savings, assets, property, financial support, supporter information, life insurance, debts, encumbrances, tax records);</p>
            <p>•  Position and relationship to an organization (e.g., manager of a company seeking formal recognition by USCIS);</p>
            <p>•  Family relationships (e.g., parent, spouse, sibling, natural, foster, and/or adopted child, other dependents); and</p>
            <p>•  Relationship practices (e.g., polygamy, custody, guardianship).</p>
            <p>Information about Attorneys and current and/or prospective Accredited Representatives include:</p>
            <p>•  Name;</p>
            <p>•  USCIS Online Account Number</p>
            <p>•  Other identifying numbers (e.g., Attorney Bar Card Number or equivalent);</p>
            <p>•  Law firm/recognized organization;</p>
            <p>•  Physical and mailing addresses;</p>
            <p>•  Phone and fax numbers;</p>
            <p>•  Email address;</p>
            <p>•  Bar membership and Bar number;</p>
            <p>•  Accreditation date;</p>
            <p>•  Board of Immigration Appeals Representative Accreditation;</p>
            <p>•  Expiration date;</p>
            <p>•  Law Practice Restriction explanation;</p>
            <p>•  Educational and training history;</p>
            <p>•  Work history and qualifications;</p>
            <p>•  Academic and professional achievements;</p>
            <p>•  Letters of recommendation; and</p>
            <p>•  Signature.</p>
            <p>Information about Preparers and Interpreters may include:</p>
            <p>•  Full name;</p>
            <p>•  Organization;</p>
            <p>•  Business State ID number;</p>
            <p>•  Employer Tax Identification Number;</p>
            <p>•  Physical and mailing addresses;</p>
            <p>•  Email address;</p>
            <p>•  Phone and fax numbers;</p>
            <p>•  Relationship to benefit requestor; and</p>
            <p>•  Signature.</p>
            <p>Information about individuals who make fee payments on behalf of the immigration-related requestor includes:</p>
            <p>•  Name;</p>
            <p>•  Email address;</p>
            <p>•  Phone number;</p>
            <p>•  Mailing address; and</p>
            <p>•  Payment information.</p>
            <p>Information about Physicians may include:</p>
            <p>•  Full name;</p>
            <p>•  Organization name;</p>
            <p>•  Physical and mailing addresses;</p>
            <p>•  Phone number;</p>
            <p>•  Fax number;</p>
            <p>•  Professional experience;</p>
            <p>•  License number;</p>
            <p>•  Other Physician Identifying Number(s);</p>
            <p>•  Licensing state and date of issuance;</p>
            <p>•  Type of degree/license (such as medical doctor, doctor of osteopathy, or clinical psychologist);</p>
            <p>•  Type of medical practice;</p>
            <p>•  Examination dates of the benefit requestor;</p>
            <p>•  Clinical methods used to diagnose benefit requestor;</p>
            <p>•  Email address; and</p>
            <p>•  Signature.</p>
            <p>Information about obligor (surety) and its agents (co-obligor) may include:</p>
            <p>•  Name;</p>
            <p>•  Unique Identifying Number (e.g., Taxpayer Identification Number (TIN), Employer Identification Number (EIN), SSN (in some cases, the obligor’s TIN or EIN may be the individual’s SSN, and DUNS Number));</p>
            <p>•  Address (Street, City, State and Zip Code);</p>
            <p>•  Telephone Number;</p>
            <p>•  Email Address;</p>
            <p>•  Power of Attorney (evidencing authority to act on behalf of the surety) and Power of Attorney number;</p>
            <p>•  Signature; and</p>
            <p>•  Information about bond (e.g., receipt number and bond amount).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p>DHS/USCIS obtains records from the immigration requestor, his or her Representative, Physician, Preparer, Interpreter, or obligor and its agents. DHS/USCIS personnel may input information as they process a case, including information from internal and external sources to verify whether a requestor or family member is eligible for the immigration-related request. BIS also stores and uses information from the following USCIS, DHS, and other federal agency systems of records:</p>
            <p>•  DHS/USCIS/ICE/CBP-001 Alien File, Index, and National File Tracking System of Records, September 18, 2017 (82 Fed. Reg. 43556);</p>
            <p>•  DHS/USCIS-005 Inter-Country Adoptions, November 8, 2016 (81 Fed. Reg. 78614);</p>
            <p>•  DHS/USCIS-006 Fraud Detection and National Security Records (FDNS), August 8, 2012 (77 Fed. Reg. 47411);</p>
            <p>•  DHS/USCIS-010 Asylum Information and Pre-Screening System of Records, November 30, 2015 (80 Fed. Reg. 74781);</p>
            <p>•  DHS/USCIS-017 Refugee Case Processing and Security Screening Information System of Records, October 19, 2016 (81 Fed. Reg. 72075);</p>
            <p>•  DHS/USCIS-018 Immigration Biometric and Background Check Records System of Records, July 31, 2018 (83 Fed. Reg. 36950);</p>
            <p>•  DHS/CBP-011 U.S. Customs and Border Protection TECS, December 19, 2008 (73 Fed. Reg. 77778);</p>
            <p>•  DHS/ICE-001 Student and Exchange Visitor Information System, January 5, 2010 (75 Fed. Reg. 412);</p>
            <p>•  DHS/ICE-011 Criminal Arrest Records and Immigration Enforcement Records (CARIER), October 19, 2016 (81 Fed. Reg. 72080);</p>
            <p>•  DHS/CBP-021 Arrival and Departure Information System (ADIS), November 18, 2015 (80 Fed. Reg. 72081);</p>
            <p>•  JUSTICE/EOIR-001 Records and Management Information System, January 25, 2007 (72 Fed. Reg. 3410);</p>
            <p>•  JUSTICE/FBI-002 The FBI Central Records System, January 25, 2007 (72 Fed. Reg. 3410);</p>
            <p>•  JUSTICE/FBI-009 Fingerprint Identification Records System (FIRS), January 25, 2007 (72 Fed. Reg. 3410);</p>
            <p>•  DOL/ETA-7 Employer Application and Attestation File for Permanent and Temporary Alien Workers, January 10, 2012 (77 Fed. Reg. 1728);</p>
            <p>•  STATE-05 Overseas Citizens Services Records, May 2, 2008 (73 Fed. Reg. 24343);</p>
            <p>•  STATE-26 Passport Records, July 6, 2011 (76 Fed. Reg. 34966);</p>
            <p>•  STATE-39 Visa Records, October 25, 2012 (77 Fed. Reg. 65245); and</p>
            <p>•  TREASURY/FMS-017 Collections Records, May 15, 2009 (74 Fed. Reg. 23006).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p>Information in this system of records contains information relating to individuals who received benefit requests for special protected classes and should not be disclosed pursuant to a routine use unless disclosure is otherwise permissible under the confidentiality statutes, regulations, or policies applicable to that information. For example, information relating to individuals who received benefit requests for protection under the Violence Against Women Act, Seasonal Agricultural Worker or Legalization claims, the Temporary Protected Status of an individual, and information relating to nonimmigrant visas protected under special confidentiality provisions should not be disclosed pursuant to a routine use unless disclosure is otherwise permissible under the confidentiality statutes, regulations, or policies applicable to that information. These confidentiality provisions do not prevent DHS from disclosing information to the DOJ and U.S. Attorneys Offices as part of an ongoing criminal or civil investigation.</p>
            <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
            <p>A. To DOJ, including the U.S. Attorney’s Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation or proceeding and one of the following is a party to the litigation or proceeding or has an interest in such litigation or proceeding:</p>
            <p>1. DHS or any component thereof;</p>
            <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
            <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
            <p>4. The United States or any agency thereof.</p>
            <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
            <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
            <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
            <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
            <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
            <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations, and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
            <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            <p>I. To clerks and judges of courts exercising naturalization jurisdiction for the purpose of filing applications for naturalization and to enable such courts to determine eligibility for naturalization or grounds for revocation of naturalization.</p>
            <p>J. To the Department of State for the purpose of assisting in the processing of benefit requests under the Immigration and Nationality Act, and all other immigration and nationality laws including treaties and reciprocal agreements.</p>
            <p>K. To appropriate federal, state, tribal, and local government law enforcement and regulatory agencies, foreign governments, and international organizations, as well as to other individuals and organizations during the course of an investigation by DHS or the processing of a matter under DHS jurisdiction, or during a proceeding within the purview of the immigration and nationality laws, when DHS deems that such disclosure is necessary to carry out its functions and statutory mandates to elicit information required by DHS to carry out its functions and statutory mandates.</p>
            <p>L. To an appropriate federal, state, local, tribal, foreign, or international agency, if the information is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an individual; issuance of a security clearance, license, contract, grant, or other benefit; or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant, or other benefit and when such disclosure is appropriate to the proper performance of the official duties of the person making the request.</p>
            <p>M. To the Office of Management and Budget in connection with the review of private relief legislation as set forth in OMB Circular No. A-19 at any stage of the legislative coordination and clearance process as set forth in the Circular.</p>
            <p>N. To an attorney or representative (as defined in 8 CFR 1.1(j)) who is acting on behalf of an individual covered by this system of records in connection with any proceeding before DHS/USCIS or the DOJ Executive Office for Immigration Review.</p>
            <p>O. To a federal, state, tribal, or local government agency to assist such agencies in collecting the repayment of loans, fraudulently or erroneously secured benefits, grants, or other debts owed to them or to the U.S. Government, or to obtain information that may assist USCIS in collecting debts owed to the U.S. Government;</p>
            <p>P. To a foreign government to assist such government in collecting the repayment of loans, fraudulently or erroneously secured benefits, grants, or other debts owed to it, provided that the foreign government in question:</p>
            <p>1. Provides sufficient documentation to establish the validity of the stated purpose of its request; and</p>
            <p>2. Provides similar information to the United States upon request.</p>
            <p>Q. To a coroner for purposes of affirmatively identifying a deceased individual (whether or not such individual is deceased as a result of a crime).</p>
            <p>R. Consistent with the requirements of the Immigration and Nationality Act, to the Department of Health and Human Services (HHS), the Centers for Disease Control and Prevention (CDC), or to any state or local health authorities, to:</p>
            <p>1. Provide proper medical oversight of DHS-designated civil surgeons who perform medical examinations of both arriving foreign nationals and of those requesting status as a lawful permanent resident; and</p>
            <p>2. To ensure that all health issues potentially affecting public health and safety in the United States are being, or have been, adequately addressed.</p>
            <p>S. To a federal, state, or local government agency seeking to verify or ascertain the citizenship or immigration status of any individual within the jurisdiction of the agency for any purpose authorized by law.</p>
            <p>T. To the Social Security Administration (SSA) for the purpose of issuing a Social Security number and card to an alien who has made a request for a Social Security number as part of the immigration process and in accordance with any related agreements in effect between the SSA, DHS, and the Department of State entered into pursuant to 20 CFR 422.103(b)(3); 422.103(c); and 422.106(a), or other relevant laws and regulations.</p>
            <p>U. To a former employee of DHS, in accordance with applicable regulations, for purposes of responding to an official inquiry by a federal, state, or local government entity or professional licensing authority or facilitating communications with a former employee that may be necessary for personnel-related or other official purposes when the Department requires information or consultation assistance from the former employee regarding a matter within that person’s former area of responsibility.</p>
            <p>V. To an individual’s prospective or current employer to the extent necessary to determine employment eligibility (e.g., pursuant to the Form I-140, Immigrant Petition for Alien Worker) or, USCIS may share information with the petitioning employers to aid in the approval or denial of a request to become a permanent resident.</p>
            <p>W. To a federal, state, or local agency, or other appropriate entities or individuals, or through established liaison channels to selected foreign governments, in order to provide intelligence, counterintelligence, or other information for the purposes of intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law or Executive Order.</p>
            <p>X. To approved federal, state, and local government agencies that grant public benefits, licenses, grants, governmental credentials, or for any other statutorily authorized purpose when the immigration status of the benefit applicant is legally required and an approved Memorandum of Agreement or Computer Matching Agreement (CMA) is in place between DHS and the entity.</p>
            <p>Y. To the Department of Labor for enforcement of labor certification violations and violations of U.S. labor laws.</p>
            <p>Z. To the news media and the public during the course of naturalization ceremonies administered by USCIS or a Federal Judge. Pursuant to 8 CFR 337.2 individuals to be naturalized are generally required to appear in a public ceremony, unless an appearance is specifically excused.</p>
            <p>AA. To the Department of Treasury to perform initial processing of benefit requests and to accept and resolve payment and any related issues.</p>
            <p>BB. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS is aware of a need to use relevant data, that relate to the purpose(s) stated in this SORN, for purposes of testing new technology.</p>
            <p>CC. To federal, state, local, and tribal benefit granting agencies (e.g., Social Security, housing, food, unemployment) to ascertain whether public benefits have been issued to the immigration requestor.</p>
            <p>DD. To an individual or entity seeking to post or arrange, or who has already posted or arranged, an immigration bond for an alien, to aid the individual or entity in (1) identifying the location of the alien; (2) posting the bond; (3) obtaining payments related to the bond; or (4) conducting other administrative or financial management activities related to the bond.</p>
            <p>EE. To a consulting entity (e.g., a labor organization or management organization) that provided an advisory opinion on a petition to USCIS seeking O or P nonimmigrant classification. USCIS may disclose the outcome of the petition to the consulting entity that provided an advisory opinion on the petition.</p>
            <p>FF. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information; when disclosure is necessary to preserve confidence in the integrity of DHS; or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            <p>To the U.S. Department of the Treasury when disclosure of the information is relevant to review payment and award eligibility through the Do Not Pay Working System for the purposes of identifying, preventing, or recouping improper payments to an applicant for, or recipient of, Federal funds, including funds disbursed by a state (meaning a state of the United States, the District of Columbia, a territory or possession of the United States, or a federally recognized Indian tribe) in a state-administered, federally funded program.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p> DHS/USCIS stores records in this system electronically or on paper in secure facilities, such as in a locked drawer or behind a locked door. The records may also be stored on magnetic disc, tape, and digital media.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
            <p>DHS/USCIS may retrieve records by using any of the data elements listed above or a combination thereof. This may include, but is not limited to, name, date of birth, Alien Number, SSN, USCIS Online Account Number, and Receipt Number.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p> USCIS receives and adjudicates immigration request forms. Each form type is governed by a respective retention schedule and each form type’s retention period is dictated by USCIS’s final action on the form (e.g., approved, denied, abandoned, withdrawn, administratively closed, and rejected). Immigration request forms and supplemental documentation that constitute the official record of an individual’s immigration history are stored in the individual’s paper and/or electronic Alien File. The Alien File records are permanent, whether hard copy or electronic. DHS/USCIS is eligible to transfer Alien Files to the custody of NARA 100 years after the individual’s date of birth.</p>
            <p>USCIS uses multiple case management systems for the processing, adjudication, and management of paper and electronically filed immigration request forms. Each case management system retains records in accordance with NARA-approved retention schedules. Generally, information is retained between 25-50 years from the last completed action. The duration of the NARA-approved retention schedules allows USCIS to address any follow-up inquiries or requests related to the immigration request form, including inquiries related to law enforcement, public safety, national security, and to FOIA and Privacy Act matters. These retention periods allow USCIS to provide as much information as possible to an individual regarding his or her immigration history.</p>
            <p>Electronic notices and communications associated with an immigration request, to include Approval or Denial letters, Requests for Evidence, Notices of Intent to Deny, Appeal/Motion Responses, etc., are retained for 13 years after the last completed action with respect to the benefit.</p>
            <p> Records of electronic appointments with USCIS are maintained for 60 days after the date of the appointment.</p>
            <p> Daily reports generated by associated information technology systems are maintained in accordance with the general records retention schedule that permits USCIS to destroy reports when no longer needed.</p>
            <p>Records replicated on the unclassified and classified networks for analysis and vetting will follow the same retention schedule.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing or electronically to the Chief Privacy Officer or USCIS’s FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief FOIA Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provides a right of access, certain records may be available under the FOIA.</p>
            <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief FOIA Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
            <p>•  Explain why he or she believe the Department would have information being requested;</p>
            <p>•  Identify which component(s) of the Department he or she believe may have the information;</p>
            <p>•  Specify when the individual believes the records would have been created; and</p>
            <p>•  Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
            <p>If an individual’s request is seeking records pertaining to another living individual, the first individual must include a statement from the second individual certifying that individual’s agreement for the first individual to access his/her records.</p>
            <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p> For records covered by the Privacy Act or covered JRA records, see "Record Access Procedures" above. Any individual, regardless of immigration status, may file a request to access his or her information under the FOIA. Throughout the benefit determination process, and prior to USCIS making a determination to deny a benefit request, USCIS provides individuals with the opportunity to address and correct the information.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p>See "Record Access Procedures" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p>None. However, when this system receives a record from another system exempted under 5 U.S.C. sec. 552a, DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="history">
        <xhtmlContent>
            <p>81 FR 72069 (October 19, 2016); 73 FR 56596 (September 29, 2008).</p>

        </xhtmlContent></subsection></section>
            <section id="uscis8" toc="yes">
<systemNumber>/USCIS-008</systemNumber>
<subsection type="systemName">Refugee Access Verification Unit Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified, sensitive.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>USCIS electronically maintains records on the Refugee Access Verification Unit (RAVU) SharePoint Enterprise Collaboration Network (ECN) site, which is accessible at the Refugee Affairs Division Headquarters in Washington, DC and field locations overseas.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include: (1) Anchor relatives who have filed an Affidavit of Relationship (AOR) for qualified family members overseas to gain access to the U.S. Refugee Admissions Program (USRAP) under Priority 3; (2) qualifying family members (parents, spouses, and unmarried children under age 21) of the anchor relative who are listed in Section II of the AOR; (3) derivatives (spouse and unmarried children under age 21) of the qualifying family member listed in Section II of the AOR; (4) individuals who qualify as Type C add-ons and are listed in Section II of the AOR; and (5) AOR preparers who work for domestic resettlement agencies and complete the AOR based on information provided by the anchor relative.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p><i>Information about the anchor relative gathered from documents in the A-file may include:</i>
</p><p>• Full Name;
</p><p>• Physical and Mailing Address;
</p><p>• Telephone and Fax Numbers;
</p><p>• Date of Birth;
</p><p>• Gender;
</p><p>• A-Number;
</p><p>• Social Security number;
</p><p>• Immigration Status;
</p><p>• Date of Arrival in the U.S.;
</p><p>• Date Asylum/Refugee status was granted;
</p><p>• Mother’s Maiden Name;
</p><p>• Documents establishing identity and claimed relationship (i.e., marriage record, civil or criminal history, medical records, education records);
</p><p>• Biometric identifiers (i.e., weight, color of eyes and hair, and facial marks);
</p><p>• Photographic Facial Image;
</p><p>• Civil or criminal history information;
</p><p>• Reports of investigations or derogatory information obtained from DHS and other federal systems;
</p><p>• Refugee and asylum interview notes and assessments; and
</p><p>• Other unique identifiers, including information found in the A-File used to facilitate a determination.
</p><p><i>Information about the anchor relative collected in the AOR and through the RAVU review may include:</i>
</p><p>• Full Name;
</p><p>• Date of Birth;
</p><p>• Gender;
</p><p>• Marital status
</p><p>• City/Country of Birth;
</p><p>• A-Number
</p><p>• Immigration Status;
</p><p>• Date of Arrival in the U.S.;
</p><p>• Date Asylum/Refugee status was granted;
</p><p>• Names, dates of birth, and locations of immediate relatives; and
</p><p>• DNA Results--confirmed or not confirmed.
</p><p><i>Information about overseas family members may include:</i>
</p><p>• Full Name;
</p><p>• Gender;
</p><p>• Date of Birth;
</p><p>• City/Country of Birth;
</p><p>• Nationality;
</p><p>• Marital Status;
</p><p>• A-Number (if applicable);
</p><p>• Relationship to Anchor Relative;
</p><p>• DNA Results--confirmed or not confirmed;
</p><p>• Photographic facial image;
</p><p>• Relationship to qualifying family member;
</p><p>• Civil or criminal history information (if available); and
</p><p>• Reports of investigations or derogatory information obtained from DHS or other federal systems (if available).
</p><p><i>Information about preparer may include:</i>
</p><p>• Preparer’s name;
</p><p>• Domestic resettlement agency’s name.
</p><p><i>Information about the case determination may include:</i>
</p><p>• RAVU Checklists
</p><p>• Decision Letters
</p><p>• Summary of Findings, including inconsistencies found between claimed relationships in the AOR and available USCIS records
</p><p>• Pre-Case ID Numbers
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>Authority for maintaining this system is contained in Sections 1157 and 1522(b) of the INA, as amended (8 U.S.C. 1157, 1522(b)).
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to track and manage the review of AORs submitted by anchor relatives in the United States on behalf of certain qualifying family members overseas who are seeking consideration for refugee resettlement under the Priority Three Family Reunification Program.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows: Note: Even when a valid routine use permits disclosure of information from this system of records to a third party, in some cases such disclosure may not be permissible because of confidentiality laws and policies that limit the sharing of information regarding individuals applying for certain immigration benefits. Information in this system of records contains information relating to persons who have pending or approved applications for asylum or refugee status and should not be disclosed pursuant to a routine use unless disclosure is otherwise permissible under the confidentiality statutes, regulations, or policies applicable to that information. These confidentiality provisions do not prevent DHS from disclosing information to the U.S. Department of Justice (DOJ) and U.S. Attorneys’ Offices as part of an ongoing criminal or civil investigation.
</p><p>A. To the Department of Justice (DOJ), including U.S. Attorney Offices, or other federal agency conducting litigation or in proceedings before any court, adjudicative or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee or former employee of DHS in his/her official capacity;
</p><p>3. Any employee or former employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;
</p><p>2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’ efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm as limited by 8 CFR 208.6.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations under 8 CFR 208.6 on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.
</p><p>H. To DOS, their contractors, agents, grantees, experts, consultants, or others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DOS, when necessary to accomplish an agency function related to this system of records.
</p><p>I. To an attorney or representative who is acting on behalf of an individual covered by this system of records (as defined in 8 CFR 1.1(j)) in conjunction with any proceeding before DHS/USCIS or the Executive Office for Immigration Review.
</p><p>J. To a former employee of the Department for purposes of responding to an official inquiry by a Federal, State, or local government entity or professional licensing authority, in accordance with applicable Department regulations; or facilitating communications with a former employee that may be necessary for personnel-related or other official purposes where the Department requires information and/or consultation assistance from the former employee regarding a matter within that person’s former area of responsibility.
</p><p>K. To Federal and foreign government intelligence or counterterrorism agencies or components where DHS becomes aware of an indication of a threat or potential threat to national or international security, or where such use is to assist in anti-terrorism efforts and disclosure is appropriate to the proper performance of the official duties of the person making the disclosure.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically in secure facilities in a locked drawer behind a locked door. The records may be stored on CD, DVD, or other digital media.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by the anchor relative’s A-Number or the Pre-Case ID assigned to the AOR.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>NARA approved the RAVU Records [N1-563-04-05] Retention Schedule. USCIS is working with NARA to supersede/revise the RAVU Retention Schedule to reflect a 15-year retention of the Master File instead of the current 20 years.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Chief, Refugee Affairs Division, Refugee, Asylum, and International Operations Directorate, 111 Massachusetts Avenue NW., Washington, DC 20529.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the National Records Center (NRC) FOIA/PA Office, P.O. Box 648010, Lee’s Summit, MO, 64064-8010. The NRC’s contact information can be found at <i>http://www.dhs.gov/foia</i> under "Contacts." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Lane SW., Building 410, STOP-0655, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, <i>http://www.dhs.gov/foia</i> or 1-866-431-0486. In addition, you should:
</p><p>• Explain why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created; and
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records; and
</p><p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information contained in this system of records is obtained from the individual who is the subject of these records. Other information sources include family members, petitions, A-File, information collected from federal databases for security screening checks, Resettlement Support Centers, the Refugee Processing Center, resettlement agencies, international organizations, and local sources at overseas sites.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="uscis9" toc="yes">
<systemNumber>/USCIS-009</systemNumber>
<subsection type="systemName">DHS/USCIS-009 Compliance Tracking and Monitoring System.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Sensitive but unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at USCIS Headquarters in Washington, DC, in USCIS field offices, and at a contractor-owned
facility in Meriden, CT. The system is accessible in a secure manner to authorized USCIS personnel via the Internet.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>This system contains information on four categories of individuals, any of whom may be either U.S. citizens or
non-U.S. citizens. These include:
</p><p>1. <i>Verification Subjects:</i> Individuals who are the subject of E-Verify or SAVE verifications and whose employer
is subject to compliance activities,
</p><p>2. <i>E-Verify or Save Program Users:</i> Individuals who use, are enrolled users, or have an agency or employment
responsibility associated with the SAVE or E-Verify programs,
</p><p>3. <i>Complainants:</i> Individuals who have contacted the Verification Division or publicly reported potential cases
of misuse, abuse, discrimination, breach of privacy, and fraudulent use of USCIS Verification Division’s verification
programs, the Systematic Alien Verification for Entitlements (SAVE) and E-Verify, and
</p><p>4. <i>DHS Employees:</i> Verification Division employees or contractors who are involved in SAVE and E-Verify
monitoring and compliance activities.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Individual’s name;
</p><p>• Verification Subjects birth information;
</p><p>• Verification Subjects citizenship and nationality information;
</p><p>• Verification Subjects immigrant/non-immigrant information maintained by DHS or Department of State, such
as arrival and departure information;
</p><p>• Verification Subjects identification information such Social Security Number, A-Number, passport and visa
information;
</p><p>• Verification Subjects contact information such as phone numbers, e-mail addresses, physical addresses;
</p><p>• SAVE and E-Verify user contact information such as phone numbers, e-mail addresses, physical addresses;
</p><p>• Analytic information derived from monitoring VIS that may indicate further compliance activities are
warranted (this may include any data element contained in VIS);
</p><p>• Complaint and lead information from VIS redress requests, media reports, and call center compliant
reports;
</p><p>• Information collected during compliance activities including, but not limited to: SAVE and E-Verify
created documents such as TNC, referral or compliance letters, Form I-9 and supporting documents, employment offer
and termination letters, benefit and credential applications and supporting documents, SAVE and E-Verify user interviews;
and
</p><p>• CTMS user information.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>The authority for the maintenance of records in the system is found in 8 U.S.C. 1324a, 8 U.S.C. 1360, 42 U.S.C.
1320b-7 and the Immigration Reform and Control Act of 1986 (IRCA), Public Law (Pub. L.) 99-603, The Personal
Responsibility and Work Opportunity Reconciliation Act of 1996 (PRWORA), Public Law 104-193, 110 Stat. 2168, Title
IV, Subtitle A, of the Illegal Immigration Reform and Immigrant Responsibility Act of 1996 (IIRIRA), Public Law 104
-208, 110 Stat. 3009, 18 U.S.C. 3291, and in Executive Order 12989, as amended by Executive Order 13465, June 6,
2008.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to analyze, collect, and manage information necessary to support monitoring and
compliance activities for researching and managing misuse, abuse, discrimination, breach of privacy, and fraudulent use
of USCIS Verification Division’s verification programs, the Systematic Alien Verification for Entitlements (SAVE) and E-
Verify.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3).
</p><p>Routine uses include disclosure to:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body, when it is necessary to the
litigation and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, Tribal, or local law enforcement agency or other appropriate authority charged
with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, where a
record, either on its face or in conjunction with other information, indicates a violation or potential violation of law,
which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official
duties of the person making the disclosure.
</p><p>H. To the DOJ, Civil Rights Division, for the purpose of responding to matters within the DOJ’s jurisdiction to
include allegations of fraud and/or nationality discrimination.
</p><p>I. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>This is an analytic and data management system that allows for retrievability on any data element collected. For
example, records may be retrieved by a name or other unique identifiers to include: verification number, A-Number, I
-94 Number, Visa Number, SSN, or by the submitting employer or agency name.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>The following proposal for retention and disposal is being prepared to be sent to the National Archives and
Records Administration for approval. Records collected in the process of establishing immigration and citizenship status
or employment authorization are stored and retained in the VIS Repository for ten (10) years from the date of the
completion of the verification unless the records are part of an on-going investigation in which case they may be
retained until completion of the investigation. This period is based on the statute of limitations for most types of
misuse or fraud possible using VIS (under 18 U.S.C. 3291, the statute of limitations for false statements or misuse
regarding passports, citizenship or naturalization documents).
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Chief, Verification Division, U.S. Citizenship and Immigration Services, 470-490 L’Enfant Plaza East, SW.,
Suite 8206,  Washington, DC 20529.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment
procedures of the Privacy Act because it is a law enforcement system. However, USCIS, Verification Division will consider
individual requests to determine whether or not information may be released. Thus, individuals seeking notification of
and access to any record contained in this system of records, or seeking to contest its content, may submit a request in
writing to the headquarters or component’s FOIA Officer, whose contact information can be found at <i>
http://www.dhs.gov/foia</i> under "contacts." If an individual believes more than one component maintains
Privacy Act records concerning him or her the individual may submit the request to the Chief Privacy Officer, Department
of Homeland Security, 245 Murray Lane, SW., Building 410, Mail STOP-0655, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Identify which component(s) of the Department you believe may have the information about you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p><i>See</i> "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records come from several sources including: (1) Information from VIS reflecting the monitoring analysis of VIS
systems users, potentially including any data fields that are allowed for VIS under the current VIS SORN, 73 FR 75445;
(2) complaints, questions, and tips from SAVE and E-Verify users and individuals subject to immigration status
verification provided by callers to the Verification Call Center; (3) information collected on potential cases of misuse,
abuse, discrimination, breach of privacy, and fraudulent use of Verification programs from various media or law
enforcement organizations to include media leads or external requests; and (4) information collected from compliance
reviews undertaken by the M&amp;amp;amp;amp;amp;amp;C staff which have been provided by the E-Verify employer or SAVE user regarding the
compliance review, which may include, but is not limited to: Form I-9 and supporting documents; benefit or
credential applications and supporting documents: government documents such as SSNs, visas, DHS and Department of State
issued benefit documents, and passports; employment offer and termination letters; and notes of interviews.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security plans to claim an exemption for this system from 5 U.S.C. 552a (c)(3), (d),
(e)(4)(G), and (e)(4)(H) pursuant to 5 U.S.C. 552a(k)(2). These exemptions apply only to the extent that records in the
system are subject to exemption pursuant to 5 U.S.C. 552a(k)(2).
</p></xhtmlContent></subsection></section>
<section id="uscis10" toc="yes">
<systemNumber>/USCIS-010</systemNumber>
<subsection type="systemName">United States Citizenship and Immigration Services Asylum Information and Pre-Screening System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent>
<p> Unclassified. The data originating from this system may be retained on classified DHS networks but this does not change the nature and character of the data until it is combined with classified information.</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent>
<p> The operational information technology (IT) systems that support the Asylum Information Pre-Screening System include: Refugees, Asylum, and Parole System (RAPS), Asylum Pre-Screening System (APSS), Case and Activity Management for International Operations (CAMINO), and the Computer Linked Information Application Management System 3 (CLAIMS 3). Affirmative asylum and cases under section 203 of NACARA cases are processed in RAPS. Reasonable fear and credible fear screenings are processed in APSS. Asylee Relative Petitions are processed in CLAIMS 3 and CAMINO. </p>
<p> Records are maintained in the respective USCIS case management systems and associated electronic and paper files located at USCIS Headquarters in Washington, D.C. and in USCIS service centers, national records center, asylum offices, and domestic and international field offices. Records are replicated from the operational system and maintained on the DHS unclassified and classified networks. </p>
</xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent>
<p> Categories of individuals covered by Asylum Information and Pre-Screening System include: </p>
<p>Individuals covered by provisions of section 208 of the INA, as amended, who have applied with USCIS for asylum on Form I-589 (Application for Asylum and for Withholding of Removal); </p>
<p>The spouse and children of a principal asylum applicant properly included in an asylum application as beneficiaries; </p>
<p>Individuals who have applied for suspension of deportation/special rule cancellation of removal under section 203 of NACARA on Form I-881 (Application for Suspension of Deportation or Special Rule Cancellation of Removal (Pursuant to section 203 of Public Law 105-100 (NACARA))); </p>
<p>Individuals who were referred to a USCIS asylum officer for a credible fear or reasonable fear screening determination under 8 CFR  208, Subpart B, after having expressed a fear of return to the intended country of removal because of fear of persecution or torture, during the expedited removal process under 8  U.S.C. 1225(b), the administrative removal processes under 8 U.S.C. 1228(b) (removal of certain aliens convicted of aggravated felonies), or 8 U.S.C. 1231(a)(5) (reinstatement of certain prior removal orders);</p>
<p>Individuals who have petitioned for follow-to-join (derivative) asylum status for their spouse and children on Form I-730 (Refugee/Asylee Relative Petition); and</p>
<p>Persons who complete asylum, Section 203 of NACARA, or follow-to-join applications, or participate in the credible fear or reasonable fear processes on behalf of the applicant (e.g., attorneys, form preparers, accredited representatives, and interpreters).</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p>Information about benefit requestor, beneficiaries, and family members includes:</p>
<p>Name; </p>
<p>Alias names; </p>
<p>Dates of birth; </p>
<p>Alien number (A-number);</p>
<p>Receipt Number;</p>
<p>Social Security number (if available); </p>
<p>Address/residence in the United States;</p>
<p>Foreign residence history;</p>
<p>Detention location (if detained by U.S. Immigration and Customs Enforcement);</p>
<p>Phone number;</p>
<p>Gender; </p>
<p>Marital status;</p>
<p>Place of marriage; </p>
<p>Date of birth; </p>
<p>Country of birth; </p>
<p>Country of nationality (or nationalities); </p>
<p>Ethnic origin; </p>
<p>Religion; </p>
<p>Port(s), date(s) of entry, and status at entry(ies); </p>
<p>Filing date of asylum, Section 203 of NACARA, or follow-to-join application; </p>
<p>Education history;</p>
<p>Work history;</p>
<p>Results of security checks; </p>
<p>Languages spoken; </p>
<p>Claimed basis of eligibility for benefit(s) sought; </p>
<p>Case status;</p>
<p>Case history; </p>
<p>Employment authorization eligibility and application history;</p>
<p>Government-issued identification (e.g., passport):</p>
<p>Document type;</p>
<p>Issuing organization;</p>
<p>Document number;</p>
<p>Expiration date; or</p>
<p>Benefit requested.</p>
<p>Notices and communications, including:</p>
<p>Appointment notices;</p>
<p>Receipt notices;</p>
<p>Requests for evidence;</p>
<p>Notices of Intent to Deny (NOID);</p>
<p>Decision notices and assessments; or</p>
<p>Proofs of benefit.</p>
<p>Records regarding organization membership or affiliation;</p>
<p>Personal background information (e.g., arrests/detentions, involvement with national security threats, criminal offenses, persecution, torture, genocide, killing, injuring, forced sexual contact, limiting or denying others religious beliefs, service in military or other armed groups, work in penal or detention systems, weapons distribution, combat training);</p>
<p>Tax records;</p>
<p>Explanation/description of foreign travel;</p>
<p>Signature;</p>
<p>Supporting documentation as necessary (e.g., birth, marriage, and/or divorce certificates, licenses, explanatory statements, and unsolicited information submitted voluntarily by the applicant or family members in support of a benefit request);</p>
<p>Photographs; and</p>
<p>Criminal and national security background check information.</p>
<p>Information about Attorneys, Accredited Representatives, and Form Prepares includes:</p>
<p>Name;</p>
<p>Law firm/recognized organization;</p>
<p>Physical and mailing addresses;</p>
<p>Phone and fax numbers;</p>
<p>Email address;</p>
<p>Attorney bar card number or equivalent;</p>
<p>Bar membership;</p>
<p>Accreditation date;</p>
<p>Board of Immigration Appeals representative accreditation;</p>
<p>Expiration date;</p>
<p>Law practice restriction explanation; and</p>
<p>Signature.</p>
<p>Information about Preparers and Interpreters may include:</p>
<p>Name;</p>
<p>Organization;</p>
<p>Business state ID number;</p>
<p>Physical and mailing addresses;</p>
<p>Email address;</p>
<p>Phone and fax numbers;</p>
<p>Relationship to benefit requestor; and</p>
<p>Signature. </p>
</xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p> Authority for maintaining this system is in 8 U.S.C. 1101, 1103, 1158, 1225, 1228, and 1522.</p>
</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p>The purpose of Asylum Information and Pre-Screening System is to manage, control, and track the following types of adjudications:</p>
<p>A. Affirmative asylum applications (Form I-589);</p>
<p>B. Applications filed with USCIS for suspension of deportation/special rule cancellation of removal pursuant to Section 203 of NACARA (Form I-881);</p>
<p>C. Credible fear screening cases under 8 U.S.C. 1225(b)(1)(B); </p>
<p>D. Reasonable fear screening cases under 8 CFR  208.31; and</p>
<p>E. Follow-to-join derivative asylum/refugee cases (Form I-730) under 8 CFR  208.21.</p>
<p>DHS maintains a replica of some or all of the data in the operating system on unclassified and classified DHS networks to allow for analysis and vetting consistent with the above stated purposes and this published notice.</p>
</xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p> In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3). Even when a valid routine use permits the disclosure of information from this system of records to a third party, in some cases such disclosure may not be permissible because of confidentiality laws and policies that limit the sharing of information regarding individuals applying for asylum or in credible fear or reasonable fear processes.</p>
<p> Information in this system of records contains information relating to persons who have pending or approved asylum applications, follow-to-join applications, or in the credible fear or reasonable fear process and should not be disclosed pursuant to a routine use unless disclosure is otherwise permissible under 8 CFR  208.6. These confidentiality provisions do not prevent DHS from disclosing information to the U.S. Department of Justice and Offices of the U.S. Attorneys as part of an ongoing criminal or civil investigation. These provisions permit disclosure to courts under certain circumstances as well, as provided under 8 CFR  208.6(c)(2). Subject to these restrictions, DHS may disclose: </p>
<p> A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
<p>  1. DHS or any Component thereof;</p>
<p>  2. Any employee or former employee of DHS in his/her official capacity;</p>
<p>  3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
<p>  4. The United States or any agency thereof.</p>
<p> B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
<p> C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. "" 2904 and 2906.</p>
<p> D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
<p> E. To appropriate agencies, entities, and persons when:</p>
<p> 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; </p>
<p> 2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
<p> 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS"s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p> F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations of 8 CFR " 208.6 on disclosure as are applicable to DHS officers and employees. 8 CFR " 208.6 prohibits the disclosure to third parties information contained in or pertaining to asylum applications, credible fear determinations, and reasonable fear determinations except under certain limited circumstances. </p>
<p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure as limited by the terms and conditions of 8 CFR " 208.6 and any waivers issued by the Secretary pursuant to 8 CFR " 208.6.</p>
<p>H. To any element of the U.S. Intelligence Community, or any other federal or state agency having a counterterrorism function, provided that the need to examine the information or the request is made in connection with its authorized intelligence or counterterrorism function or functions and the information received will be used for the authorized purpose for which it is requested. </p>
<p>I. To other federal, state, tribal, and local government agencies, foreign governments, intergovernmental organizations and other individuals and organizations as necessary and proper during the course of an investigation, processing of a matter, or during a proceeding within the purview of U.S. or foreign immigration and nationality laws, to elicit or provide information to enable DHS to carry out its lawful functions and mandates, or to enable the lawful functions and mandates of other federal, state, tribal, and local government agencies, foreign governments, or intergovernmental organizations as limited by the terms and conditions of 8 CFR  208.6 and any waivers issued by the Secretary.</p>
<p>J. To a federal, state, tribal, or local government agency or foreign government seeking to verify or ascertain the citizenship or immigration status of any individual within the jurisdiction of the agency for any purpose authorized by law as limited by the terms and conditions of 8 CFR  208.6 and any waivers issued by the Secretary pursuant to 8 CFR 208.6.</p>
<p> K. To the Department of State for the purpose of assisting in the processing of petitions or applications for benefits under the Immigration and Nationality Act, and all other immigration and nationality laws including treaties and reciprocal agreements.</p>
<p>L. To the Department of Health and Human Services (HHS), Office of Refugee Resettlement (ORR) and the Centers for Disease Control and Prevention (CDC) to provide emergency relief to qualified asylees, meet congressional reporting requirements, provide post-decisions services, and generate statistical reports for allocating funding for asylee social benefits. </p>
<p>Disclosure to consumer reporting agencies:</p>
<p> None. </p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>Storage:</p>
<p> Records in this system are stored electronically in the operational system as well as on the unclassified and classified network or on paper in secure facilities in a locked drawer behind a locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM. The records may be stored on magnetic disc, tape, and digital media.</p>
</xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p> Records may be retrieved by name and date of birth, A-number, or receipt number.</p>
</xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p> DHS/USCIS safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. USCIS has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
</xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p>USCIS stores the physical documents and supplemental documentation in the Alien File and processes asylum, NACARA and follow-to-join applications, and credible fear or reasonable fear determinations in the respective case management system. The A-File records are permanent whether hard copy or electronic. USCIS transfers the A-Files to the custody of NARA 100 years after the individual"s date of birth.</p>
<p>NARA approved the RAPS [N1-563-04-06], APSS [N1-563-04-07], CAMINO [N1-566-12-06] and CLAIMS 3 [N1-566-08-12] Retention Schedule. RAPS, APSS, and CAMINO Master File automated records are maintained for 25 years after the case is closed and then destroyed. CLAIMS 3 records are destroyed after the data is transferred to the electronic master file and verified. Information in the master file is destroyed 15 years after the last completed action with respect to the benefit. USCIS is proposing to update the CLAIMS 3 Retention Schedule to destroy records 25 years after the last completed action. </p>
<p> Records replicated on the unclassified and classified networks will follow the same retention schedule.</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent>
<p> The Chief of the Asylum Division, Refugee, Asylum, and International Operations Directorate, U.S. Citizenship and Immigration Services, Suite 3300, 20 Massachusetts Avenue, NW, Washington, D.C., 20529. </p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p> Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing </p>
<p>to the National Records Center (NRC) FOIA/PA Office, P.O. Box 648010, Lee"s Summit, MO, 64064-8010. The NRC"s contact information can be found at http://www.dhs.gov/foia under "Contacts." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act (FOIA) Officer, Department of Homeland Security, Washington, D.C. 20528-0655.</p>
<p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief FOIA Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, you should:</p>
<p>Explain why you believe the Department would have information on you;</p>
<p>?dentify which Component(s) of the Department you believe may have the information about you;</p>
<p>Specify when you believe the records would have been created; and </p>
<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records; </p>
<p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
<p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
<p>In processing requests for access to information in this system, USCIS will review not only the records in the operational system but also the records that were replicated on the unclassified and classified networks, and based on this notice provide appropriate access to the information.</p>
</xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p> See "Notification procedure" above.</p>
</xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p> Records are obtained from the applicant orhis or her accredited representative, preparer, or interpreter. Information contained in this system may also be supplied by DHS, other U.S. federal, state, tribal, or local government agencies, foreign government agencies, and international organizations. USCIS personnel may input information as they process a case, including information from internal and external sources to verify whether a benefit requestor or family is eligible for the benefit requested. Information from other systems of records (or their successor systems) such as Alien File, Index, and National File Tracking System of Records (DHS/USCIS/ICE/CBP-001, 78 FR 69983, November 22, 2013); USCIS Benefits Information System (BIS) (DHS/USCIS-007, 73 FR 56596, September 29, 2008); ICE Removable Alien Records System (DHS/ICE-011, 75 FR 23274, May 3, 2010); U.S. Customs and Border Protection (CBP) TECS (DHS/CBP-011, 73 FR 77778, December 19, 2008); DHS Automated Biometric Identification System (IDENT) (DHS/USVISIT-004, 72 FR 31080, June 5, 2007); Department of Justice (DOJ) Records and Management Information System (JUSTICE/EOIR-001, 72 FR 3410, January 25, 2007;) Department of Defense (DOD) Defense Biometric Services, 74 FR 48237, (September 22, 2009); DOD Detainee Biometric Information System, 72 FR 14534, (March 28, 2007); and DOD Defense Biometric Identification Records System, 74 FR 17840, (April 17, 2009).</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent>
<p> None.
</p></xhtmlContent></subsection></section>
<section id="uscis11" toc="yes">
<systemNumber>/USCIS-011</systemNumber>
    <subsection type="systemName">
        Department of Homeland Security (DHS)/U.S. Citizenship Immigration Service (USCIS)-011 E-Verify Program
    </subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p>Unclassified.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p>Records are maintained at USCIS Headquarters in Washington, D.C. and at DHS/USCIS field offices. Electronic records are stored in the Verification Information System (VIS).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p>Chief, Verification Division, E-Verify@dhs.gov, U.S. Citizenship and Immigration Services, Department of Homeland Security, 131 M Street, N.E., Suite 200, Mail Stop 200, Washington, D.C. 20529.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="authorityForMaintenance">
        <xhtmlContent>
            <p>Illegal Immigration Reform and Immigrant Responsibility Act of 1996, Public Law 104-208, secs. 401-405 (Sept. 30, 1996), codified at 8 U.S.C. 1324a note.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p>The purpose of this system is to provide employment authorization information to employers, entities authorized by federal law to participate in E-Verify, and to individuals seeking to check employment eligibility under the Immigration and Nationality Act (INA). This system also enables individuals to access features concerning the use of their personally identifiable information (PII) in E-Verify, such as the ability to lock their Social Security number (SSN) to prevent its use in E-Verify and Self Check. The system may also be used by DHS to support DHS monitoring and compliance activities for obtaining information in order to prevent the commission of fraud, discrimination, or other misuse or abuse of the E-Verify system, including violations of privacy laws or other illegal activity related to misuse of E-Verify, including for example: (1) investigating duplicate or incomplete enrollments by employers; (2) inappropriate enrollments by individuals posing as employers; (3) verifications that are not performed within the required time limits; and (4) cases referred by and between E-Verify and the Department of Justice Immigrant and Employee Rights Section (formerly known as the Office of Special Counsel for Immigration-Related Unfair Employment Practices), or other intelligence or law enforcement entities.</p>
            <p> Additionally, the information in E-Verify may be used for program management and analysis, program outreach, customer service, and preventing or deterring further use of stolen identities in E-Verify.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
            <p>Categories of individuals covered by E-Verify, to the extent these individuals are covered by and defined by the Privacy Act and this SORN, include: employees whose employers have submitted identity and employment eligibility information on their behalf; employers or employer agents that enroll in E-Verify; clients of employer agents who enroll in E-Verify; individuals employed or retained by employers or employer agents who have accounts to use E-Verify; individuals subject to verification by E-Verify; entities authorized by federal law to use E-Verify; entities who contact E-Verify for information on the use of E-Verify; entities who provide their names and contact information to E-Verify for notification or contact purposes; individuals seeking to confirm employment eligibility under the INA using Self Check; and individuals who have created a myE-Verify account.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p>Information collected about individuals may include the following:</p>
            <p>A. Information about the employee or individual to be confirmed:</p>
            <p>•Full name (first, middle, and last);</p>
            <p>•Other names or aliases, if available;</p>
            <p>•Date of birth;</p>
            <p>•SSN;</p>
            <p>•Home address (address, apartment number, city, state/region);</p>
            <p>•Email address;</p>
            <p>•Telephone number (home, mobile, work, other);</p>
            <p>•Employee’s First Day of Employment;</p>
            <p>•Claimed citizenship status;</p>
            <p>•Form I-9 document type provided by individual to the entity verifying employment eligibility (such as passport, employment authorization document, or permanent resident card);</p>
            <p>•Expiration date of acceptable Form I-9 document;</p>
            <p>•State or jurisdiction of issuance of identity document when that document is a driver’s license, driver’s permit, or state-issued identification (ID) card;</p>
            <p>•Passport number and country of issuance;</p>
            <p>•Driver’s license number, driver’s permit number, or state-issued ID number;</p>
            <p>•Receipt number;</p>
            <p>•Visa number;</p>
            <p>•Alien Number (A-Number);</p>
            <p>•I-94 Number;</p>
            <p>•Form I-766, Employment Authorization Document, Number; and</p>
            <p>•Form I-551, Permanent Resident Card, Number and photographs.</p>
            <p>B. Disposition data from the employer or entity. If the E-Verify case result is Employment Authorized, E-Verify automatically closes the case and no additional information is collected from the employer or entity. The following codes are entered by the employer or entity when the case result is Final Nonconfirmation (FNC), based on what the employer or entity does as a result of the employment verification query (the most up-to-date disposition codes can be found in the E-Verify User Manual available at https://www.E-Verify.gov):</p>
            <p>•[Employer Name] will no longer employ [Employee Name].</p>
            <p>•[Employer Name] will continue to employ [Employee Name].</p>
            <p>• If the employer selects the option that he or she will continue to employ the individual, he or she has to provide the reason why he or she will do so in a free text field.</p>
            <p>•Neither of the options above apply – I am closing this case for a different reason.</p>
            <p>• If the employer selects the option that he or she is closing the case for another reason, the employer has to select a reason from the following predetermined reasons:</p>
            <p>•SSA (Social Security Administration) asked me to re-run this case</p>
            <p>•DHS (Department of Homeland Security) asked me to re-run this case</p>
            <p>•The information entered was not correct.</p>
            <p>•Other</p>
            <p>•If the employer selects "Other," the employer must type the reason in a free text field.</p>
            <p>•Information related to the expiration of the three day hire rule;</p>
            <p>• Whether an individual is awaiting a SSN;</p>
            <p>• Technical problems;</p>
            <p>• Audit revealed new hire was not run;</p>
            <p>• Federal contractor with E-Verify clause verifying existing employees; and</p>
            <p>• Other.</p>
            <p>C. Information about the Enrollee, Employer, Entity, or Employer Agent:</p>
            <p>•Company name;</p>
            <p>•"Doing business as" name (optional);</p>
            <p>•Data Universal Numbering System (DUNS) number (only required for employers with Federal Acquisition Regulation (FAR) clause);</p>
            <p>•Street address;</p>
            <p>•Employer Identification Number (EIN);</p>
            <p>•North American Industry Classification System (NAICS) code;</p>
            <p>•Number of employees;</p>
            <p>•Number of sites;</p>
            <p>•Parent company or corporate company;</p>
            <p>•Name of company point of contact;</p>
            <p>•Phone number;</p>
            <p>•Fax number; and</p>
            <p>•Email address.</p>
            <p>D. Information about the Individual User of E-Verify (e.g., Human Resource employee conducting E-Verify queries):</p>
            <p>•Full name (first, middle initial, and last);</p>
            <p>•Telephone number (home, mobile, work, other);</p>
            <p>•Fax number;</p>
            <p>•Email address; and</p>
            <p>•User ID.</p>
            <p>E. Employment Eligibility Information created by E-Verify:</p>
            <p>•Case Verification Number; and</p>
            <p>•Verification Information System response (the most up-to-date codes can be found in the E-Verify User Manual available at https://www.E-Verify.gov), for example:</p>
            <p>• Employment authorized;</p>
            <p>• DHS verification in process;</p>
            <p>•SSA Tentative Nonconfirmation (TNC);</p>
            <p>• DHS TNC;</p>
            <p>• Employee referred to SSA;</p>
            <p>• Employee referred to DHS;</p>
            <p>• Close Case and Resubmit;</p>
            <p>• SSA Case in Continuance (In rare cases, SSA needs more than 10 Federal Government workdays to confirm employment eligibility); and</p>
            <p>• DHS Case in Continuance (In rare cases, DHS needs more than 10 Federal Government workdays to confirm employment eligibility);</p>
            <p>• FNC.</p>
            <p>F. Information from the National Law Enforcement Telecommunications System (NLETS) and State Motor Vehicle Agencies (MVA) used to verify the information from a driver’s license, permit, or state issued ID card. The categories of records from MVAs and MVA information via commercial data providers include:</p>
            <p>•Full name (first, middle and last);</p>
            <p>•State or Jurisdiction of Issuance;</p>
            <p>•Document type (i.e., driver’s license, driver’s permit, or state-issued ID card);</p>
            <p>•Document number;</p>
            <p>•Date of birth;</p>
            <p>•Status text (e.g., status of the license – valid, revoked, or expired);</p>
            <p>•Status description text (i.e., document issue date and/or record found indicator); and</p>
            <p>•Expiration date.</p>
            <p>G. Information from federal databases used to confirm employment eligibility may contain some or all of the following information about the individual being verified:</p>
            <p>•Full name (first, middle, and last);</p>
            <p>•Other names or aliases, if available;</p>
            <p>•Date of birth;</p>
            <p>•Age;</p>
            <p>•Country of birth;</p>
            <p>•Country of citizenship;</p>
            <p>•A-Number;</p>
            <p>•SSN;</p>
            <p>•Citizenship number;</p>
            <p>•Receipt number;</p>
            <p>•Home address (address, apartment number, city, state/region);</p>
            <p>•Previous Address;</p>
            <p>•Phone number;</p>
            <p>•Nationality;</p>
            <p>•Gender;</p>
            <p>•Photograph;</p>
            <p>•Date entered into United States;</p>
            <p>•Class of admission;</p>
            <p>•File Control Office Code;</p>
            <p>•Student and Exchange Visitor Information System (SEVIS) Number;</p>
            <p>•Form I-94 Number;</p>
            <p>•Provision of Law cited for employment authorization;</p>
            <p>•Office Code where the authorization was granted;</p>
            <p>•Date employment authorization decision was issued;</p>
            <p>•Date employment authorization begins;</p>
            <p>•Date employment authorization expires;</p>
            <p>•Date employment authorization was denied;</p>
            <p>•Confirmation of employment eligibility;</p>
            <p>•TNC of employment eligibility and justification;</p>
            <p>•FNC of employment eligibility;</p>
            <p>•Status of Department of Justice Executive Office Immigration Review System (EOIR) information, if in proceedings;</p>
            <p>•Date alien’s status changed;</p>
            <p>•Class of Admission Code;</p>
            <p>•Date employee is admitted into the U.S. until;</p>
            <p>•Port of Entry;</p>
            <p>•Departure date;</p>
            <p>•Visa Number;</p>
            <p>•Passport Number;</p>
            <p>•Passport Country of Issuance (COI);</p>
            <p>•Passport Card Number;</p>
            <p>•Benefit granting document number, for example, Form I-551, Permanent Resident Card, or Form I-766, Employment Authorization Document;</p>
            <p>•Expiration date;</p>
            <p>•Employment Authorization Card information;</p>
            <p>•Permanent Resident Card information;</p>
            <p>•Employer Identification Number;</p>
            <p>•Valid to date;</p>
            <p>•Student status;</p>
            <p>•Visa Code;</p>
            <p>•Status Code;</p>
            <p>•Status change date;</p>
            <p>•Port of Entry Code;</p>
            <p>•Non-Citizen entry date;</p>
            <p>•Program end date;</p>
            <p>•Naturalization Certificate Number;</p>
            <p>•Naturalization date and place;</p>
            <p>•Naturalization information and certificate;</p>
            <p>•Naturalization verification (Citizenship Certificate Identification ID);</p>
            <p>•Naturalization verification (Citizenship naturalization date/time);</p>
            <p>•Immigration status (Immigration Status Code);</p>
            <p>•Universal Control Number (formerly known as Federal Bureau of Investigation Number);</p>
            <p>•Admission Number;</p>
            <p>•Date of admission;</p>
            <p>•Marital status;</p>
            <p>•Marriage date and place;</p>
            <p>•Marriage information and Certificate;</p>
            <p>•Visa Control Number;</p>
            <p>•Visa Foil Number;</p>
            <p>•Case history;</p>
            <p>•Alerts;</p>
            <p>•Case summary comments;</p>
            <p>•Case category;</p>
            <p>•Date of encounter;</p>
            <p>•Encounter information;</p>
            <p>•Case actions and decisions;</p>
            <p>•Bonds;</p>
            <p>•Current status;</p>
            <p>•Asylum Applicant Receipt date;</p>
            <p>•Airline and Flight Number;</p>
            <p>•Country of residence;</p>
            <p>•City where boarded;</p>
            <p>•City where visa was issued;</p>
            <p>•Date visa issued;</p>
            <p>•Address while in United States;</p>
            <p>•File Number; and</p>
            <p>•File location.</p>
            <p>H. Information from individuals who successfully complete an E-Verify query using Self Check:</p>
            <p>•Full name (first, middle initial, and last);</p>
            <p>•Other names or aliases, if available;</p>
            <p>•Date of birth;</p>
            <p>•SSN; and</p>
            <p>•Document(s) type, associated number, and associated expiration date that demonstrates work authorization. These may include U.S. Passport, Form I-766, Employment Authorization Document, Form I-551, Permanent Resident Card, or other documents and associated numbers listed as acceptable Form I-9, Form I-9 and supporting documents; and Employment Eligibility Verification documents.</p>
            <p>I. Information from individuals that establish a lock on their SSN through myE-Verify accounts:</p>
            <p>•Full name (first, middle initial, and last);</p>
            <p>•Other names or aliases, if available;</p>
            <p>•SSN;</p>
            <p>•Date of birth;</p>
            <p>•Lock Receipt Number;</p>
            <p>•Lock date and expiration date;</p>
            <p>•Email address; and</p>
            <p>•Self-Generated security questions and answers.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p>Records are obtained from several sources including: (A) Information collected from employers and entities about their employees; (B) Information collected from individuals relating to employment eligibility verification; (C) Information collected from E-Verify users used to provide account access and monitoring; (D) Information collected from entities requesting information about E-Verify; (E) Information created by E-Verify; (F) Information from individuals seeking to check employment eligibility and access to features concerning the use of their information in E-Verify and Self Check; (G) Federal and state databases listed below, including the systems and the SORNs that cover information contained in those systems:</p>
            <p>•SSA Numident System covered by SSA’s Master Files of SSN Holders and SSN Applications SORN, 79 FR 8780 (February 13, 2014), 78 FR 40542 (July 5, 2013), and 75 FR 82121 (December 29, 2010);</p>
            <p>•U.S. Customs and Border Protection (CBP) information covered by DHS/CBP-005 Advance Passenger Information System SORN, 80 FR 13407 (March 13, 2015); DHS/CBP-007 CBP Border Crossing Information SORN, 81 FR 89957 (December 13, 2016); DHS/CBP-011 U.S. Customs and Border Protection TECS SORN, 73 FR 77778 (December 19, 2008); DHS/CBP-016 Non-Immigrant System SORN, 80 FR 13398 (March 13, 2015); DHS/CBP-021 Arrival and Departure Information System SORN, 80 FR 72081 (November 18, 2015); DHS/USVISIT-004 DHS Automated Biometric Identification System (IDENT) SORN, 72 FR 31080 (June 5, 2007); DHS/USCIS/ICE/CBP-001 Alien File, Index, and National File Tracking System of Records SORN, 82 FR 43556 (September 18, 2017); and DHS/ICE-001 Student and Exchange Visitor Information System (SEVIS) SORN, 75 FR 412 (January 5, 2010);</p>
            <p>•CBP Nonimmigrant Information System (NIIS) covered by DHS/CBP-016 Non-Immigrant System SORN, 80 FR 13398 (March 13, 2015);</p>
            <p>•CBP Border Crossing Information (BCI) covered by DHS/CBP-007 CBP Border Crossing Information SORN, 81 FR 89957 (December 13, 2016);</p>
            <p>•U.S. Immigration Customs and Enforcement (ICE) SEVIS covered by DHS/ICE-001 Student and Exchange Visitor Information System (SEVIS) SORN, 75 FR 412 (January 5, 2010); DHS/ALL-016 Correspondence Records SORN, 83 FR 48645 (September 26, 2018); and DHS/ALL-003 Department of Homeland Security General Training Records SORN, 73 FR 71656 (November 25, 2008);</p>
            <p>•ICE ENFORCE Integrated Database (EID) Enforcement Alien Removal Module (EARM) Alien Number covered by DHS/ICE-011 Criminal Arrest Records and Immigration Enforcement Records (CARIER) System of Records SORN, 81 FR 72080 (October 19, 2016);</p>
            <p>•USCIS Aliens Change of Address System (AR-11) covered by DHS/USCIS-007 Benefit Information System SORN, 81 FR 72069 (October 19, 2016);</p>
            <p>•USCIS Central Index System (CIS) covered by DHS/USCIS/ICE/CBP-001 Alien File, Index, and National File Tracking System of Records SORN, 82 FR 43556 (September 18, 2017);</p>
            <p>•USCIS Customer Profile Management System (CPMS) covered by DHS/USCIS-018 Immigration Biometric and Background Check (IBBC) System of Records SORN, 83 FR 36950 (July 31, 2018);</p>
            <p>•USCIS Computer-Linked Application Information Management System 3 (CLAIMS 3) covered by DHS/USCIS-007 Benefit Information System SORN, 81 FR 72069 (October 19, 2016);</p>
            <p>•USCIS Computer-Linked Application Information Management System 4 (CLAIMS 4) covered by DHS/USCIS-007 Benefit Information System SORN, 81 FR 72069 (October 19, 2016);</p>
            <p>•USCIS Citizenship and Immigration Services Centralized Operational Repository (eCISCOR); </p>
            <p>•USCIS RAILS (a modernization of the National File Tracking System) covered by DHS/USCIS/ICE/CBP-001 Alien File, Index, and National File Tracking System of Records SORN, 82 FR 43556 (September 18, 2017);</p>
            <p>•USCIS Microfilm Digitization Application System (MiDAS) covered by DHS/USCIS/ICE/CBP-001 Alien File, Index, and National File Tracking System of Records SORN, 82 FR 43556 (September 18, 2017);</p>
            <p>•USCIS Marriage Fraud Amendment System (MFAS) covered by DHS/USCIS-007 Benefit Information System SORN, 81 FR 72069 (October 19, 2016);</p>
            <p>•USCIS Enterprise Document Management System (EDMS) covered by DHS/USCIS/ICE/CBP-001 Alien File, Index, and National File Tracking System of Records SORN, 82 FR 43556 (September 18, 2017);</p>
            <p>•USCIS Global (formerly known as Refugees, Asylum, and Parole System (RAPS)) covered by DHS/USCIS-010 Asylum Information and Pre-Screening System of Records SORN, 80 FR 74781 (November 30, 2015);</p>
            <p>•USCIS Validation Instrument for Business Enterprises (VIBE) covered by DHS/USCIS/ICE/CBP-001 Alien File, Index, and National File Tracking System of Records SORN, 82 FR 43556 (September 18, 2017); DHS/USCIS-006 Fraud Detection and National Security Records (FDNS) SORN, 77 FR 47411 (August 8, 2012); and DHS/USCIS-007 Benefit Information System SORN, 81 FR 72069 (October 19, 2016);</p>
            <p>•Department of State Consular Consolidated Database (CCD) covered by STATE-05 Overseas Citizens Services Records and Other Overseas Records, 81 FR 62235, (September 8, 2016); STATE-26 Passport Records, 80 FR 15653 (March 24, 2015); and STATE-39 Visa Records, 83 FR 28062 (June 15, 2018);</p>
            <p>•DOJ’s Immigration Review Information Exchange System (IRIES) covered by EOIR-001 Records and Management Information System, 69 FR 26179 (May 11, 2004), including routine use updates in 82 FR 24147 (May 25, 2017); and</p>
            <p>•State Motor Vehicle Agencies (through commercial data providers).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as listed below. USCIS reviews disclosures from this System of Records for compliance with IIRIRA section 404(h).</p>
            <p>A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other federal agencies conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
            <p>1. DHS or any component thereof;</p>
            <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
            <p>3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
            <p>4. The United States or any agency thereof.</p>
            <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
            <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
            <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
            <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
            <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
            <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
            <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            <p>I. To employers participating in E-Verify in order to confirm the identity and employment eligibility of their employees working in the United States.</p>
            <p>J. To NLETS and the American Association of MVA Network and participating MVAs for the purpose of validating information for a driver’s license, permit, or identification card issued by the state MVAs.</p>
            <p>K. To the DOJ, Civil Rights Division, for the purpose of responding to matters within the DOJ’s jurisdiction of E-Verify, especially with respect to discrimination.</p>
            <p>L. To persons and other entities authorized by federal law to determine the employment eligibility of individuals subject to verification under E-Verify (e.g., SSA).</p>
            <p>M. To federal government intelligence or counterterrorism agencies or components when DHS becomes aware of a violation or potential violation of E-Verify program requirements that is related to an indication of a threat or potential threat to national security to assist in countering such threat.</p>
            <p>N. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p>DHS/USCIS stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
            <p>DHS/USCIS may retrieve records by name, verification case number, A-Number, I-94 Number, Receipt number, Passport (United States or Foreign) number and country of issuance, Driver’s License, Permit, or State-Issued Identification Card Number, or SSN of the employee or employee user, or by the submitting company name.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p>E-Verify records are covered by NARA-approved records retention and disposal schedule, N1-566-08-007. USCIS stores and retains records collected in the process of enrolling in E-Verify and in verifying employment eligibility for ten (10) years from the date of the completion of the last transaction, unless the records are part of an ongoing investigation in which case they may be retained until completion of the investigation. This period is based on the statute of limitations for most types of misuse or fraud possible using E-Verify (under 18 U.S.C. sec. 3291, the statute of limitations for false statements or misuse regarding passports, citizenship, or naturalization documents).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
            <p>DHS/USCIS safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. USCIS has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and to the USCIS FOIA/Privacy Act Officer whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
            <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
            <p>•Explain why he or she believes the Department would have information being requested;</p>
            <p>•Identify which component(s) of the Department he or she believes may have the information;</p>
            <p>•Specify when the individual believes the records would have been created; and</p>
            <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
            <p>If an individual’s request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
            <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p>For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record. For records not covered by the Privacy Act or Judicial Redress Act, individuals may still amend their records at a USCIS Field Office by making an InfoPass appointment http://infopass.uscis.gov or by contacting the USCIS Contact Center at 1-800-375-5283.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p>See "Record Access Procedures."</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p>No exemption will be  claimed except for those records covered by a system of records that have been claimed  exempt in that source system identified above in the record source categories under 5 U.S.C. 552a(j)(2) and are covered by this system of records. DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated for this system.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="history">
        <xhtmlContent>
            <p>DHS/USCIS-011 E-Verify Program, 79 FR 46852 (August 11, 2014); E-Verify Program, 77 FR 47419 (August 8, 2012); Verification and Information System (VIS), 73 FR 75445 (December 11, 2008); VIS, 73 FR 10793 (February 28, 2008); VIS, 72 FR 17569 (April 9, 2007); Justice/INS-035, 67 FR 64134 (October 17, 2002); and Alien Status; and Verification Index (ASVI) Justice/INS-009, 66 FR 174 (September 7, 2001).</p>
        </xhtmlContent></subsection></section>
<section id="uscis12" toc="yes">
<systemNumber>/USCIS-012</systemNumber>
    <subsection type="systemName">
        United States Citizenship and Immigration Services -012 Citizenship and Immigration Data Repository.
    
    </subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p>Unclassified and Classified</p>
        </xhtmlContent></subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p>Records are maintained at the USCIS Headquarters at 111 Massachusetts Ave, NW Washington, D.C.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p> Chief, Program Management Office, Fraud Detection and National Security Directorate, USCIS, FDNSCommunications@uscis.dhs.gov, 111 Massachusetts Avenue, N.W., Washington, D.C., 20529.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
            <p>Immigration and Nationality Act, sections 101 and 103, as amended (8 U.S.C. 1101 and 1103), and the regulations issued pursuant thereto; sec. 453 and 454 of the Homeland Security Act of 2002 (Pub. L. 107-296); Executive Order 12958, and as amended; E.O. 13388; and E.O. 12333, and as amended.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p>The purpose of this system is to (1) vet USCIS application information for indications of possible immigration fraud, public safety, and national security concerns when classified information must be cross-referenced with unclassified data in USCIS data sets, (2) detect possible fraud and misuse of immigration information or position by USCIS employees, for personal gain or by coercion when USCIS receives tips or referrals from other federal agencies via classified channels, and (3) respond to RFIs from the DHS I&amp;amp;amp;amp;amp;amp;A and/or the federal intelligence and law enforcement community members that are based on classified criteria.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
            <p>Categories of individuals covered by this system include: persons who have filed (for themselves or on the behalf of others) applications or petitions and other request forms for immigration benefits under the Immigration and Nationality Act, as amended, or who have submitted fee payments or received refunds from such applications or petitions; current, former and potential (e.g., fiancé) family members of applicants/petitioners; persons who complete immigration forms for applicants and petitioners (e.g., attorneys, interpreters, form preparers); names of applicant’s employer; and individuals referred to USCIS for reasonable fear and credible fear screenings. Additionally, CIDR maintains information on USCIS personnel who have used CIDR or the underlying USCIS systems included in CIDR.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p>CIDR receives information on individuals whose information is maintained in USCIS source systems, USCIS personnel who accessed the underlying source systems, and Federal Government employees who submit a RFI or other classified correspondence to USCIS. CIDR will not modify the source data contained in the underlying systems. Information collected about individuals may include, but is not limited to:</p>
            <p>•  Names (and types of individuals): first name, last name, middle name, and any aliases of the applicant/petitioner/requestor, beneficiary, or family members. USCIS also collects names of sponsors, form preparers, attorneys, and designated representatives.</p>
            <p>•  Immigration Status: status and status expiration dates relating to the benefit applicant/petitioner/requestor, beneficiary, family member, and sponsor.</p>
            <p>•  Travel Information: destination in the United States, port of entry, days spent outside the United States, dates of entry, arrival and departure dates, passport number, passport place of issue, passport issue date, passport expiration date, travel document number, travel document country of issue, and travel document expiration date.</p>
            <p>•  Marital Status and current and former marital status of the benefit applicant/petitioner/requestor or beneficiary, the dates of and place of marriages or terminations, and the reason for termination.</p>
            <p>•  Addresses: benefit applicants/petitioners/requestors, beneficiaries, family members, sponsors, attorneys, representatives. For certain benefits, a requestor or beneficiary can provide both a home address and an alternative mailing address.</p>
            <p>•  Telephone and Facsimile Numbers: benefit applicants/petitioners/requestors, beneficiaries, family members, sponsors, household members, attorneys, and representatives.</p>
            <p>•  E-mail Addresses: benefit applicants/petitioners/requestors, beneficiaries, family members, attorneys, and representatives.</p>
            <p>•  Dates of Birth and Age: benefit applicants/petitioners/requestors, beneficiaries, sponsors, and family members.</p>
            <p>•  Unique Identifying Numbers: Alien Numbers (A-Numbers), Social Security numbers (SSN), USCIS Online Account Numbers, receipt numbers, and other identifying numbers of benefit applicants/petitioners requestors, beneficiaries, family members, and sponsors.</p>
            <p>•  Citizenship/Nationality: benefit applicants/petitioners/requestors, beneficiary, or family member’s country of citizenship or nationality, and country of birth.</p>
            <p>•  Gender: benefit applicants/petitioners/requestors, beneficiaries, and family members.</p>
            <p>•  Personal Characteristics: benefit applicants/petitioners/requestors or beneficiary’s hair color, eye color, height, weight, race, and ethnicity.</p>
            <p>•  Information about the attorney, representative, form preparer, or interpreter: Full name, business or organization, mailing address, e-mail address, phone number, fax number, signature, language spoken, relationship to the benefit requestor or beneficiary (if applicable). USCIS also collects Attorney Bar Number or equivalent, Bar Membership, Accreditation Date, Board of Immigration Appeals Representative Accreditation Expiration Date, and Law Practice Restriction Explanation.</p>
            <p>•  Biometrics: benefit applicants/petitioners/requestors or beneficiary’s biometric images such as press-print, photograph, details about those images (e.g., capture date), and signature of benefit requestor, beneficiary, interpreter, and representative.</p>
            <p>•  Card Data: details about USCIS-issued cards (e.g., Employment Authorization Document and the Permanent Resident Cards) for approved applications such as card serial number, Radio-frequency identification (RFID) data, production site, production status, and time/date stamp of cards.</p>
            <p>•  Tax and Financial Information: tax identification numbers, and financial information (check information, bank account numbers, credit card numbers (the last four digits only) and other tax and financial information information).</p>
            <p>•  Results of Background, Identity and Security Checks: date of the background check, whether the check returned any derogatory results, whether those results were resolved, and expiration date of the results.</p>
            <p>•  Certifying Agency Information (if applicable): agency name, certifying official name, title of certifying official, address, phone, fax, agency type, case status, agency category, case number, FBI Number, or State Identification (SID) Number.</p>
            <p>•  Medical Information: collected and used to establish that an applicant is not inadmissible to the United States on public health grounds, as well as in support of a request for an accommodation during an interview. Such information may indicate alcoholism, declaration of incompetence, or family medical history.</p>
            <p>•  Employment Information: collected and used to determine the benefit requestor and beneficiary’s eligibility. Such information includes place and address of employment/occupation, type of work, employer name, length of employment, spouse’s employment.</p>
            <p>•  Military and Selective Service Information: collected and used to verify that the benefit requestor or beneficiary has registered with Selective Service as required by law. Such information includes Selective Service number, date of registration, application for military exemption, military branch, and willingness to bear arms for the United States of America.</p>
            <p>•  Information Regarding Organization Membership or Affiliation: collected and used to determine whether the applicant poses a security threat to the United States or individuals or has participated in activities that may disqualify him or her for a requested benefit. Such information includes an applicant’s organization memberships and affiliations (i.e., organizations, associations, clubs, foundations, parties, societies, or similar groups; communist party membership; totalitarian party membership; terrorist organization membership).</p>
            <p>•  Criminal History or Involvement and Moral Character Issues: collected and used to assess whether the applicant meets the standards contained in the INA. Such information includes an applicant’s criminal history, involvement in criminal activities, and information regarding moral character.</p>
            <p>•  Case Processing Information: date USCIS received or filed benefit requests; benefit request status; location of record; other control number when applicable; fee receipt data; status of USCIS appointments and interviews; date of issuance of a notice; and whether the benefit request form was referred to FDNS for review.</p>
            <p>•  Final Decision: final notice to the benefit requestors, beneficiary, and/or the representative on record, approval/denial code, etc.</p>
            <p>CIDR maintains information on USCIS personnel who use the underlying USCIS systems included in CIDR as well as CIDR itself, which includes, but is not limited to:</p>
            <p>•  System audit logs, including PICS Identification Numbers assigned to users of the underlying USCIS systems;</p>
            <p>•  Records of searches, analyses, correspondence, and outputs generated by USCIS personnel in response to a classified request for USCIS immigrant and non-immigrant data;</p>
            <p>CIDR does not collect or track specific data elements concerning personnel of other federal agencies; however, the classified correspondence associated with background checks or RFIs is maintained in CIDR in a searchable format. These documents may include contact information such as names, agency, title, work addresses, or phone numbers</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p>Records are obtained from the following systems of records:</p>
            <p>USCIS Systems:</p>
            <p>•  DHS/USCIS-007 Benefit Information System, 81 FR 72069 (October 19, 2016), which corresponds to the following USCIS databases:</p>
            <p>•   CLAIMS 3, case tracking for all benefits except refugee status, asylum, and naturalizations;</p>
            <p>•   CLAIMS 4, case tracking for naturalization and citizenship benefits; and</p>
            <p>•   RNACS, interim legacy system used to support naturalization processing in the period between the termination of Naturalization Application Casework System and the deployment of CLAIMS 4.</p>
            <p>•  DHS/USCIS-006 Fraud Detection and National Security Records (FDNS), 77 FR 47411 (August 8, 2012), which covers the following database:</p>
            <p>•   Fraud Detection and National Security Data System (FDNS-DS, screening and case management system used to record requests and case determinations involving benefit fraud, public safety, and national security concerns); and</p>
            <p>•   Service Center Computer-Linked Application Information Management System (SCCLAIMS), a mirror copy of CLAIMS 3 data, used to facilitate searches.</p>
            <p>•  DHS/USCIS/ICE/CBP-001 Alien File, Index, and National File Tracking System of Records, 82 FR 43556 (September 18, 2017), which covers the following USCIS database:</p>
            <p>•   Central Index System (CIS, contains status information on applicants/petitioners seeking immigration benefits)</p>
            <p>•  DHS/USCIS-010 Asylum Information and Pre-Screening, 80 FR 74781 (November 30, 2015), which corresponds to RAPS/APSS. RAPS, is a case management system that tracks applications for asylum pursuant to section 208 of the Immigration and Naturalization Act (INA) and applications for suspension of deportation or special rule cancellation of removal pursuant to Nicaraguan Adjustment and Central American Relief Act (NACARA) section 203 of the INA. APSS is a case management system that tracks the processing of "Credible Fear" and "Reasonable Fear" cases by Asylum staff.</p>
            <p>•  DHS/USCIS-017 Refugee Case Processing and Security Screening Information, 81 FR 72075 (October 19, 2016), which covers the collection and use of refugee applicants, refugee derivatives, and follow-to-join applicants.</p>
            <p>DHS Intelligence and Analysis System:</p>
            <p>•  DHS/IA-001, Office of Intelligence and Analysis (I&amp;A) Enterprise Records System, 73 FR 28128 (May 15, 2008).</p>
            <p>DHS-Wide System:</p>
            <p>•  DHS/ALL-004 General Information Technology Access Account Records System of Records, 77 FR 70792 (November 27, 2012).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p> Information in this system of records contains information relating to persons who have pending or approved benefit requests for special protected classes and should not be disclosed pursuant to a routine use unless disclosure is otherwise permissible under the confidentiality statutes, regulations, or policies applicable to that information. For example, information relating to persons who have pending or approved benefit requests for protection under the Violence Against Women Act, Seasonal Agricultural Worker or Legalization claims, Temporary Protected Status, and information relating to nonimmigrant visas. These confidentiality provisions do not prevent DHS from disclosing information to the U.S. Department of Justice (DOJ) and Offices of the United States Attorney as part of an ongoing criminal or civil investigation.</p>
            <p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
            <p> A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
            <p>  1. DHS or any component thereof;</p>
            <p>  2. Any employee or former employee of DHS in his/her official capacity;</p>
            <p>  3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
            <p>  4. The United States or any agency thereof.</p>
            <p> B. To a congressional office from the record of an individual in response</p>
            <p>to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
            <p> C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. sec. 2904 and 2906.</p>
            <p> D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
            <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
            <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary and otherwise compatible with the purpose of collection to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
            <p> G. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            <p>H. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
            <p>I. To a federal, state, or local agency, or other appropriate entity or individual, or through established liaison channels to selected foreign governments, in order to provide intelligence, counterintelligence, or other information for the purposes of intelligence, counterintelligence, or antiterrorism activities authorized by U.S. law, Executive Order, or other applicable national security directive.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p>DHS/USCIS stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
            <p>Records may be retrieved by any of the data elements listed above or a combination thereof. This may include, name, date of birth, Alien Number, SSN, USCIS Online Account Number, Receipt Number, and PICS Identification Number. Additionally, records may be retrieved by the output of USCIS’s search, analysis, and response to classified requests for USCIS data.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p>CIDR does not retain the replicated data sets from the underlying USCIS data systems, to include CLAIMS 3, CLAIMS 4, RAPS, APSS, RNACS, and CIS, and the associated audit trails of DHS personnel using the systems. The data supplied by these systems are retained by those systems in accordance with their own retention schedules. CIDR simply mirrors these data sets. Information will be removed from CIDR after it has been removed in the source system.</p>
            <p>USCIS is working with the NARA to develop a records retention schedule to cover the records retained in CIDR, such as classified background check responses. USCIS proposes to retain background check related records 100 years from the date of birth. The 100-year retention rate comes from the length of time USCIS may interact with a customer. Further, retaining the data for this period of time will enable USCIS to fight identity fraud and misappropriation of benefits. This proposed records retention schedule is consistent with the approved NARA Disposition Authority Number DAA-0563-2013-0001-0005.</p>
            <p>Records used as part of a benefit determination are maintained in the Alien File and processed in the respective USCIS case management system. The A-File records are permanent whether in hard copy or electronic form. USCIS transfers the A-Files to the custody of NARA 100 years after the individual’s date of birth. Electronic benefits information is archived and disposed of in accordance with NARA-approved retention schedule for the respective USCIS systems.</p>
            <p>CIDR retains a record of the classified search request, the results of the request, and a log of these activities for up to 25 years. These are maintained for a minimum of five years in accordance with Director of Central Intelligence Directive (DCID) 6/3. Classified data will be maintained for the period of time required by the originating classification authority.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
            <p>DHS/USCIS safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. USCIS has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act pursuant to 5 U.S.C. 552a(k)(1) and (k)(2). However, each request for information within CIDR will be reviewed to determine whether or not the record within CIDR meets the requirements of the exemptions and, as appropriate, to disclose information that does not meet the requirements. This does not prevent the individual from gaining access to his records in the source systems noted below. Persons may seek access to records maintained in the source systems that feed into CIDR, currently CLAIMS 3, and in future releases, CLAIMS 4, RAPS, APSS, RNACS, and CIS.</p>
            <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and to the USCIS FOIA/Privacy Act (PA) Officer whose contact information can be found at http://www.dhs.gov/foia under "Contacts Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about an individual may be available under the Freedom of Information Act.</p>
            <p>When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must verify his or her identity, meaning that the individual must provide his or her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
            <p>•  Explain why the individual believes the Department would have information on him or her;</p>
            <p>•  Identify which component(s) of the Department the individual believes may have the information about you;</p>
            <p>•  Specify when the individual believes the records would have been created; and</p>
            <p>•  Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
            <p>If an individual’s request is seeking records pertaining to another living individual, he or she must include a statement from that individual certifying his/her agreement for the individual to access his/her records.</p>
            <p>Without the above information, the component(s) may not be able to conduct an effective search, and the request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p>For records covered by the Privacy Act or covered JRA records, see "Record Access Procedures" above. Any individual, regardless of immigration status, may file a request to access his or her information under the FOIA. Throughout the benefit determination process and prior to USCIS making a determination to deny a benefit request, USCIS provides individuals with the opportunity to address and correct the information.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p>See "Record Access Procedures."</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p> The Secretary of Homeland Security has exempted this system from subsections (c)(3), (d), (e)(1), (e)(4)(G), (H), (I), and (f) of the Privacy Act, pursuant to 5 U.S.C. 552a (k)(1) and (k)(2).
            </p>
            <p>Additionally, many of the functions in this system require retrieving records from law enforcement systems. When this system receives a record from another system exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="history">
        <xhtmlContent>
            <p>
                DHS/USCIS-012, United States Citizenship and Immigration Services – 012 Citizenship and Immigration Data Repository, 75 FR 54642 (September 8, 2010). Final Rule for Privacy Act Exemptions, 75 FR 81371 (December 28, 2010).
            </p>
        </xhtmlContent>
    </subsection></section>
<section id="uscis13" toc="yes">
<systemNumber>/USCIS-013</systemNumber>
<subsection type="systemName">E-Verify Self Check.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified, sensitive.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the USCIS Headquarters in Washington, D.C. and field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Individuals seeking to check employment eligibility under the Immigration and Naturalization Act (INA). This
includes U.S. citizens as well as non-U.S. citizens.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>E-Verify Self Check is a two-step process: (1) identity authentication and (2) confirmation of work authorization
status. The first step of the process is the identity authentication. E-Verify Self Check will use a third party
commercial identity assurance service provider (IdP) using commercial identity verification information, collected by
third-party companies from financial institutions, public records, and other service providers to verify an individual’s
identity. The IdP will collect information about the individual who has elected to use E-Verify Self Check.
</p><p>The IdP will collect the following information from all individuals in order to generate the questions:
</p><p>• Name (last, first, middle initial, and maiden);
</p><p>• Date of birth;
</p><p>• Address of Residence; and
</p><p>• SSN(if provided).
</p><p>The questions asked by the IdP and the answers provided by the individual are not provided to USCIS. If an individual
fails the identity authentication portion of E-Verify Self Check and therefore is unable to proceed to an actual query in
E-Verify, none of the information listed above is provided to or retained by E-Verify Self Check. Only the transaction
number, the reason for failure, the date and time of the transaction, and error code are retained by the IdP to
facilitate troubleshooting and system management.
</p><p>In the individual passes identity authentication, he will be redirected to the DHS/USCIS E-Verify Self Check screen to
begin the E-Verify Self Check. The individual’s name, date of birth, and SSN (if provided) that were entered during
identity authentication is automatically pre-populated in E-Verify Self Check (E-Verify will not receive the address of
residence). This information will be unchangeable to ensure that the information represents the individual whose identity
has been authenticated. To begin the E-Verify Self Check process, the individual will be asked for additional
information. This information will be based the on individual’s citizenship status and the document chosen to prove work
authorization. Documents chosen could include:
</p><p>• SSN (if not previously provided);
</p><p>• Document(s) type, associated number, and associated expiration date that demonstrates work authorization.
These may include U.S. Passport, employment authorization document, I-495 Lawful Permanent resident card, or other
documents and associated numbers as listed as acceptable Form I-9 verification documents.
</p><p>This process is the same process as the basic E-Verify query and is described in the E-Verify PIA, dated May 4, 2010,
and System of Records Notice dated May 19, 2010, 75 FR 28035.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>The Illegal Immigration Reform and Immigrant Responsibility Act of 1996 (IIRIRA), Public Law 104-208, dated
September 30, 1996.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>An individual will use E-Verify Self Check to determine work authorization status. E-Verify Self Check contracts
with an IdP in order to provide identity authentication.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the Department of Justice (DOJ), including U.S. Attorney Offices, or other federal agency conducting litigation
or in proceedings before any court, adjudicative or administrative body, when it is necessary to the litigation and one
of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The U.S. or any agency thereof, is a party to the litigation or has an interest in such litigation, and DHS
determines that the records are both relevant and necessary to the litigation and the use of such records is compatible
with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration (NARA) or other federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. DHS has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or
property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or
programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the compromised
information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of the E-Verify Program, which includes possible fraud, discrimination, or employment based
identity theft and such disclosure is proper and consistent with the official duties of the person making the disclosure.
</p><p>H. To an individual utilizing E-Verify Self Check in order to determine his own work authorization in the United
States.
</p><p>I. To a third party commercial identity assurance provider (IdP) under contract with the Department, but only the
name, date of birth, address of residence, and Social Security number (if provided), for the purposes of authenticating
an individual who is seeking to access the USCIS E-Verify Self Check for employment eligibility.
</p><p>When there are multiple attempts to authenticate an individual, which indicates possible fraud, the DHS contract
authorizes the IdP to notify the provider of the information of potential fraud and to terminate access to E-Verify Self
Check. The IdP will share the fact of the inquiry with the appropriate credit bureau and monitor for potential fraudulent
access in accordance with the Fair Credit Reporting Act (FCRA).
</p><p>Disclosure to consumer reporting agencies:
</p><p>DHS is using the services of a third party IdP to authenticate an individual’s identity. The third party IdP uses
commercial identity verification information which is collected by third party companies from financial institutions,
public records, and other service providers to create the knowledge-based questions used to authenticate identity. This
information does not belong to DHS nor will information from other sources relied upon by the third party provider be
collected and/or retained by DHS. FCRA requires the IdP to retain the fact of an inquiry. The IdP will maintain time/date
stamp and inquiry type (credit check, identity check, etc.) so that the inquiry is noted in the individual’s credit
record and can be audited at a later date. The E-Verify Self Check inquiry is an identity check, and therefore will not
affect an individual’s credit score. These types of inquiries are not shown to third parties who may request copies of
credit reports. Under FCRA, an individual has the right to know who has reviewed his credit report and the individual can
place a fraud alert on his credit file. If an individual has placed a fraud alert on his credit file, the individual will
not be able to authenticate for E-Verify Self Check purposes.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically, on magnetic disc, tape, digital media, and CD-ROM. All
personal information entered by the individual as part of the IdP process and any questions that might have been
generated by the third party data IdP are deleted at the end of the session. Nothing is stored or retained in E-Verify
Self Check. Only the transaction number, the reason for failure, the date and time of the transaction, and error code are
retained to facilitate troubleshooting and system management. Because the IdP accesses an individual’s credit history to
perform the authentication, it will retain audits of the individual’s E-Verify Self Check inquiry to comply with legal
obligations, specifically, the FCRA. The FCRA requires that an inquiry be noted in the individual’s credit record.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records related to the IdP portion of the program can be retrieved by the following fields:
</p><p>• E-Verify Self Check unique transaction ID;
</p><p>• IdP Unique Transaction ID;
</p><p>• E-Verify Self Check transaction time/date stamp;
</p><p>• Failure of the IDP transaction; and
</p><p>• Reason for Failure (i.e., could not generate questions/answered incorrectly/system error)
</p><p>For the actual E-Verify Self Check query, the information will be retrieved by name, Alien Number, I-94 Number,
Receipt Number, Passport (U.S. or Foreign) Number, or Social Security number of the individual as discussed in the E-
Verify SORN dated May 19, 2010.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>The retention schedule is currently under development with the National Archives and Records Administration
(NARA). The proposed retention schedule for the query and response to the query is for one (1) year in order to allow
time for management analysis and proper reporting.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Chief, Verification Division, U.S. Citizenship and Immigration Services, Washington, DC 20529.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to the USCIS FOIA Officer, whose contact information can be found at
<i>http://www.dhs.gov/foia</i> under "contacts." If an individual believes more than one component maintains
Privacy Act records concerning him or her the individual may submit the request to the Chief Privacy Officer and Chief
Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive, SW., Building 410, STOP-
0655, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records, your
request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, <i>http://www.dhs.gov</i> or 1
-866-431-0486. In addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created;
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records; and
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are obtained from several sources including: (A) Information collected from individuals requesting their
work authorization status; (B) information collected from federal databases for work authorization, (C) information
created by E-Verify, including its monitoring and compliance activities; and (D) pass notification from the IdP when an
individual has successfully completed identity authentication.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>

    <section id="uscis17" toc="yes">
        <systemNumber>/USCIS-017</systemNumber>
        <subsection type="systemName">
            DHS/United States Citizenship and Immigration Services (USCIS)-017 Refugee Case Processing and Security Screening Information.
        </subsection>

        <subsection type="securityClassification">
            <xhtmlContent>
                <p> Unclassified, Sensitive, For Official Use Only. The data may be retained on classified networks, but this does not change the nature and character of the data until it is combined with classified information.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p> Records are maintained in DHS/USCIS information technology (IT) systems and associated electronic and paper files located at USCIS Headquarters in Washington, D.C. and in DHS/USCIS service centers and domestic and international field offices to support USCIS Refugee, Asylum, and International Operations (RAIO) Refugee Affairs Division (RAD). The DHS/USCIS IT systems, as well as DOS IT systems that support the Refugee Case Processing and Security Screening Information include: the DOS WRAPS, USCIS CAMINO, and CLAIMS 3. Refugee application data and biographic check results for the principal applicant, derivatives, and other family members are processed in DOS WRAPS and USCIS CAMINO. Biometric check results for the refugee applicant and derivatives are stored in the USCIS Customer Profile Management System (CPMS). Applications for the adjustment of status, refugee travel documents, and follow-to-join benefit petitions Form I-730, are processed in USCIS CAMINO and CLAIMS 3. Records are replicated from the operational DHS/USCIS IT systems and maintained on DHS unclassified and classified networks.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p> Categories of individuals covered by this system include: (1) individuals who have applied for admission to the United States under the USRAPS; (2) spouses (current and former) and children of a principal refugee applicant included in the refugee application; (3) principal refugee applicant’s parents and relatives in the United States; (4) other individuals listed as part of the family tree and including points of contact in the United States and other individuals with whom the applicant associates; (5) individuals who have petitioned for follow-to-join (derivative) refugee or asylum status for their spouse and  unmarried children under the age of 21 on Form I-730 Refugee/Asylee Relative Petition; (6) persons who complete refugee applications on behalf of the refugee applicant (e.g., form preparers, interpreters); and (7) individuals associated with partner organizations such as Resettlement Support Centers and the United Nations High Commissioner for Refugees.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>Information about benefit requestor and derivatives may include:</p>
                <p>•Full name;</p>
                <p>•Alias(es);</p>
                <p>•Physical and mailing addresses;</p>
                <p>•Date of birth;</p>
                <p>•Place of birth;</p>
                <p>•Gender;</p>
                <p>•Ethnicity or tribal group;</p>
                <p>•Religion;</p>
                <p>•Present Citizenship or Nationality;</p>
                <p>•Alien Number (A-Number);</p>
                <p>•Resettlement Support Center Case Number;</p>
                <p>•Receipt Number;</p>
                <p>•USCIS Online Account Number;</p>
                <p>•Social Security number (SSN), if any;</p>
                <p>•Relationship to benefit requestor (i.e., children under the age of 21 and spouse);</p>
                <p>•Employment authorization eligibility and application history;</p>
                <p>•Records regarding organization membership or affiliation;</p>
                <p>•Supporting documentation as necessary (e.g., birth, marriage, divorce certificates; licenses; academic diplomas; academic transcripts; appeals or motions to reopen or reconsider decisions; explanatory statements; and unsolicited information submitted voluntarily by the applicant or family members in support of a benefit request);</p>
                <p>•Government-issued identification (e.g., passport, driver license):</p>
                <p>o Document type</p>
                <p>o Issuing organization</p>
                <p>o Document number</p>
                <p>o Expiration date</p>
                <p>o Benefit requested;</p>
                <p>•Notices and communications, including:</p>
                <p>o Receipt notices;</p>
                <p>o Requests for Evidence;</p>
                <p>o Notices of Intent to Deny;</p>
                <p>o Proofs of benefit;</p>
                <p>•Phone and fax numbers;</p>
                <p>•Email addresses;</p>
                <p>•Social Media handles, associated identifiable information, and results;</p>
                <p>•Marital status;</p>
                <p>•Place of marriage;</p>
                <p>•Arrival/Departure information;</p>
                <p>•Immigration history (e.g., citizenship/naturalization certificate number, removals, explanations);</p>
                <p>•Family relationships (e.g., parent, spouse, sibling, child, other dependents);</p>
                <p>•Relationship practices (e.g., polygamy, custody, guardianship);</p>
                <p>•Personal background information (e.g., involvement with national security threats, criminal offenses, Communist party affiliation, activity and/or affiliation with groups or organizations abroad, torture, genocide, killing, injuring, forced sexual contact, limiting or denying others religious beliefs, service in military or other armed groups, work in penal or detention systems, weapons);</p>
                <p>•Health information (e.g., vaccinations, referrals, communicable diseases, physical or mental disorders, prostitution, drug or alcohol abuse);</p>
                <p>•Employment authorization eligibility and application history;</p>
                <p>•Professional accreditation information;</p>
                <p>•Financial information (e.g., income, expenses, scholarships, savings, assets, property, financial support, supporter information, life insurance, debts, encumbrances, tax records);</p>
                <p>•Travel history;</p>
                <p>•Explanation/description of foreign travel;</p>
                <p>•Education history;</p>
                <p>•Work history;</p>
                <p>•Documents establishing identity and claimed relationship (e.g., marriage record, civil or criminal history, medical records, education records, DNA results);</p>
                <p>•Physical description (e.g., height, weight, eye color, hair color, race, ethnicity, identifying marks like tattoos or birthmarks);</p>
                <p>•Biometrics (i.e., fingerprints and photographs) and other information (e.g., race, ethnicity, weight, height, eye color, hair color);</p>
                <p>•Background check results;</p>
                <p>•Reports of investigations or derogatory information obtained from DHS and other federal systems;</p>
                <p>•Refugee interview notes and assessments;</p>
                <p>•Information regarding the status of Department of Justice (DOJ), Executive Office of Immigration Review (EOIR) proceedings, if applicable; and</p>
                <p>•Case processing information such as date applications were filed or received by USCIS; application/petition status, location of record, other control number when applicable, and fee receipt data.</p>
                <p>Information about the benefit requestor’s parents and relatives in the United States and other individuals listed as part of the family tree and including points of contact in the United States and other individuals with whom the applicant associates:</p>
                <p>•  Name;</p>
                <p>•  Date of Birth;</p>
                <p>•  Relationship to the benefit requestor;</p>
                <p>•  Country of Birth;</p>
                <p>•  Address; and</p>
                <p>•  Background check results.</p>
                <p>Information about Registrants, Preparers, and Interpreters may include:</p>
                <p>•Full name;</p>
                <p>•Organization;</p>
                <p>•Business State ID number;</p>
                <p>•Employer Tax Identification Number;</p>
                <p>•Physical and mailing addresses:</p>
                <p>•Email address;</p>
                <p>•Phone and fax numbers;</p>
                <p>•Relationship to applicant; and</p>
                <p>•Signature.</p>
                <p>Information about Accredited Representatives and Attorneys includes:</p>
                <p>•Name;</p>
                <p>•Law Firm/Recognized Organization;</p>
                <p>•Physical and mailing addresses:</p>
                <p>•Phone and fax numbers;</p>
                <p>•Email address;</p>
                <p>•Attorney Bar Card Number or equivalent;</p>
                <p>•Bar membership;</p>
                <p>•Accreditation date;</p>
                <p>•Board of Immigration Appeals Representative Accreditation;</p>
                <p>•Expiration date;</p>
                <p>•Law Practice Restriction Explanation; and</p>
                <p>•Signature.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p> Authority for maintaining this system is in Section 207 of the Immigration and Nationality Act (INA), as amended.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p> The purpose of this system is to collect, use, maintain, disseminate, and store refugee information, including the administration and adjudication of the review of refugee applications and follow-to-join applications for those who are seeking consideration for refugee resettlement, as well as applications for permanent residency, employment authorization, and travel abroad.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p> In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3). Even when a valid routine use permits disclosure of information from this system of records to a third party, in some cases such disclosure may not be permissible because of confidentiality laws and policies that limit the sharing of information regarding individuals applying for refugee status.</p>
                <p> Information in this system of records contains information relating to persons who have pending or approved refugee applications or pending or approved follow-to-join petitions should not be disclosed pursuant to a routine use unless disclosure is otherwise permissible under 8 CFR 208.6. These confidentiality provisions do not prevent DHS from disclosing information to the DOJ and Offices of the United States Attorneys as part of an ongoing criminal or civil investigation. These provisions permit disclosure to courts under certain circumstances as well, as provided under 8 CFR 208.6(c)(2). Subject to these restrictions:</p>
                <p> A. To the DOJ, including Offices of the United States Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party of the litigation or has an interest in such litigation:</p>
                <p>  1. DHS or any component thereof;</p>
                <p>  2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>  3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
                <p>  4. The United States or any agency thereof.</p>
                <p> B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p> C. To the National Archives and Records Administration (NARA) or other Federal Government agencies pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
                <p> D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p> E. To appropriate agencies, entities, and persons when:</p>
                <p> 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;</p>
                <p> 2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
                <p> 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
                <p> F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To DOS, their contractors, agents, grantees, experts, consultants, or others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DOS (e.g., RSC, International Organization for Migration), when necessary to accomplish refugee case processing.</p>
                <p>I. To federal and foreign government intelligence or counterterrorism agencies or components when DHS becomes aware of an indication of a threat or potential threat to national or international security, or when such use is to assist in anti-terrorism efforts and disclosure is appropriate to the proper performance of the official duties of the person making the disclosure.</p>
                <p>J. To requesting foreign governments under appropriate information sharing agreements and there is a legitimate need to share information for law enforcement or national security purposes under 8 CFR 208.6.</p>
                <p>Disclosure to consumer reporting agencies:</p>
                <p> None.</p>
                 
                </xhtmlContent>
    </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>Storage:</p>
                <p> DHS/USCIS stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p> DHS/USCIS may retrieve records by any of the data elements listed above or a combination thereof. This may include name, date of birth, alias(es), place of birth, gender, ethnicity or tribal group, physical addresses, relatives addresses, A-Number, SSN, USCIS Online Account, Receipt Number, Resettlement Support Center Case Number, government-issued identification, notices and communications, phone numbers, and email addresses.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p> DHS/USCIS safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS/USCIS has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.  </p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p> DHS/USCIS stores the physical documentation in the Alien File, and maintains refugee case processing and security screening information and follow-to-join applications in the respective case management systems. The A-File records are permanent whether hard copy or electronic. USCIS transfers the A-Files to the custody of NARA 100 years after the individual’s date of birth. </p>
                <p> NARA approved the CAMINO [N1-566-12-06] and CLAIMS 3 [N1-566-08-12] Retention Schedules.</p>
                <p> CAMINO Master File automated records are maintained for 25 years after the case is closed and then destroyed.</p>
                <p> CLAIMS 3 records are destroyed after the data is transferred to the electronic master file and verified. Information in the master file is destroyed 15 years after the last completed action with respect to the benefit. USCIS is proposing to update the CLAIMS 3 Retention Schedule to destroy records 50 years after the last completed action. This retention schedule allows USCIS to address any follow-up inquiries or requests related to the application, including inquiries related to law enforcement, public safety, and national security, and to respond to Freedom of Information Act/Privacy Act (FOIA/PA) matters.</p>
                <p> The biometric check data is retained in CPMS, which is governed by a DHS-wide retention schedule. The records in CPMS are retained for 100 years from the individual’s data of birth in accordance with the NARA Disposition Authority Number DAA-0563-2013-0001-0005.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
            <p> For refugee records, the DHS system manager is the Chief, Refugee Affairs Division, Refugee, Asylum, and International Operations Directorate, U.S. Citizenship and Immigration Services, Department of Homeland Security, 111 Massachusetts Avenue N.W., Washington, D.C. 20529.</p>
            <p> For refugee follow-to-join records, the DHS system manager is the Chief, International Operations Division, Refugee, Asylum, and International Operations Directorate, U.S. Citizenship and Immigration Services, Department of Homeland Security, 111 Massachusetts Avenue N.W., Washington, D.C. 20529.</p>
            <p> For refugee records relating to adjustment of status and travel, the DHS system manger is the Associate Director, Service Center Operations Directorate, U.S. Citizenship and Immigration Services, Department of Homeland Security, 111 Massachusetts Avenue N.W., Washington, D.C. 20529.</p>
        </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p> Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the National Records Center (NRC) FOIA/PA Office, P.O. Box 648010, Lee’s Summit, MO, 64064–8010, whose contact information can be found at http://www.dhs.gov/foia under "Contacts." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive, S.W., Building 410, STOP-0655, Washington, D.C. 20528.</p>
                <p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, you should:</p>
                <p>•Explain why you believe the Department would have information on you;</p>
                <p>•Identify which component(s) of the Department you believe may have the information about you;</p>
                <p>•Specify when you believe the records would have been created; and</p>
                <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p> See "Notification procedure" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p> See "Notification procedure" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p> DHS/USCIS obtains records from the applicant, and his or her accredited representative, preparer, or interpreter. Other information sources include family members, federal databases for security screening checks, RSCs, the DOS Refugee Processing Center, resettlement agencies, international organizations, and local sources at overseas sites. DHS/USCIS personnel may input information as they process a case, including information from internal and external sources to verify whether a benefit requestor or family is eligible for the refugee benefit requested. Refugee Case Process and Security Screening also stores and uses information from the following USCIS, DHS, and other federal agency systems of records:</p>
                <p>•DHS/USCIS/ICE/CBP-001 Alien File, Index, and National File Tracking System of Records, 78 FR 69864 (November 21, 2013);</p>
                <p>•DHS/USCIS-002 Background Check Service, 72 FR 31082 (June 5, 2007);</p>
                <p>•DHS/USCIS-003 Biometric Storage System, 72 FR 17172 (April 6, 2007);</p>
                <p>•STATE-05, Overseas Citizen Services Records (May 2, 2008);</p>
                <p>•STATE-26, Passport Records, (Mar. 24, 2015)STATE-39, DOS Visa Opinion Information Service (VOIS), 77 FR 65245, (Oct. 25, 2012);</p>
                <p>•JUSTICE/FBI-002 The FBI Central Records System, 72 FR 3410 (January 25, 2007);</p>
                <p>•DoD/A0025-2 Defense Biometric Services, 74 FR 48237, (September 22, 2009);</p>
                <p>•DoD Detainee Biometric Information System, 72 FR 14534, (March 28, 2007); and</p>
                <p>•DoD/A0025-2a Defense Biometric Identification Records System, 74 FR 17840, (April 17, 2009).</p>
                 
                </xhtmlContent>
    </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                claimed for the system:
             
                <p> None  </p>

            </xhtmlContent>
        </subsection>
    </section>

    <section id="uscis18" toc="yes">
        <systemNumber>/USCIS-018</systemNumber>
        <subsection type="systemName"> DHS/ USCIS-018 Immigration Biometric and Background Check (IBBC) System of Records </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified and classified. The data may be retained on classified networks but this does not change the nature and character of the data until it is combined with classified information.</p>
                </xhtmlContent>
                </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>DHS/USCIS replicates records from the operational IT systems and maintains them in other IT systems connected on the DHS unclassified and classified networks.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>• Persons who have filed on their own behalf, or on the behalf of others, applications or petitions for immigration benefits or other requests under the Immigration and Nationality Act (INA) (i.e., applicants, petitioners, and beneficiaries), as amended;</p>
                <p>• Current, former, and potential derivative family members of benefit requestors;</p>
                <p>• Affiliated persons who have a clearly articulated rational connection to the request, applicant, petitioner, or beneficiary, that may have an impact on the adjudication process of a request;</p>
                <p>• Associates whose information is voluntarily provided by the applicant as part of the family tree, and which include points of contact in the United States and other individuals with whom the applicant associates (i.e., household members, sponsors);</p>
                <p>• Attorneys and representatives recognized by USCIS and/or accredited by the Board of Immigration Appeals (Representatives); and</p>
                <p>• All individuals who meet the definition of an adult member of the household, 8 C.F.R. 204.3(b) or 8 C.F.R. 204.301; and/or any other individual whose presence in the applicant’s or petitioner’s residence is relevant to the prospective adoptive parent(s)’s suitability to adopt overseas.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>Biographic information may include:</p>
                <p>• Full name;</p>
                <p>• Aliases;</p>
                <p>• Other names;</p>
                <p>• Date of birth;</p>
                <p>• Place of birth;</p>
                <p>• Country of Citizenship/Nationality;</p>
                <p>• Current and previous immigration status;</p>
                <p>• Mailing and physical address;</p>
                <p>• Phone number;</p>
                <p>• Employment status;</p>
                <p>• Travel Document Numbers (i.e., passport numbers, I-94 number);</p>
                <p>• Travel Document Information (i.e., country of issuance, nationality, date of issuance, expiration date);</p>
                <p>• Case Type (i.e., refugee claimant, identity investigation, absconder, visa applicant);</p>
                <p>• Filing date;</p>
                <p>• Filing determination;</p>
                <p>• Reason for filing determination;</p>
                <p>• Gender;</p>
                <p>• Height;</p>
                <p>• Weight;</p>
                <p>• Eye color;</p>
                <p>• Hair color;</p>
                <p>• Race/Ethnicity; and</p>
                <p>• Unique Identifying Numbers, including, but not limited to, Alien Registration Number (Alien Number), Receipt Number, Social Security number (SSN), and USCIS Online Account Number.</p>
                <p>Biometric information may include:</p>
                <p>• Biometric images (including, but not limited to: photographs/facial images, fingerprint images, iris images, voice samples, and signatures); and</p>
                <p>• Details about images (i.e., capture date, reason fingerprinted, and location).</p>
                <p>Encounter information may include:</p>
                <p>• Scan of marked travel document page;</p>
                <p>• Foreign partner point of contact information;</p>
                <p>• Watchlist indicator, indicator of derogatory information, or reason for alert;</p>
                <p>• Arrival, Departure, and/or Removal information (date and location);</p>
                <p>• Transaction Control Numbers Associated with FBI fingerprint checks;</p>
                <p>• Date/time of submission;</p>
                <p>• Type of immigration form or non-biometric encounter;</p>
                <p>• Date of immigration form or non-biometric encounter;</p>
                <p>• Query results (match or no match);</p>
                <p>• Error code; and</p>
                <p>• Transaction Identifier Data (i.e., sending organization; timestamp; date; transaction type; case type; priority level; message origin; message destination; reference numbers (requesting participants subject specific reference number; or requesting participants event specific reference number)); workstation; reason fingerprinted, such as entry, visa application, credentialing application, or apprehension; and any available encounter information, including an IDENT-generated encounter identification number (EID)).</p>
                <p>Background Check information may include:</p>
                <p>• Results of criminal and national security background checks (i.e., positive or negative response; and positive responses are generally accompanied with the individual’s criminal history and additional information explaining the results of the response); Unique Biometric Identifier (i.e., Fingerprint Identification Number (FIN) and Universal Control Number (formerly known as FBI Number)); and</p>
                <p>• Logs associated with the requests of background checks, which may include requesting location and requesting person.</p>
                <p>Document Production information may include:</p>
                <p>• Identifying Transactional Information (i.e., transaction control number, book number);</p>
                <p>• Biographical Information used for Document Production;</p>
                <p>• Document Production Status;</p>
                <p>• Benefit Card/Document Type;</p>
                <p>• Class of Admission;</p>
                <p>• Document Serial Number;</p>
                <p>• Radio Frequency Identification (RFID) with USCIS Issued Document;</p>
                <p>• Machine-readable Barcode;</p>
                <p>• Production Site;</p>
                <p>• Production Status; and</p>
                <p>• Document Issuance Time/Date and Expiration Date.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>1. DHS/USCIS/ICE/CBP-001 Alien File, Index, and National File Tracking System of Records, 82 FR 43556 (Sept. 18, 2017);</p>
                <p>2. DHS/USCIS-005 Intercountry Adoptions Security, 81 FR 78614 (Nov. 8, 2016);</p>
                <p>3. DHS/USCIS-006 Fraud Detection and National Security Records (FDNS), 77 FR 47411 (Aug. 8, 2012);</p>
                <p>4. DHS/USCIS-007 Benefit Information System, 81 FR 72069 (Oct. 19, 2016);</p>
                <p>5. DHS/USCIS-010 Asylum Information and Pre-Screening, 80 FR 74781 (Nov. 30, 2015);</p>
                <p>6. DHS/USCIS-017 Refugee Case Processing and Security Screening Information, 81 FR 72075 (Oct. 19, 2016);</p>
                <p>7. DHS/CBP-011 U.S. Customs and Border Protection TECS, 73 FR 77778 (Dec. 19, 2008);</p>
                <p>8. DHS/ICE-011-Criminal Arrest Records and Immigration Enforcement Records (CARIER) System of Records, 81 FR 72080 (Oct. 19, 2016);</p>
                <p>9. DHS/US-VISIT-001 DHS Automated Biometric Identification System (IDENT), 72 FR 31080 (June 5, 2007);</p>
                <p>10. DHS/ALL-041 External Biometric Records (EBR) System of Records, 83 FR 17829 (April 24, 2018);</p>
                <p>11. JUSTICE/FBI-002 The FBI Central Records System, 82 FR 24147 (May 25, 2017), and prior history (https://www.justice.gov/opcl/doj-systems-records);</p>
                <p>12. JUSTICE/FBI-009 The Next Generation Identification (NGI) System, 81 FR 27283 (May 5, 2016), and 82 FR 24151 (May 25, 2017);</p>
                <p>13. STATE-05 Overseas Citizens Services Records and Other Overseas Records, 81 FR 62235 (Sept. 8, 2016);</p>
                <p>14. STATE-26 Passport Records, 80 FR 15653 (March 24, 2015);</p>
                <p>15. STATE-39 Visa Records, 77 FR 65245 (Oct. 25, 2012);</p>
                <p>16. STATE-59 Refugee Case Records, 77 Fed. Reg. 5865 (Feb. 6, 2012);</p>
                <p>17. ODNI/NCTC–008 National Counterterrorism Center Terrorism Analysis Records, 72 FR 73895 (Dec. 28, 2007);</p>
                <p>18. DoD/A0025-2 Defense Biometric Services, 74 FR 48237 (Sept. 22, 2009);</p>
                <p>19. DoD/A0025-2 PMG (DFBA) Defense Biometric Identification Records System, 80 FR 8292 (Feb. 17, 2015); and</p>
                <p>20. DoD/A0025-2a Defense Biometric Identification Records System, 74 FR 17840 (April 17, 2009).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
                <p>A. To the DOJ, including Offices of the U.S. Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>H. To an appropriate Federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>I. To appropriate Federal, state, local, tribal, territorial, or foreign governments, as well as to other individuals and organizations during the course of an investigation by DHS or the processing of a matter under DHS’s jurisdiction, or during a proceeding within the purview of the immigration and nationality laws, when DHS deems that such disclosure is necessary to carry out its functions and statutory mandates.</p>
                <p>J. To a former employee of DHS, in accordance with applicable regulations, for purposes of: responding to an official inquiry by a Federal, state, or local government entity or professional licensing authority; or facilitating communications with a former employee that may be necessary for personnel-related or other official purposes when DHS requires information or consultation assistance from the former employee regarding a matter within that person’s former area of responsibility.</p>
                <p>K. To a coroner, in accordance with applicable law and regulations, for purposes of affirmatively identifying a deceased individual (whether or not such individual is deceased as a result of a crime).</p>
                <p>L. To a Federal, state, or local government agency seeking to verify or ascertain the citizenship or immigration status of any individual within the jurisdiction of the agency for any purpose authorized by law</p>
                <p>M. To an appropriate domestic government agency or other appropriate authority for the purpose of providing information about an individual who has been or is about to be released from DHS custody who, due to a condition such as mental illness, may pose a health or safety risk to himself/herself or to the community. DHS will only disclose information about the individual that is relevant to the health or safety risk they may pose and/or the means to mitigate that risk (e.g., the individuals need to remain on certain medication for a serious mental health condition).</p>
                <p>N. To foreign governments for the purpose of coordinating and conducting the removal of individuals to other nations under the INA; and to international, foreign, and intergovernmental agencies, authorities, and organizations in accordance with law and formal or informal international arrangements.</p>
                <p>O. To DOJ FBI for the purpose of conducting name and fingerprint background checks in order to verify the identity of an individual and generate information used to grant or deny an immigration benefit request or other request.</p>
                <p>P. To U.S. Department of State for the purpose of conducting biographic and biometric based searches for identity verification in order to process requests for benefits under the INA, and all other immigration and nationality laws including treaties and reciprocal agreements; or when DOS requires information to consider and/or provide an informed response to a request for information from a foreign, international, or intergovernmental agency, authority, or organization about an alien or an enforcement operation with transnational implications.</p>
                <p>Q. To U.S. Department of Defense for the purpose of biometric background checks to verify the identity of an individual and generate information used to grant or deny an immigration benefit request or other request.</p>
                <p>R. To the Office of the Director of National Intelligence National Counterterrorism Center (ODNI/NCTC) and other Federal and foreign government intelligence or counterterrorism agencies when USCIS becomes aware of an indication of a threat or potential threat to national or international security, or when such use is to assist in anti-terrorism efforts and disclosure is appropriate to the proper performance of the official duties of the person making the disclosure.</p>
                <p>S. To an individual’s prospective or current employer to the extent necessary to determine employment eligibility (for example, pursuant to the Form I-140, Immigrant Petition for Alien Worker).</p>
                <p>T. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
              
                </xhtmlContent>
    </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>Records may be retrieved by any of the data elements listed above or a combination thereof. This may include, but is not limited to, name, date of birth, Alien Number, SSN, USCIS Online Account Number, and Receipt Number.
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>USCIS generates secure identification documents to communicate adjudication decisions to the mailing address on file for the benefit requestor or his or her legal representative. USCIS systems that generate cards and documents retain data 10 years from the date of record creation in accordance with NARA Disposition Authority Number DAA-0566-2016-0014. Proof of benefits sent to the benefit requestor and returned to USCIS are retained by USCIS for up to one year in accordance with NARA Disposition Authority Number DAA-0566-2014-0005.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his or her identity, meaning that the individual must provide his or her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief FOIA Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                <p>• Explain why the individual believe the Department would have information on him or her;</p>
                <p>• Identify which component(s) of the Department the individual believes may have the information about him or her;</p>
                <p>• Specify when the individual believes the records would have been created; and</p>
                <p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If an individual’s request is seeking records pertaining to another living individual, the first individual must include a statement from that individual certifying his/her agreement for the first individual to access his/her records.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>
                    For records covered by the Privacy Act or covered JRA records, see "Records Access Procedures" above. Any individual, regardless of immigration status, may file a request to access his or her information under the FOIA. Throughout the benefit determination process, and prior to USCIS making a determination to deny a benefit request, USCIS provides individuals with the opportunity to address and correct the information.

                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p> See "Record Access Procedures.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>
                    The Secretary of Homeland Security, pursuant to Secretary’s delegation number 15002 to the Director of USCIS to conduct certain law enforcement activities, when necessary to protect the national security and public safety, pursuant to 5 U.S.C. 552a(j)(2), is proposing to exempt this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (f); and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f). When a record received from another system has been exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>
                    DHS/USCIS-002 Background Check Service, 72 FR 31082 (June 5, 2007); DHS/USCIS-003 Biometric Storage System, 72 FR 17172 (April 6, 2007).
                </p>
            </xhtmlContent>
        </subsection>
    </section>



        <section id=" dhs/cisomb-1" toc="yes">
        <systemNumber> DHS/CISOMB-001</systemNumber>
            <subsection type="systemName">
                Case Assistant Analytic Data Integration System (CAADI) System of Records.
            </subsection>
            <subsection type="securityClassification">
                <xhtmlContent>
                    <p>Unclassified.</p>
                    </xhtmlContent>
    </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at the Office of Citizenship and Immigration Services Ombudsman in Washington, D.C.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Kelly Kingsley, Management and Program Analyst, (202) 357-8485, Office of Citizenship and Immigration Services Ombudsman, 375 E St, SW, Washington, D.C 20024.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>Section 452 of the Homeland Security Act of 2002; 6 U.S.C. sec. 272.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system of records is to provide efficient and secure case management and processing of information related to individuals and employers experiencing problems with USCIS.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p> Any individuals or persons, including their employers or representatives, who are seeking assistance from the CIS Ombudsman in resolving general problems with USCIS.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>The CIS Ombudsman collects the following information via Form DHS-7001 from individuals who seek assistance in resolving problems with USCIS:</p>
                •	<p>Full legal name, including any aliases;</p>
                •	<p>Date and country of birth;</p>
                •	<p>Country of citizenship;</p>
                •	<p>A-Number;</p>
                •	<p>Contact information, including mailing address, email address, phone number, and fax number;</p>
                •	<p>Full legal name of person preparing the form if other than the individual named in the application or petition;</p>
                •	<p>Applications and/or petitions filed;</p>
                •	<p>Receipt number received from USCIS in response to application/petition filed;</p>
                •	<p>Immigration status or interim benefit applied or petitioned for;</p>
                •	<p>Type of case problem;</p>
                •	<p>Source of case problem;</p>
                •	<p>Description of case problem;</p>
                •	<p>Prior actions taken to remedy the problem;</p>
                •	<p>Designated attorney/representative name, address, phone number, email address, and fax number;</p>
                •	<p>Supporting documentation attached to submissions, such as evidence submitted to USCIS, documents received from USCIS, or other information the individual feels is relevant or important;</p>
                •	<p>Consent of the petitioner for USCIS to disclose information in the file to the designated representative, if applicable;</p>
                •	<p>Verification statement signed and dated by the subject of the request or the authorized representative; and</p>
                •	<p>Declaration by the attorney or accredited representative submitting the case problem.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>Records are obtained from individuals or persons seeking assistance, including their employers or representatives, and USCIS, or other agencies such as the U.S. Departments of State, Labor, and Justice.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3), as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorney’s Offices, or any other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any Component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration (GSA) pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that, as a result of the suspected or confirmed breach, there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach, or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another federal agency or entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To an attorney or representative who is acting on behalf of an individual covered by this system of records to obtain the individual’s information submitted to the CAADI System.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>The CIS Ombudsman stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p> The CIS Ombudsman’s retrieves records by Case Number, A-Number, or the individual’s name.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>In accordance with NARA’s approved retention and disposal schedule DAA-0563-2019-0004-0001, the processed case files are resolved at the final disposition of the case and are deleted or destroyed three years after resolution. Incomplete case files are the record copy of cases where additional information is requested, but not received. The CIS Ombudsman’s procedure is to close such cases seven days after the request for additional information, if such information is not received. These records are also deleted or destroyed three years after resolution.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p>The CIS Ombudsman safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. The CIS Ombudsman has imposed strict controls to minimize the risk of compromising the information that is stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties, and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the DHS Chief Privacy Officer and Chief Freedom of Information Act Officer, whose contact information can be found on page two of this document. If an individual believes more than one DHS Component maintains Privacy Act records concerning him or her, the individual may submit the request to the DHS Chief Privacy Officer and Chief Freedom of Information Act Officer. Even if neither the Privacy Act nor the JRA provide a right of access, certain records about you may be available under the Freedom of Information Act (FOIA).</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. In addition, the individual should:</p>
                •	<p>Explain why he or she believes the Department would have the information being requested;</p>
                •	<p>Identify which DHS Component may have the information;</p>
                •	<p>Specify when the individual believes the records would have been created; and</p>
                •	<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                <p>Without the information above, the DHS Component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the DHS Component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record. The CIS Ombudsman may amend requestor-specific information upon notification from that individual. Additionally, the CIS Ombudsman may verify information submitted by the requestor against other agency databases; amendments may also be made as a result. Amendments may be made in case notes or by overwriting inaccurate information. Requestors are notified of material changes.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p> See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p> When this system receives a record from another system exempted in that source system under 5 U.S.C. sec. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p> DHS/CISOMB-001, 75 FR 18857 (April 13, 2010).</p>
            </xhtmlContent>
        </subsection>
    </section>

    <subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at Citizenship and Immigration Services Ombudsman Headquarters in Washington, DC.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include: any member of the general public, including
individuals, employers, and their representatives seeking assistance from the Citizenship and Immigration Services
Ombudsman in resolving general matters, issues, or problems with USCIS.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Individual’s full legal name including any aliases;
</p><p>• Individual’s date and country of birth;
</p><p>• Individual’s legal citizenship;
</p><p>• Individual’s alien ("A") number;
</p><p>• Full legal name of person preparing form if other than the individual named in the case;
</p><p>• Applications and petitions filed;
</p><p>• Receipt number located on the top left hand corner of Notice of Action (Form I-797) received from
USCIS in response to the application/petition filed;
</p><p>• Immigration status or interim benefit applied or petitioned for;
</p><p>• Type of case problem;
</p><p>• Source of case problem;
</p><p>• Description of case problem;
</p><p>• Prior actions taken to remedy the problem;
</p><p>• Designated attorney/representative;
</p><p>• Consent of the petitioner for USCIS to disclose information in the file to the designated representative;
</p><p>• Verification statement signed and dated by the individual of the inquiry or the authorized representative;
and
</p><p>• Declaration by the individual or the attorney or representative submitting the case problem.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>Section 452 of the Homeland Security Act of 2002.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to provide efficient and secure case management and processing of information
related to individuals and employers problems with USCIS.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3), and in accordance with 6 U.S.C. 272, as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other federal agency conducting
litigation or in proceedings before any court, adjudicative or administrative body, when it is necessary to the
litigation and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. any employee of DHS in his/her official capacity;
</p><p>3. any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. the United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish a CISOMB function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To an attorney or representative who is acting on behalf of an individual covered by this system of records to
obtain the individual’s information submitted to the Virtual Ombudsman System.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by CISOMB Case Number, Alien Registration Number, or by the individuals’ name.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>In accordance with National Archives and Records Administration approved retention and disposal policy N1-
563-08, processed case files are cut off at the final disposition of the case and are deleted or destroyed ten
years after cutoff. Uncompleted case files are the record copy of cases where additional information is requested, but
not received. Cases are closed 30 days after the request for additional information. These records are cut off 30 days
from date of request if no response, and are deleted or destroyed 5 years after cutoff.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>CISOMB VOS Project Manager (202-357-8100), Office of the Citizenship and Immigration Services
Ombudsman, Department of Homeland Security, Washington, DC 20528.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to the CISOMB’s FOIA Officer, whose contact information can be found
at <i>http://www.dhs.gov/foia</i> under "contacts." When seeking records about yourself from this system of
records or any other Departmental system of records your request must conform with the Privacy Act regulations set forth
in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address, and
date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28
U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no
specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief FOIA Officer at
<i>http://www.dhs.gov</i> or 1-866-431-0486. In addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created;
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records; and
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Information originates from stakeholders and customers who contact the CISOMB.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection>
    <section id="usss1" toc="yes">
        <systemNumber>/USSS-001</systemNumber>
        <subsection type="systemName">
            Criminal Investigation Information System of Records.
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified and Classified.</p></xhtmlContent>
                </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p> Records are maintained at the USSS Headquarters in Washington, D.C. and field offices. IT systems covered by this SORN include USSS systems, such as e-Agent, Field Support System (FSS), and Field Investigative Reporting System (FIRS), all accessible at USSS offices.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Assistant Director, Office of Investigations, United States Secret Service, wfo@usss.dhs.gov, 245 Murray Lane SW, Building T-5, Washington, D.C. 20223.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>The Homeland Security Act of 2002, Public Law 107-296, including 6 U.S.C. sec. 124n, 6 U.S.C. sec. 455, and 6 U.S.C. sec. 383; 18 U.S.C. sec. 3056; 18 U.S.C. sec. 3056A; 18 U.S.C. sec. 1029(d); 18 U.S.C. sec. 1030(d).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to collect and maintain criminal records related to individuals being investigated by DHS/USSS in connection with DHS/USSS’ criminal law enforcement functions, including investigating counterfeiting offenses, financial institution fraud, computer and telecommunications fraud, false identification documents, access device fraud, advance fee fraud, and electronic funds transfer fraud.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                • 	<p>Name, alias, or code name;</p>
                • 	<p>Records containing information from government-issued identifiers, including Passport number, Social Security number, and Driver License number;</p>
                • 	<p>Contact information identifiers, such as physical and electronic addresses and phone numbers;</p>
                • 	<p>Records containing still and video imagery (imagery records containing facial biometrics may be both electronically analyzed and/or examined by human agents during the course of criminal investigations);</p>
                • 	<p>Records containing historical cell-site location information obtained from providers of electronic communications, and other information lawfully obtained under the provisions of 18 U.S.C. sec. 2701, et seq.;</p>
                • 	<p>Records containing citizenship information and identifiers;</p>
                • 	<p>Records containing geo-fence information from mobile devices to track a suspected criminal’s location;</p>
                • 	<p>Records containing information from government-issued property identifiers, to include boat, vehicle, and other asset registration numbers;</p>
                • 	<p>Social media posts, profiles, and account content;</p>
                • 	<p>Records containing information from biometric identifiers and profiles based on biometric attributes to include fingerprint and voiceprint (such information may be both electronically analyzed and/or examined by human agents); and</p>
                • 	<p>Records containing information from DNA samples and profiles of DNA obtained from the body, such as bodily fluids, or obtained from contacted surfaces (such information may be both electronically analyzed and/or examined by human agents).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>The Secretary of Homeland Security has exempted this system from subsections (e)(4)(I) of the Privacy Act pursuant to 5 U.S.C. secs. 552a(j)(2), (k)(2), and (k)(3); therefore, record source categories shall not be disclosed.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p> In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorney’s Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To NARA or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the federal government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the federal government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To employees and officials of financial and commercial business firms and to private individuals, information pertaining to actual or suspected criminal offenders where such disclosure is considered reasonably necessary for the purpose of furthering USSS efforts to investigate the activities of and apprehend criminal offenders and</p>
                <p>suspected criminal offenders.</p>
                <p>J. To federal, state, and local government agencies foreign or domestic, having prosecutorial and civil law enforcement functions for use by attorneys, magistrates, and judges, parole or probation authorities and other law enforcement authorities for the purpose of developing a criminal or civil investigation, prosecuting, sentencing,</p>
                <p>or determining the parole and probation status of criminal offenders or suspected criminal offenders.</p>
                <p>K. To personnel of other federal, state, and local law enforcement agencies, foreign or domestic, for the purpose of developing information on subjects involved in USSS criminal investigations and assisting other law enforcement agencies in the investigation and prosecution of violations of the criminal laws which those agencies are</p>
                <p>responsible for enforcing.</p>
                <p>L. To personnel of federal, state, and local governmental agencies, foreign and domestic, where such disclosure is considered reasonably necessary for the purpose of furthering USSS efforts to investigate the activities of and apprehend criminal offenders and suspected criminal offenders.</p>
                <p>M. To personnel of federal, state, and local governmental agencies, foreign and domestic, where there is a showing of reasonable necessity to obtain such information to accomplish a valid law enforcement purpose as agreed to by the USSS.</p>
                <p>N. To a court, magistrate, or administrative tribunal in the course of presenting evidence and opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection with criminal or civil proceedings.</p>
                <p>O. To an appropriate federal, state, local, tribal, foreign, or international agency, if the information is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or the issuance of a security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, the issuance of a license, grant, or other benefit and when disclosure is appropriate to the proper performance of the official duties of the person making the request.</p>
                <p>P. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS is aware of a need to use relevant data for purposes of testing new technology that relate to the purpose(s) stated in this SORN.</p>
                <p>Q. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/USSS stores records in this system electronically or on paper in secure facilities behind a locked door. The electronic records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p> Investigative Records are managed by DHS/USSS in accordance with the following National Archives and Records Administration (NARA) approved records schedules: N1-087-89-02, "Field Investigative Records," N1-087-92-002, "Investigative Program Records," and NC1-87-84-1, "Closed Case Investigative Files." Records are retained, transferred, and destroyed based on where the record was created (Headquarters or Field Office) and the type of record. For instance, pursuant to N1-087-89-02, for Field Office records, all selected closed case files pursuant to the selection criteria in the introduction of N1-087-89-02 are permanent and are subsequently transferred to NARA 30 years after the case has ended. All other closed case files are retained, transferred, and destroyed in the following: criminal judicial case files are to be transferred to a Federal Records Center (FRC) and destroyed 30 years after the end of the case; criminal non-judicial case files are to be transferred to the FRC and destroyed 30 years after the end of the case, except for forgery case files which are to be transferred to the FRC and then destroyed 5 years after the end of the case; non-criminal case files are to be transferred to the FRC and then destroyed 5 years following the end of the case; and investigations for other district (IOD) cases are to be destroyed two years following the end of a case. Case files in Field Offices containing special information are to be retained for the following dependent on the type of information: Title I Intercept Material Electronic communications (minimum of 10 years), Protected IRS information (minimum of 8 years), and mail cover information (minimum of 8 years), and then all follow records retention schedule for closed investigative case files in Item 1 of N1-087-89-02. Please refer to N1-087-89-02 for records retention schedules for other Field Office Investigative Program Records. Headquarters Office records are subject to NC1-87-84-1, as amended by N1-087-92-002. For instance, all selected closed case files pursuant to the selection criteria in the introduction of NC1-87-84-1 are permanent and are subsequently transferred to NARA in five-year blocks when 50 years old. Judicial, non-judicial, and non-criminal case files are to be transferred to the FRC 10 years after closing the case and destroyed 30 years after the end of the case. Please refer to NC1-87-84-1 and N1-087-92-002 for all other investigative program records held at USSS Headquarters. Disposal of records that have met the end of their life cycles is carried out in a secure manner, including by burning or shredding.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p> The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act, and the Judicial Redress Act if applicable, because it is a law enforcement system. However, DHS/USSS will consider individual requests to determine whether or not information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and Chief Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief FOIA Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief FOIA Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                • 	<p>Explain why he or she believes the Department would have information being requested;</p>
                • 	<p>Identify which component(s) of the Department he or she believes may have the information;</p>
                • 	<p>Specify when the individual believes the records would have been created; and</p>
                • 	<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>This system of records is exempt from the Privacy Act’s access and amendment provisions and those of the Judicial Redress Act; therefore, record access and amendment may not be available. In such cases, certain records about an individual may be available under FOIA, and the correspondence from those seeking a record amendment may be placed in the respective case file. For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p> The Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. sec. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), and (e)(8); (f); and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(k)(1), (k)(2), and (k)(3) has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. sec. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), and (e)(4)(I); and (f).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>76 FR 49497 (August 10, 2011); 74 FR 45087 (Final Rule) (August 31, 2009).</p>
            </xhtmlContent>
        </subsection>
    </section>

    <section id="usss3" toc="yes">
<systemNumber>/USSS-003</systemNumber>
<subsection type="systemName">Non-Criminal Investigation Information System System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified and Classified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the United States Secret Service Headquarters, 950 H St. NW., Washington, DC 20223 and
field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>• Individuals who are applicants for employment or are currently employed with the USSS or other
federal or state entities and have taken a polygraph; and
</p><p>• Qualified USSS law enforcement officers and qualified USSS retired law enforcement officers who carry
concealed firearms.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>• Individual’s name;
</p><p>• Social Security number;
</p><p>• Address;
</p><p>• Date of birth;
</p><p>• Case number;
</p><p>• Polygraph examination reports and files;
</p><p>• Records containing investigatory material compiled solely for the purpose of determining suitability,
eligibility, and/or qualifications for federal civilian employment or access to classified information; and
</p><p>• Any group of records which have been created by the Law Enforcement Officer Safety Act of 2004, Public Law
108-277, 1, codified at 18 U.S.C. 926 B and C, as amended.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>The Homeland Security Act of 2002, Public Law 107-296; 5 U.S.C. 301; Federal Records Act, 44 U.S.C. 3101;
18 U.S.C. 3056; 18 U.S.C. 3056A; 42 U.S.C. 13031; Executive Order 10450; and 6 CFR part 5.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to record and maintain files related to applicants for employment or current
employees of the USSS or other federal or state entities who have taken a polygraph; and current and retired USSS
employees who are qualified to carry a concealed weapon.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C.
</p><p>552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed
outside the Department of Homeland Security (DHS) as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:
</p><p>A. To the Department of Justice or other federal agency conducting litigation or in proceedings before any court,
adjudicative or administrative body, when it is necessary to the litigation and one of the following is a party to the
litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation, and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. DHS has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or
property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or
programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. Individuals provided information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other
appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule,
regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation
or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and
consistent with the official duties of the person making the disclosure.
</p><p>H. To Federal, State, or local government agencies for the purpose of developing a relevant ongoing civil,
administrative, or background investigation.
</p><p>I. To private institutions and individuals for the purpose of confirming and/or determining suitability, eligibility,
or qualification for federal civilian employment or access to classified information, and for the purposes of furthering
the efforts of the USSS to investigate the activities of individuals related to or involved in non-criminal civil and
administrative investigations.
</p><p>J. To another federal agency or to an instrumentality of any government jurisdiction within or under the control of
the United States for the purpose of determining suitability, eligibility, or qualifications for employment with or
access to classified information in such other agency instrumentality.
</p><p>K. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to
opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection
with criminal law proceedings or in response to a subpoena from a court of competent jurisdiction.
</p><p>L. To an appropriate federal, state, local, tribal, foreign, or international agency, if the information is relevant
and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or issuance of a
security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS
decision concerning the hiring or retention of an employee, the letting of a contract, or the issuance of a license,
grant or other benefit when disclosure is appropriate to the proper performance of the official duties of the person
making the request.
</p><p>M. To state and local school boards, private and public schools, daycare facilities, children’s camps, and childcare
transportation providers, if information concerns one of their employees, or applicants for employment, when such an
individual has admitted to the USSS that they viewed, have taken an interest in, or have engaged in prior activity
regarding child pornography, the touching of a child for sexual gratification, or child abuse.
</p><p>N. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Paper and electronic records in this system are stored in secure facilities and/or behind locked doors.
Electronic records media, such as magnetic tape, magnetic disk, digital media, and CD-ROM are stored in proper
environmental controls.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records are indexed by name on file at USSS Headquarters, and in field offices and are retrieved through a manual
search of index cards and/or through computer search of magnetic media. Access to the physical files is by case number
obtained from the name indices.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS and USSS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored, processed, and transmitted. Access to the records in this system is
limited to those individuals who have a USSS approved need to know the information for the performance of their official
duties and who have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Applicant security and background investigation records of retired or separated USSS employees are retained for
20 years after the date of last action. All judicial case records are retained for 30 years from the date of case
closure, unless otherwise required to be held permanently for transfer to the National Archives and Records
Administration. Non-judicial and non-criminal case files generally are retained for a period of between 5 years and 30
years from the date of case closure, depending upon the nature or subject of the investigation. All other records, the
disposition of which is not otherwise specified, are retained until destruction is authorized.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Assistant Director, Human Resources and Training and Assistant Director, Office of Investigation, U.S. Secret
Service, 245 Murray Lane SW., Building T-5, Washington, DC 20223.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment
procedures of the Privacy Act because it is a law enforcement system. However, DHS/USSS will consider individual requests
to determine whether or not information may be released. Thus, individuals seeking notification of and access to any
record contained in this system of records, or seeking to contest its content, may submit a request in writing to the
USSS FOIA Officer, 245 Murray Drive, SW., Building T-5, Washington, DC 20223. If an individual believes more than
one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief
FOIA Officer, Department of Homeland Security, whose contact information can be found at <i>http://www.dhs.gov/foia.</i>
</p><p>When seeking records about yourself from this system of records or any other USSS system of records, your request must
conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you
must provide your full name, current address and date and place of birth. You must sign your request, and your signature
must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of
perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from
the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-(866) 431-0486. In addition, you should
provide the following:
</p><p>• An explanation of why you believe the Department would have information on you;
</p><p>• Specify when you believe the records would have been created; and
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information USSS may not be able to conduct an effective search, and your request may be denied
due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are obtained from employees, former employees, and applicants for employment with the USSS; federal,
state, and local governmental agencies; court systems; executive entities, both foreign and domestic; educational
institutions; private businesses; and members of the general public.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>Pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act and the limitations therein, this system is exempt
from 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f);
and (g). Pursuant to 5 U.S.C. 552a (k)(1), (k)(2), (k)(3), (k)(5), and (k)(6), this system is exempt from the following
provisions of the Privacy Act, subject to the limitations set forth in those subsections: 5 U.S.C. 552a(c)(3), (d), (e)
(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f). In addition, to the extent a record contains information from other exempt
systems of records, USSS will rely on the exemptions claimed for those systems.
</p></xhtmlContent></subsection></section>
    <section id="usss4" toc="yes">
        <systemNumber>/USSS-004</systemNumber>
        <subsection type="systemName">
            Protection Information System.
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified and Classified.</p> </xhtmlContent>
                </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at the USSS Headquarters in Washington, D.C. and field offices. IT Systems covered by this SORN, include E-Check; Protective Intelligence Exchange (PIX); eCASE; and Protective Threat Management System (PTMS); which all can be accessed by individuals located at the United States Secret Service, and 245 Murray Lane, S.W., Building T-5, Washington, D.C. 20223.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Assistant Director, Office of Strategic Intelligence and Information; Assistant Director, Office of Technical Development and Mission Support; and Assistant Director, Office of Protective Operations, wfo@usss.dhs.gov, 245 Murray Lane, S.W., Building T-5, Washington, D.C. 20223.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>18 U.S.C. 3056; 18 U.S.C. 3056A; 18 U.S.C. 871; 18 U.S.C. 879; Presidential Threat Protection Act of 2000, Pub. L. No. 106-544.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is: 1) to assist USSS in protecting its protectees by recording information necessary to implement protective measures and to investigate individuals who may come into proximity with a protectee or who have sought to make contact with a protectee, as well as individuals who have been involved in incidents or events that relate to the protective functions of USSS; 2) to support field agents coordinating physical security for designated Security Events by providing access to information regarding cases and threat assessments; and 3) to enable USSS to provide assistance to law enforcement officials, school personnel, and others with protective and public safety responsibilities for various types of targeted violence, such as the services provided by the National Threat Assessment Center.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>(1) Individuals who have been or are currently the subject of a criminal investigation by USSS or another law enforcement agency for the violation of certain criminal statutes relating to the safety of persons or security of events, properties, facilities, and areas protected by USSS; (2) Individuals who are subjects of investigative records and reports supplied to USSS by federal, state, and local law enforcement agencies, or private institutions and individuals, in conjunction with the protective functions of USSS; (3) Individuals who are the subjects of non-criminal protective inquiries by USSS and other law enforcement agencies; (4) Individuals who are granted or denied ingress and egress to events, properties, facilities, and areas secured by USSS, or have access to areas in proximity to protected persons or areas secured by USSS, including but not limited to invitees, passholders, tradesmen, law enforcement personnel, maintenance personnel, or service personnel; (5) Individuals who are witnesses, suspects, complainants, informants, defendants, fugitives, released prisoners, and correspondents who have been identified by USSS or from information supplied by other law enforcement agencies, governmental units, private institutions, and members of the general public in connection with USSS performance of its protective functions; (6) Individuals who fly Unmanned Aircraft Systems (UAS) into protected areas; (7) Individuals who have sought an audience or contact with persons protected by USSS; (8) Individuals who could otherwise be in proximity of protectees or in contact with persons protected by USSS; (9) Individuals who have been involved in law enforcement encounters, incidents or events that relate to the protective functions of USSS; and (10) Individuals who have been or are currently protected by USSS.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                • 	<p>Name, alias, or code name;</p>
                • 	<p>Contact information identifiers, such as physical and electronic addresses and phone numbers;</p>
                • 	<p>Date of birth;</p>
                • 	<p>Case number;</p>
                • 	<p>Arrest Record;</p>
                • 	<p>Government-controlled confinement and release information;</p>
                • 	<p>Nature and disposition of criminal charges, to include sentencing and parole or probation status;</p>
                • 	<p>Records concerning agency activities associated with protectee movements and other protective measures taken on a protectee’s behalf;</p>
                • 	<p>Records containing information compiled for identifying and evaluating individuals who may constitute a threat to the safety or persons or security of events, properties, facilities, and areas protected by USSS;</p>
                • 	<p>Records containing information compiled for a criminal investigation, including reports of informants and investigators, that are associated with an identifiable individual;</p>
                • 	<p>Records containing reports relative to an individual compiled at various stages of the process of enforcement of certain criminal laws from arrest or indictment through release from supervision;</p>
                • 	<p>Records containing information supplied by other federal, state, and local law enforcement agencies, foreign or domestic, other non-law enforcement governmental agencies, private institutions, and persons concerning individuals who, because of their activities, personality traits, criminal or mental history, or history of social deviancy, may be of interest to USSS in connection with the performance of its protective functions to include furthering threat assessment and targeted violence prevention activities, as well as when exercising other USSS protective functions;</p>
                • 	<p>Records containing information compiled for background investigations, including name check records for credentialing some individuals, including but not limited to, passholders, tradesmen, maintenance, or service personnel who have access and/or have been denied access to areas secured by or who may be in close proximity to persons protected by USSS;</p>
                • 	<p>Records containing information compiled during protective law enforcement encounters in conjunction with National Security Events;</p>
                • 	<p>Records containing information from the Protective Operations program and program files and security event management files;</p>
                • 	<p>Records containing citizenship information and identifiers;</p>
                • 	<p>Records containing information from Government-issued identifiers, including Passport, Social Security, and Driver License Numbers;</p>
                • 	<p>Records containing information from Government-Issued property identifiers, to include boat, vehicle, and UAS registration numbers;</p>
                • 	<p>Records containing information from biometric identifiers and profiles based on biometric attributes to include fingerprint and voiceprint. Such information may be both electronically analyzed and/or examined by human agents; and</p>
                • 	<p>Records containing information from DNA samples and profiles of DNA obtained from the body, such as bodily fluids, or obtained from contacted surfaces. Such information may be both electronically analyzed and/or examined by human agents.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>The Secretary of Homeland Security has exempted this system from subsections (e)(4)(I) of the Privacy Act pursuant to 5 U.S.C. 552a(j)(2), (k)(2), and (k)(3); therefore, records sources shall not be disclosed.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To NARA or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another Federal agency or Federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To federal, state, and local governmental agencies for criminal prosecutions; to parole and probation authorities for sentencing and to determine the parole and probation status of criminal offenders or suspected criminal offenders; and to personnel necessary for the completion of civil and other proceedings involving USSS protective functions.</p>
                <p>J. To federal, state, and local governmental agencies, foreign and domestic, for the purposes of developing information on subjects involved in USSS protective investigations and the evaluation for and by USSS of persons considered to be of protective interest and for protective functions.</p>
                <p>K. To federal, state, and local governmental agencies, foreign and domestic, private institutions and private individuals, for the purposes of designing and implementing protective measures, furthering threat assessment and targeted violence prevention activities, and exercising other USSS protective functions.</p>
                <p>L. To private institutions and private individuals, to include identifying information pertaining to actual or suspected criminal offenders or other individuals considered to be of protective interest, for furthering USSS efforts to evaluate the danger such individuals pose to protected persons, facilities, and events.</p>
                <p>M. To a court, magistrate, or administrative tribunal in the course of presenting evidence and opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection with criminal or civil proceedings.</p>
                <p>N. To an appropriate federal, state, local, tribal, foreign, or international agency, if the information is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or the issuance of a security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, the issuance of a license, grant, or other benefit and when disclosure is appropriate to the proper performance of the official duties of the person making the request.</p>
                <p>O. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS is aware of a need to use relevant data for purposes of testing new technology that relate to the purpose(s) stated in this SORN.</p>
                <p>P. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/USSS stores records in this system electronically or on paper in secure facilities behind a locked door. The electronic records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p> Pursuant to NARA Schedule N1-087-11-2, Protective Intelligence Exchange System (PIX), protective intelligence case records, including non-judicial protective intelligence cases, are routinely retained for a period of up to 5 years from the date of last action; or for 10 years from the date of last action if they contain electronic records. All judicial records are retained for a period of 30 years from the date of last action, unless otherwise required to be held permanently for transfer to NARA. Files relating to issuance of White House Complex passes for employees of the White House, USSS employees, press representatives accredited at the White House, and other authorized individuals are retained for a period of 8 years from the date the file is closed.</p>
                <p>Video surveillance source data from cameras and protectee active location data is maintained for 30 days. Recordings relevant to an investigative inquiry are retained for a minimum of 3 years following the date recorded but can be kept with a relevant case file. Video recordings associated with a highly unusual incident, occurrence, or significant event are permanent and are subsequently transferred to NARA when 25 years old.</p>
                <p>Planning and after-action records pertaining to Presidential inaugurations and campaign records related to a Presidential candidate not currently under Secret Service protection are permanent and are subsequently transferred to NARA when 25 years old. Routine records pertaining to the administration and operations of USSS protective programs, logs, shift reports, survey files and related documents/data, and trip reports are retained for a period of 3 years up to 10 years, from the end of the event. Non-Criminal Protective Investigation Name Check Reports are kept until no longer needed, e.g., cut off at end of the month, and destroyed 30 days after cutoff, as approved in its NARA Schedule.</p>
                <p>Special Event files not related to an inauguration are retained for 5 years. In the event of a highly unusual protective incident – e.g., assassination attempt, successful assassination, or events requiring extraordinary protective measures – relevant records of the incident, including those normally scheduled as temporary, will be retained and subsequently transferred to NARA 25 years after the incident.</p>
            </xhtmlContent>
        </subsection>
       <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act, and the Judicial Redress Act if applicable, because it is a law enforcement system. However, DHS/USSS will consider individual requests to determine whether information may be released. Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and Headquarters or USSS FOIA Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                • 	<p>Explain why he or she believes the Department would have information being requested;</p>
                • 	<p>Identify which component(s) of the Department he or she believes may have the information;</p>
                • 	<p>Specify when the individual believes the records would have been created; and</p>
                • 	<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>This system of records is exempt from the Privacy Act’s access and amendment provisions and those of the Judicial Redress Act; therefore, record access and amendment may not be available. In such cases, certain records about you may be available under the FOIA, and the correspondence from those seeking a record amendment may be placed in the respective case file. For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p> See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. sec. 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8), (e)(12); (f); (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(k)(1), (k)(2), and (k)(3), has exempted this system from the following provisions of the Privacy Act, 5 U.S.C. sec. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).  When this system receives a record from another system exempted in that source system under 5 U.S.C. sec. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary system of records from which they originated and claims any additional exemptions set forth here.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>DHS/USSS-004 Protection Information System of Records, 76 FR 66940 (October 28, 2011); Implementation of Exemptions, DHS/USSS-004 Protection Information System of Records, 74 FR 45090 (August 31, 2009).  </p>
            </xhtmlContent>
        </subsection>
    </section>

    <section id="usvisit1" toc="yes">
<systemNumber>/USVISIT-001</systemNumber>
<subsection type="systemName">Arrival and Departure Information System (ADIS).
</subsection>
<subsection type="systemLocation"><xhtmlContent><p>Department of Homeland Security (DHS).
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this notice consist of aliens who have applied for entry, entered, or
departed from the United States at any time. These individuals may be in records collected by DHS or other Federal,
state, local, tribal, foreign, or international government organizations. This system primarily consists of records
pertaining to alien immigrants (including lawful permanent residents) and non-immigrants. Some of these individuals may
change status and become United States citizens.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>ADIS contains biographic data, biometric indicator data, and encounter data. Biographic data includes, but is not
limited to, name, date of birth, nationality, and other personal descriptive data. Biometric indicator data includes, but
is not limited to, fingerprint identification numbers. Encounter data provides the context of the interaction between the
immigrant or non-immigrant and the border management authority. This data includes, but is not limited to, encounter
location, document types, document numbers, document issuance information, and address while in the United States.
</p><p>ADIS also sometimes contains commentary from immigration enforcement officers which includes references to active
criminal and other immigration enforcement investigations and contains other confidential data fields used for
enforcement purposes.
</p><p>ADIS data may be derived from records related to entry or exit data of foreign countries collected by foreign
governments in support of their respective entry and exit processes; however, records collected from foreign governments
must relate to individuals who have entered or exited the United States at any time, i.e., individuals who have an
existing record in ADIS.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>6 U.S.C. 202; 8 U.S.C. 1103, 1158, 1201, 1225, 1324, 1357, 1360, 1365a, 1365b, 1372, 1379, and 1732.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>This system of records is the primary repository of data held by DHS for near real-time entry and exit status
tracking throughout the immigrant and non-immigrant pre-entry, entry, status management, and exit processes, based on
data collected by DHS or other Federal or foreign government agencies and used in connection with DHS national security,
law enforcement, immigration, intelligence, and other DHS mission-related functions. Data is also used to provide
associated testing, training, management reporting, planning and analysis, or other administrative purposes. Similar data
may be collected from multiple sources to verify or supplement existing data and to ensure a high degree of data
accuracy.
</p><p>Specifically, the ADIS data will be used to identify lawfully admitted non-immigrants who remain in the United States
beyond their period of authorized stay, which may have a bearing on an individual’s right or authority to remain in the
country or to receive governmental benefits; to assist DHS in supporting immigration inspection at ports of entry (POEs)
by providing quick retrieval of biographic and biometric indicator data on individuals who may be inadmissible to the
United States; and to facilitate the investigation process of individuals who may have violated their immigration status
or may be subjects of interest for law enforcement or intelligence purposes.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3), limited by privacy impact assessments, data sharing, or other agreements, as follows:
</p><p>A. To appropriate Federal, state, local, tribal, foreign, or international governmental agencies seeking information
on the subjects of wants, warrants, or lookouts, or any other subject of interest, for purposes related to administering
or enforcing the law, national security, or immigration, where consistent with a DHS mission-related function as
determined by DHS.
</p><p>B. To appropriate Federal, state, local, tribal, foreign, or international government agencies charged with national
security, law enforcement, immigration, intelligence, or other DHS mission-related functions in connection with the
hiring or retention by such an agency of an employee, the issuance of a security clearance, the reporting of an
investigation of such an employee, the letting of a contract, or the issuance of a license, grant, loan, or other benefit
by the requesting agency.
</p><p>C. To an actual or potential party or to his or her attorney for the purpose of negotiation or discussion on such
matters as settlement of a case or matter, or discovery proceedings.
</p><p>D. To a Congressional office from the record of an individual in response to an inquiry from that Congressional office
made at the request of the individual to whom the record pertains.
</p><p>E. To the National Archives and Records Administration (NARA) or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>F. To contractors, grantees, experts, consultants, students, and others performing or working on a contract, service,
grant, cooperative agreement, or other assignment for the Federal government, when necessary to accomplish a DHS mission
function related to this system of records in compliance with the Privacy Act of 1974.
</p><p>G. To appropriate agencies, entities, and persons when: (1) It is suspected or confirmed that the security or
confidentiality of information in the system of records has been compromised; (2) DHS has determined that, as a result of
the suspected or confirmed compromise, there is a risk of harm to economic or property interests, identity theft or
fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or
another agency or entity) that rely upon the compromised information; and (3) the disclosure is made to such agencies,
entities, and persons who are reasonably necessary to assist in DHS’s efforts to respond to the suspected or confirmed
compromise and prevent, minimize, or remedy such harm.
</p><p>H. To Federal, state, local, tribal, foreign or international government intelligence or counterterrorism agencies or
components where DHS becomes aware of an indication of a threat or potential threat to national or international
security, or where such use is to assist in anti-terrorism efforts and disclosure is appropriate to the proper
performance of the official duties of the person making the disclosure.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records are stored in a central computer database.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by a variety of data elements including, but not limited to, name, place and date of
arrival or departure, document number, and fingerprint identification number.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Information in this system is safeguarded in accordance with applicable laws, rules, and policies, including the
DHS Information Technology Security Program Handbook. All records are protected from unauthorized access through
appropriate administrative, physical, and technical safeguards. These safeguards include restricting access to authorized
personnel who have a need to know, using locks, and password protection identification features. DHS file areas are
locked after normal duty hours, and the facilities are protected from the outside by security personnel.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>The following proposal for retention and disposal is pending approval with the National Archives and Records
Administration (NARA): Testing and training data will be purged when the data is no longer required. Electronic records
for which the statute of limitations has expired for all criminal violations or that are older than 75 years, whichever
is longer, will be purged.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>ADIS System Manager, US-VISIT Program, U.S. Department of Homeland Security, Washington, DC 20528.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>To determine whether this system contains records relating to you, write to the US-VISIT Privacy Officer,
US-VISIT Program, U.S. Department of Homeland Security, Washington, DC 20528.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>This system is exempted from this requirement pursuant to 5 U.S.C. 552a(j)(2) and (k)(2). An individual who is
the subject of a record in this system may be provided access. A determination whether a record may be accessed will be
made at the time a request is received. DHS will review and comply appropriately with information requests on a case-by-
case basis. An individual desiring copies of records maintained in this system should direct his or her request to the
FOIA Officer, US-VISIT Program, U.S. Department of Homeland Security, Washington, DC 20528.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>This system is exempted from this requirement pursuant to 5 U.S.C. 552a(j)(2) and (k)(2). An individual who is
the subject of a record in this system may be provided access. A determination whether a record may be accessed will be
made at the time a request is received. DHS will review and comply appropriately with information requests on a case-by-
case basis. Requests for correction of records in this system may be made through the Traveler Redress Inquiry Program
(TRIP) at <i>http://www.dhs.gov/trip</i> or via mail, facsimile, or e-mail in accordance with instructions available at
<i>http://www.dhs.gov/trip.</i>
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Basic information contained in this system is supplied by individuals covered by this system and other Federal,
state, local, tribal, or foreign governments; private citizens; and public and private organizations.
</p><p>ADIS data may be derived from records related to entry or exit data of foreign countries collected by foreign
governments in support of their respective entry and exit processes; however, records collected from foreign governments
must relate to individuals who have entered or exited the United States at some time, i.e., have an existing record in
ADIS.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)
(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5), (e)(8); (f); and (g) pursuant to 5 U.S.C. 552a(j)(2). In addition, the
Secretary of Homeland Security has exempted portions of this system from 5 U.S.C. 552a (c)(3); (d); (e)(1), (e)(4)(G),
(e)(4)(H); and (f) pursuant to 5 U.S.C. 552a (k)(2). These exemptions apply only to the extent that records in the system
are subject to exemption pursuant to 5 U.S.C. 552a(j)(2) and (k)(2).
</p></xhtmlContent></subsection></section>
<section id="nppd/usvisit3" toc="yes">
<systemNumber>/NPPD/USVISIT-003</systemNumber>
<subsection type="systemName">The United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Program; Technical
Reconciliation Analysis Classification System (TRACS).
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the United States Visitor and Immigrant Status Indicator Technology (US-VISIT)
Program Office Headquarters in Washington, DC and field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this notice consist primarily of persons who are not United States citizens
or legal permanent residents (LPRs). However, it will contain data on: (1) U.S. citizens or LPRs who have a connection to
the DHS mission (e.g., individuals who have submitted a visa application to the UK (based on the January 11, 2008 signed
Memorandum of Understanding between the Department of Homeland Security of the United States of America and the [UKBA
International Group Visa Services program formerly known as] UKVISAS as the Authority Appointed by the Secretary of State
for the Home Department and the Secretary of State for Foreign and Commonwealth Affairs of the United Kingdom of Great
Britain and Northern Ireland, regarding Information Vetting and Sharing), or have made requests for a license or
credential as part of a background check or security screening in connection with their hiring or retention, performance
of a job function or the issuance a license or credential for employment at DHS); (2) U.S. citizens and LPRs who have an
incidental connection to the DHS mission (e.g., individuals living at the same address as individuals who have remained
in this country beyond their authorized stays); and (3) individuals who have, over time, changed their status and became
U.S. citizens or LPRs.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include: (1) Biometric data (to include, but not limited to, photographs and
fingerprints); (2) biographic data held in Government system (to include, but not limited to, names, aliases, date of
birth, nationality or other personal descriptive data such as address and phone number); (3) biometric indicator data (to
include, but not limited to, fingerprint identification numbers); (4) encounter data (i.e. information that provides the
context of the interaction with an individual, such as encounters concerning border entry screening, immigration
enforcement, and submission of visa applications); and (5) commercial or publicly available data such as name, address,
and phone number as found in open source searches of internet phone directories. The records described in (1)-(5)
above may also include related contextual and information management data and metadata, such as: encounter location, time
of encounter, document types, document numbers, document issuance information, conveyance information, and address while
in the U.S. Information management data is used to manage ongoing analyses or investigations and may include, but is not
limited to, case resolution, status, comments and notes from interviewers or by the analysts assigned to the case(s).
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>6 U.S.C. 202, 8 U.S.C. 1103, 1158, 1187, 1201, 1225, 1324, 1357, 1360, 1365a, 1365b, 1379, and 1732.
Specifically, the data is collected and maintained in TRACS under the authority provided by: The Immigration and
Naturalization Service Data Management Improvement Act of 2000 (DMIA), Public Law 106-215; The Visa Waiver
Permanent Program Act of 2000 (VWPPA), Public Law 106-396; The Uniting and Strengthening America by Providing
Appropriate Tools Required to Intercept and Obstruct Terrorism Act (U.S.A. PATRIOT Act), Public Law 107-56; The
Enhanced Border Security and Visa Entry Reform Act (Border Security Act), Public Law 107-173; The Intelligence
Reform and Terrorism Prevention Act of 2004 (IRTPA), Public Law 108-458; The Implementing Recommendations of the
9/11 Commission Act of 2007, Public Law 110-53; and The Immigration and Nationality Act (INA), Title 8, United
States Code, as delegated by the Secretary, Department of Homeland Security.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to serve as an information management tool used to enhance the integrity of the
United States’ immigration system by detecting, deterring, and pursuing immigration fraud, and identifying persons who
pose a threat to national security and/or public safety, and to assist in supporting credentialing activities. TRACS is
used to: identify individuals who have remained in the United States beyond their authorized period of admission
(overstays); maintain information on why individuals are promoted to, or demoted from, the IDENT list of subjects of
interest; assist in determining eligibility in connection with: Hiring or retention, issuance of a license or credential
as part of a background check or security screening in connection with their hiring or retention, or performance of a job
function or the issuance a license or credential for employment at DHS; and to analyze information regarding immigration
status, including applications to enter and exit the United States, as well as the actual physical entries into and exits
from the United States, in support of law enforcement and intelligence agencies. In addition, TRACS will be used to
analyze data quality, integrity, and utility; and analyze data to establish trends and patterns in the data for future
enforcement actions.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion
of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
</p><p>A. To the United States Department of Justice (including United States Attorney offices) or other federal agency
conducting litigation or in proceedings before any court, adjudicative or administrative body, or to the court or
administrative body, when it is necessary to the litigation and one of the following is a party to the litigation or has
an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and
DHS determines that the records are both relevant and necessary to the litigation and the use of such records is
compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office
made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records
management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized
by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been
compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to
economic or property interests, identity theft or fraud, harm to the security or integrity of this system or other
systems or programs (whether maintained by DHS or another agency or entity), or harm to the individual that rely upon the
compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with
DHS’ efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function
related to this system of records. The individuals who provide information under this routine use are subject to the same
Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, foreign, multinational, or international law enforcement agency or
other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law,
rule, regulation, or order, where a record, either on its face or in conjunction with other information, indicates a
violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is
proper and consistent with the official duties of the person making the disclosure.
</p><p>H. To appropriate Federal, State, local, tribal, foreign, multinational, or international governmental agencies
seeking information on the subjects of wants, warrants, or lookouts, or any other subject of interest, for purpose
related to administering or enforcing the law, national security, immigration, or preparedness and critical
infrastructure protection, where consistent with a DHS mission-related function as determined by DHS.
</p><p>I. To appropriate Federal, State, local, tribal, foreign, multinational, or international government agencies charged
with national security, law enforcement, immigration, intelligence, preparedness and critical infrastructure protection,
or other DHS mission-related functions in connection with the hiring or retention by such an agency of an employee, the
issuance of a security clearance, the reporting of an investigation of such an employee, the letting of a contract, or
the issuance of a license, grant, loan, or other benefit by the requesting agency.
</p><p>J. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when
there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to
preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’ officers,
employees, or individuals covered by the system, except to the extent it is determined that release of the specific
information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a
locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM. Information may also be
stored in secured case file folders, cabinets, safes, or a variety of secured electronic or computer databases and
storage media to include data and materials introduced through legacy systems (e.g. spreadsheets).
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by a variety of data elements including, but not limited to, name, place and date of
arrival or departure, document number, and other personal identifiers.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable
DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of
compromising the information that is being stored. Access to the computer system containing the records in this system is
limited to those individuals who have a need to know the information for the performance of their official duties and who
have appropriate clearances or permissions. The system maintains a real-time auditing function of individuals who access
the system. Additional safeguards may vary by component and program. The system is protected through multi-layer security
mechanisms. The protective strategies are physical, technical, administrative, and environmental in nature, and provide
access control to sensitive data, physical access control to DHS facilities, confidentiality of communications, user
authentication, and personnel screening to ensure that all personnel with access to data are screened through background
investigations commensurate with the level of access required to perform their duties.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>The following proposal for retention and disposal is pending approval with National Archives and Records
Administration (NARA):
Data will be disposed of when the information regarding the potential subject of interest has either been adjudicated or
when the 75 year retention schedule has been met. Seventy five years is the retention period of IDENT and ADIS, the
primary source systems of TRACS. Because TRACS is frequently used to establish and track decisions that affect the list
of subjects of interest and overstay status in IDENT and ADIS, it is necessary that a retention period correspond to
these systems.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>TRACS System Manager, US-VISIT Program, U.S. Department of Homeland Security, Washington, DC 20528.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to
contest its content, may submit a request in writing to the component’s FOIA Officer, whose contact information can be
found at <i>http://www.dhs.gov/foia</i> under "contacts". If an individual believes more than one component
maintains Privacy Act records concerning him or her the individual may submit the request to the Chief Privacy Officer,
Department of Homeland Security, 245 Murray Drive, SW., Building 410, STOP-0550, Washington, DC 20528.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your
request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity,
meaning that you must provide your full name, current address and date and place of birth. You must sign your request,
and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made
under penalty or perjury as a substitute for notarization. While no specific form is required, you may obtain forms for
this purpose form the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In
addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you,
</p><p>• Identify which component(s) of the Department you believe may have the information about you,
</p><p>• Specify when you believe the records would have been created,
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have
responsive records,
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement
from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) will not be able to conduct an effective search, and your request
may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>A portion of this system is exempted from this requirement pursuant to 5 U.S.C. 552a (j)(2), (k1), (k)(2), and
(k)(5). An individual who is the subject of a record in this system may access those records that are not exempt from
disclosure. A determination whether a record may be accessed will be made at the time a request is received. DHS will
review and comply appropriately with information requests on a case by case basis. An individual desiring copies of
records maintained in this system should direct his or her request to the FOIA Officer: See: "Notification
procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>A portion of this system is exempted from this requirement pursuant to 5 U.S.C. 552a (j)(2), (k)(1), (k)(2), and
(k)(5). An individual who is the subject of a record in this system may access those records that are not exempt from
disclosure. A determination whether a record may be accessed will be made at the time a request is received. DHS will
review and comply appropriately with information requests on a case by case basis. Requests for access or correction of
records in this system may be made through the Traveler Redress Inquiry Program (TRIP) at <i>http://www.dhs.gov/trip</i>
or via mail, facsimile or e-mail in accordance with instructions available at <i>http://www.dhs.gov/trip</i>. See:
"Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Basic information contained in this system is supplied by individuals covered by this system, and other Federal,
State, local, tribal, or foreign government systems; private citizens; and public sources.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>The Secretary of Homeland Security has exempted this system from 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)
(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f); and (g) pursuant to 5 U.S.C. 552a(j)(2). In
addition, the Secretary of Homeland Security has exempted this system from 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G),
(e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5). These exemptions apply only to the
extent that records in the system are subject to exemption pursuant to 5 U.S.C. 552a (j)(2), (k)(1), (k)(2), and (k)(5).</p></xhtmlContent></subsection></section>

<section id="fema/govt1" toc="yes">
<systemNumber>/FEMA/GOVT-1</systemNumber>
<subsection type="systemName">Federal Emergency Management Agency National Defense Executive Reserve System.  
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.  
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records may be maintained in the personnel office, emergency preparedness unit, or other designated offices located at the local installation of the department or agency which currently employs the individual.  
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals include applicants for and members of the National Defense Executive Reserve assignments.  
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:  
</p><p>• FEMA Form 85-3, National Defense Executive Reserve Personal Qualifications Statement. This Form includes:  
</p><p>• Individual’s name;  
 
</p><p>• Social security number;  
</p><p>• Home mailing address;  
</p><p>• Home telephone number;  
</p><p>• Home e-mail address;  
</p><p>• Date of birth;  
</p><p>• Birthplace;  
</p><p>• Employment experience; and  
</p><p>• Professional memberships.  
</p><p>• Other personnel and administrative records, skills inventory, training data, and other related records necessary to coordinate and administer the program.  
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>Defense Production Act of 1950, E.O. 11179 dated September 22, 1964, as amended by E.O. 12148 dated July 20, 1979, 5 U.S.C. 301; the Federal Records Act, 44 U.S.C. 3101; Executive Order 9397.  
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to collect and preserve records regarding applicants for and members of the National Defense Executive Reserve. The collection and maintenance of this information will assist the Federal Government in coordinating and administering the National Defense Executive Reserve  
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:  
</p><p>A. To the Department of Justice or other Federal agency conducting litigation or in proceedings before any court, adjudicative or administrative body, when it is necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:  
</p><p>1. DHS or any component thereof;  
</p><p>2. Any employee of DHS in his/her official capacity;  
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or  
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and DHS determines that the records are both relevant and necessary to the litigation and the use of such records is compatible with the purpose for which DHS collected the records.  
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual about whom the record pertains.  
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.  
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.  
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;  
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the compromised information; and  
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.  
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.  
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.  
</p><p>H. To the Association of the National Defense Executive Reserve and the National Defense Executive Reserve Conference Association to facilitate training and relevant information dissemination efforts for reservists in the National Defense Executive Reserve.  
</p><p>I. To an appropriate Federal, State, local, tribal, foreign, or international agency, if the information is relevant and necessary to a requesting agency’s decision concerning the hiring or retention of an individual, or issuance of a security clearance, license, contract, grant, or other benefit, or if the information is relevant and necessary to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant or other benefit and when disclosure is appropriate to the proper performance of the official duties of the person making the request.  
</p><p>J. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosure to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations or in connection with criminal law proceedings or in response to a subpoena from a court of competent jurisdiction.  
</p><p>K. To the news media and the public, with the approval of the Chief Privacy  Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.  
</p><p>Disclosure to consumer reporting agencies: 
</p><p>None.  
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage: 
</p><p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.  
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by individual’s name, social security number, specific skill area of the applicant, or agency.  
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.  
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Case files on reservists are maintained in accordance with Item 29a, GRS 18, Security and Protective Services Records, and destroyed five years after termination from the NDER program. Case files on individuals whose applications were rejected or withdrawn are destroyed when five years old in accordance with Item 29b, GRS 18. FEMA will review this retention schedule and work with NARA to determine whether it remains appropriate.  
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Associate Director, National Preparedness Directorate, Federal Emergency Management Agency, Washington, DC 20472, will maintain a computerized record of all applications and assignments of National Defense Executive Reserve reservists for the Federal Government as well as the personnel files for all individuals assigned to the Federal Emergency Management Agency. The departments and agencies will maintain their own personnel records on those individuals assigned to their respective department or agency.  
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals wishing to inquire whether this system of records contains information about themselves should submit their inquiries to:  
</p><p>(a) NDER applicants/assignees to DHS/FEMA--Federal Emergency Management Agency, Associate Director, National Preparedness Directorate, Washington, DC 20472;  
</p><p>(b) NDER applicants/assignees to Federal departments and/or agencies other than DHS--contact the agency personnel, emergency preparedness unit, or Privacy Act Officer to determine location of records within the department/agency. Individuals must include their full name, date of birth, social security number, current address, and type of assignment/agency they applied with to be an NDER reservist.  
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Individuals/applicants/assignees to DHS/FEMA wishing to access records containing information about themselves should follow the record access procedures that are outlined in FEMA’s and DHS’ Privacy Act regulations, 44 CFR Part 6 and 6 CFR Part 5. Requests for Privacy Act protected information must be made in writing and clearly marked as a "Privacy Act Request." The name of the requester, the nature of the record sought, and the required verification of identity must be clearly indicated. Requests should be sent to: FOIA Officer, Records Management, Federal Emergency Management Agency, Department of Homeland Security, 500 C Street, SW., Washington, DC 20472.  
</p><p>Individuals/applicants/assignees to Federal departments and/or agencies other than DHS should follow "Notification procedure (b)" above.  
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p><i>See</i> "Record access procedures" above.  
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>The individuals to whom the record pertains. Prior to being designated as a National Defense Executive Reserve reservist, the applicant must successfully complete a background investigation conducted by the Office of Personnel Management which may include reference checks of prior employers, educational institutions attended, police records, neighborhoods, and present and past friends and acquaintances.  
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="fema/mitigation" toc="yes">
<systemNumber>/FEMA/MITIGATION-</systemNumber>
<subsection type="systemName">NFIP Claims Appeals Process. 
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified. 
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>The database will be maintained at FEMA Headquarters at 500 C Street, SW., Washington, DC 20472. 
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>The system covers the individual NFIP policyholders who are appealing decisions on their flood insurance claim. 
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Information is collected from individual NFIP policyholders, who have voluntarily opted to appeal the disposition of their flood insurance claim. In addition, FEMA collects individual policyholder information from the WYO Companies that service the policies which are the subject of appeals in order to make a determination on these appeals. The "individually identifying information" collected includes the policyholders name, address where the loss occurred, telephone number, a list of personal property that is claimed to be damaged and is the subject of the appeal, the policyholder’s statement of facts about the claim, the policyholder’s statement why the claim’s disposition is being disputed and supporting proof or records to document the policyholder’s position, correspondence pertaining to the appeal which may include the foregoing individually identifying information, and FEMA’s appeal decision. 
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>Section 205 of the Bunning-Bereuter-Blumenauer Flood Insurance Reform Act (FIRA) of 2004, 42 U.S.C. 4011. 
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>These records are collected for the purpose of FEMA’s review and determination on NFIP flood insurance individual policyholder’s claim appeals, so that FEMA may determine whether additional payment to the individual policyholder is warranted. 
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows: 
</p><p>A. To the Government Accountability Office (GAO), DHS Office of the Inspector General (OIG), or other organization for the purposes of performing authorized audits or oversight of the NFIP program. 
</p><p>B. To a Congressional office from the record of an individual in response to an inquiry from that Congressional office made at the request of the individual to whom the record pertains. 
</p><p>C. To FEMA contractors as necessary to provide an appeal resolution. 
 
</p><p>D. To the Department of Justice (DOJ), the United States Attorney’s Office, or a consumer-reporting agency for further collection action on any debt in relation to the appeals process, when circumstances warrant. 
</p><p>E. Where a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law--criminal, civil or regulatory--the relevant records may be referred to an appropriate Federal, State, territorial, tribal, local, international, or foreign agency law enforcement authority or other appropriate agency charged with investigating or prosecuting such a violation or enforcing or implementing such law. 
</p><p>F. To DOJ or other Federal agency conducting litigation or in proceedings before any court, adjudicative or administrative body, when: (1) FEMA, or (2) any employee of FEMA in his/her official capacity, or (3) any employee of FEMA in his/her individual capacity where DOJ or FEMA have agreed to represent the employee, or (4) the United States or any agency thereof, is a party to the litigation or has an interest in such litigation and when the records are determined by FEMA to be arguably relevant to the proceeding. 
</p><p>Disclosure to consumer reporting agencies:
</p><p>Privacy Act information may be reported to consumer reporting agencies pursuant to 5 U.S.C. 552a(b)(12). 
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage: 
</p><p>The hard copy files and the electronically scanned document files will be maintained at FEMA Headquarters at 500 C Street, SW., Washington, DC 20472. 
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Hard copy files and the electronically scanned document files are retrieved by the individual flood insurance policyholder’s name or property address. 
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Information in this system is safeguarded in accordance with applicable laws, rules and policies, including the DHS Information Technology Security Program Handbook. All records are protected from unauthorized access through appropriate administrative, physical, and technical safeguards. These safeguards include restricting access to authorized personnel who have a need-to-know, using locks, and password protection identification features. DHS file areas are locked after normal duty hours and the facilities are protected from the outside by security personnel. 
</p><p>Each authorized individual working on the NFIP appeals procedure will have access only to information necessary to perform his or her official duties. Activity logs (audit trails) are maintained for all operating systems, applications, and middleware. A periodic review is conducted to monitor all user access. Incident response procedures are established to address reported security incidents as quickly as possible. Use of the access database will be carefully monitored and reviewed on a periodic basis by the system administrator. 
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>The paper copy of the appeal letter and supporting documentation that are sent to FEMA by the individual with the appeal letter, and FEMA’s response letter reflecting its appeal decision constitute the official copy of the records. Electronically scanned copies will be kept as back up. FEMA will retain both the paper and electronic copies for six years and three months. This retention schedule has been approved by the National Archives and Records Administration (NARA). The NARA authority is N1-311-86-1 2A12 (a)(2) FIA File 12-2. 
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Director of Claims, Mitigation Division, Federal Emergency Management Agency, 500 C Street, SW., Washington, DC 20472. 
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>A request for access to records in this system may be made in writing to the System Manager identified above, or to the Privacy Act Officer, DHS/FEMA, Office of General Counsel (GL), Room 406, 500 C Street, SW., Washington, DC 20472, in conformance with 6 CFR part 5, subpart B and 44 CFR part 6, which provide the rules for requesting access to Privacy Act records. 
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See Notification procedure above. Request for access must comply with DHS and FEMA regulations for Privacy Act requests. 
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Policyholders typically contest their records with their service provider (WYO or NFIP Servicing Agent). Virtually all of theses disputes are successfully handled through that mechanism. However, policyholders may also contest their records using the process outlined in the Notification procedures section above. State clearly and concisely the information being contested, the reasons for contesting it and the proposed amendment to the information sought. 
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>The "individually identifying" information may come from the individual NFIP policyholder and/or the entity servicing the policy. 
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None. 
</p></xhtmlContent></subsection></section>
<section id="fema/netc17" toc="yes">
<systemNumber>/FEMA/NETC-017</systemNumber>
<subsection type="systemName">Student Application and Registration Records.  
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.  
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>NETC, 16825 South Seton Avenue, Emmitsburg, Maryland 21727-8998.  
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>The system covers those individuals who apply for or take courses offered by FEMA’s NFA or EMI. Courses are offered on-campus and off-campus, by State and local training agencies, through selected colleges and universities, and through independent self-study. Information can be obtained by individuals completing a general admissions application or by applying for a course electronically. Information may also be provided by a State or local training agency when the course has been taken through that agency.  
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Files include application forms and other information submitted either in hard copy or electronically by the applicant. Information collected includes, but is not limited to, U.S. citizenship (city and country of birth is also included for non-U.S. citizens), social security number or an alternate number that has been assigned in lieu of the social security number, name, mailing address, work phone number, alternate phone number, fax number, email address, course code and title, course location, dates requested, course pre-requisite as described in the course catalog, an indication if they require special assistance, name and address of the organization being represented, fire department identification number, current position and years in that position, category of the position, jurisdiction type, type of work for the organization, organization type, employment status, number of staff in the organization, size of population served by the organization, brief description of the activities or responsibilities as they relate to the course for which they are applying, primary responsibility and type of experience, number of years of experience, date of birth, sex, ethnicity and race. Information such as age, sex, and ancestral heritage are used for statistical purposes only. Personal information is provided on a voluntary basis. Failure to provide certain information being requested, however, may result in a delay in processing an application because the information provided may be insufficient to determine eligibility for the course. The social security number is necessary because of the large number of individuals who may have identical names and birth dates and whose identities can only be distinguished by their social security number. The social security number is used for record-keeping purposes, i.e., to ensure that academic records are maintained accurately. Disclosure of an individual’s social security number is voluntary. However, if an applicant does not provide a social security number, a unique identification number will be substituted, which will affect the ability to retrieve complete training information on an applicant.  
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>Pub. L. 93-498, Federal Fire Prevention and Control Act of 1974, as amended; Pub. L. 93-288, Robert T. Stafford Disaster Relief and Emergency Assistance Act; Pub. L. 93-579, 44 U.S.C. 3101; Privacy Act of 1974; E.O. 12127; E.O. 12148; and Reorganization Plan No. 3 of 1978; 5 U.S.C. 301; Presidential Memorandum, "Electronic Government’s Role in Implementing the President’s Management Agenda," July 10, 2002; 15 U.S.C. 2206, 44 U.S.C. 3101; 50 U.S.C. App. 2253 and 2281; E.O. 12127, 12148 and 9397; Title VI of the Civil Rights Act of 1964; and Section 504 of the Rehabilitation Act of 1973. Executive Order 9397 authorizes the collection of the social security number.  
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>For the purpose of determining eligibility and effectiveness of NFA and EMI courses; to reimburse students under the Student Stipend Program, and to provide housing to students and other official guests of the NETC. Information such as age, sex, and ancestral heritage are used for statistical purposes only.  
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>Information in this system may be disclosed as a routine use as follows:  
</p><p>1. Audits and Oversight: To an agency, organization, or individual for the purposes of performing authorized audit or oversight operations.  
</p><p>2. Congressional Inquiries: To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.  
</p><p>3. Contractors, et al: To contractors, grantees, experts, consultants, students, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for the Federal government, when necessary to accomplish an agency function related to this system of records.  
</p><p>4. Investigations: Where a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law--criminal, civil or regulatory--the relevant records may be referred to an appropriate Federal, State, territorial, tribal, local, international, or foreign agency law enforcement authority or other appropriate agency charged with investigating or prosecuting such a violation or enforcing or implementing such law.  
</p><p>5. Litigation: To the Department of Justice (DOJ) or other Federal agency conducting litigation or in proceedings before any court, adjudicative or administrative body, when: (a) DHS, or (b) any employee of DHS in his/her official capacity, or (c) any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee, or (d) the United States or any agency thereof, is a party to the litigation or has an interest in such litigation and when the records are determined by the DHS to be arguably relevant to the proceeding  
</p><p>6. Privacy Act Verification and Amendment: To a federal, State, territorial, tribal, local, international, or foreign agency or entity for the purpose of consulting with that agency or entity (a) to assist in making a determination regarding access to or amendment of information, or (b) for the purpose of verifying the identity of an individual or the accuracy of information submitted by an individual who has requested access to or amendment of information.  
</p><p>7. Privacy/Act FOIA Access and Amendment: To the submitter or subject of a record or information to assist DHS in making a determination as to access or amendment.  
</p><p>8. Records Management: To the National Archives and Records Administration or other Federal government agencies pursuant to records management inspections being conducted under the authority of 44 U.S.C. sections 2904 and 2906.  
</p><p>9. Requesting Information: To a Federal, State, local, tribal, territorial, foreign, or international agency, if necessary to obtain information relevant to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant or other benefit.  
</p><p>10. Requested Information: To a Federal, State, local, tribal, territorial, foreign, or international agency, in response to its request, in connection with the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant, or other benefit by the requesting agency, to the extent that the information is relevant and necessary to the requesting agency’s decision on the matter.  
</p><p>11. Medical Assistance: To a physician(s) in order to provide information from the application for students who become ill or are injured during courses and are unable to provide the information.  
</p><p>12. Boards of Visitors: To members of the NFA and EMI Boards of Visitors Federal advisory committees for the purpose of evaluating NFA’s and EMI’s programmatic statistics.  
</p><p>13. Sponsors: To sponsoring States, local officials, or state agencies to update/evaluate statistics on NFA and EMI educational program participation.  
</p><p>Disclosure to consumer reporting agencies: 
</p><p>Records in this system do not qualify for the purpose of disclosure to consumer reporting agencies.  
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:   
</p><p>Copies of paper applications as well as information maintained electronically are stored in a work area that is locked when it is not staffed. The doors to the work area are kept closed and signs stating that access is limited to authorized personnel are posted on the doors. There is limited access given to persons who have a need to have access to the information to perform their official duties. Computerized records are stored in a database server in a secured file server room. Electronic records are stored on a file server in another building and backed up nightly. The backup tapes are stored in a separate area from the file server for seven days. After that they are placed in a safe in another building and retained for one year.  
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records can be retrieved by an individual’s last name or social security number.  
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>The admissions contractor controls access to hardcopy records by keeping them in file cabinets when not being used and in a work area that is locked when it is not occupied by authorized personnel. The System Administrator controls access to the electronic files by use of passwords and the Admissions Specialist assigns rights to modules of the system based on work responsibility. The files are stored in a secure server room at FEMA’s Emmitsburg facility. Records are maintained in accordance with Federal computer security standards.  
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Hard copy records are maintained for one year and nine months, at which time they are retired to the Federal Records Center. Records are retained for a total of 40 years. Computerized records are stored in a database server in a secured file server room. The same retention schedule that applies to paper records will be followed. This is consistent with the records retention schedule that has been developed for this system.  
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Senior Admissions Specialist, National Emergency Training Center, 16825 South Seton Avenue, Emmitsburg, Maryland, 21727-8998.  
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification and access to any records contained in the system of records, or seeking to contest its content, may inquire in accordance with instructions appearing at 6 CFR Part 5, subpart B, with specific reference to the verification of identity requirements of 6 CFR 5.21.  
</p><p>Requests for Privacy Act protected information must be made in writing, and clearly marked as a "Privacy Act Request." The name of the requester, the nature of the record sought, and the required verification of identity must be clearly indicated. Requests should be sent to: Privacy Act Officer, DHS/FEMA Office of General Counsel (GL), room 840, 500 C Street, SW., Washington, DC 20472.  
</p><p>Certain public information such as name, organizational address, organizational telephone number, email address, position title, course code and title, and the dates the course was taken are made available. All reports are based on organizational information.  
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Same as Notification Procedure above.  
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Same as Notification Procedure above. State clearly and concisely the information being contested, the reasons for contesting it, and the proposed amendment to the information sought.  
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>The sources are the individuals themselves, applicants to NFA or EMI courses, Federal employees, and FEMA employees and contractor support processing NFA or EMI course applications as part of their official duties.  
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.  
</p></xhtmlContent></subsection></section>

<section id="fema/nfip/sec1" toc="yes">
<systemNumber>/FEMA/NFIP/SEC-1</systemNumber>
<subsection type="systemName">Security Support System.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Limited Access. Certain records in this system are provided security safeguards equivalent to the protection of Top Secret and/or Special Access Program (SAP) information. 
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Office of Security, Federal Emergency Management Agency, Washington, DC 20472; FEMA Regional offices and Field Activities, and other facilities designated and approved by the Systems Manager. Name, Social Security number, FEMA point of contact, and time and length of visit, is also available to General Services Administration guards who are hired under a GSA contract for FEMA to confirm proper identification of individuals requiring access to FEMA Headquarters facility. 
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>FEMA employees, other Federal agency employees, State employees, and consultant/contract employees and visitors to the FEMA Headquarters Building and Field Activities, and all other individuals requiring access to official FEMA premises. 
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>This system contains security records on FEMA employees, applicants for employment, nominees. Security records include: Statement of personal history, personal data (e.g., name, address, telephone number and social security number) contained on Standard Forms 85, 85A, 86, and 87, security clearance forms; rosters; lists; Standard Form 312, non-disclosure statements; FEMA Form 12-17, security termination statement, and Optional Forms 62 and 63, forms for record container combinations and other related records. This system also includes copies of background investigations conducted by the Office of Personnel Management (OPM), FEMA, or other government investigative agencies. (The OPM background investigations are not FEMA records but rather are OPM records covered by OPM’s system of records entitled, OPM/Central-9, Personnel Investigations Records, and requests for these records must be submitted directly to OPM-FIPC, Boyers, PA 16018. Requests for investigations conducted by other government investigative agencies must be submitted directly to the agency which conducted the investigation. The background investigations conducted by a FEMA contractor are FEMA records and are covered by this system notice. This system also contains records concerning Personnel Security Program for positions associated with computer systems (Chapter 732 of the Federal Personnel Manual). This system also includes FEMA Form 12-36, requests for access to FEMA Special Access Program; FEMA Form 12-35, notification of disapproval for access to FEMA Special Access Program; FEMA Form 12-37, inadvertent disclosure statements; FEMA Form 12-38, non-disclosure agreements; and FEMA Form 12-30, termination of access to certain classified information. 
</p><p>This system also includes entrant/exit records for access to FEMA premises. For visitors, this system includes name; temporary badge number; host’s number, office symbol, and room number. For all others, this system includes name, social security number, specific areas and times of authorized accessibility, escort authority, status and level of security clearance. 
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>E.O. 12127; E.O. 12148; Reorganization Plan No. 3 of 1978; Section 4-2a, Executive Order 10450; Executive Order 12356; and Paragraph 1a, National Security Decision Directive 84, Safeguarding National Security Information. 
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>For routine administrative, managerial, and security purposes by officials on a need-to-know basis in order to better track, manage and control access to information, buildings and restricted areas under the jurisdiction of FEMA, to determine the status of individuals entering FEMA premises; and to provide data requisite to investigations and security reports. 
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>An employee’s level of security clearance and type of Special Access Program may be reported to another agency for the purpose of interagency security administration; information may be provided to other federal departments and agencies charged with responsibility in the assignment and coordination of federal emergency response teams; to any Federal, State or local law enforcement agency for law enforcement purposes; to any Federal agency pursuant to statutory intelligence responsibilities. The entrant and exit records may also include employees from other agencies which share building space in FEMA facilities and those records may be released to the individuals’ respective employing agency. The name, Social Security number, FEMA point of contact, and time and length of visit, is also available to General Services Administration guards who are hired under a GSA contract for FEMA to confirm proper identification of individuals requiring access to FEMA Headquarters facility. 
</p><p>Additional routine uses may include Nos.1, 2, 3, 4, 5, and 8 of Appendix A. 
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:  
</p><p>Mag-tape, disk, paper and index cards. 
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>By name, social security number, organization, security clearance level, type of Special Access Program, and badge number (except for visitors). 
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>All employees of the Office of Security have undergone a Special Background Investigation (SBI). All records containing personal information are maintained in secured storage areas contained within restricted areas, access to which is limited to authorized personnel. All records containing personal information on a computerized data base are accessible only through computer media under FEMA jurisdiction and placed in restricted areas, access to which is limited to authorized personnel. Access to computerized files is password protected and under the direct responsibility of the system manager. The system manager has the capability of printing audit trails of access from the computer media, thereby permitting regular ad hoc monitoring of computer usage. Certain records in this system are provided security safeguards equivalent to the protection of Top Secret and/or Special Access Program (SAP) information. All records are maintained in areas that are secured by building guards and/or alarm systems during non-business hours. Records are retained in areas accessible only to authorized personnel who are properly screened, cleared, trained and have a verified need-to-know.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Records are covered by General Records Schedule 18. Requests and authorizations for individuals to have access to classified files are destroyed 2 years after authorization expires. Forms or lists used to record safe combinations, names of individuals knowing combinations, and comparable data used to control access into classified containers are destroyed when superseded by a new form or list, or upon turning in of containers. Lists or rosters showing the current security clearance status of individuals are destroyed when superseded or obsolete. Personnel security case files are destroyed upon notification of death or not later than 5 years after separation or transfer of employee or no later than 5 years after contract relation expires, whichever is applicable. Records relating to alleged security violations are destroyed 2 years after completion of final action or when no longer needed, whichever is sooner; records relating to alleged violations of a sufficient serious nature that are referred for prosecutive determinations are destroyed 5 years after the close of the case. Copies of non-disclosure agreements are destroyed when 50 years old.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Director of Security, Office of Security, Federal Emergency Management Agency, Washington, DC 20472.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals wishing to inquire whether this system contains information about them should contact the appropriate system manager in writing. Individuals must furnish their full name, social security number, some type of appropriate personal identification, current mailing address and zip code, and any other available information regarding the type of record involved.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>Specific materials in this system have been exempted from the access and contesting requirements under 5 U.S.C. 552a(k)(1) and 5 U.S.C. 552a(k)(5). To the extent that this system of records is not subject to exemption, it is subject to the access and contesting procedures. A determination as to the applicability of an exemption as to a specific record shall be made at the time a request for access or contest is received. Inquiries should be addressed to the appropriate system manager. Written requests should be clearly marked, "Privacy Act Request" on the envelope and letter. Individuals must furnish their full name, social security number, some type of appropriate personal identification, and current address, any other available information regarding the type of record for which access or amendment is being requested.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>Same as access procedure above. The letter should state clearly and concisely what information is being contested, the reasons for contesting it, and the proposed amendment to the information sought.
</p><p>FEMA Privacy Act Regulations are promulgated in 44 CFR part 6.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Directly from the individual to whom the record pertains. The FEMA background investigation for access to classified information includes information from an application submitted by or an interview with the individual to whom the record pertains; employers; coworkers; neighbors; friends; acquaintances; physicians; other government agencies; educational institutions; credit references; and police departments. The entrant and exit records come directly from paper log completed by the individuals and/or from the individuals using FEMA issued badges to enter through turnstiles.
</p></xhtmlContent></subsection>
<subsection type="systemsExempted"><xhtmlContent><p>The Director, Federal Emergency Management Agency, has determined that specific materials in this system should be exempted from subsections (c)(3), and (d) of the Privacy Act, 5 U.S.C. 552a, pursuant to 5 U.S.C. 552a(k)(1) and 5 U.S.C. 552a(k)(5). Rules have been promulgated in accordance with the requirements of 5 U.S.C. 553 (b), (c) and (e) and have been published in 44 CFR 6.87.
</p></xhtmlContent></subsection></section>
<section id="fema1" toc="yes">
<systemNumber>/FEMA-001 </systemNumber>
<subsection type="systemName">National Emergency Family Registry and Locator System (NEFRLS) System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at FEMA Headquarters in Washington, DC and field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Registrants (adult individual(s)) who have been displaced by a Presidentially-declared disaster or emergency and who voluntarily register in NEFRLS; family or household members who are travelling with the registrant or who lived in the pre-disaster residence immediately preceding the disaster; and searchers who are searching for missing family or household members.
</p><p>Searchers are permitted to view personal information and/or messages of certain registrant(s) upon designation by the registrant(s).
</p><p>Federal, state, local, tribal, territorial, international, or foreign Law Enforcement Officials (LEOs) that are searching for missing persons that may have been displaced by a Presidentially-declared disaster or emergency pursuant to an Official Missing Persons Report.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Information about the individual registering in NEFRLS as a registrant consists of:
</p><p>• Authenticated Individual’s Full Name;
</p><p>• Date of Birth;
</p><p>• Gender;
</p><p>• Current Phone;
</p><p>• Alternate Phone;
</p><p>• Current Address;
</p><p>• Pre-Disaster Address;
</p><p>• Name and Type of Current Location; (<i>i.e.</i> shelter, hotel, or family/friend’s home);
</p><p>• Traveling with Pets (Yes or No);
</p><p>• Identity Authentication Approval or Nonapproval (the fact of the authentication is maintained, but the answers to the questions provided to the third party organization are not maintained by DHS/FEMA);
</p><p>• System Specific Username and Password; and
</p><p>• Personal Message (may consist of up to 300 characters intended for designated family or household members to read).
</p><p>Information about the family/household members traveling with the registrant in NEFRLS consists of:
</p><p>• Family/Household Members’ Full Name;
</p><p>• Gender;
</p><p>• Current Phone;
</p><p>• Alternate Phone;
</p><p>• Current Address;
</p><p>• Pre-Disaster address;
</p><p>• Name and type of current location; (<i>i.e.,</i> shelter, hotel, or family/friend’s home);
</p><p>• Traveling with Pets (Yes or No);
</p><p>• Personal Message: (may consist of up to 300 characters for listed, designated family, or household members to read.)
</p><p>Information about the individual searching NEFRLS for a registrant or family/household member (searcher) consists of:
</p><p>• Searching Individual’s Full Name;
</p><p>• Permanent Address;
</p><p>• Phone;
</p><p>• Alternate Phone;
</p><p>• E-mail;
</p><p>• Date of Birth;
</p><p>• Identity Authentication Approval or Nonapproval (the fact of the authentication is maintained, but the answers to the questions provided to the third party organization are not maintained by DHS/FEMA); and
</p><p>• System Specific Username and Password.
</p><p>Information about a LEO collected by a FEMA NEFRLS Administrator for verification and status:
</p><p>• Law Enforcement Official’s Title;
</p><p>• First Name;
</p><p>• Last Name;
</p><p>• Gender;
</p><p>• Badge number/Law Enforcement License ID Number;
</p><p>• Agency Name;
</p><p>• City;
</p><p>• County/Parish;
</p><p>• State;
</p><p>• Zip Code;
</p><p>• Contact Phone;
</p><p>• Contact E-mail;
</p><p>• Supervisor Name;
</p><p>• Supervisor Contact Number;
</p><p>• Supervisor Contact E-mail;
</p><p>• Agency City;
</p><p>• Agency County/Parish;
</p><p>• Agency State; and
</p><p>• Verification Data. The verification process below indicates that there is a confirmed box to be checked for successful verification.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>Section 689c of the Post-Katrina Emergency Management Reform Act of 2006, Public Law 109-295 and the Robert T. Stafford Disaster Relief and Emergency Assistance Act, as amended, 42 U.S.C. 5121-5207.
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to reunify families and household members following a Presidentially-declared disaster or emergency. To families using NEFRLS, the registrant, and searcher must acknowledge that the information in NEFRLS may be disclosed to searchers upon request, to Federal, state, local, tribal, territorial, international, or foreign agencies including LEO as well as voluntary agencies.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:
</p><p>A. To the Department of Justice (DOJ), including U.S. Attorney Offices, or other Federal agency conducting litigation or in proceedings before any court, adjudicative or administrative body, when it is necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The U.S. or any agency thereof, is a party to the litigation or has an interest in such litigation, and DHS determines that the records are both relevant and necessary to the litigation and the use of such records is compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration (NARA) or other Federal government agencies pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;
</p><p>2. DHS has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, state, local, tribal, territorial, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.
</p><p>H. To appropriate authorized Federal, state, local, tribal, territorial, international, or foreign law enforcement officers charged with investigating the whereabouts or locating missing persons.
</p><p>I. To the National Center for Missing and Exploited Children and voluntary organizations as defined in 44 CFR 206.2(a)(27) that have an established disaster assistance program to address the disaster-related unmet needs of disaster victims, are actively involved in the recovery efforts of the disaster, and either have a national membership, in good standing, with the National Voluntary Organizations Active in Disaster, or are participating in the disaster’s Long-Term Recovery Committee for the express purpose of reunifying families.
</p><p>J. To Federal, state, local, tribal, territorial, international, or foreign agencies that coordinate with FEMA under the National Response Framework (an integrated plan explaining how the Federal government will interact with and support state, local, tribal, territorial, and non-governmental entities during a Presidentially-declared disaster or emergency) for the purpose of assisting with the investigation on the whereabouts of or locating missing persons.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by name, address, and phone number of the individual registering or searching in the National Emergency Family Registry and Locator System.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>In accordance with the FEMA Records Schedule (FRS) and NARA Disposition Authority number N1-311-09-1, records and reports related to and regarding registrations and searchers in NEFRLS performed by a displaced person, Call Center Operator on behalf of a displaced person, or family and friends will be cut off 60 days after the last edit to the record and destroyed/deleted three years after the cutoff. Additionally, in compliance with FRS and NARA Disposition Authority number N1-311-04-5, Item 3, records in this system associated with a domestic catastrophic event will have permanent value. A catastrophic event may be any natural or manmade incident, including terrorism, which results in extraordinary levels of mass casualties, damage, or disruption severely affecting the population, infrastructure, environment, economy, national morale, and/or government functions. A catastrophic event could result in sustained national impacts over a prolonged period of time; almost immediately exceeds resources normally available to state, local, tribal, territorial and private-sector authorities in the impacted area; and significantly interrupts governmental operations and emergency services to such an extent that national security could be threatened.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Deputy Director, Individual Assistance, Disaster Assistance Directorate, Federal Emergency Management Agency, 500 C Street, SW., Washington, DC 20472.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to FEMA’s FOIA Officer, 500 C Street, SW., Attn: FOIA Coordinator, Washington, DC 20472.
</p><p>When seeking records about yourself from this system of records or any other Departmental system of records your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, <i>http://www.dhs.gov</i> or 1-866-431-0486. In addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you;
</p><p>• Identify which component(s) of the Department you believe may have the information about you;
</p><p>• Specify when you believe the records would have been created;
</p><p>• Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records; and
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are obtained from registrants of NEFRLS and individuals searching NEFRLS, LEOs, and the third party authentication service indicating an individual has been approved or not approved.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="fema2" toc="yes">
<systemNumber>/FEMA-002</systemNumber>
    <subsection type="systemName">DHS/FEMA-002 Quality Assurance Recording System.
</subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
                      <p>Unclassified.</p>
        </xhtmlContent> </subsection>
            <subsection type="systemLocation">
                <xhtmlContent>
                    <p>Records are maintained at the FEMA Headquarters in Washington, D.C. and field offices, and also within the Contact Center Modernization Program (C3MP) IT system.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="systemManager">
                <xhtmlContent>
                    <p>Program Manager, Recovery Technology Programs Division, Federal Emergency Management Agency, Texas Recovery Service Center, Denton, TX 76208, (940) 891-8500.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="authorityForMaintenance">
                <xhtmlContent>
                    <p>5 U.S.C. 301; 5 C.F.R. 430.102; 5 U.S.C. 4302; 5 U.S.C. 7106(a); 6 U.S.C. 795; 29 U.S.C. 204(b); Executive Order No. 13571; FEMA Directive 3100.1; FEMA Directive 3700.1; and FEMA Directive 3700.2.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="purpose">
                <xhtmlContent>
                    <p>The purpose of this system is to collect, maintain, use, and retrieve performance records of the FEMA employees and contractors who interact with applicants of the Agency’s individual assistance and public assistance programs for internal employee and contractor performance evaluations, training, and quality assurance purposes to improve FEMA’s customer service to and satisfaction of those individuals applying for FEMA’s individual and public assistance programs.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="categoriesOfIndividuals">
                <xhtmlContent>
                    <p>This system collects information from FEMA employees and contractors who are making or receiving telephone calls to or from disaster assistance applicants; FEMA employees and contractors engaged in the case review of disaster assistance applications not related to a telephone call to or from a disaster assistance applicant; and FEMA employees and contractors performing customer service satisfaction assessments involving applicants of FEMA individual assistance or public assistance programs. Voice recordings or screenshots may be captured during provision of customer service for training and feedback purposes. These captures may contain disaster survivor information as listed below under "Categories of Record in the System."</p>
                </xhtmlContent>
            </subsection>
            <subsection type="categoriesOfRecords">
                <xhtmlContent>
                    <p>•  Voice recordings of telephone calls between FEMA employees and contractors and applicants for FEMA’s individual assistance and public assistance programs. Telephone calls may include a third-party vendor that is providing language translation services on behalf of FEMA;</p>
                    <p>•  A "quality result" generated in C3MP for each call or case processing activity that is evaluated by a FEMA supervisor or quality control specialist assessing the level of customer service provided by the FEMA employee/contractor to the FEMA individual assistance or public assistance applicant;</p>
                    <p>•  System-generated Contact ID;</p>
                    <p>•  Name of FEMA employee who conducted the assessment;</p>
                    <p>•  Identification number of FEMA employee who conducted the assessment;</p>
                    <p>•  FEMA employee/contractor name; and</p>
                    <p>•  FEMA employee/contractor user identification number.</p>
                    <p>Tracking of FEMA employee/contractor activity related to call recordings, case review processing not related to a phone call, and customer satisfaction assessments may include the following individual assistance applicant information:</p>
                    <p>•  Survey ID;</p>
                    <p>•  Applicant’s name;</p>
                    <p>•  Applicant email address;</p>
                    <p>•  Home address;</p>
                    <p>•  Social Security number;</p>
                    <p>•  Applicant phone number(s);</p>
                    <p>•  Current mailing address; and</p>
                    <p>•  Personal financial information including applicant’s bank name, bank account information, insurance information, and individual or household income.</p>
                    <p>Tracking of FEMA employee/contractor activity related to call recordings for customer satisfaction assessments may include the following public assistance applicant information:</p>
                    <p>•  Survey ID;</p>
                    <p>•  Applicant/Point of Contact name and title;</p>
                    <p>•  Applicant email address;</p>
                    <p>•  Organization Name;</p>
                    <p>•  Applicant’s organization phone number(s); and</p>
                    <p>•  Organization’s business and/or mailing address.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="recordSourceCategories">
                <xhtmlContent>
                    <p>FEMA obtains records from FEMA employees and contractors who assist disaster survivors in the disaster assistance application and casework process, FEMA employees, and contractors initiating customer satisfaction assessments of FEMA disaster assistance applicants, and from supervisors or quality control specialists. This system of records contains personally identifiable information (PII) of individual assistance applicants, which is part of the DHS/FEMA-008 Disaster Recovery Assistance Files System of Records, 78 FR 25282 (April 30, 2013), as well as PII of public assistance applicants, which is part of the DHS/FEMA-009 Hazard Mitigation Disaster Public Assistance and Disaster Loan Programs System of Records, 79 FR 16015 (March 24, 2014).</p>
                </xhtmlContent>
            </subsection>
            <subsection type="routineUsesOfRecords">
                <xhtmlContent>
                    <p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
                    <p>A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                    <p>1. DHS or any component thereof;</p>
                    <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                    <p>3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
                    <p>4. The United States or any agency thereof.</p>
                    <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                    <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
                    <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                    <p>E. To appropriate agencies, entities, and persons when:</p>
                    <p>1. DHS determines that information from this system of records is reasonably necessary and otherwise compatible with the purpose of collection to assist another federal recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach; or</p>
                    <p>2. DHS suspects or has confirmed that there has been a breach of this system of records; and (a) DHS has determined that as a result of the suspected or confirmed breach, there is a risk of harm to individuals, harm to DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (b) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                    <p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                    <p> G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                    <p> H. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="policiesAndPractices">
                <xhtmlContent>
                    <p>DHS/FEMA stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="retrievability">
                <xhtmlContent>
                    <p>Records may be retrieved by the FEMA employee and/or contractor’s name and user identification number, or system-generated Contact ID number. This system does not retrieve information by individual or public assistance applicant information.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="retentionAndDisposal">
                <xhtmlContent>
                    <p>The retention period for information maintained in C3MP depends on the use of the data. Records within C3MP that are used in an evaluation of a FEMA employee or contractor are retained for six years, pursuant to FEMA Records Schedule, Series 15-1 "National Processing Service Centers Evaluated Call Recordings," NARA Authority N1-311-08-1. Records that are not used in an evaluation of a FEMA employee or contractor are purged from the secured servers within 45 days, per FEMA Records Schedule, Series 15-2 "National Processing Service Centers Unevaluated Call Recordings," also under NARA Authority N1-311-08-1.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="safeguards">
                <xhtmlContent>
                    <p>DHS/FEMA safeguards records in this system according to applicable rules and policies, including all applicable DHS automated systems security and access policies. FEMA has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="recordAccessProcedures">
                <xhtmlContent>
                    <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and Headquarters or FEMA Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                    <p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform to the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, you should:</p>
                    <p>•  Explain why you believe the Department would have information on you;</p>
                    <p>•  Identify which component(s) of the Department you believe may have the information about you;</p>
                    <p>•  Specify when you believe the records would have been created; and</p>
                    <p>•  Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                    <p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
                    <p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="contestingRecordProcedures">
                <xhtmlContent>
                    <p>For records covered by the Privacy Act or covered JRA records, see "Record Access Procedures" above. For records not covered by the Privacy act or JRA covered records an applicant may call and connect directly with a live Human Services Specialist (HSS) to update the applicant’s information.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="notificationProcedure">
                <xhtmlContent>
                    <p>See "Record Access Procedures."</p>
                </xhtmlContent>
            </subsection>
            <subsection type="exemptionsClaimed">
                <xhtmlContent>
                    <p>None.</p>
                </xhtmlContent>
            </subsection>
            <subsection type="history">
                <xhtmlContent>
                    <p>79 FR 35366; 76 FR 8758.</p>
                </xhtmlContent>
            </subsection>
        </section>

            <section id="fema3" toc="yes">
<systemNumber>/FEMA-003</systemNumber>
<subsection type="systemName">Federal Emergency Management Agency--003 National Flood Insurance Program Files.  
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.  
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the Federal Emergency Management Agency Headquarters in Washington, DC and in field offices.  
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include applicants and policyholders of flood insurance; Severe Repetitive Loss (SRL) property owners (previously known as "Repetitive Loss Target Group" (RLTG)); insurance companies and agents; WYO Companies and lenders; communities that submit Community Rating Survey (CRS) applications; and certified flood adjusters.  
 
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:  
</p><p>• Individual’s name;  
</p><p>• Social security number;  
</p><p>• Addresses;  
</p><p>• Telephone numbers;  
</p><p>• E-mail address;  
</p><p>• Tax ID numbers;  
</p><p>• Insurance policy numbers and information;  
</p><p>• Group Flood Insurance Program (GFIP) Certificate Holders  
</p><p>• Property information: 
</p><p>• Bank/lender 
</p><p>• Date of mortgage 
</p><p>• Address of bank/lender 
</p><p>• Loan information, such as: loan number, names and addresses of first and possible second mortgagees, and file or identification number of loan; 
</p><p>• Taxpayer’s identification number  
</p><p>• Administration records, such as: transaction errors and rejects per WYO Company, documents and photographs necessary to substantiate a claim for losses due to burglary or robbery, reports of adjusters, and adjusters’ bills paid by the program;  
</p><p>• Names and contact information of insurance agents;  
</p><p>• Write Your Own Companies (WYO’s);  
</p><p>• Severe Repetitive Loss (SRL) property owners;  
</p><p>• Community Rating System (CRS) applications to adjust NFIP insurance premiums based on the mitigation of activities implemented by a community;  
</p><p>• Names and contact information of individuals seeking NFIP data; and  
</p><p>• Data elements required for reporting purposes under the FEMA Mitigation Directorate Bureau and Statistical Agent contract for private insurance companies. Data elements include, but are not limited to: 
</p><p>• Data elements regarding policy reinstatement with/without policy changes, 
</p><p>• Data elements regarding insurance claims, and 
</p><p>• Data elements regarding payment of claims.  
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>The Federal Records Act, 44 U.S.C. 3101; National Flood Insurance Act of 1968, as amended and Flood Disaster Protection Act of 1973, 42 U.S.C. 4001, <i>et seq.</i>  
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to manage the National Flood Insurance Program, to assess National Flood Insurance Program user satisfaction, and to provide information on the National Flood Insurance Program to those who inquire.  
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy 
Act, all or a portion of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:  
</p><p>A. To the Department of Justice (DOJ) (including United States Attorney Offices) or other Federal agency conducting litigation or in proceedings before any court, adjudicative or administrative body when it is necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:  
</p><p>1. DHS or any component thereof;  
</p><p>2. Any employee of DHS in his/her official capacity;  
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or  
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and DHS determines that the records are both relevant and necessary to the litigation and the use of such records is compatible with the purpose for which DHS collected the records.  
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.  
</p><p>C. To the National Archives and Records Administration or other Federal Government agencies pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.  
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.  
</p><p>E. To appropriate agencies, entities, and persons when:  
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;  
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the compromised information; and  
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.  
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.  
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.  
</p><p>H. To insurance agents, brokers, adjusters, lending institutions, WYO Companies as authorized under 44 CFR 62.23, the Army Corps of Engineers, Small Business Association, the American Red Cross, the United States Department of Agriculture Farm Service Agency, State and local governments, including State and local individual and family grant and assistance agencies, National Flood Insurance Program policy and claims records for carrying out the purposes of the National Flood Insurance Program, to determine eligibility for benefits, and to verify non-duplication of benefits following a flooding event.  
</p><p>I. To States to provide Group Flood Insurance Program (GFIP) certificates for carrying out the purposes of the National Flood Insurance Program.  
</p><p>J. To property loss reporting bureaus, State insurance departments, and insurance companies to investigate fraud or potential fraud in connection with claims, subject to the approval of the Office of Inspector General, DHS.  
</p><p>K. To State and local government individual and family grant agencies to ascertain the degree of financial burden that State and local governments expect to assume in the event of a flooding disaster.  
</p><p>L. To State and local government agencies to further the National Flood Insurance Program marketing activities.  
</p><p>M. To State and local government agencies that provide the names and addresses of policyholders and a brief general description of their plan for acquiring and relocating their flood prone properties to ensure that they are engaged in flood plain management, improved real property acquisitions, relocation projects that are consistent with the National Flood Insurance Program and, upon the approval of the Administrator, Federal Insurance Mitigation Administration, that the use furthers the flood plain management and hazard mitigation goals of the agency.  
</p><p>N. To the Army Corps of Engineers, State and local government agencies and municipalities to review National Flood Insurance Program policy and claims files to assist in hazard mitigation and flood plain management activities and in monitoring compliance with the flood plain management measures duly adopted by the community.  
</p><p>O. To lending institutions, mortgage servicing companies, and others servicing mortgage loan portfolios, as well as private companies engaged in or planning to engage in activities to market or assist lenders and mortgage servicing companies to comply with the requirements of the Flood Disaster Protection Act of 1973, including lender compliance, and to market the sale of flood insurance policies under the National Flood Insurance Program.  
</p><p>P. To current owners of properties designated under the National Flood Insurance Program as SRL Target Group properties, the dates and dollar amounts of loss payments made to prior owners so current owners may evaluate whether that designation is appropriate and may, if they believe the designation is not appropriate, use the information to appeal that designation.  
</p><p>Q. To the Special Direct Facility National Flood Insurance Program Repetitive Loss records for the processing of SRL Target Group policyholder underwriting and claims records.  
</p><p>R. To Preferred Risk Property (PRP) owners who are contesting the denial of the PRP applications, the properties’ prior loss history.  
</p><p>S. To Federal, State, and local government agencies to conduct research, analysis, and feasibility studies.  
</p><p>T. To communities to provide repetitive loss records that pertain to that community.  
</p><p>U. To OMB in connection with the review of private relief legislation in accordance with OMB Circular No. A-19.  
</p><p>Disclosure to consumer reporting agencies: 
</p><p>Disclosure under 5 U.S.C. 552a(b)(12). DHS/FEMA may make disclosures from this system to "consumer reporting agencies" as defined in the Fair Credit Reporting Act 15 U.S.C. 1681a(f), as amended; or the Federal Claims Collection Act of 1966 31 U.S.C. 3701(a)(3), as amended.  
</p><p>To the U.S. Department of the Treasury when disclosure of the information is relevant to review payment and award eligibility through the Do Not Pay Working System for the purposes of identifying, preventing, or recouping improper payments to an applicant for, or recipient of, Federal funds, including funds disbursed by a state (meaning a state of the United States, the District of Columbia, a territory or possession of the United States, or a federally recognized Indian tribe) in a state-administered, federally funded program.</p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage: 
</p><p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.  
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records will be retrieved by individual’s name; insurance policy number; Repetitive Loss Target Group number; property address; zip code; telephone number; insurance agents; company name, including lenders and WYO Companies; community name; and Community Rating System application number.  
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable DHS automated system security access policies. Strict controls have been imposed to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.   
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Policy records are kept as long as the property owner is enrolled in the insurance program and pays the policy premiums, and cutoff when the file becomes inactive. Policy records are destroyed 5 years after the cutoff with FEMA Records Schedule N1-311-86-1, Item 1A13a(2). Claim records are maintained for 6 years and 3 months after final action, unless litigation exists. Records are disposed of FEMA Records Schedule N1-311-86-1, Item 2A12(2)(b). Claim records with pending litigation are destroyed after review by General Counsel with FEMA Records Schedule N1-311-86-1, Item 2A13a(1). Consumer records, including Community Rating System records, are retired to the Federal Record Center 2 years after cutoff, and destroyed 10 years after cutoff, IAW FEMA Records Schedule N1-311-02-01, Item 4.  
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Administrator, Federal Insurance and Mitigation Administration, Federal Emergency Management Agency Headquarters, 500 C Street, SW., Washington, DC 20472.  
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to FEMA’s FOIA Officer, 500 C Street, SW., Attn: FOIA Coordinator, Washington, DC 20472.  
</p><p>When seeking records about yourself from this system of records or any other FEMA system of records your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In addition you should provide the following:  
</p><p>• An explanation of why you believe the Department would have information on you, 
</p><p>• Specify when you believe the records would have been created, 
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.  
</p><p>Without this bulleted information the FEMA may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.  
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.  
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.  
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Individual’s who apply for and individuals who are insured under the National Flood Insurance Program, WYO Companies, flood insurance agents and lenders, individuals who request information on the National Flood Insurance Program, appraisal records, title reports, and homeowner reports.  
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
    <section id="fema4" toc="yes">
        <systemNumber>/FEMA-004</systemNumber>
<subsection type="systemName">
            Non-Disaster Grant Management Information Files.
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified.</p>
                </xhtmlContent>
                </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>DHS/FEMA maintains records at DHS/FEMA Headquarters in Washington, D.C., and DHS/FEMA regional field offices. Additionally, DHS/FEMA maintains records in FEMA information technology systems such as the FEMA Non-Disaster (ND) Grants and Assistance to Firefighters Grants (AFG) systems</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Deputy Assistant Administrator, Grant Program Directorate, Federal Emergency Management Agency, 500 C Street SW, Washington, D.C. 20472
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>Section 614 of the Robert T. Stafford Disaster Relief and Emergency Assistance Act (42 U.S.C. 5196c), as amended by Section 202, Title II of the Implementing Recommendations of the 9/11 Commission Act of 2007 (Pub. L. 110-053); Section 1809 of the Homeland Security Act of 2002 (6 U.S.C. 571 et seq.), as amended by Section 301(a) Title III of the Implementing Recommendations of the 9/11 Commission Act of 2007 (Pub. L. 110-053); Section 2003(a) of the Homeland Security Act of 2002 (6 U.S.C. 101 et seq.), as amended by Section 101, Title I of the Implementing Recommendations of the 9/11 Commission Act of 2007, (Pub. L. 110-053); Section 2004(a) of the Homeland Security Act of 2002 (6 U.S.C. 101 et seq.), as amended by Section 101, Title I of the Implementing Recommendations of the 9/11 Commission Act of 2007, (Pub. L. 110-053); Section 2004 of the Homeland Security Act of 2002 (6 U.S.C. 605 et seq.), as amended by Section 101, Title I of the Implementing Recommendations of the 9/11 Commission Act of 2007, (Pub. L. No. 110-53); Section 2005 of the Homeland Security Act of 2002 (6 U.S.C. 606 et seq.), as amended by Section 101, Title I of the Implementing Recommendations of the 9/11 Commission Act of 2007, (Pub. L. No. 110-53); the Post-Katrina Emergency Management Reform Act of 2006 (6 U.S.C. 723); Title III of Division D of the Consolidated Security, Disaster Assistance, and Continuing Appropriations Act, 2009 (Pub. L. 110-329); Title III of Division E of the Consolidated Appropriations Act, 2008 (Pub. L. 110-161); Section 1406, Title XIV of the Implementing Recommendations of the 9/11 Commission Act of 2007 (Pub. L. 110-053); Section 1513, Title XV of the Implementing Recommendations of the 9/11 Commission Act of 2007 (Pub. L. 110-053); Section 1532(a), Title XV of the Implementing Recommendations of the 9/11 Commission Act of 2007 (Pub. L. 110-053); 46 U.S.C. 70107; the Federal Financial Assistance Management Improvement Act of 1999 (Pub. L. 160-107); and National Historic Preservation Act of 1966, as amended, Pub. L. 89-665, Sec. 102, 16 U.S.C. 470.
                </p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to assist in determining eligibility of awards for non-disaster related grants and for the issuance of awarded funds. The system also allows DHS to contact individuals to ensure completeness and accuracy of grants and applications.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>Categories of individuals covered by this system include the respective points of contact (POC) for grant applications and awardees of grant funds. Awardees of grant funds include state, local, tribal, and territorial governments; port authorities; transit authorities; non-profit organizations; and private companies (in rare instances).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p> Categories of records in this system include:</p>
                <p>Name of Organization’s Designated Point of Contact;</p>
                <p>Point of Contact Title;</p>
                <p>Grant applicant organization Point of Contact’s office mailing address;</p>
                <p>Grant applicant organization Point of Contact’s office phone number;</p>
                <p>Grant applicant organization Point of Contact’s office cellphone number;</p>
                <p>Grant applicant organization Point of Contact’s office fax number;</p>
                <p>Grant applicant organization Point of Contact’s work email address;</p>
                <p>Organization Name;</p>
                <p>Organization’s Federal Employer Identification Number (EIN);</p>
                <p>Organization’s Dun &amp; Bradstreet (B&amp;D) Data Universal Numbering System (DUNS) Number (a unique nine-digit numeric identifier assigned to each organization's location);</p>
                <p>Organization’s Bank Routing Number; and</p>
                <p>Organization’s Bank Account Number.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>DHS/FEMA obtains records from grantees, applicants for award, grant applicants’ points of contact, and grant program monitors.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p> In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including Offices of the United States Attorneys, or other federal agency conducting litigation, or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity when the department of Justice or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p> B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p> H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to and accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p> I. To an individual’s employer or affiliated organization to the extent necessary to verify employment or membership status.</p>
                <p>J. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
                <p>To the U.S. Department of the Treasury when disclosure of the information is relevant to review payment and award eligibility through the Do Not Pay Working System for the purposes of identifying, preventing, or recouping improper payments to an applicant for, or recipient of, Federal funds, including funds disbursed by a state (meaning a state of the United States, the District of Columbia, a territory or possession of the United States, or a federally recognized Indian tribe) in a state-administered, federally funded program.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/FEMA stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>DHS/FEMA may retrieve records by the Point of Contact of an organization or the name of organization itself.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p> DHS/FEMA retains grant application information for audit, oversight operations, and appeal purposes. In accordance with General Records Schedule (GRS) 1.2, Item 10, FEMA destroys grant administrative records and hard copies of unsuccessful grant application files after three years after final action is taken on the file. In accordance with General Records Schedule 1.2, Item 21, FEMA deletes electronically received and processed copies of unsuccessful grant application files after three years from the date final action is taken on the file.</p>
                <p>In accordance with NARA Authority N1-311-95-001, Item 1, FEMA maintains grant project records for three years after the end of the fiscal year that the grant or agreement is finalized or when no longer needed, whichever is sooner.</p>
                <p>In accordance with NARA Authority N1-311-95-001, Item 3, FEMA retires grant final reports to the Federal Records Center three years after cutoff and transfers them to NARA 20 years after cutoff. In accordance with NARA Authority N1-311-95-001, Item 2; N1-311-01-008, Item 1; and N1-311-04-001, Item 1, FEMA stores all other grant records for six years and three months from the date of closeout (when closeout is the date FEMA closes the grant in its financial system) and final audit and appeals are resolved and then deleted.</p>
                <p>The customer service assessment forms that have been filled out and returned by disaster assistance applicants are temporary records that are destroyed upon transmission of the final report, per NARA Authority N1-311-00-001, Item 1.</p>
                <p>The statistical and analytical reports resulting from these assessments are temporary records that are retired three years after the final report cutoff and destroyed 20 years after the report cutoff per NARA Authority N1-311-00-001, Item 2. The assessment results database are temporary records that are destroyed when no longer needed for analysis purposes, per NARA Authority N1-311-00-001, Item 3.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p> DHS/FEMA safeguards records in this system in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies. DHS/FEMA imposes strict controls to minimize the risk of compromising the information that is being stored. DHS/FEMA limits access to the computer system containing the records in this system to those individuals who have a need-to-know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and FEMA’s Freedom of Information Act (FOIA) Officer whose contact information can be found at https://www.dhs.gov/foia-contact-information. If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655, or electronically at https://www.dhs.gov/dhs-foia-privacy-act-request-submission-form. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. An individual may obtain more information about this process at http://www.dhs.gov/foia. In addition, the individual should:</p>
                <p>Explain why he or she believes the Department would have information being requested;</p>
                <p>Identify which component(s) of the Department he or she believes may have the information;</p>
                <p>Specify when the individual believes the records would have been created; and</p>
                <p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered Judicial Redress Act records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p> None.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>80 FR 13404 (March 13, 2015); and FR 39705 (August 7, 2009).</p>
            </xhtmlContent>
        </subsection>
    </section>

    <section id="fema6" toc="yes">
<systemNumber>/FEMA-006</systemNumber>
<subsection type="systemName">Citizen Corps Database.
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified.
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the Federal Emergency Management Agency Headquarters in Washington, DC and field offices.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include individuals who express an interest in Citizen Corps programs or activities supporting State and Local governments which include the Community Emergency Response Teams (CERT), the Fire Corps, the Office of the Civilian Volunteer Medical Reserve Corps (MRC), the National Neighborhood Watch Program, the Volunteers in Police Service (VIPS), the Operation Terrorism Information and Prevention System (TIPS), the Corporation for National and Community Service (CNCS), and the Citizen Corps Council. Additionally, various State and Local Government Officials are covered by this system.
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include:
</p><p>• Individual’s name;
</p><p>• Mailing address;
</p><p>• E-mail address;
</p><p>• Phone number;
</p><p>• Volunteer program area and type of interest;
</p><p>• Date of expression of interest; and
</p><p>• Emergency preparedness training information, such as; courses taken and dates of courses.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>Federal Records Act, 44 U.S.C. 3101; Section 2, Executive Order 13254, January, 29, 2002; 1998 Appropriations Act (Pub, L, 105-119); and the Homeland Security Act of 2002 (Pub. L. 107-296, Section 224.). Fiscal Year 2008 Consolidated Appropriations Act (Pub. L. 110-161).
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The Citizen Corps, through its internet site at <i>http://www.citizencorps.gov,</i> allows individuals to indicate their interest in specific voluntary programs. Information concerning those desired activities is then disseminated by DHS/FEMA to the appropriate organization for further processing or response. The Citizen Corps coordinates efforts among several organizations, including the Community Emergency Response Teams (CERT), the Fire Corps, the Office of the Civilian Volunteer Medical Reserve Corps (MRC), the National Neighborhood Watch Program, the Volunteers in Police Service (VIPS), the Operation Terrorism Information and Prevention System (TIPS), the Corporation for National and Community Service (CNCS), and the Citizen Corps Council. In addition, these entities may express an interest in sharing their respective contact and similar information with other participants in these programs.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:
</p><p>A. To the Department of Justice or other Federal agency conducting litigation or in proceedings before any court, adjudicative or administrative body, when it is necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and DHS determines that the records are both relevant and necessary to the litigation and the use of such records is compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.
</p><p>H. To the USA Freedom Corps, Executive Office of the President.
</p><p>I. To organizations or activities participating in the Citizen Corps Program if an individual has volunteered to assist this specific type of organization or activity.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records may be retrieved by individual’s name, mailing address, e-mail address, or volunteer program(s) in which the respondent indicates an interest.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Routine correspondence with governors, mayors, and other State and local officials, as well as private citizens relating to FEMA programs will be destroyed when no longer needed in accordance with FEMA Records Schedule N1-311-86-1, Item 1B4. Records relating to establishment, organization, membership, and policy of external committees that are sponsored by FEMA, but have a membership including representatives from other Federal agencies, States, local governments, and/or public citizens are permanent and will be maintained in accordance with FEMA Records Schedule N1-311-97-2, Item 1.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Director, Office of Grants and Training, Federal Emergency Management Agency, 810 Seventh Street, NW., Washington, DC 20531.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to FEMA’s FOIA Officer, 500 C Street, SW., Attn: FOIA Coordinator, Washington, DC 20472.
</p><p>When seeking records about yourself from this system of records or any other FEMA system of records your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you, 
</p><p>• Specify when you believe the records would have been created, 
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the FEMA may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Records are generated by the individual and by DHS/FEMA based on individual’s responses submitted via the Citizen Corps Web site.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
<section id="fema7" toc="yes">
<systemNumber>/FEMA-007</systemNumber>
<subsection type="systemName">National Flood Insurance Program Marketing Files. 
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>Unclassified. 
</p></xhtmlContent></subsection>
<subsection type="systemLocation"><xhtmlContent><p>Records are maintained at the Federal Emergency Management Agency Headquarters in Washington, DC and in field offices. 
</p></xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent><p>Categories of individuals covered by this system include individuals who apply for and individuals who are insured under the National Flood Insurance Program, Write-Your-Own companies, flood insurance agents and lenders, and individuals who request information on the National Flood Insurance Program. 
</p></xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent><p>Categories of records in this system include: 
</p><p>• Individual’s name; 
</p><p>• Business’s name; 
</p><p>• Addresses; 
</p><p>• Phone numbers; 
</p><p>• Account numbers or order numbers; 
</p><p>• Market research data regarding the NFIP, including information regarding awareness, attitudes, and satisfaction as it relates to the NFIP, which is obtained through qualitative surveys approved by the Office of Management and Budget (OMB); 
</p><p>• Telephone Response Center (TRC) records regarding research conducted with customers, insurance agents, Write-Your-Own (WYO) companies and individual respondents.
</p></xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent><p>Federal Records Act, 44 U.S.C. 3101; National Flood Insurance Act of 1968, as amended, and Flood Disaster Protection Act of 1973, as amended, 42 U.S.C 4001 <i>et seq.</i> 
</p></xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent><p>The purpose of this system is to market the National Flood Insurance Program.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent><p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records of information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:
</p><p>A. To the Department of Justice (including United States Attorney Offices) or other Federal agency conducting litigation or in proceedings before any court, adjudicative or administrative body when it is necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:
</p><p>1. DHS or any component thereof;
</p><p>2. Any employee of DHS in his/her official capacity;
</p><p>3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or
</p><p>4. The United States or any agency thereof, is a party to the litigation or has an interest in such litigation, and DHS determines that the records are both relevant and necessary to the litigation and the use of such records is compatible with the purpose for which DHS collected the records.
</p><p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.
</p><p>C. To the National Archives and Records Administration or other Federal government agencies pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.
</p><p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.
</p><p>E. To appropriate agencies, entities, and persons when:
</p><p>1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;
</p><p>2. The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual who relies upon the compromised information; and
</p><p>3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
</p><p>F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.
</p><p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.
</p><p>H. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.
</p><p>Disclosure to consumer reporting agencies:
</p><p>None.
</p></xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent><p>Storage:</p>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent><p>Records are retrieved by individual’s name, business’ name, addresses, telephone number, account number, or order number.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p>Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable DHS automated system security access policies. Strict controls have been imposed to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent><p>Flood plain Management Files end at the close of each fiscal year, retired to the Federal Record Center, and destroyed ten years after cutoff, in accordance with FEMA Records Schedule N1-311-02-01, Item 4. Files generated in processing flood insurance policies under the continuing National Flood Insurance Program end when file becomes inactive and destroyed five years after cutoff, in accordance with FEMA Records Schedule N1-311-86-1, Item 1A13a(2).
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent><p>Administrator, Federal Insurance and Mitigation Administration, Federal Emergency Management Agency Headquarters, 500 C Street, SW., Washington, DC 20472.
</p></xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent><p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to FEMA’s FOIA Officer, 500 C Street, SW., Attn: FOIA Coordinator, Washington, DC 20472.
</p><p>When seeking records about yourself from this system of records or any other FEMA system of records your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Director, Disclosure and FOIA, <i>http://www.dhs.gov</i> or 1-866-431-0486. In addition you should provide the following:
</p><p>• An explanation of why you believe the Department would have information on you, 
</p><p>• Specify when you believe the records would have been created, 
</p><p>• If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.
</p><p>Without this bulleted information the FEMA may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent><p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent><p>Individual’s who apply for and individuals who are insured under the National Flood Insurance Program, Write-Your-Own companies, flood insurance agents and lenders, and individuals who request information on the National Flood Insurance Program.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent><p>None.
</p></xhtmlContent></subsection></section>
    <section id="fema8" toc="yes">
        <systemNumber>/FEMA-008</systemNumber>
        <subsection type="systemName">
            <p>Department of Homeland Security (DHS)/Federal Emergency Management Agency (FEMA)-008 Disaster Recovery Assistance Files System of Records.</p>
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>DHS/FEMA maintains records at the FEMA Headquarters in Washington, D.C.; FEMA Regional Offices; Joint Field Offices; National Processing Service Centers; Disaster Recovery Centers; and the DHS/FEMA data centers located in Bluemont, Virginia and Clarksville, Virginia.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Deputy Director, Individual Assistance Division, (202) 646-3642, femahqiafrontoffice@fema.dhs.gov, Federal Emergency Management Agency, 500 C Street SW, Washington, D.C. 20472.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>Robert T. Stafford Disaster Relief and Emergency Assistance Act (the Stafford Act), Public Law 93-288, as amended (42 U.S.C. 5121-5207); 6 U.S.C. 728, 776, 777, and 795; the Debt Collection Improvement Act of 1996, 31 U.S.C. 3325(d) and 7701(c)(1); the Government Performance and Results Act, Public Law 103-62, as amended; Executive Order 13411; and Executive Order 12862.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to register applicants seeking disaster assistance from FEMA after a Presidential major disaster declaration or emergency and when a declaration may be imminent, but not yet declared; verify Individuals and Households Program applicant information; determine eligibility of applicants; correspond with, focus, direct, and refer applicants to available sources of disaster assistance; and inspect damaged property. Additional purposes include: to identify and implement measures to reduce future disaster damage; prevent or correct a duplication of Federal Government efforts and benefits; identify possible fraudulent activity after a Presidentially declared disaster or emergency; identify assistance provided in error, funds spent inappropriately by the applicant, or misuse of disaster assistance; and assess the customer satisfaction of FEMA disaster assistance applicants.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>All individuals and their household members who apply for or express interest in applying for FEMA disaster assistance following a Presidentially declared major disaster or emergency and when a declaration may be imminent (Note: FEMA will accept applications from any individual; however, an individual must self-certify as a U.S. citizen, non-citizen national, or qualified non-citizen to meet the eligibility requirements for Individuals and Households Program Assistance). Individuals also include those who apply for or express interest in non-FEMA assistance programs to facilitate a duplication of benefits check or determination of unmet needs.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>(a) Registration and Assistance Records</p>
                <p>• Disaster number;</p>
                <p>• FEMA Registration ID/Occupant ID;</p>
                <p>• Applicant/co-applicant information:</p>
                <p>o Full name;</p>
                <p>o Social Security number or A-Number;</p>
                <p>o Citizenship status;</p>
                <p>o Signature;</p>
                <p>o Date of birth;</p>
                <p>o Phone numbers;</p>
                <p>o Email addresses;</p>
                <p>o Mailing addresses;</p>
                <p>o Position title and number of years;</p>
                <p>o Employer name;</p>
                <p>o Language(s) spoken;</p>
                <p>o Number of dependents claimed;</p>
                <p>o User ID;</p>
                <p>o Password; and</p>
                <p>o Personal Identification Number (PIN).</p>
                <p>• Witness name and signature;</p>
                <p>• Damaged dwelling:</p>
                <p>o Addresses of the damaged dwelling and the applicant’s current address (if other than the damaged dwelling);</p>
                <p>o County;</p>
                <p>o Geospatial location of the damaged dwelling; and</p>
                <p>o Information related to the residence (accessibility, type, own/rent, damage sustained).</p>
                <p>• Disaster-related expenses;</p>
                <p>• Emergency needs (e.g., food, clothing, shelter);</p>
                <p>• Disability-related needs and accommodations (e.g., sign language interpreter, Assistive Listening Device, braille, wheelchair access, mobility, mental, hearing, vision, other needs and accommodations);</p>
                <p>• Occupant and household information (for all occupants at the time of disaster):</p>
                <p>o Name (first name, middle initial, last name);</p>
                <p>o Age;</p>
                <p>o Relationship to applicant;</p>
                <p>o Dependent;</p>
                <p>o Sex;</p>
                <p>o Pre- and post-disaster income information of occupants 18 years of age or older; and</p>
                <p>o Tribal Membership Status (if applicable).</p>
                <p>• Business damage:</p>
                <p>o Self-employment is primary income (Yes/No); and</p>
                <p>• Business or rental property affected? (Yes/No)</p>
                <p>• Authorization for electronic funds transfer of benefits:</p>
                <p>o Institution name;</p>
                <p>o Account type; and</p>
                <p>o Account number and routing number.</p>
                <p>• Comments and correspondence from the applicant;</p>
                <p>• Supporting documents that show proof of occupancy or ownership of a dwelling and/or verify identity. This includes:</p>
                <p>o Driver’s license;</p>
                <p>o State/Federal issued photo identification;</p>
                <p>o Mortgage payment receipts;</p>
                <p>o Real property insurance;</p>
                <p>o Tax receipts or property tax bill;</p>
                <p>o Property title;</p>
                <p>o Contract for deed;</p>
                <p>o Voter registration card;</p>
                <p>o Death certificate and will; and/or</p>
                <p>o Maintenance receipts.</p>
                <p>• Public records information for identity verification;</p>
                <p>• Pre-registration questionnaire information;</p>
                <p>• Disaster loan status (i.e., rejected, approved, declined, verified, cancelled);</p>
                <p>• Applicant travel and accommodations related information (e.g., flight information, travel assistance needs, companion information);</p>
                <p>• Information related to determining eligibility for assistance, including date of the disaster, application status, insurance information, types and amount of damage to the dwelling, supporting documentation (e.g., death certificates, invoices, receipts, and documentation to support accommodations or access and functional need requests and repairs) and results of the home inspection (including inspector’s notes and determination).</p>
                <p>• Landowner’s or landlord’s information (in cases where FEMA is placing a manufactured housing unit on the individual’s land or for other temporary housing assistance):</p>
                <p>o Name;</p>
                <p>o Address;</p>
                <p>o Phone number; and</p>
                <p>o Signature.</p>
                <p>• Correspondence and documentation related to determining eligibility and appropriate housing unit size, type, and location for temporary housing assistance, including general correspondence; complaints; requests for disbursement of payments; inquiries from tenants and landlords; information related to household access and functional needs; general administrative and fiscal information; payment schedules and forms; termination notices; information shared with the temporary housing program staff from other agencies to prevent the duplication of benefits; leases; contracts; specifications for repair of disaster damaged residences; reasons for revocation or denial of aid; sales information related to occupant purchase of housing units; and the status or disposition of housing applications;</p>
                <p>• Recoupment, appeals, and/or arbitration (oral hearings) of such determinations;</p>
                <p>• Notice of Potential Debt Letter;</p>
                <p>• Notations and reports of decisions for disaster or similar financial awards and assistance from other FEMA Programs, Federal and State agencies, insurance companies, employers, banks, financial, power/utility companies, health care providers, safety/rescue services, and public or private entities as they relate to determinations of applicants’ eligibility for Individuals and Households Program disaster assistance; and</p>
                <p>• Unsolicited information concerning an individual’s suspected or actual exposure to illness during a public health emergency, including, but not limited to quarantine or isolation orders.</p>
                <p>(b) Inspection Reports:</p>
                <p>• Inspection reports contain applicants’ personally identifiable information (as outlined above) and results of assessments of damaged real property; personal property; and goods, which may include: descriptions and photographic images of an applicant’s home and personal items; video and/or audio of the inspection conducted on the home; and notations of cleaning, sanitizing, and debris removal by contractors and partnering agencies. Inspection reports may also include Inspector ID and Contractor ID.</p>
                <p>(c) Assistance from Other Sources:</p>
                <p>• Other files independently maintained by the State, territory, Tribe, local government, voluntary agency, or other source of assistance that contain records of persons who request disaster aid, including for the "Other Needs" assistance provision of the Individuals and Households Program administrative files and reports required by FEMA. The States, territories, Tribes, local governments, voluntary agencies, and other sources of assistance maintain the same type of information about individuals as described above under registration, inspection, and temporary housing assistance records.</p>
                <p>• Records of assistance from the FEMA National Flood Insurance Program to avoid duplication of benefits (name, address, disaster assistance coverage required code, policy number, policy number, policy effective date, policy coverage building, policy coverage contents, new policy date, and expiration date).</p>
                <p>(d) Customer service survey responses</p>
                <p>• Demographic information, pursuant to Executive Order 13985 (race, ethnicity, religion, gender, sex, nationality, age, disability, English proficiency, economic status, income level, marital status); and</p>
                <p>• Responses to customer service and customer satisfaction survey questions.</p>
                <p>(e) Investigation results that may contain the name and address of the applicants to support recoupment, appeals, oral hearings, or other legal proceedings to recover disaster assistance.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>FEMA receives information from individuals who apply for disaster assistance through three different means: (1) Electronically via https://www.disasterassistance.gov (/FEMA Form 009-0-1 and FEMA Form 009-0-2); (2) by calling FEMA’s toll-free number 1-800-621-3362 (FEMA Form 009-0-1t and FEMA Form 009-0-2t); and (3) through submission of a paper copy of pre-registration intake, FEMA Form 009-0-1 and its Spanish-language equivalent, FEMA Form 009-0-2. In addition, information in this system of records derives from Temporary Housing Assistance Eligibility Determinations (FEMA Forms 009-0-5 and 009-0-6), Application for Continued Temporary Housing Assistance (FEMA Form 010-0-12), and Housing Inspections (FEMA Forms 009-0-143, 009-0-144, and 009-0-145). Information may also come from FEMA inspectors; financial institutions; insurance companies; other Federal, State, territorial, local, Tribal, and voluntary agencies; and commercial databases (for verification purposes, such as third-party identity proofing that verifies an individual’s identity by validating the applicant’s responses to verification questions). The final investigative summary report is maintained in this system of records if an applicant’s file is investigated for potential fraud.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information maintained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other Federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant and necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any Component thereof;</p>
                <p>2. Any employee or former employee of DHS in their official capacity;</p>
                <p>3. Any employee or former employee of DHS in their individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another Federal agency or Federal entity when DHS determines that information maintained in this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate Federal, State, Tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS/FEMA, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same requirements and limitations on disclosure as are applicable to DHS/FEMA officers and employees.</p>
                <p>I. To Federal, State, Tribal, territorial, and local governments, and voluntary organizations when disclosure of applicant information is necessary to prevent a duplication of efforts or a duplication of benefits in determining eligibility for disaster assistance for eligible or partially eligible FEMA applicants.</p>
                <p>J. To Federal, State, Tribal, territorial, and local governments, voluntary organizations, educational institutions, and private nonprofit organizations to address disaster-related unmet needs of FEMA applicants. The above-mentioned entities must be actively involved in the recovery efforts of the disaster and have a program or service that addresses one or more disaster-related unmet need(s) of FEMA applicants. If the service is for outreach or referrals, only name and contact information may be shared.</p>
                <p> K. To government and private entities for the purpose of issuing permits or connecting utilities to FEMA-provided temporary housing units for FEMA applicants eligible for direct temporary housing assistance. FEMA shall only release the  address of where the transportable temporary housing unit will be placed.</p>
                <p>L. To Federal, State, Tribal, territorial, or local governments; voluntary organizations; private nonprofit organizations, insurance companies; employers; any public or private entities; banks and financial institutions when an applicant’s eligibility, in whole or in part, for FEMA’s Individuals and Households Program depends upon financial benefits already received or available from that source for similar purposes as necessary to determine benefits; and to prevent duplication of disaster assistance benefits (as described in 42 U.S.C. 5155). FEMA initiates the data sharing by disclosing only applicant information necessary for identification purposes to obtain relevant information from entities listed above.</p>
                <p>M. To Federal, State, Tribal, territorial, and local governments, medical providers, dental providers, landlords, mechanics, childcare providers, or any other private entities (such as a home contractor) when cited by applicants as proof of an expense, to verify the accuracy of an expense for FEMA’s Individuals and Households Program. FEMA may disclose the applicant’s name and limited contact information (telephone number, current address, and/or damaged dwelling address) and a record identifier (e.g., account, invoice or estimate numbers) to the third-party service provider.</p>
                <p>N. To Federal, State, Tribal, territorial, or local government agencies charged with the implementation of hazard mitigation measures and the enforcement of hazard-specific provisions of building codes, standards, and ordinances. FEMA will only disclose information for the following purposes:</p>
                <p>1. For hazard mitigation planning purposes, to assist Federal, State, territorial, Tribal, or local government agencies in identifying high-risk areas and preparing mitigation plans that target those areas for hazard mitigation projects implemented under Federal, State, Tribal, territorial, or local hazard mitigation programs.</p>
                <p>2. For enforcement purposes, to enable Federal, State, Tribal, territorial, or local government agencies to ensure that owners repair or rebuild structures in conformity with applicable hazard-specific building codes, standards, and ordinances.</p>
                <p>O. To the Department of the Treasury to verify identity and account information of an applicant and to determine eligibility for final payment from Federal programs (e.g., Do Not Pay program). An applicant’s Social Security number will be released in connection with a request that the Department of the Treasury provide a disaster assistance payment to an applicant under the Individuals and Households Program.</p>
                <p>P. To a State, local, territorial, or Tribal government agency in connection with billing that State, local, territorial, or Tribal government for the applicable non-Federal cost share under the Individuals and Households Program. Information shared shall only include applicants’ names, contact information, and amounts of assistance received.</p>
                <p>Q. To State, Tribal, territorial, or local government emergency managers, when an applicant is occupying a FEMA temporary housing unit, for the purposes of preparing, administering, coordinating, and/or monitoring emergency response, public safety, and evacuation plans. FEMA shall only release the applicants’ phone numbers, address, email address, and number of household occupants of the housing unit.</p>
                <p>R. To the Department of the Treasury, Department of Justice, the U.S. Attorney’s Office, an Oral Hearing Official, or other third party for further collection action on any delinquent debt when circumstances warrant.</p>
                <p>S. To Federal, State, territorial, Tribal, or local law enforcement authorities, or agencies, or other entities authorized to investigate and/or coordinate locating missing children and/or reuniting families.</p>
                <p>T. To State, Tribal, territorial, or local government election agencies/authorities that oversee the voting process within their respective municipalities, for the purpose of ensuring voting rights of individuals who have applied for FEMA assistance, limited to their own respective citizens who are displaced from their voting jurisdiction by a Presidentially declared major disaster or emergency out of their voting jurisdiction.</p>
                <p>U. To other Federal, State, or local government agencies under approved computer-matching programs for the purposes articulated in subsection (a)(8)(A) of the Privacy Act.</p>
                <p>V. To the individual applicants, of whom the record contains third party personally identifiable information, to defend themselves during appeals and Oral Hearings on the recoupment of disaster assistance funds.</p>
                <p>W. To any law enforcement agency of the Federal Government or a State, local, territorial, or Tribal government to identify illegal conduct or address public safety or security issues, including compliance with sex offender notification laws, in the event of circumstances requiring an evacuation, sheltering, or mass relocation.</p>
                <p>X. To entities providing temporary housing or sheltering to disaster survivors during a declared public health emergency to provide indication that a survivor with an infectious disease is inhabiting or has inhabited a specific location, when necessary for the safety of individuals located in the facility and to comply with additional necessary infectious disease protocols.</p>
                <p>Y. To State, local, territorial, and Tribal government and private entities to verify applicant identity and account information as a fraud prevention measure.</p>
                <p>Z. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/FEMA stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital/electronic media. </p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>DHS/FEMA retrieves records by an individual’s name, email address, dwelling address, Social Security number, and case file number.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>Records pertaining to disaster assistance will be placed in inactive storage two years after FEMA receives the application and will be destroyed when they are six years and three months old, in accordance with National Archives and Records Administration Authority N1-311-86-1, DAP 8-1, item 4C10a. Records pertaining to temporary housing will be destroyed three years after closeout of the operation in accordance with National Archives and Records Administration Authority N1-311-86-1, DAP 8-2, item 4C10b. Closeout of a disaster operation occurs when the disaster contract is terminated. Records pertaining to the Individuals and Households Program (IHP) program will retire to the Federal Records Center (FRC) one year after closeout and be destroyed three years after closeout in accordance with National Archives and Records Administration Authority N1-311-86-1, item 4C6c. Records pertaining to individual assistance customer satisfaction assessments are stored in accordance with National Archives and Records Administration Authority N1-311-00-01. Records pertaining to investigations are retired to inactive storage when two years old, and destroyed when six years, three months old in accordance with National Archives and Records Administration Authority N1-311-86-001, item 4C10a. Customer service assessment forms that have been completed and returned by disaster assistance applicants are temporary records that are destroyed upon transmission of the final report, per National Archives and Records Administration Authority N1-311-00-01, DAP-14-1. The statistical and analytical reports resulting from these assessments are temporary records that are retired three years after the final report cutoff and destroyed 20 years after the report cutoff, per National Archives and Records Administration Authority N1-311-00-01, DAP-14-2. The assessment results database records are temporary records that are destroyed when no longer needed for analysis purposes, per National Archives and Records Administration Authority N1-311-00-01, DAP-14-3. Per current National Archives and Records Administration guidance, records pertaining to COVID-19 will be maintained permanently until further guidance regarding the retention of COVID-19 records is provided.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>Individuals applying for Individuals and Households Program assistance may access their information online via the Disaster Assistance Center using the user ID, password, system generated PIN, and authentication that was established during the application process. Applicants may also call a FEMA National Processing Service Center (NPSC) representative to access their information by providing their registration ID, full name, damaged dwelling address, current mailing address (if different), current phone number, and the last four digits of their Social Security number.</p>
                <p>In addition, individuals seeking access to and notification of any record maintained in this system of records, or seeking to contest its content, may submit a request in writing to the FEMA Freedom of Information Act (FOIA) Officer, whose contact information can be found at https://www.dhs.gov/foia under "Submit a FOIA Request." If an individual believes more than one Component maintains Privacy Act records concerning them, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records may be made available under the Freedom of Information Act.</p>
                <p>When an individual is seeking records about themself from this system of records or any other FEMA system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR part 5. The individual must first verify their identity, meaning that the individual must provide their full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. An individual may obtain more information about this process at http://www.dhs.gov/foia. In addition, the individual should:</p>
                <p>• Explain why they believe the Department would have the information being requested;</p>
                <p>• Identify which Component(s) of the Department they believe may have the information;</p>
                <p>• Specify when they believe the records would have been created; and</p>
                <p>• Provide any other information that will help DHS determine which DHS Component agency may have responsive records.</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing release to the requester.</p>
                <p>Without the above information, the Component(s) may not be able to conduct an effective search, and a request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>None.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>87 FR 7852 (February 10, 2022); 78 FR 25282 (April 30, 2013); 74 FR 48763 (September 24, 2009); 71 FR 38408 (July 6, 2006); 69 FR 65615 (November 15, 2004); 66 FR 51436 (October 9, 2001); 64 FR 40596 (July 27, 1999); 61 FR 49777 (September 23, 1996).</p>
            </xhtmlContent>
        </subsection>
    </section>

    <section id="fema9" toc="yes">
<systemNumber>/FEMA-009</systemNumber>
<subsection type="systemName">Hazard Mitigation, Disaster Public Assistance, and Disaster Loan Programs System of Records.
</subsection>
<subsection type="securityClassification"><xhtmlContent>
<p>Unclassified.</p></xhtmlContent>
</subsection>
<subsection type="systemLocation"><xhtmlContent>
<p>Records collected for disaster-related grant, loan, and other public assistance programs may be located in systems such as Mitigation eGrants, Emergency Management Mission Integrated Environment (EMMIE) system, National Emergency Management Information System – Public Assistance (NEMIS-PA), Hazard Mitigation Grant Program (HMGP) system (formerly NEMIS-MT), and Individual Assistance (IA).  Community Disaster Loan Program and hard copy records are maintained at FEMA Headquarters in Washington, D.C. and field locations.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p>Categories of individuals covered by this system include:</p>
<p>Points of contact (POCs) for grantees of the Public Assistance (PA) program, disaster loans, and the Hazard Mitigation Assistance (HMA) grant programs, including applications that are denied, and awarded grants (grantees), such as state, local, tribal, and territorial governments, and private and non-profit organizations applying for assistance or funds; and </p>
<p>Individual private property owners and/or occupants whose properties are identified in applications for PA, HMA, and other disaster-related assistance, or who have been identified by FEMA as candidates for such assistance.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p><i>Categories of records for State/Local/Tribal  POCs of Grantee include:</i></p>
<p>Grant applicant organization POC; </p>
<p>Grant applicant organization POC’s office phone number;</p>
<p>Grant applicant organization POC’s office mailing address;</p>
<p>Grant applicant organization POC’s email address;</p>
<p>Grant applicant’s Dun and Bradstreet Data Universal Numbering System (DUNS);</p>
<p>Governor’s authorized representative name;</p>
<p>Governor’s authorized representative signature;</p>
<p><i>Categories of records from individual property owners/occupants include:</i></p>
<p>Individual property owner/occupant’s name; </p>
<p>Individual property owner/occupant’s damaged property address;</p>
<p>Individual property owner/occupant’s personal and/or work phone number;</p>
<p>Individual other/emergency contact number;  </p>
<p>Individual property owner/occupant’s mailing address; </p>
<p>Individual property owner’s status regarding flood and/or homeowners’ insurance; </p>
<p>Individual property owner’s National Flood Insurance Program (NFIP) policy number; </p>
<p>Individual property owner’s insurance policy provider for the property proposed to be mitigated with FEMA funds;</p>
<p>Individual property owner/occupant’s signature;</p>
<p>Individual owner/occupant’s household size;</p>
<p><i>Other records collected to administer and support the disaster-related grant, loan, and public assistance programs:</i></p>
<p>Vital and/or special needs and/or accommodations that the individual property owner/occupants and/or their dependents may require;</p>
<p>Notations and reports of decisions from insurance, disaster, or similar financial aid and/or income from other federal and state agencies, insurance companies, employers, banks, financial or credit data services, and public or private entities as they relate to payments, services, financial assistance, and/or other benefit received by individual property owners for the subject property; </p>
<p>Records and worksheets describing mitigation activity type, hazard type, award date, and/or Congressional district; </p>
<p>Relevant financial information, such as salary information, that helps determine eligibility to receive payments, assistance, and/or other benefits, or to cancel loan assistance;</p>
<p>Information supporting a request for public assistance, which may include maps and sketches, cost estimates, photo sheet, description of the damage, special consideration questions, and scope of work required;</p>
<p>Information pertaining to requests for appeals for the PA and/or HMA programs and program recommendations;</p>
<p>Information pertaining to requests and recommendations for arbitrations for the PA program; </p>
<p>Information pertaining to requests for additional funding for cost overruns for large projects; </p>
<p>Amounts paid for purchase of property, including records of negotiations and offers;</p>
<p>Title search documentation including property titles, title company correspondence, closing papers, tax records, and contracts;</p>
<p>Loan interest payment information including mortgage payment papers, loan documentation claims, and DHS/FEMA approvals;</p>
<p>Information for determining benefit amounts for real property acquisition including tax records, mortgage information, and divorce decrees;</p>
<p>Information concerning replacement housing determinations including tax information, affidavits, and determinations;</p>
<p>Relocation claims payment information including documents verifying that funds have been spent, deeds, contractors, building estimates, construction bills, loan papers, leases, cancelled checks, claim forms, and Decent, Safe, and Sanitary Inspection forms;</p>
<p>Right of entry and/or consent documentation to enter property;</p>
<p>Deeds, contractual sales documents, notations of follow-up actions, appraiser qualifications, rent supplement information, questionnaire including background information on displaced persons, and information supplied by displaced persons to support claims for relocation files may contain the following:</p>
<p>Applicant contact sheet;</p>
<p>Application for assistance;</p>
<p>Leases and/or reimbursement agreements and corresponding housing inspection reports;</p>
<p>Requests for payment with supporting bills, receipts, etc., for relocation expenses and payment records to individuals and businesses; and</p>
<p>Move-out records.</p>
<p>Customer service survey/assessment responses.</p>
</xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p>Sections 203, 403, 404, 406, 407, 417 of the Robert T. Stafford Disaster Relief and Emergency Assistance Act, as amended, 42 U.S.C. 5133, 5170a, 5170b, 5170c, 5173 and 5184; 42 U.S.C. 4030, 4102a, and 4104c, National Flood Insurance Act of 1968, as amended (the "NFIA"), 42 U.S.C. 4001, et seq; the Government Performance and Results Act, Public Law 103-62, as amended;  Executive Order 13411 "Improving Assistance to Disaster Victims," August 29, 2006; and Executive Order 12862 "Setting Customer Service Standards," September 11, 2003.</p>
</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p>The purpose of this system is to administer the PA grants program, HMA grants programs, and other disaster grants and disaster loan programs to mitigate and recover from emergencies and disasters and to assess the customer satisfaction of FEMA public assistance applicants while allowing FEMA to prevent the duplication of benefits and recoup improper payment.  The purpose of this SORN consolidation is to streamline FEMA documentation and processes since the aforementioned programs are administered by FEMA through state, local, tribal, and other entities and collect similar information.
</p></xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
<p> A.  To the Department of Justice (DOJ), including  Offices of the U.S. Attorneys, or other federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
<p> 1.  DHS or any component thereof;</p>
<p> 2.  Any employee or former employee of DHS in his/her official capacity;</p>
<p> 3.  Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
<p> 4.  The U.S. or any agency thereof.</p>
<p>B.  To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
<p>C.  To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
<p>D.  To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary or relevant to such audit or oversight function.</p>
<p>E.  To appropriate agencies, entities, and persons when:</p>
<p>1.  DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; </p>
<p>2.  DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
<p>3.  The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
<p>F.  To contractors and their agents, grantees, experts, consultants, students, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records.  Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
<p>G.  To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
<p>H.  To the state, local, tribal government whose area has been declared, approved, and subject to said grant/loan efforts, or to a federal, state, tribal, or local government agency charged with administering federal mitigation or disaster relief programs in order to prevent a duplication of efforts by FEMA or the said agency, or a duplication of benefits to an individual applying for mitigation grant programs administered by FEMA.</p>
<p>I.  To a federal, state, tribal, or local government agency, or other public or private entity (to include voluntary/non-governmental organizations, insurance companies, insurance agents/brokers, individual’s employer, and/or financial institutions), when an individual property owner’s eligibility for grant assistance to the property, in whole or in part, depends upon financial benefits already received or available from that source for similar purposes.</p>
<p>J.  To federal, state, tribal, local governments, voluntary organizations, utilities, and hospitals/health care providers to address unmet needs of individuals seeking assistance, or to restore/provide essential services, determine the status of ongoing projects or requests for assistance, and verify eligibility for/prevent a duplication of assistance. </p>
<p>K.  To the affected state subdivision thereof (regional, local, or tribal) for the purpose of determining the state's or subdivision's eligibility for tracking title to the acquired property for recreational and open space resources.</p>
<p>L.  To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
<p>Disclosure to consumer reporting agencies:</p>
<p>None.</p>
<p>To the U.S. Department of the Treasury when disclosure of the information is relevant to review payment and award eligibility through the Do Not Pay Working System for the purposes of identifying, preventing, or recouping improper payments to an applicant for, or recipient of, Federal funds, including funds disbursed by a state (meaning a state of the United States, the District of Columbia, a territory or possession of the United States, or a federally recognized Indian tribe) in a state-administered, federally funded program.</p>    
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>Storage:</p>
<p>FEMA stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door.  The records are stored on magnetic disc, tape, or digital media.
</p></xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p>FEMA may retrieve records by an individual’s name, name of the applicant or sub-applicant organization submitting the grant application, mitigation activity type, hazard type, award date, congressional district, and/or individual’s flood insurance policy information.
</p></xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent>
<p>FEMA safeguards records in this system in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies. FEMA has imposed strict controls to minimize the risk of compromising the information it stores.  Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.
</p></xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p>In accordance with Government Records Schedule (GRS) 3, Item 14, FEMA destroys grant administrative records and hard copies of unsuccessful grant applications files after two years.  In accordance with GRS 3, Item 13, FEMA stores electronically received and processed copies of unsuccessful grant application files for 3 years from the date of denial and then deleted.  </p>
<p>In accordance with NARA Authority N1-311-95-1, Item 1, FEMA maintains grant project records for three years after the end of the fiscal year that the grant or agreement is finalized or when no longer needed, whichever is sooner.  </p>
<p>In accordance with NARA Authority N1-311-95-1, Item 3, FEMA retires grant final reports to the Federal Records Center (FRC) three years after cutoff and transfers them to NARA 20 years after cutoff.  In accordance with NARA Authority N1-311-95-1, Item 2; N1-311-01-8, Item 1; and N1-311-04-1, Item 1, FEMA stores all other grant records for six years and three months from the date of closeout (when closeout is the date FEMA closes the grant in its financial system) and final audit and appeals are resolved and then deleted. </p>
<p>FEMA will consolidate original files regarding occupant-related documents (e.g., site requests, mobile home sales documents, leases, and contracts) at regional offices at the end of Phase II (e.g., when shelterees are removed to permanent housing) and destroy them six years and three months after files are consolidated in accordance with NARA Authority N1-311-86-1, Item 4C8b (1).  </p>
<p>Records of real properties (property acquisition agreement and lists of acquired properties) acquired with FEMA funds for maintenance in accordance with agreement terms of the grant cannot be destroyed until agreement with locality is no longer viable.  Files regarding the permanent relocation purchases of properties under Section 1362 are permanent and maintained in accordance with NARA Authority N1-311-86-1, Item 4C10d.  FEMA stores records pertaining to individual assistance customer satisfaction assessments in accordance with NARA Authority N1-311-00-1. </p>
<p>The customer service assessment forms that have been filled out and returned by disaster assistance applicants are temporary records that are destroyed upon transmission of the final report, per NARA Authority N1-311-00-1, item 1.  </p>
<p>The statistical and analytical reports resulting from these assessments are temporary records that are retired three years after the final report cutoff and destroyed 20 years after the report cutoff per NARA Authority N1-311-00-1, item 2.  The assessment results database are temporary records that are destroyed when no longer needed for analysis purposes, per NARA Authority N1-311-00-1, item 3.
</p></xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent>
<p>Director, Risk Reduction Division, FEMA, 1800 South Bell Street, Arlington, VA  20598-3030;   Director, Public Assistance Division, FEMA, 500 C Street SW, Washington, DC 20472.   Enterprise Coordination/Information Management, National Processing Service Center, Winchester, VA. </p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p>Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the FEMA Privacy Officer and FEMA Freedom Of Information Act Officer, whose contact information can be found at http://www.dhs.gov/foia under "contacts."  If an individual believes more than one component maintains Privacy Act records concerning him or her the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive, SW, Building 410, STOP-0655, Washington, DC 20528.</p>
<p>When seeking records about yourself from this system of records or any other Departmental system of records your request must conform with the Privacy Act regulations set forth in 6 CFR Part 5.  You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth.  You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C.  1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization.  While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov or 1-866-431-0486.  In addition you should:</p>
<p>Explain why you believe the Department would have information on you;</p>
<p>Identify which component(s) of the Department you believe may have the information about you;</p>
<p>Specify when you believe the records would have been created; and</p>
<p>Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
<p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
<p>Without the above information the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.
</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p>See "Notification procedure’’ above.
</p></xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p>See "Notification procedure" above.
</p></xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
<p>FEMA obtains information in this system of records from individual points of contact for state, local, tribal, territorial governments, and private and non-profit organizations via hard copy and electronic applications for assistance, as well as from the individual disaster survivors, from whom FEMA may collect information directly to assess and report on damages incurred as a result of a disaster.
</p></xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent>
<p>None.

</p></xhtmlContent></subsection></section>
<section id="fema11" toc="yes">
<systemNumber>/FEMA-011</systemNumber>
    <subsection type="systemName">
        <p>DHS/FEMA-011 Training and Exercise Program Records.</p>
    </subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p>Classified and Unclassified.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p>Records are maintained at the FEMA Headquarters in Washington, DC, and field offices. Additionally, records are maintained in various FEMA training and exercise information technology (IT) systems, such as the National Emergency Training Center (NETC) Admissions System, United States Fire Administration Learning Management System (USFA-LMS), the Center for Domestic Preparedness Training Infrastructure (CDP-TI), the Independent Study Database System, the FEMA Employee Knowledge Center, and the Radiological Emergency Preparedness Program Online Operation Center.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p>Director, National Training and Education Division, Federal Emergency Management Agency, Department of Homeland Security, Washington, DC 20472</p>
        </xhtmlContent>
    </subsection>
    <subsection type="authorityForMaintenance">
        <xhtmlContent>
            <p>42 U.S.C. 5196; Federal Fire Prevention and Control Act of 1974, as amended, 15 U.S.C. 2201 et seq.; 44 U.S.C. 3101-3106; 6 U.S.C. 748; Homeland Security Presidential Directive 8; Homeland Security Presidential Directive 5; the Reorganization Plan No. 3 of 1978, 5 U.S.C. 301; 31 U.S.C. 3716; 31 U.S.C. 321, Executive Order No. 13111; Executive Order No. 12148; Executive Order No. 12127; 15 U.S.C. 2206; Chief Financial Officer Bulletin, Financial and Acquisition Management Division, Number 117, June 23, 2003, Subject: Invitational Travel; Executive Order No. 9397 amended by Executive Order No. 13478; and 31 U.S.C. 7701 (1996) Authorize the Collection of the Social Security number; Post –Katrina Emergency Management Reform Act (PKEMRA) of 2006, Public Law 109-295, 120 Stat. 1355, October 4, 2006; and Occupational Safety and Health Administration (OSHA) Personal Protective Equipment (No. 1910.134).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p>The purpose of this system is to facilitate registration, participation, completion, documentation of FEMA's training and exercise programs, including assessment of the health and fitness of individuals participating in training exercises; determine eligibility for training, housing, travel, and stipend reimbursement programs; and compile statistical information to administer and measure effectiveness of FEMA training and exercise programs.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
            <p>Any individual who has applied for, participated in, been named as a reference for, or assisted with a training or exercise program recommended, sponsored, or operated by FEMA. This includes current and former employees of DHS, any other federal government employee or contractor, volunteers, other federal, state, local, tribal, territorial, foreign, or international government agencies, and non-profit/non-governmental personnel. The categories of individuals also include individuals from the private sector and other participants in FEMA training and exercise programs such as instructors, developers, observers, and interpreters.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p>Individual's name (First, Middle, Last, Suffix);</p>
            <p>Date of birth;</p>
            <p>Social Security number (SSN);</p>
            <p>Alternate unique number assigned in lieu of an SSN (if the individual does not have a SSN or doesn't know his or her SSN);</p>
            <p>Gender/Sex;</p>
            <p>Race and ethnicity (for statistical purposes only);</p>
            <p>U.S. Citizenship;</p>
            <p>City and country of birth (collected for non-U.S. citizens);</p>
            <p>Information related to disabilities requiring special assistance;</p>
            <p>Phone numbers;</p>
            <p>Email addresses;</p>
            <p>Mailing addresses;</p>
            <p>Military Rank/Prefix;</p>
            <p>Unique user ID (for IT system registration);</p>
            <p>Individual's password (for IT system access; only accessible by the individual; disclosed as part of the authentication process);</p>
            <p>Individual's security questions and answers (for IT system access);</p>
            <p>Individual's employer or organization being represented;</p>
            <p>Individual's employment status;</p>
            <p>Individual's position title;</p>
            <p>Individual's professional certifications;</p>
            <p>Category of position;</p>
            <p>Years of experience;</p>
            <p>Type of experience;</p>
            <p>Primary responsibility;</p>
            <p>Reason for applying/registering for training/exercise;</p>
            <p>Reference point of contact name;</p>
            <p>Reference point of contact phone number;</p>
            <p>Reference point of contact addresses;</p>
            <p>Relationship of individual to the reference point of contact;</p>
            <p>Organization type/Jurisdiction (e.g., federal, state, local, tribal, territorial, foreign, or international government agencies);</p>
            <p>Organization identification number (non-proprietary);</p>
            <p>Number of staff in the organization;</p>
            <p>Size of population served by the organization;</p>
            <p>Nomination forms;</p>
            <p>Registration/Application forms;</p>
            <p>Training/Exercise rosters and sign-in sheets;</p>
            <p>Training instructor and exercise role lists;</p>
            <p>Training/exercise schedules, including location and venue, type, target capabilities, and mission;</p>
            <p>Financial information, such as bank routing and account number;</p>
            <p>Payment records, including financial, travel, and related expenditures;</p>
            <p>Examination and testing materials;</p>
            <p>Grades and student evaluations;</p>
            <p>Course and instructor critiques;</p>
            <p>Reports pertaining to and resulting from training and exercises;</p>
            <p>Formal education level</p>
            <p>Military experience</p>
            <p>Medical capability / Physical Fitness Information</p>
            <p>Past medical history</p>
            <p>Body composition</p>
            <p>Experience with respirators</p>
            <p>Cardiac and Respiratory assessment</p>
            <p>Hearing and vision assessment</p>
            <p>Musculoskeletal assessment</p>
            <p>Pregnancy history</p>
            <p>Medication list</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p>Records are obtained on paper and through IT systems directly from all individuals who register for, apply for, participate in, or assist with FEMA's training or exercise programs including FEMA employees and contractors, volunteers, other federal employees and other participants such as current and former fire, medical, emergency management, and law enforcement professionals; nongovernmental and volunteer disaster relief organizations; and private sector professionals such as flood insurance representatives, instructors, course developers, observers, and interpreters.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
            <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant and necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
            <p>1. DHS or any component thereof;</p>
            <p>2. Any employee or former employee of DHS in his or her official capacity;</p>
            <p>3. Any employee or former employee of DHS in his or her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
            <p>4. The United States or any agency thereof.</p>
            <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
            <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
            <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
            <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
            <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
            <p>G. To an appropriate federal, state, local, tribal, territorial, foreign, or international government agency, law enforcement agency, or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
            <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            <p>I. To federal, state, local, tribal, territorial, foreign, international government agency, or non-profit/non-governmental entity if necessary to obtain information relevant to a DHS decision concerning the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant, or other benefit.</p>
            <p>J. To federal, state, local, tribal, territorial, foreign, international government agency, or non-profit/non-governmental entity in response to its request, in connection with the hiring of a prospective employee or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, the issuance of a license, grant, or other benefit by the requesting agency, or for general inquiries by a state agency or state entity in connection with monitoring status and activities of its employees, to the extent that the information is relevant and necessary to the requesting agency's role and authority on such decisions and matters.</p>
            <p>K. To physician(s) in order to provide information about a student or participant in need of medical care and who is unable to provide the information him- or herself.</p>
            <p>L. To members of the National Fire Academy (NFA) and Emergency Management Institute (EMI) Boards of Visitors federal advisory committees for the purpose of evaluating NFA's and EMI's programmatic statistics.</p>
            <p>M. To a federal, state, local, tribal, territorial, foreign,  international government agencies or non-profit/non-governmental entity for a statistical or research purpose, including the development of methods or resources to support statistical or research activities, provided that the records support DHS programs and activities that relate to the purpose(s) stated in this SORN, and will not be used in whole or in part in making any determination regarding an individual’s rights, benefits, or privileges under federal programs, or published in any manner that identifies an individual.</p>
            <p>N. To Department of Treasury for the processing and issuance of stipend payments to reimburse training, exercise, housing, or conference related expenses.</p>
            <p>O. To federal, state, local, tribal, territorial, foreign, international government agencies, non-profit/non-governmental entity, or educational institutions for the maintenance/updating of student academic records (such as transcripts).</p>
            <p>P. To other federal agencies that support FEMA's training and exercise efforts through use of IT system(s).</p>
            <p>Q. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS's officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p>DHS/FEMA stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
            <p>Records may be retrieved by an individual's name, SSN, or unique user ID.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p>FEMA's training and exercise records retention is generally covered under General Records Schedule (GRS) 2.6 item 10 and NARA Authority N1-311-08-2 1A. Under GRS 2.6 item 10, records are temporary, destroyed when 3 years old, or 3 years after superseded or obsolete, whichever is appropriate.   Under NARA Authority N1-311-08-2 1A, records are retired to the Federal Records Center (FRC) five years after the cutoff and destroyed forty years after the cutoff. Finally, in accordance with OSHA 29 CFR 1910.1020(d)(1)(i), medical records are retained for at least thirty years and then destroyed.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
            <p>FEMA safeguards records in this system in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies. FEMA imposes strict controls to minimize the risk of compromising the information it stores. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act because it is a testing and evaluation system. However, DHS/FEMA will consider individual requests to determine whether or not information may be released. Individuals seeking notification of or access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and FEMA’s Freedom of Information Act (FOIA) Officer whose contact information can be found at https://www.dhs.gov/foia-contact-information. If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655, or electronically by https://www.dhs.gov/dhs-foia-privacy-act-request-submission-form.  Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
            <p>When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. An individual may obtain more information about this process at https://www.dhs.gov/foia.  In addition, you should:</p>
            <p>Explain why you believe the Department would have information on you; Identify which component(s) of the Department you believe may have the information about you; Specify when you believe the records would have been created; Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
            <p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
            <p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p>For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p>See ``Record Access Procedure'' above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(6) has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="history">
        <xhtmlContent>
            <p>January 22, 2015, 80 FR 3241.</p>
        </xhtmlContent></subsection></section>
<section id="fema12" toc="yes">
<systemNumber>/FEMA-012</systemNumber>
    <subsection type="systemName">
        <p>Department of Homeland Security (DHS)/Federal Emergency Management Agency (FEMA)-012 Suspicious Activity Reporting System of Records.</p>
    </subsection>
    <subsection type="securityClassification">
        <xhtmlContent>
            <p>For official use only (FOUO) and law enforcement sensitive (LES).  This system does not contain classified information.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemLocation">
        <xhtmlContent>
            <p>Records are maintained on a FEMA Exchange Server that is access-controlled and under the management and control of the Federal Emergency Management Agency (FEMA) Office of Chief Information Officer at FEMA Headquarters, 500 C Street SW, Washington, D.C., 20472.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="systemManager">
        <xhtmlContent>
            <p>Office of the Chief Security Officer, Fraud Investigations and Inspections Division, 500 C Street SW, Washington, D.C., 20472.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="authorityForMaintenance">
        <xhtmlContent>
            <p>42 U.S.C. 5196(d); Executive Orders 12333 and 13388; 40 U.S.C. 1315(b)(2)(F); 6 U.S.C. 314 of the Homeland Security Act of 2002, as amended; the Intelligence Reform and Terrorism Prevention Act of 2004, as amended; and the National Security Act of 1947, as amended.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="purpose">
        <xhtmlContent>
            <p>The purpose of this system is to collect, investigate, analyze, and report suspicious activities to the police or law enforcement agency of jurisdiction and upload the Suspicious Activity Reports into the FEMA Exchange Server in coordination with the agency that reported the information.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfIndividuals">
        <xhtmlContent>
            <p>Categories of individuals covered by the system include individuals reported as being involved in suspicious activities, individuals who report suspicious activities, and Fraud Investigations and Inspections Division Investigators and Analysts assigned to analyze and appropriately handle suspicious activity reports.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="categoriesOfRecords">
        <xhtmlContent>
            <p>The following fields related to individuals may be maintained in this system:</p>
            •	<p>•Report of the suspicious activity (e.g., description of the suspicious activity and physical descriptors of individuals involved in suspicious activity);</p>
            •	<p>•Case/incident number;</p>
            •	<p>•Name (first, middle, and last);</p>
            •	<p>•Address (number, street, apartment, city, and state);</p>
            •	<p>•Age;</p>
            •	<p>•Sex;</p>
            •	<p>•Race for subject description;</p>
            •	<p>•Signature (investigator, analyst, or law enforcement officer (LEO));</p>
            •	<p>•Jurisdiction over the suspected activity;</p>
            •	<p>•Injury code  (a dropdown that lists the codes in question (0-None, 1-Refused, 2-First Aid, 3-Hospital, 4-Deceased) (if applicable));</p>
            •	<p>•Telephone numbers (home, business, or cell);</p>
            •	<p>•Other contact information (e.g., email address); and</p>
            •	<p>•Property information (e.g., name, quantity, serial number, brand name, model, value, year, make, color, identifying characteristics, registration information).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordSourceCategories">
        <xhtmlContent>
            <p>Records are obtained from individuals reported as being involved in suspicious activities, individuals who report suspicious activities, Fraud Investigations and Inspections Division Investigators and Analysts, commercially available systems (LexisNexis) and other federal, state, and local law enforcement agencies.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="routineUsesOfRecords">
        <xhtmlContent>
            <p>In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
            <p>A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or to another federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant and necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
            <p>1. DHS or any component thereof;</p>
            <p>2. Any employee or former employee of DHS in their official capacity;</p>
            <p>3. Any employee or former employee of DHS in their individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
            <p>4. The United States or any agency thereof.</p>
            <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
            <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. §§ 2904 and 2906.</p>
            <p>D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
            <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
            <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the federal government, or national security, resulting from a suspected or confirmed breach.</p>
            <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
            <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
            <p> I. To an appropriate federal, state, tribal, local, international counterterrorism agencies when DHS becomes aware of an indication of a threat or potential threat to security, and when such use is to assist in counterterrorism efforts.</p>
            <p>J. To an organization or individual in either the public or private sector, either foreign or domestic, when there is a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to the extent the information is relevant to the protection of life, property, or other vital interests of a data subject and disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
            <p>K. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="policiesAndPractices">
        <xhtmlContent>
            <p>DHS/FEMA stores records in this system electronically on the access-controlled FEMA Exchange Server.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retrievability">
        <xhtmlContent>
            <p>DHS/FEMA retrieves records by case/incident number, name, address, and/or date.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="retentionAndDisposal">
        <xhtmlContent>
            <p>Pursuant to National Archives and Records Administration Schedule Number N1-311-99-6, Items 1, 2, and 3, files containing information or allegations that are of an investigative nature but do not relate to a specific investigation are destroyed after five (5) years. Investigative case files that involve allegations made against senior agency officials, attract significant attention in the media, attract congressional attention, result in substantive changes in agency policies and procedures, or are cited in the Office of the Inspector General’s (OIG) periodic reports to Congress are cut off when the case is closed, retired to the Federal Records Center (FRC) five (5) years after cutoff, and then transferred to the National Archives and Records Administration twenty (20) years after cutoff. All other investigative case files are placed in inactive files when a case is closed, cut off at the end of fiscal year, and destroyed ten (10) years after cutoff, except those that are unusually significant for documenting major violations of criminal law or ethical standards by agency officials or others.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="safeguards">
        <xhtmlContent>
            <p>DHS/FEMA safeguards records in this system in accordance with applicable rules and policies, including all applicable DHS  systems security and access policies. DHS/FEMA imposes strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="recordAccessProcedures">
        <xhtmlContent>
            <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act because it is a law enforcement system. However, DHS/FEMA will consider individual requests to determine whether information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and FEMA’s Freedom of Information Act (FOIA) Officer whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning them, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C., 20528-0655, or electronically at https://www.dhs.gov/dhs-foia-privacy-act-request-submission-form. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
            <p> When an individual is seeking records about themself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR part 5. The individual must first verify their identity, meaning that the individual must provide their full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C.  1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. An individual may obtain more information about this process at http://www.dhs.gov/foia. In addition, the individual should:</p>
            •	<p>•Explain why they believe the Department would have information being requested;</p>
            •	<p>•Identify which component(s) of the Department they believe may have the information;</p>
            •	<p>•Specify when the individual believes the records would have been created; and</p>
            •	<p>•Provide any other information that will help the DHS staff determine which DHS component agency may have responsive records.</p>
            <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
            <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="contestingRecordProcedures">
        <xhtmlContent>
            <p>For records covered by the Privacy Act or covered Judicial Redress Act (JRA) records, individuals may make a request for amendment or correction of a Department record about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record. When an individual is making a request for amendment or correction of Departmental records about themself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR part 5.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="notificationProcedure">
        <xhtmlContent>
            <p>See "Record Access Procedures" above.</p>
        </xhtmlContent>
    </subsection>
    <subsection type="exemptionsClaimed">
        <xhtmlContent>
            <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2), has exempted this system from the following provisions of the Privacy Act, subject to the limitation set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).</p>
        </xhtmlContent>
    </subsection>
    <subsection type="history">
        <xhtmlContent>
            <p>79 FR 40124 (July 11, 2014).</p> </xhtmlContent>
        </subsection>
    </section>

            <section id="fema13" toc="yes">
        <systemNumber>/FEMA-013</systemNumber>
        <subsection type="systemName">
            Operational Use of Publicly Available Social Media Internet Sources for Situational Awareness System of Records.
        </subsection>
        <subsection type="securityClassification">
             <p> Unclassified.</p>
            </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p> DHS/FEMA retains records at the DHS/FEMA Headquarters in Washington, D.C., DHS/FEMA regional field offices, and at the DHS National Operations Center, in Washington, D.C.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p> Categories of individuals covered by the system:</p>
                <p>Individuals located within the United States in extremis situations involving potential life or death circumstances;</p>
                <p>Senior U.S. Government officials who make public statements or provide public updates about natural disasters, acts of terrorism, and other man-made disasters, including catastrophic incidents;</p>
                <p>U.S. Government spokespersons who make public statements or provide public updates about natural disasters, acts of terrorism, and other man-made disasters, including catastrophic incidents;</p>
                <p>U.S. private sector officials and spokespersons who make public statements or provide public updates about natural disasters, acts of terrorism, and other man-made disasters, including catastrophic incidents;</p>
                <p>Names of anchors, newscasters, or on-scene reporters who are known or identified as reporters in their post or article or who use traditional and/or social media in real time to keep their audience situationally aware and informed (including known subject matter experts such as emergency management volunteers, tornado spots, and Community Emergency Response Team members) about natural disasters, acts of terrorism, and other man-made disasters, including catastrophic incidents; and</p>
                <p>Current and former public officials who are victims of natural disasters, acts of terrorism, and other man-made disasters, including catastrophic incidents.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p> Through the course of normal social media monitoring, FEMA does not collect any records from individuals. However, in extremis situations FEMA may collect:</p>
                <p>•Individual’s name;</p>
                <p>•Social media account information including: Email address, Login ID, Handle, User Name, or Alias;</p>
                <p>•Address or approximate location (via geo-coded submission);</p>
                <p>•Job title or Position;</p>
                <p>•Phone numbers, email address, or other contact information included in or associated with a user profile;</p>
                <p>•Date and Time of post; and</p>
                <p>•Additional details relevant to an in extremis situation (e.g., details of an individual’s physical condition).</p>
                <p>This system of records may also include:</p>
                <p>•Reports related to incidents or updates seen via social media;</p>
                <p>•Links to original social media content described in reports; and</p>
                <p>•Links to other open source media such as a publicly available news websites.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p> 6 U.S.C. 313(b)(2)(A)-(H); 6 U.S.C. 314(b)(1), 6 U.S.C. 314(a)(17); and 6 U.S.C. 321d(b)(1).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p> The purpose of this system is to monitor and review publicly available social media Internet sources for situational awareness to maintain timely, actionable decision-making. DHS/FEMA collects PII through social media Internet sources to respond to and provide potentially lifesaving assistance to the individual only in extremis situations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p> In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:</p>
                <p> A. To the Department of Justice (DOJ), including Offices of the United States Attorneys, or other Federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>  1. DHS or any Component thereof;</p>
                <p>  2. Any employee or former employee of DHS in his or her official capacity;</p>
                <p>  3. Any employee or former employee of DHS in his or her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
                <p>  4. The United States or any agency thereof.</p>
                <p> B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p> C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906.</p>
                <p> D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p> E. To appropriate agencies, entities, and persons when:</p>
                <p> 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised;</p>
                <p> 2. DHS has determined that as a result of the suspected or confirmed compromise, there is a risk of identity theft or fraud, harm to economic or property interests, harm to an individual, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and</p>
                <p> 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.</p>
                <p> F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>G. To an appropriate Federal, State, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To Federal, State, local, tribal emergency management agencies, and the National Center for Missing and Exploited Children, and other partners who assist in emergency response, reunification, or rescue efforts.</p>
                <p>Disclosure to consumer reporting agencies:</p>
                <p> None.</p>
                </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>Storage:</p>
                <p> Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, or digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p> Much of the data within this system does not pertain to an individual; rather, the information pertains to locations, geographic areas, facilities, and other things or objects not related to individuals. However, in the event that PII is collected, DHS/FEMA may retrieve records by date, time stamp, incident name, individual name, or social media user name.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p> DHS/FEMA safeguards records in this system in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies. Strict controls are in place to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p> FEMA’s ORR is collaborating with FEMA Records Management Division and NARA to establish an approved retention and disposal policy for any records created through this initiative related to its situation reports and responses to in extremis situations.  However, all PII from reports are redacted once the information is sent to the appropriate first responders in extremis situations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p> Director of National Watch Center, Response Directorate, FEMA, 500 C Street, SW, Washington, D.C. 20472.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p> Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the DHS/FEMA Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contacts." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief FOIA Officer, Department of Homeland Security, 245 Murray Drive, SW, Building 410, STOP-0655, Washington, D.C. 20528.</p>
                <p> When seeking records about yourself from this system of records or any other Departmental system of records, your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief FOIA Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, you should:</p>
                <p>•Explain why you believe the Department would have information on you;</p>
                <p>•Identify which component(s) of the Department you believe may have the information about you;</p>
                <p>•Specify when you believe the records would have been created; and</p>
                <p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
                <p>If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p> See "Notification procedure" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p> See "Notification procedure" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p> DHS/FEMA may collect information from members of the public, first responders, press, volunteers, and others that provide publicly available information on social media sites including online forums, blogs, public websites, and message boards. All DHS/FEMA users of social media are clearly identified as DHS/FEMA employees and do not collect any information that is not publicly available or inaccessible due to user privacy settings.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p> None.</p>
            </xhtmlContent>
        </subsection>
    </section>
    <section id="fema14" toc="yes">
    <systemNumber>/FEMA-014</systemNumber>
        <subsection type="systemName">
            <p>U.S. Department of Homeland Security (DHS)/Federal Emergency Management Agency (FEMA)-014 Hazard Mitigation Planning and Flood Mapping Products and Services Records System of Records.</p>
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at the FEMA Headquarters in Washington, D.C. and field offices. Additionally, records may be located in the Risk Analysis and Management (RAM) system (formerly Mapping Information Platform (MIP) system, the Map Service Center, and Risk Map collaboration sites) and the LOMA-Logic system.</p>
                <p>
                    <i>Primary Production Server/Data Storage Locations:</i>
                </p>
                <p>Alleghany Ballistics Laboratory Data Center (Operated by IBM), Rocket Center, WV</p>
                <p>
                    <i>CDS Operations Sites:</i>
                </p>
                <p>Primary Local Operations Site (Operated by IBM), Fairfax, VA</p>
                <p>Alleghany Ballistics Laboratory Data Center (Operated by IBM), Rocket Center, WV</p>
                <p>Secondary Local Operations Site (Operated by Michael Baker International), Alexandria, VA</p>
                <p>
                    <i>Backup Data Storage Sites (in addition to sites already listed above):</i>
                </p>
                <p>Alleghany Ballistics Laboratory (Operated by IBM), Rocket Center, WV</p>
                <p>Iron Mountain Secure Offsite Storage, Various U.S. locations</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Program Management, Risk Management Program, Federal Insurance and Mitigation Administration, 400 C Street, SW, Washington, D.C. 20472.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>The National Flood Insurance Act of 1968, as amended, including the Biggert Waters Flood Insurance Reform Act of 2012, Pub. L. No. 112-141, 126 Stat. 916 (codified in sections of 42 U.S.C. secs. 4001-4130); The Robert T. Stafford Disaster Relief and Emergency Assistance Act, as amended by the Disaster Mitigation Act of 2000 (DMA 2000), Pub. L. No. 106-390, 14 Stat. 1552; and 44 CFR Parts 59-72.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purposes of this system of records are to support FEMA’s flood mapping, risk analysis, and hazard mitigation planning functions, which are to: identify and prioritize the need for flood hazard updates; schedule and track progress and quality of flood hazard and risk studies; conduct community outreach and coordinate with SLTT officials and the public on the flood hazard and risk study process; collect information to support flood hazard analysis from a wide variety of sources, including SLTT government organizations and other organizations such as levee owners; provide public review of the proposed flood hazard data; adjudicate administrative appeals to flood hazards and flood elevations; coordinate and track the request and processing of flood map revisions and amendments; publish and distribute flood hazard and risk data, maps, and related information, as well as updates, revisions, and amendments thereto; respond to inquiries from stakeholders and help to resolve issues related to flood maps; monitor the effectiveness of program delivery and stakeholder satisfaction; and collaborate with SLTT officials to support the development, review, and approval of SLTT hazard mitigation plans, track planned mitigation actions, and facilitate collaboration among planners and risk analysts.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>Members of the general public, including: letters of map change applicants/property owners, developers, investors, and their representatives; realtors; certifiers, including Registered Professional Engineers and Licensed Land Surveyors; state, local, tribal, or territorial government officials with authority over a community’s flood plain management activities, which includes Mapping Review Partners (MRP); potential or confirmed respondents to customer service surveys/focus groups; potential or confirmed attendees at FEMA’s public meetings or other outreach activities related to flood hazard identification and flood mapping activities; and FEMA staff and stakeholders registered to use FEMA’s information technology systems and collaboration sites.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>●Full name;</p>
                <p>●Position or title;</p>
                <p>●Email addresses;</p>
                <p>●Addresses (mailing and property);</p>
                <p>●Business website or business social media account information;</p>
                <p>●Public Records (such as voter records, tax records, real estate records, or directories) to conduct outreach activities;</p>
                <p>●Company or community name;</p>
                <p>●Organization or agency name;</p>
                <p>●Six-digit NFIP community number;</p>
                <p>●Fax number;</p>
                <p>●Professional license number;</p>
                <p>●Professional license expiration date;</p>
                <p>●Signature;</p>
                <p>●Signature date;</p>
                <p>●Fill placement and date;</p>
                <p>●Type of construction;</p>
                <p>●Elevation data;</p>
                <p>●Base Flood Elevation (BFE) data;</p>
                <p>●Legal property description;</p>
                <p>●FEMA region number (1-10);</p>
                <p>●Transcripts of conversations with FEMA call centers or helpdesk including name, address, phone number, email address, caller type (e.g., property owner, realtor), chat subject, and chat subject category;</p>
                <p>●Bank name and account information including electronic funds transfer, and credit/debit card account information;</p>
                <p>●Payment confirmation number;</p>
                <p>●User account creation and access information; and</p>
                <p> ○Username;</p>
                <p>○Activation code;</p>
                <p>○Password;</p>
                <p>○Roles and responsibilities;</p>
                <p>○Challenge questions and answers; and</p>
                <p>○System permissions or permission levels.</p>
                <p>●Voluntary response to customer satisfaction and experience surveys and focus groups, including demographic information about the individual.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>Records are obtained from individuals (e.g., home and property owners, tenants, investors, and property developers, or their representatives); LOMC Certifiers (e.g., Registered Professional Engineers and Licensed Land Surveyors); state, local, tribal, or territorial government officials, including those with authority over a community’s floodplain management activities or other land use, which includes MRPs; FEMA staff and stakeholders registered to use SharePoint information and collaboration portals; the FEMA Community Information System (CIS) system; and the cloud-based LOMA-LOGIC tool. Records may also be obtained from public records maintained by SLTT or private entities, such as tax records, real estate records, voter records or directories.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity, only when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the federal government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the federal government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>I. To state and local governments pursuant to signed agreements allowing such governments to assist FEMA in making LOMC determinations.</p>
                <p>J. To the U.S. Department of the Treasury for the processing of payments for products and services.</p>
                <p>K. To the public, in accordance with the National Flood Insurance Act, the following information: names and business contact information of certifiers, public officials, and others involved in the development, update, and approval of flood hazard maps, including business websites or business social media account information as well as the address of the subject property. This does not include names or other information regarding the applicant/property owner.</p>
                <p>L. To appropriate federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations, with the approval of the Chief Privacy Officer, when DHS is aware of a need to use relevant data, that relate to the purpose(s) stated in this SORN, for purposes of testing new technology.</p>
                <p>M. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/FEMA stores records in this system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>DHS/FEMA retrieves records by name, address information, legal description of property, order number, and account number.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>In accordance with NARA authority N1-311-01-2, item 1, and FEMA records disposition schedule FIA 1-2-2, FEMA retires community case file materials to off-site storage when the record is three years old and destroys the record 100 years after the retirement date.</p>
                <p>In accordance with NARA authority N1-311-86-1, item 2.A.2, and FEMA Records Disposition Schedule FIA-2, appeals records are cut off after the appeal is resolved or the appealed map becomes effective and are retired two years after cutoff. FEMA destroys appeals records 20 years after cutoff.</p>
                <p>Pursuant to NARA authority N1-311-86-1, item 2.A.3, and FEMA Records Disposition Schedule FIA-3, digital preliminary flood maps are destroyed five years after FEMA issues a flood elevation determination or insurance rate map.</p>
                <p>Pursuant to NARA authority N1-311-86-1, item 2.A.4, and FEMA Records Disposition Schedule FIA-4, flood elevation determination (or insurance rate) maps are permanent, cut off when superseded, and transferred directly to the National Archives five years after cutoff, or sooner, for permanent storage.</p>
                <p>Pursuant to NARA authority DAA-GRS-2016-0012-0002, NARA’s General Record Schedule 5.5, item 20, and FEMA Records Disposition Schedule COMM 2, FEMA stores copies of checks and credit card numbers received by mail from stakeholders who request changes to the flood maps and who request engineering library services to obtain copies of flood map information for one year.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and FEMA’s Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, U.S. Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act (JRA) provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, an individual may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, the individual should:</p>
                <p>●Explain why he or she believes the Department would have information being requested;</p>
                <p>●Identify which component(s) of the Department he or she believes may have the information;</p>
                <p>●Specify when the individual believes the records would have been created; and</p>
                <p>●Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>None</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>82 FR 49404 (October 25, 2017); 71 FR 7990 (February 15, 2006).</p>

            </xhtmlContent></subsection></section>
    <section id="fema15" toc="yes">
        <systemNumber>/FEMA-015</systemNumber>
        <subsection type="systemName">
            <p>U.S. Department of Homeland Security (DHS) Federal Emergency Management Agency (FEMA)-015 Fraud Investigations System of Records.</p>
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained on access-controlled servers or in access-controlled cabinets that are under the management and control by the FEMA Office of Chief Information Officer at FEMA Headquarters in Washington, D.C., and field offices.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>FEMA Investigations and Inspections Division (FIID), Fraud Prevention Investigations Branch (FPIB), Fraud Investigations Operations Manager, 400 C Street, SW, Washington, D.C., Suite 7SW-1009, Mail Stop 3005.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>Robert T. Stafford Disaster Relief and Emergency Assistance Act, as amended, 42 U.S.C. secs. 5161 and 5174(i), as delegated to the Administrator of FEMA in 44 C.F.R. Part 206; The Homeland Security Act of 2002, 6 U.S.C. secs. 793 and 795; and Executive Order 13520, Reducing Improper Payments (2009).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to collect, maintain, and share records related to fraud investigations conducted by the FEMA FIID. It allows FEMA to conduct the necessary investigations to safeguard and protect federal disaster funds and/or benefits from fraud against the United States.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
                <p>Categories of individuals covered by this system include any: (1) individual who files a complaint or report alleging fraud or misuse of federal disaster benefits; (2) individual who is the subject of the disaster fraud complaint or report; (3) individual who has submitted potentially fraudulent applications for disaster fund benefits; and (4) individual who is associated with the fraud investigation but not the actual subject of the investigation and whose information is relevant to the fraud case.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>Categories of records in this system include:</p>
                •	<p>•Full name of applicant and co-applicant, including aliases;</p>
                •	<p>•Full names of dependents and/or others living in the dwelling associated with the investigation;</p>
                •	<p>•Full names and addresses of associates and relatives;</p>
                •	<p>•Position or title of applicant or associates and relatives, as needed;</p>
                •	<p>•Date of birth;</p>
                •	<p>•Social Security number (SSN);</p>
                •	<p>•Phone numbers;</p>
                •	<p>•Email addresses;</p>
                •	<p>•Addresses (mailing and damaged dwelling associated with the investigation);</p>
                •	<p>•Address history (addresses lived at prior to the damaged dwelling associated with the investigation);</p>
                •	<p>•Employment information and data (e.g., name of employer, location, job title);</p>
                •	<p>•Banking name and account information, including routing numbers, electronic funds transfer information, and credit/debit account information;</p>
                •	<p>•FEMA Registration Identification Number;</p>
                •	<p>•Property, building, and structural photographs;</p>
                •	<p>•Publicly available criminal records;</p>
                •	<p>•Publicly available civil court records (e.g., bankruptcy, liens, divorce, child custody judgements);</p>
                •	<p>•Driver’s license data (current and historical);</p>
                •	<p>•Vehicle records (current and historical);</p>
                •	<p>•Business and professional license information (e.g., Medical Doctor, Certified Public Accountant, Registered Nurse);</p>
                •	<p>•Social media information, to include posts, user name/handles, comments, and photographs;</p>
                •	<p>•National Flood Insurance Program (NFIP) records;</p>
                •	<p>•Private house, property, and vehicle insurance records;</p>
                •	<p>•Voter registration records (to determine location data);</p>
                •	<p>•Property records (e.g., deeds, liens, tax assessments, tax bills, leases, rental receipts, landlord letters and information);</p>
                •	<p>•School or education institution location information (no transcripts or education records);</p>
                •	<p>•Utility Company information;</p>
                •	<p>•Aerial property photographs and Google Earth Street View photographs;</p>
                •	<p>•Transcripts of conversations with FEMA call centers or helpdesk, including name, address, phone number, email address, caller type (e.g., property owner, lessee), chat subject, and chat subject category;</p>
                •	<p>•Other relevant information or documents voluntarily provided by disaster applicants that is contained in the NEMIS database; and</p>
                •	<p>•Names and contact information of complainants and witnesses interviewed by Investigators.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>Records are obtained from individuals who are the subject of the investigation or inquiry, employers, law enforcement organizations, members of the public, witnesses, educational institutions, government agencies, nongovernmental organizations, credit bureaus, commercial databases, references, confidential sources, personal interviews, photographic images, financial institutions, and the personnel history and application forms of agency applicants, employees, or contractors.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or other federal agencies conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. DHS or any component thereof;</p>
                <p>2. Any employee or former employee of DHS in his/her official capacity;</p>
                <p>3. Any employee or former employee of DHS in his/her individual capacity when DOJ or DHS has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach, there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the federal government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the federal government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees.</p>
                <p>H. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>I. To appropriate federal, state, tribal, and local government agencies that provide assistance with disaster fraud investigations for FEMA to investigate and verify the identity of a subject or witness, or investigate and verify the information provided by the subject or witness to the extent disclosure is necessary to obtain information pertinent to the fraud investigation, including those investigations to prevent or identify fraudulent disaster applications involving identity theft.</p>
                <p> J. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or when disclosure is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
                </xhtmlContent>
    </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>DHS/FEMA stores records in this system electronically, paper files, magnetic disc, tape, or other digital media in a locked drawer within secure access-controlled facilities.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>Records may be retrieved by an individual’s name or address, fraud complaint or investigation number, FEMA Registration Identification Number, or FEMA FIID investigator’s name.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p> In accordance with National Archives and Records Administration (NARA) authority N1-311-99-6, Item 1, AUD 1-1, FEMA FIID retains investigative case files containing information or allegations which are of an investigative nature but do not relate to a specific investigation for five (5) years. Further, in accordance with NARA authority N1-311-99-6, Item 2, AUD 1-2, FEMA FIID retains all other investigative case files except those that are unusually significant for documenting major criminal or ethical violations by others for ten (10) years from the end of the fiscal year when a case is closed. Additionally, in accordance with NARA authority N1-311-99-6, Item 3, AUD 1-3, FEMA FIID retains significant investigative case files that attract significant attention from the media or Congress; result in substantive agency policies and procedures; or are cited in OIG’s periodic reports to Congress. These case files are retired to the Federal Records Center five (5) years from when a case is closed and transferred to the National Archives twenty (20) years from when a case is closed.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p>The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act, and the Judicial Redress Act if applicable to protect information relating to DHS activities from disclosure to subjects or others related to these activities. Specifically, the exemptions are required to preclude subjects of these activities from frustrating these processes; to avoid disclosure of activity techniques; ensure DHS’s ability to obtain information from third parties and other sources; and to protect the privacy of third parties. Disclosure of information to the subject of the inquiry could also permit the subject to avoid detection or apprehension.</p>
                <p>However, DHS/FEMA will consider individual requests to determine whether information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and FEMA FOIA Officer whose contact information can be found at http://www.dhs.gov/foia under "Contacts Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, U.S. Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records may be available under the Freedom of Information Act.</p>
                <p> When seeking records from this system of records or any other Departmental system of records, the request must conform with the Privacy Act regulations set forth in 6 C.F.R. Part 5. Individuals must first verify identity, meaning that that full name, current address, and date and place of birth must be provided. Request must be signed, and the signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, forms for this purpose may be obtained from the Chief Privacy Officer and Chief Freedom of Information Act Officer, http://www.dhs.gov/foia or 1-866-431-0486. In addition, requestors should:</p>
                •	<p>•Explain why the requestor believes that the Department would have information on the requestor;</p>
                •	<p>•Identify which component(s) of the Department may have the information;</p>
                •	<p>•Specify the records would have been created; and</p>
                •	<p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records;</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include a statement from that individual certifying his/her agreement for the requestor to access his/her records.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered JRA records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record. For records covered by the Privacy Act or covered Judicial Redress Act records, see "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(k)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. secs. 552a(c)(3); (d); (e)(1); (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). While investigating a complaint, records, or information covered by other systems of records may become part of, merged with, or recompiled within this system. To the extent this occurs, DHS will claim the same exemptions for those records that are claimed in the original primary systems from which they originated and claim any additional exemptions set forth here.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>None.</p>
            </xhtmlContent>
        </subsection>
    </section>
    <section id="fema16" toc="yes">
        <systemNumber>/FEMA-016</systemNumber>
        <subsection type="systemName">
            <p>Department of Homeland Security (DHS)/Federal Emergency Management Agency (FEMA)-016 Disaster Case Management (DCM) Files System of Records.</p>
        </subsection>
        <subsection type="securityClassification">
            <xhtmlContent>
                <p>Unclassified.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemLocation">
            <xhtmlContent>
                <p>Records are maintained at the Federal Emergency Management Agency Headquarters in Washington, D.C.; Federal Emergency Management Agency Regional Offices; Joint Field Offices; Disaster Field Offices; National Processing Service Centers; Disaster Recovery Centers; and the Federal Emergency Management Agency data centers located in Bluemont, Virginia, and Clarksville, Virginia. Subject to agreement with an organization chosen by the Federal Emergency Management Agency to implement Disaster Case Management on its behalf, records may be maintained at the facilities of federal agencies with interagency agreements or mission assignments or with non-profit organizations or qualified private organizations under contract.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="systemManager">
            <xhtmlContent>
                <p>Division Director, Individual Assistance Division, (202) 646-3642, femahqiafrontoffice@fema.dhs.gov, Federal Emergency Management Agency, 500 C Street SW, Washington, D.C. 20472.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="authorityForMaintenance">
            <xhtmlContent>
                <p>Section 426 of the Robert T. Stafford Disaster Relief and Emergency Assistance Act, as amended (42 U.S.C. sec. 5189d); Executive Order 12148, as amended by Executive Order 12673 and Executive Order 13286.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="purpose">
            <xhtmlContent>
                <p>The purpose of this system is to enable the Federal Emergency Management Agency, and its chosen providers (which can be non-profit organizations, qualified private organizations, or federal agencies working on behalf of the Federal Emergency Management Agency), to provide services in an efficient and expeditious manner that support the overall Federal Emergency Management Agency-administered Disaster Case Management programs. Records will primarily be used to connect disaster survivors who have disaster-related unmet needs to locally available services and will additionally support long term recovery assistance provided by state, tribal, and local entities and the Federal Emergency Management Agency and/or state recognized long term recovery committees and their members (e.g., long term recovery groups).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfIndividuals">
            <xhtmlContent>
            </xhtmlContent>
        </subsection>
        <subsection type="categoriesOfRecords">
            <xhtmlContent>
                <p>Disaster-related case management records, consisting of:</p>
                	<p>●Disaster number;</p>
                	<p>●Case ID numbers (e.g., FEMA Registration ID, client numbers);</p>
                	<p>●Written consents;</p>
                	<p>●Disaster Case Management Applicant/Co-Applicant and Household Information:</p>
                	<p>oFull name;</p>
                	<p>oLanguages spoken, written, or signed;</p>
                	<p>oAddress;</p>
                	<p>oLocation types;</p>
                	<p>oDates of occupation;</p>
                	<p>oLocation at time of registration;</p>
                	<p>oPhone numbers;</p>
                	<p>oEmail addresses;</p>
                	<p>oDisaster Case Management-related healthcare records (e.g., health insurance type, status, service provider, type of appointment referral);</p>
                	<p>oHousehold size;</p>
                	<p>oDemographic information (e.g., age, gender, relationship to head of household, marital status);</p>
                	<p>oReferral assessment and tracking information/Disaster Recovery Plan:</p>
                	<p>●Referral source;</p>
                	<p>●Appointment times and attendance/no show to appointment;</p>
                	<p>●Reported symptoms and feelings of distress;</p>
                	<p>●Behavioral health advocacy assessment;</p>
                	<p>●Children and youth, clothing assessment;</p>
                	<p>●Employment assessment;</p>
                	<p>●Food assessment;</p>
                	<p>●Furniture and appliances assessment;</p>
               	<p>●Healthcare needs assessment;</p>
                	<p>●Housing assessment;</p>
               	<p>●Transportation assessment;</p>
                	<p>●Senior services assessment;</p>
                	<p>●Legal services assessment;</p>
                	<p>●Assistance animals and household pets; and</p>
                	<p>●Funeral assistance.</p>
                <p>●Federal Emergency Management Agency Disaster Assistance Registration Assistance Records:</p>
                	<p>oHomeowners insurance coverage details (including flood coverage and compliance);</p>
                	<p>oDetails on damage to real and personal property (Federal Emergency Management Agency verified);</p>
                	<p>oDegree of total damage incurred (Federal Emergency Management Agency verified);</p>
                	<p>oResidence type;</p>
                	<p>oSelf-reported income;</p>
                	<p>oHousing Assistance (HA) eligibility, types, and amounts;</p>
                	<p>oOther Needs Assistance (ONA) eligibility, types, and amounts;</p>
                	<p>oApproved direct assistance received, including Direct Housing Assistance eligibility, types, received status;</p>
                	<p>oTotal Individuals and Households Program (IHP) amount approved, assistance sought, assistance received, source of assistance;</p>
                	<p>oSmall Business Administration (SBA) referral details, and status of access and functional needs and/or emergency needs; and</p>
                	<p>oSelf-reported disability or access and functional need, such as Personal Assistance Services.</p>
                <p>●Business contact information collected from employees, contractors, and other personnel providing Disaster Case Management assistance (e.g., name, title, email address, phone number).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordSourceCategories">
            <xhtmlContent>
                <p>Records may be obtained from disaster survivors (i.e., applicant) or a member of the applicant’s family or household, or may be provided by other governmental entities (e.g., federal, state, tribal, or local governments) through the Federal Emergency Management Agency-Administered Disaster Case Management Intake Form and the Federal Emergency Management Agency-Administered Disaster Case Management Consent Form, as well as the Federal Emergency Management Agency’s Disaster Assistance Registration Form (FEMA Forms 009-0-1 and 009-0-2).</p>
            </xhtmlContent>
        </subsection>
        <subsection type="routineUsesOfRecords">
            <xhtmlContent>
                <p>In addition to those disclosures generally permitted under 5 U.S.C. sec. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside the Department of Homeland Security as a routine use pursuant to 5 U.S.C. sec. 552a(b)(3) as follows:</p>
                <p>A. To the Department of Justice (DOJ), including the U.S. Attorneys Offices, or other federal agencies conducting litigation or proceedings before any court, adjudicative, or administrative body, when it is relevant or necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation:</p>
                <p>1. Department of Homeland Security or any component thereof;</p>
                <p>2. Any employee or former employee of the Department of Homeland Security in his/her official capacity;</p>
                <p>3. Any employee or former employee of the Department of Homeland Security in his/her individual capacity, only when the Department of Justice or the Department of Homeland Security has agreed to represent the employee; or</p>
                <p>4. The United States or any agency thereof.</p>
                <p>B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains.</p>
                <p>C. To the National Archives and Records Administration or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. secs. 2904 and 2906.</p>
                <p>D. To an agency or organization for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function.</p>
                <p>E. To appropriate agencies, entities, and persons when (1) the Department of Homeland Security suspects or has confirmed that there has been a breach of the system of records; (2) the Department of Homeland Security has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, the Department of Homeland Security (including its information systems, programs, and operations), the federal government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with the Department of Homeland Security’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.</p>
                <p>F. To another federal agency or federal entity, when the Department of Homeland Security determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.</p>
                <p>G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure.</p>
                <p>H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment or agreement for the Department of Homeland Security, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to Department of Homeland Security officers and employees.</p>
                <p>I. To a voluntary organization, as defined in 44 C.F.R. 206.2(a)(27), or to a Federal Emergency Management Agency-recognized or state-recognized long term recovery committee and its members (long term recovery groups) for a declared county charged through legislation or chartered with administering disaster relief or assistance programs, that is actively involved in the recovery efforts of the disaster and that has an assistance program to address one or more unmet disaster-related needs of disaster survivors. The Federal Emergency Management Agency may disclose to such voluntary organizations lists of applicant names and contact information, as well as information necessary to provide the identified additional disaster assistance and/or address a specified unmet need.</p>
                <p>J. To a state, tribal, or local agency for a statistical or research purpose, including the development of methods or resources to support statistical or research activities, provided that the records support Department of Homeland Security programs and activities that relate to the purpose(s) stated in this System of Records Notice, and will not be used in whole or in part in making any determination regarding an individual’s rights, benefits, or privileges under federal programs, or published in any manner that identifies an individual.</p>
                <p>K. To recipients of a long-term Disaster Case Management federal award, such as a state, tribal, or local government entity or a non-profit entity, to ensure continuity of services for each disaster survivor, if the disaster survivor still has unmet needs at the conclusion of the Federal Emergency Management Agency-administered Disaster Case Management program.</p>
                <p>L. To the subject of a Disaster Case Management case file, the name, title, and business contact information of the employee or contractor providing Disaster Case Management assistance.</p>
                <p>M. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of the Department of Homeland Security, or when disclosure is necessary to demonstrate the accountability of the Department of Homeland Security’s officers, employees, or individuals covered by the system, except to the extent the Chief Privacy Officer determines that release of the specific information in the context of a particular case would constitute a clearly unwarranted invasion of personal privacy.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="policiesAndPractices">
            <xhtmlContent>
                <p>The Federal Emergency Management Agency and non-profit organizations, qualified private organizations, or federal agencies supporting Federal Emergency Management Agency-administered Disaster Case Management programs store records in this system in a secure computer system electronically or on paper in secure facilities in a locked drawer behind a locked door. The records may be stored on magnetic disc, tape, and digital media.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retrievability">
            <xhtmlContent>
                <p>The Federal Emergency Management Agency and non-profit organizations, qualified private organizations, or federal agencies supporting the Federal Emergency Management Agency-administered Disaster Case Management program may retrieve records by a case identification number, name, or address.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="retentionAndDisposal">
            <xhtmlContent>
                <p>In accordance with National Archives and Records Administration Authority N1-311-86-1, Item 4C10a, records pertaining to disaster assistance will be placed in inactive storage when two years old and will be destroyed when they are six years and three months old. In accordance with National Archives and Records Administration Authority N1-311-86-1, Item 4C6a, Disaster Case Management files covering the administrative management, program, and information functions (such as mission assignments and correspondence with state and local officials) will be consolidated at appropriate regional offices upon close of the Disaster Field Office (DFO). These files will be retired to off-site storage one year after closeout and destroyed three years after closeout.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="safeguards">
            <xhtmlContent>
                <p>The Federal Emergency Management Agency safeguards records in this system according to applicable rules and policies, including all applicable federal and national standard automated systems security and access policies. The Federal Emergency Management Agency has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to computer systems containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="recordAccessProcedures">
            <xhtmlContent>
                <p> Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and the Federal Emergency Management Agency Freedom of Information Act (FOIA) Officer, whose contact information can be found at http://www.dhs.gov/foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
                <p> When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 C.F.R. Part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. In addition, the individual should:</p>
                	<p>•Explain why he or she believes the Department would have information being requested;</p>
                	<p>•Identify which component(s) of the Department he or she believes may have the information;</p>
                	<p>•Specify when the individual believes the records would have been created; and</p>
                	<p>•Provide any other information that will help the Freedom Of Information Act staff determine which the Department of Homeland Security component agency may have responsive records.</p>
                <p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
                <p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="contestingRecordProcedures">
            <xhtmlContent>
                <p>For records covered by the Privacy Act or covered Judicial Redress Act records, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="notificationProcedure">
            <xhtmlContent>
                <p>See "Record Access Procedures" above.</p>
            </xhtmlContent>
        </subsection>
        <subsection type="exemptionsClaimed">
            <xhtmlContent>
                <p>None.  </p>
            </xhtmlContent>
        </subsection>
        <subsection type="history">
            <xhtmlContent>
                <p>None.</p>
            </xhtmlContent>
        </subsection>
    </section>
    <section id=" cisa-005" toc="yes">
<systemNumber>/CISA-005</systemNumber>
<subsection type="systemName">
<p>DHS/CISA-005 Administrative Subpoenas for Cybersecurity Vulnerability Identification and Notification.</p>
</subsection>
<subsection type="securityClassification"><xhtmlContent><p>
Controlled Unclassified Information</p></xhtmlContent>
</subsection>
<subsection type="systemLocation"><xhtmlContent>
<p>Records are maintained at CISA locations such as Arlington, Virginia and Pensacola, Florida.</p>
</xhtmlContent></subsection>
<subsection type="systemManager"><xhtmlContent>
<p>Division Director, National Cybersecurity and Communications Integration Center (NCCIC) Hunt &amp;amp;amp;amp;amp; Incident Response, 1110 North Glebe Rd. Arlington, VA 22201.</p>
</xhtmlContent></subsection>
<subsection type="authorityForMaintenance"><xhtmlContent>
<p>Subsection (o) of Section 2209 of the Homeland Security Act, as amended, 6 U.S.C. sec. 659(o).</p>
</xhtmlContent></subsection>
<subsection type="purpose"><xhtmlContent>
<p>The purpose of this system is to maintain records for the purpose of identifying and notifying entities at risk of security vulnerabilities relating to critical infrastructure on covered devices and systems. The authority is available only in circumstances where CISA knows of a specific cybersecurity risk to a covered device or system but is unable to determine the owner or operator of the covered device or system. The information sought by subpoena is limited to only basic categories of subscriber information.</p>
</xhtmlContent></subsection>
<subsection type="categoriesOfIndividuals"><xhtmlContent>
</xhtmlContent></subsection>
<subsection type="categoriesOfRecords"><xhtmlContent>
<p>Categories of records in this system include the following information obtained through subpoenas:</p>
•	<p>•Name;</p>
•	<p>•Address;</p>
•	<p>•Length of service (including start date) and types of service utilized; and</p>
•	<p>•Telephone or instrument number or other subscriber number or identity.</p>
<p>In addition, the system will also include the following categories of records:</p>
•	<p>•IP address;</p>
•	<p>•Individual’s position/title or organizational affiliations; and</p>
•	<p>•Identifier or ticket number created by CISA to retrieve information.</p>
</xhtmlContent></subsection>
<subsection type="recordSourceCategories"><xhtmlContent>
</xhtmlContent></subsection>
<subsection type="routineUsesOfRecords"><xhtmlContent>
<p>In accordance with subsection (o) of Section 2209 of the Homeland Security Act, as amended, (6 U.S.C. sec. 659(o)), the Agency may not disseminate nonpublic information obtained through a subpoena that identifies the party that is subject to such subpoena or the entity at risk identified by information obtained, except that the Agency may share the nonpublic information with the Department of Justice for the purpose of enforcing such subpoena in non-compliance circumstances, and may share with a federal agency the nonpublic information of the entity at risk if the requirements of 6 U.S.C. sec. 659(o)(7)(A) are met so long it is used by that federal agency for a cybersecurity purpose, as defined in 6 U.S.C. sec. 1501, in accordance with 6 U.S.C. sec. 659(o)(12).</p>
</xhtmlContent></subsection>
<subsection type="policiesAndPractices"><xhtmlContent>
<p>Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a locked door.</p>
</xhtmlContent></subsection>
<subsection type="retrievability"><xhtmlContent>
<p>CISA will retrieve records by CISA-created ticket number associated with a covered device or system connected to the internet identified as having a security vulnerability. Records may also be retrieved by IP address or phone number.</p>
</xhtmlContent></subsection>
<subsection type="retentionAndDisposal"><xhtmlContent>
<p>Records that are stored in an individual’s file will be purged according to the retention and disposition guidelines under 6 U.S.C. sec. 659(o)(7)(C)(ii), which requires destruction of any personally identifiable information not later than six (6) months after the date on which the Agency receives information obtained through subpoena, unless otherwise agreed to by the individual identified by the subpoena respondent. CISA is developing a records retention schedule for submission and approval by the National Archives Records Administration.</p>
</xhtmlContent></subsection>
<subsection type="safeguards"><xhtmlContent><p> CISA safeguards records in this system according to applicable rules and policies, including all applicable CISA automated systems security and access policies. CISA has imposed strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those CISA officials who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions.</p></xhtmlContent></subsection>
<subsection type="recordAccessProcedures"><xhtmlContent>
<p>Individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the DHS Chief Privacy Officer or the appropriate Headquarters or component’s FOIA Officer whose contact information can be found at https://www.dhs.gov/freedom-information-act-foia under "Contact Information." If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the DHS Chief Privacy Officer and Chief Freedom of Information Act Officer, U.S. Department of Homeland Security, Washington, D.C. 20528-0655. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act.</p>
<p>When an individual is seeking records about himself or herself from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR part 5. The individual must first verify his/her identity, meaning that the individual must provide his/her full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. sec. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. In addition, the individual should:</p>
•	<p>•Explain why he or she believes the Department would have information being requested;</p>
•	<p>•Identify which component(s) of the Department he or she believes may have the information;</p>
•	<p>•Specify when the individual believes the records would have been created; and</p>
•	<p>•Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records.</p>
<p>If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester.</p>
<p>Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations.</p>
</xhtmlContent></subsection>
<subsection type="contestingRecordProcedures"><xhtmlContent>
<p>For records covered by the Privacy Act, individuals may make a request for amendment or correction of a record of the Department about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record.</p>
</xhtmlContent></subsection>
<subsection type="notificationProcedure"><xhtmlContent>
<p>See "Record Access Procedures" above.</p>
</xhtmlContent></subsection>
<subsection type="exemptionsClaimed"><xhtmlContent>
<p>None.</p></xhtmlContent></subsection>
<subsection type="history"><xhtmlContent>
<p>None.</p>
</xhtmlContent></subsection></section>



    <appendix id="appa" letter="A(1)" toc="yes">
<title> Addresses for FEMA Regional Offices </title>
<xhtmlContent>
<p>Region I--Regional Director, FEMA, 99 High Street, 6th Floor, Boston, MA 02110; 
</p><p>Region II--Regional Director, FEMA, 26 Federal Plaza, New York, NY 10278-0002; 
</p><p>Region III--Regional Director, FEMA, One Independence Mall, 615 Chestnut Street, Philadelphia, PA 19106-4404; 
</p><p>Region IV--Regional Director, FEMA, 3003 Chamblee-Tucker Road, Atlanta, GA 30341; 
</p><p>Region V--Regional Director, FEMA, 536 S. Clark Street, Chicago, IL 60605; 
</p><p>Region VI--Regional Director, FEMA, Federal Center, 800 North Loop 288 Denton, TX 76209; 
</p><p>Region VII--Regional Director, FEMA, 2323 Grand Boulevard, Kansas City, MO 64108-2670; 
</p><p>Region VIII--Regional Director, FEMA, Denver Federal Center, Building 710, Box 25267, Denver, CO 80225-0267; 
</p><p>Region IX--Regional Director, FEMA, 1112 Broadway St. Oakland, CA 94607; 
</p><p>Region X--Regional Director, FEMA, Federal Regional Center, 130 228th Street, SW., Bothell, WA 98021-9796. 

</p></xhtmlContent></appendix>

<appendix id="appa" toc="yes">
<title>Addresses for FEMA Regional Offices </title>
<xhtmlContent>
<p>Region I--Regional Director, Federal Emergency Management Agency, room 442, J.W. McCormack Post Office and Courthouse Building, Boston, MA 02109-4595; 
</p><p>Region II--Regional Director, Federal Emergency Management Agency, 26 Federal Plaza, room 1338, New York, NY 10278-0002;
</p><p>Region III--Regional Director, Federal Emergency Management Agency, Liberty Square Building (Second Floor), 105 South Seventh Street, Philadelphia, PA 19106-3316; 
</p><p>Region IV--Regional Director, Federal Emergency Management Agency, 1371 Peachtree Street, NE., suite 700, Atlanta, GA 30309-3108; 
</p><p>Region V--Regional Director, Federal Emergency Management Agency, 175 West Jackson Blvd., 4th Floor, Chicago, IL 60604-2698; 
</p><p>Region VI--Regional Director, Federal Emergency Management Agency, Federal Regional Center, 800 North Loop 288, Denton, TX 76201-3698; 
</p><p>Region VII--Regional Director, Federal Emergency Management Agency, 2323 Grand Boulevard, room 900, Kansas City, MO 64108-2670;
</p><p>Region VIII--Regional Director, Federal Emergency Management Agency, Denver Federal Center, Building 710, Box 25267, Denver, CO 80225-0267; 
</p><p>Region IX--Regional Director, Federal Emergency Management Agency, Building 105, Presidio of San Francisco, CA 94129-1250; 
</p><p>Region X--Regional Director, Federal Emergency Management Agency, Federal Regional Center, 130 228th Street SW., Bothell, WA 98021-9796. </p></xhtmlContent></appendix>

 
    <regulations id="reg1" toc="yes">
<regulationsTitle number="6">
<heading> Domestic Security </heading>
<regulationsChapter number="I">
<heading> Department of Homeland Security </heading>
<regulationsPart number="5">
<heading> DISCLOSURE OF RECORDS AND INFORMATION </heading>
<xhtmlContent>
<p>Subpart B – Privacy Act</p>
<p>Sec.5.20 General provisions.</p>
            <p>5.21 Requests for access to records.</p>
            <p>5.22 Responsibility for responding to requests for access to records.</p>
            <p>5.23 Responses to requests for access to records.</p>
            <p>5.24 Classified information.</p>
            <p>5.25 Administrative appeals for access requests.</p>
            <p>5.26 Requests for amendment or correction of records. 5.27 Requests for an accounting of record disclosures.</p>
            <p>5.28 Preservation of records.</p>
            <p>5.29 Fees.</p>
            <p>5.30 Notice of court-ordered and emergency disclosures.</p>
            <p>5.31 Security of systems of records.</p>
            <p>5.32 Contracts for the operation of systems of records.</p>
            <p>5.33 Use and collection of Social Security numbers.</p>
            <p>5.34 Standards of conduct for administration of the Privacy Act.</p>
            <p>5.35 Sanctions and penalties.</p>
            <p>5.36 Other rights and services.</p>

            <p><b>Appendix A to Part 5--FOIA/Privacy Act Offices of the Department of Homeland Security 
</b></p>
<p><b>Appendix C to Part 5--DHS Systems of Records Exempt From the Privacy Act
</b></p>
<p><b>Authority:</b> 5 U.S.C. 552; 5 U.S.C. 552a; 5 U.S.C. 301; 6 U.S.C. 101 et seq.; E.O. 13392, 70 FR 75373, 3 CFR, 2005 Comp., p. 216.</p>
<p>Subpart A also issued under 5 U.S.C. 552. Subpart B also issued under 5 U.S.C. 552a.</p>

<p><b>Source:</b> 68 FR 4056, Jan. 27, 2003, unless otherwise noted.</p>
<p><b>Subpart B--Privacy Act 

</b></p>
<p><b>&amp;#167; 5.20
 General provisions. 
</b></p>
    <p>(a) Purpose and scope. (1) This subpart contains the rules that the Department of Homeland Security (Department or DHS) follows in processing records under the Privacy Act of 1974 (Privacy Act) (5 U.S.C. 552a) and under the Judicial Redress Act of 2015 (JRA) (5 U.S.C. 552a note).</p>
    <p>(2) The rules in this subpart should be read in conjunction with the text of the Privacy Act and the JRA, 5 U.S.C. 552a and 5 U.S.C. 552a note, respectively (which provide additional information abo ut records maintained on individuals and covered persons), and JRA designations issued in the Federal Register. The rules in this subpart apply to all records in systems of records maintained by the Department. These rules also apply to all records containing Social Security Numbers regardless of whether such records are covered by an applicable system of records maintained by the Department. They describe the procedures by which individuals may request access to records about themselves, request amendment or correction of those records, and request an accounting of disclosures by Department personnel and contractors. In addition, the Department processes all Privacy Act and JRA requests for access to records under the Freedom of Information Act (FOIA) (5 U.S.C. 552), following the rules contained in subpart A of this part, which gives requesters the benefit of both statutes.</p>
    <p>(3) The provisions established by this subpart apply to all Department Components, as defined in paragraph (b)(1) of this section.</p>
    <p>(4) DHS has a decentralized system for processing requests, with each component handling requests for its records.</p>
    <p>(b) Definitions. As used in this subpart:</p>
    <p>(1) Component means the office that processes Privacy Act and JRA requests for each separate organizational entity within DHS that reports directly to the Office of the Secretary.</p>
    <p>(2) Request for access to a record means a request made under Privacy Act subsection (d)(1).</p>
    <p>(3) Request for amendment or correction of a record means a request made under Privacy Act subsection (d)(2).</p>
    <p>(4) Request for an accounting means a request made under Privacy Act subsection (c)(3).</p>
    <p>(5) Requester means an individual who makes a request for access, a request for amendment or correction, or a request for an accounting under the Privacy Act.</p>
    <p>(6) Individual means, as defined by the Privacy Act, 5 U.S.C. 552a(a)(2), a citizen of the United States or an alien lawfully admitted for permanent residence. Also, an individual, for purposes of this subpart, but limited to the exclusive rights and civil remedies provided in the JRA, includes covered persons, as defined by the JRA, as a natural person (other than an individual) who is a citizen of a covered country, as designated by the Attorney General, with the concurrence of the Secretary of State, the Secretary of the Treasury, and the Secretary of Homeland Security.</p>
    <p>(7) Record has the same meaning as contained in the Privacy Act, 5 U.S.C. 552a(a)(4), except that in cases covered by the JRA, the term "record" has the same meaning as "covered record" in the JRA, 5 U.S.C. 552a note.</p>
    <p>(c) Authority to request records for a law enforcement purpose. The head of a component or designee thereof is authorized to make written requests under subsection 552a(b)(7) of the Privacy Act for records maintained by other agencies that are necessary to carry out an authorized law enforcement activity.</p>
    <p>(d) Notice on Departmental use of (b)(1) exception. As a general matter, when applying the Privacy Act (b)(1) exception for authorized disclosures within an agency on a need to know basis, the Department will consider itself a single entity, meaning that information may be disclosed between components of the Department under the (b)(1) exception.</p>
<p><b>&amp;#167; 5.21
 Requests for access to records. 
</b></p>
    <p>(a) How made and addressed. (1) DHS has a decentralized system for responding to Privacy Act and JRA requests, with each component designating an office to process records from that component.</p>
    <p>(2) An individual may make a request for access to a Department of Homeland Security record about that individual covered by a DHS-wide or component system of records notice (SORN) by writing directly to the Department component that maintains the record at the address listed in appendix A to this part or via the internet at https://www.dhs.gov/foia. A description of all DHS-wide and component SORNs may be found here: https://www.dhs.gov/system-records-notices-sorns.</p>
    <p>(3) In most cases, a component’s central FOIA office, as indicated in appendix A to this part, is the place to send a Privacy Act request. For records held by a field office of U.S. Customs and Border Protection, the U.S. Coast Guard, or other Department components with field offices other than the U.S. Secret Service and Transportation Security Administration, the requester must write directly to that U.S. Customs and Border Protection, Coast Guard, or other field office address, which can be found by calling the component's central FOIA office. Requests for U.S. Secret Service records should be sent only to the U.S. Secret Service central FOIA office, and requests for Transportation Security Administration records should be sent only to the Transportation Security Administration central FOIA office.</p>
    <p>(4) Requests for records held by the Cybersecurity and Infrastructure Security Agency (CISA) should be sent to the DHS Privacy Office.</p>
    <p>(5) DHS’s FOIA Website refers the reader to descriptions of the functions of each component and provides other information that is helpful in determining where to make a request. Each component’s FOIA office and any additional requirements for submitting a request to a given component are listed in appendix A to this part. These references can all be used by requesters to determine where to send their requests within DHS.</p>
    <p>(6) An individual may send a request to the Privacy Office via the internet at https://www.dhs.gov/foia for any of the Headquarters Offices of the Department of Homeland Security listed Appendix A to Subpart 5, or https://www.foia.gov/. Upon request, DHS FOIA public liaisons may facilitate, in limited circumstances (e.g., incarceration), an alternative method to submit requests for requesters who are unable to submit electronic requests. Please direct such requests to the liaison of the Office or DHS Component you wish to seek records from, which can be found listed in Appendix A to Subpart 5 or here: https://www.dhs.gov/foia-contact-information. In addition, if a requester does not know which DHS component may maintain responsive records to a request, the requester may explicitly ask for assistance from the DHS Privacy Office with identifying the proper component that most likely maintains any potential responsive records citing this section of the regulations. Upon a request for assistance and based on information provided in the FOIA request and by the requester, the Privacy Office will forward the request to the DHS component(s) that it determines to be most likely, as of the date of the request for information, to maintain the records that are sought. The Privacy Office will notify the requester that it is forwarding the request, including identifying the component(s) where the request has been sent, provide the FOIA Public Liaison contact information for the respective component(s), and provide administrative appeal rights in the response. If the requester does not agree with the Privacy Office's determination regarding which components would likely have records responsive to the request, the requester must submit a timely appeal of the Privacy Office's determination. For the quickest possible handling, the requester should mark the request letter "Privacy Act Request" or "Judicial Redress Act Request."</p>
    <p>(b) Government-wide SORNs. A government-wide system of records is a system of records where one agency has regulatory authority over records in the custody of multiple agencies, and the agency with regulatory authority publishes a SORN that applies to all of the records regardless of their custodial location. If records are sought that are covered by a Government-wide SORN and requested of DHS, DHS will consult or refer such request, only as applicable and necessary, to the corresponding agency having authority over such records for further processing. DHS will acknowledge to the requester that it is referring the request to another agency or consulting with that agency when processing the request.</p>
    <p>(c) Description of records sought. A requester must describe the records sought in sufficient detail to enable Department personnel to locate the system of records covering them with a reasonable amount of effort. Whenever possible, the request should describe the records sought, the time periods in which the requester believes they were compiled, the office or location in which the requester believes the records are kept, and the name or identifying number of each system of records in which the requester believes they are kept. The Department publishes notices in the Federal Register that describe its components' systems of records. These notices can be found on the Department's website here: https://www.dhs.gov/system-records-notices-sorns. If a request does not adequately describe the records sought, DHS may at its discretion either seek additional information from the requester or administratively close the request.  Requests for clarification or more information must be made in writing via electronic mail. To be considered timely, responses to requests for additional information must be received by electronic mail within 30 working days of the electronic mail request for additional information. If the requester does not respond timely, the request may be administratively closed at DHS's discretion. This administrative closure does not prejudice the requester's ability to submit a new request for further consideration with additional information.</p>
    <p>(d) Agreement to pay fees. DHS and components shall charge for processing requests under the Privacy Act or JRA. DHS and components will ordinarily use the most efficient and least expensive method for processing requested records. DHS may contact a requester for additional information in order to resolve any fee issues that arise under this section. DHS ordinarily will collect all applicable fees before sending copies of records to a requester. If one makes a Privacy Act or JRA request for access to records, it will be considered a firm commitment to pay all applicable fees charged under § 5.29, up to $25.00. The component responsible for responding to a request ordinarily will confirm this agreement in an acknowledgement letter. When making a request, an individual may specify a willingness to pay a greater or lesser amount. Requesters must pay fees by check or money order made payable to the Treasury of the United States.</p>
    <p>(e) Verification of identity. When an individual makes a request for access to their own records, their identity must be verified. The individual must provide their full name, current address, date and place of birth, and country of citizenship or residency. The individual must sign the request and provide a signature that must either be notarized or submitted by the requester under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury, as a substitute for notarization. An individual may obtain more information about this process at http://www.dhs.gov/foia or 1-866-431-0486. In order to help the identification and location of requested records, an individual may also voluntarily include other identifying information that are relevant to the request (e.g., passport number, Alien Registration Number (A-Number)).</p>
    <p>(f) Verification of guardianship. When making a request as the parent or guardian of a minor or as the guardian of someone determined by a court of competent jurisdiction to be incompetent due to physical or mental incapacity or age, for access to records about that individual, the individual submitting a request must establish:</p>
    <p>(1) The identity of the individual who is the subject of the record, by stating the name, current address, date and place of birth, and country of citizenship or residency of the individual;</p>
    <p>(2) The submitting individual’s own identity, in the same manner as required in paragraph (e) of this section;</p>
    <p>(3) That the submitting individual is the parent or guardian of the subject of the record, which may be proven by providing a copy of the subject of the record’s birth certificate showing parentage or by providing a court order establishing guardianship; and</p>
    <p>(4) That the submitting individual is acting on behalf of that individual that is the subject of the record.</p>
    <p>(g) Verification in the case of third-party information requests. Outside of requests made pursuant to paragraph (f) of this section, if a third party requests records about a subject individual, the third party requester must provide verification of the subject individual’s identity in the manner provided in paragraph (e) of this section along with the subject individual’s written consent authorizing disclosure of the records to the third party requester, or by submitting proof by the requester that the subject individual is deceased (e.g., a copy of a death certificate or an obituary). As an exercise of its administrative discretion, each component can require a third-party requester to supply additional information to verify that the subject individual has consented to disclosure or is deceased.</p>


    <p><b>&amp;#167; 5.22
 Responsibility for responding to requests for access to records. 
</b></p>
    <p>(a) In general. Except as stated in paragraphs (c), (d), and (e) of this section, the component that first receives a request for access to a record, and has possession of that record, is the component responsible for responding to the request. In determining which records are responsive to a request, a component ordinarily will include only those records in its possession as of the date the component begins its search for them. If any other date is used, the component will inform the requester of that date.</p>
    <p>(b) Authority to grant or deny requests. The head of a component, or the component head’s designee, is authorized to grant or deny any request for access or amendment to a record of that component.</p>
    <p>(c) Misdirected requests, consultations, coordination, and referrals. All misdirected requests and consultations, coordination, and referrals for requests of records subject to the Privacy Act or JRA will follow the same process and procedures as described in § 5.4(c) and § 5.4(d), including how to handle those requests that pertain to law enforcement information, as specified in § 5.4(d)(2), and classified information, as specified in § 5.4(d)(2) and (e). Further, whenever a request is made for access to a record containing information that has been classified by or may be appropriate for classification by another component or agency under any relevant Executive order concerning the classification of records, the receiving component will refer to § 5.24 for processing.</p>
    <p>(d) Release of medical records. (1) Generally, an individual has the right to access their medical records maintained by the Department. Special procedures for requests from an individual requesting medical records that include psychological records for which direct release may cause harm to the individual requesting access are set forth in paragraph (d)(2) of this section.</p>
    <p>(2) If a request is made for access to medical records that include psychological records, and a component medical practitioner or qualified designee determines that direct release is likely to adversely affect the individual who is requesting access, the component will request the individual to provide the name and contact information of a representative who is capable of ameliorating the potential adverse effect. The representative may be a physician or other health professional who will be willing to review the record and inform the requester of its contents. Once provided, the component FOIA office or designated component official will send the medical records to the individual’s designated representative.  The component will inform the subject individual in writing (either via U.S. mail or electronic mail whenever possible) that the record has been sent to that individual’s chosen representative. The representative does not have the discretion to withhold any part of the individual’s record. If the subject individual does not comply with the procedural requirement to designate a representative, the component may decline to release the requested information.</p>
    <p>(3) Paragraph (d)(2) of this section does not apply to Coast Guard records held by another agency.</p>
    <p>(e) Notice of referral. Whenever a component refers all or any part of the responsibility for responding to a request to another component or agency, it ordinarily will notify the requester of the referral and inform the requester of the name of each component or agency to which the request has been referred and of the part of the request that has been referred.</p>
    <p>(f) Timing of responses to consultations and referrals. All consultations and referrals received by DHS will be handled according to the date the Privacy Act or JRA access request was initially received by the first component or agency, not any later date.</p>
    <p>(g) Agreements regarding consultations and referrals. Components may establish agreements with other components or agencies to eliminate the need for consultations or referrals with respect to types of records.</p>

    <p><b>&amp;#167; 5.23
 Responses to requests for access to records. 
</b></p>
    <p>(a) In general. Components should, to the extent practicable, communicate with requesters having access to the Internet using electronic means, such as email or web portal.</p>
    <p>(b) Acknowledgements of requests. Consistent with the procedures in subpart A of this part, a component will acknowledge the request and assign it an individualized tracking number if it will take longer than ten (10) working days to process. Components will include in the acknowledgement letter a brief description of the records sought to allow requesters to more easily keep track of their requests. Further, in the acknowledgment letter, the component will confirm the requester’s agreement to pay fees under §§ 5.21(d) and 5.29.</p>
    <p>(c) Grants of requests for access. Consistent with the procedures in subpart A to this part, a component will have twenty (20) working days from when a request is received to determine whether to grant or deny the request unless there are unusual or exceptional circumstances as defined by the FOIA and set out in § 5.5(c). Once a component decides to grant a request for access to record(s) in whole or in part, it will notify the requester in writing. The component will inform the requester in the notice of any fee charged under §§ 5.21(d) and 5.29 and will disclose records to the requester promptly upon payment of any applicable fee. The component will inform the requester of the availability of its FOIA Liaison to offer assistance.</p>
    <p>(d) Adverse determinations of requests for access. A component making an adverse determination denying a request for access in any respect will notify the requester of that determination in writing. Adverse determinations, or denials of requests, include decisions that: the requested record is exempt, in whole or in part; the requested record does not exist or cannot be located; or the record requested is not subject to the Privacy Act or JRA. Further, adverse determinations also include disputes regarding fees, or denials of a request for expedited processing. The denial letter will be signed by the head of the component, or the component head’s designee, and will include:</p>
    <p>(1) The name and title or position of the person responsible for the denial;</p>
    <p>(2) A brief statement of the reason(s) for the denial, including any Privacy Act exemption(s) applied by the component in denying the request; and</p>
    <p>(3) A statement that the denial may be appealed under § 5.25(a) and a description of the requirements of § 5.25(a).</p>
    <p>(e) JRA access requests. For purposes of responding to a JRA access request, a covered person is subject to the same limitations, including exemptions and exceptions, as an individual is subject to under section 552a of title 5, United States Code, when pursuing access to records. The implementing regulations and reasons provided for exemptions can be found in appendix C to this part.</p>

    <p><b>&amp;#167; 5.24
 Classified information. 
</b></p>
    <p>On receipt of any request involving classified information, the component will determine whether information is currently and properly classified and take appropriate action to ensure compliance with 6 CFR part 7. Whenever a request is made for access to a record that is covered by a system of records containing information that has been classified by or may be appropriate for classification by another component or agency under any applicable executive order, the receiving component will consult the component or agency that classified the information. Whenever a record contains information that has been derivatively classified by a component or agency because it contains information classified by another component or agency, the component will consult the component or agency that classified the underlying information. Information determined to no longer require classification will not be withheld from a requester based on exemption (k)(1) of the Privacy Act. On receipt of any appeal involving classified information, the DHS Office of the General Counsel, or its designee, shall take appropriate action to ensure compliance with 6 CFR part 7.</p>
<p><b>&amp;#167; 5.25
Administrative appeals for access requests.</b></p>
<p>(a) Requirements for filing an appeal. An individual may appeal an adverse determination denying the individual’s request for access in any respect to the appropriate Appeals Officer. For the address of the appropriate component Appeals Officer, an individual may contact the applicable component FOIA Liaison using the information in appendix A to this part, visit www.dhs.gov/foia, or call 1-866-431-0486. An appeal must be in writing, and to be considered timely it must be postmarked or, in the case of electronic submissions, transmitted to the Appeals Officer within 90 working days, consistent with the procedures in subpart A to this part, after the date of the component’s response. An electronically filed appeal will be considered timely if transmitted to the Appeals Officer by 11:59:59 p.m. EST or EDT on the 90th working day. The appeal should clearly identify the component determination (including the assigned request number if the requester knows it) that is being appealed and should contain the reasons the requester believes the determination was erroneous. For the quickest possible handling, an individual should mark both the appeal letter and the envelope "Privacy Act Appeal" or "Judicial Redress Act Appeal."</p>
<p>(b) Adjudication of appeals. The DHS Office of the General Counsel, or its designee, (e.g., Component Appeals Officer) is the authorized appeals authority for DHS. On receipt of any appeal involving classified information, the Appeals Officer will consult with the Chief Security Officer and take appropriate action to ensure compliance with 6 CFR part 7. If the appeal becomes the subject of a lawsuit, the Appeals Officer is not required to act further on the appeal.</p>
<p>(c) Appeal decisions. Consistent with the procedures in subpart A to this part, the decision on an appeal will be made in writing generally twenty (20) working days after receipt. However, consistent with the procedures in subpart A to this part, the time limit for responding to an appeal may be extended provided the circumstances set forth in 5 U.S.C. 552(a)(6)(B)(i) are met. A decision affirming an adverse determination in whole or in part will include a brief statement of the reason(s) for the affirmance, including any Privacy Act exemption applied, and will inform the requester of the Privacy Act provisions for court review of the decision. If the adverse determination is reversed or modified on appeal in whole or in part, the requester will be notified in a written decision and the request will be reprocessed in accordance with that appeal decision. An adverse determination by the DHS Office of the General Counsel or its designee or Component Appeals Officer will be the final action of the Department.</p>
<p>(d) Appeal necessary before seeking court review. If an individual wishes to seek review by a court of any adverse determination or denial of a request by DHS within the allotted 20 working days to respond unless there are unusual or exceptional circumstances, that individual must first appeal it under this subpart. An appeal will not be acted on if the request becomes a matter of litigation.</p>

<p><b>&amp;#167; 5.26
 Requests for amendment or correction of records. 
</b></p>
    <p>(a) How made and addressed. Unless the record is not subject to amendment or correction as stated in paragraph (f) of this section, an individual may make a request for amendment or correction of a record of the Department about that individual by writing directly to the component that maintains the record, following the procedures in § 5.21. The request should identify each record in question, state the amendment or correction requested, and state the reason why the requester believes that the record is not accurate, relevant, timely, or complete. The requester may submit any documentation that the requester thinks would support the request. If the individual believes that the same record is in more than one system of records, the requester should state that and address the request to each component that maintains a system of records containing the record.</p>
    <p>(b) Component responses. Within ten working days of receiving a request for amendment or correction of records, a component will send the requester a written acknowledgment of its receipt of the request, and it will promptly notify the requester whether the request is granted or denied. If the component grants the request in whole or in part, it will describe the amendment or correction made and will advise the requester of the right to obtain a copy of the corrected or amended record, in disclosable form. If the component denies the request in whole or in part, it will send the requester a letter signed by the head of the component, or the component head’s designee, that will state:</p>
    <p>(1) The reason(s) for the denial; and</p>
    <p>(2) The procedure for appeal of the denial under paragraph (c) of this section, including the name and business address of the official who will act on the appeal.</p>
    <p>(c) Appeals. Within 90 working days after the date of the component’s response, the requester may appeal a denial of a request for amendment or correction to the Component Appeals Officer or the DHS Office of the General Counsel or its designee. The Component Appeals Officer or the DHS Office of the General Counsel or its designee must complete its review and make a final determination on the requester’s appeal no later than 30 days (excluding Saturdays, Sundays, and legal public holidays) from the date on which the individual requests such review unless good cause is shown, and communicated to the individual, for which the 30-day period may be extended for an additional 30 days. If the appeal is denied, the requester will be advised of the right to file a Statement of Disagreement as described in paragraph (d) of this section and of the right under the Privacy Act, 5 U.S.C. 552a(d)(3), for court review of the decision. If an individual wishes to seek review by a court of any adverse determination or denial of a request, that individual must first appeal it under this subpart. For purposes of responding to a JRA amendment request, a covered person is subject to the same limitations, including exemptions and exceptions, as an individual is subject to under section 552a of title 5, United States Code, when pursuing amendment to records. The implementing regulations and reasons provided for exemptions can be found in appendix C to this part, titled DHS Systems of Records Exempt from the Privacy Act.</p>
    <p>(d) Statements of Disagreement. If an individual’s appeal under this section is denied in whole or in part, that individual has the right to file a Statement of Disagreement, unless exempt, that states the individual’s reason(s) for disagreeing with the Department's denial of the request for amendment or correction. Statements of Disagreement must be concise, must clearly identify each part of any record that is disputed, and should be no longer than one typed page for each fact disputed. The individual’s Statement of Disagreement must be sent to the component involved, which will place it in the system of records in which the disputed record is maintained and will mark the disputed record to indicate that a Statement of Disagreement has been filed and where in the system of records it may be found.</p>
    <p>(e) Notification of amendment/correction or disagreement. Within 30 working days of the amendment or correction of a record, the component that maintains the record will, unless exempt, notify all persons, organizations, or agencies to which it previously disclosed the record, if an accounting of that disclosure was made or should have been made, that the record has been amended or corrected. If an individual has filed a Statement of Disagreement, the component will append a copy of it to the disputed record whenever the record is disclosed and may also append a concise statement of its reason(s) for denying the request to amend or correct the record.</p>
    <p>(f) Records not subject to amendment or correction. The following records are not subject to amendment or correction:</p>
    <p>(1) Transcripts of testimony given under oath or written statements made under oath;</p>
    <p>(2) Transcripts of grand jury proceedings, judicial proceedings, or quasi-judicial proceedings, which are the official record of those proceedings;</p>
    <p>(3) Presentence records that originated with the courts; and</p>
    <p>(4) Records in systems of records that have been exempted from amendment and correction under the Privacy Act (5 U.S.C. 552a(j) or (k)) pursuant to a final rule published in the Federal Register.</p>

    <p><b>&amp;#167; 5.27
 Requests for an accounting of record disclosures. 
</b></p>
    <p>(a) How made and addressed. Except where accountings of disclosures are not required to be kept (as stated in paragraph (b)(1) of this section), an individual may make a request for an accounting of any disclosure that has been made by the Department to another person, organization, or agency of any record about the requester. This accounting contains the date, nature, and purpose of each disclosure, as well as the name and address of the person, organization, or agency to which the disclosure was made. A request for an accounting should identify each record in question and should be made by writing directly to the Department component that maintains the record, following the procedures in § 5.21.</p>
    <p>(b) Where accountings are not required. Components are not required to provide accountings to the requester where they relate to:</p>
    <p>(1) Disclosures for which accountings are, by statute (5 U.S.C. 552a(c)(1)), not required to be kept, such as disclosures that are made to officers and employees within the agency and disclosures that are required to be made under the FOIA, or for records covered by the JRA;</p>
    <p>(2) Disclosures made to law enforcement agencies for authorized law enforcement activities in response to written requests from those law enforcement agencies specifying the law enforcement activities for which the disclosures are sought; or</p>
    <p>(3) Disclosures made from systems of records that have been exempted from accounting requirements by a rulemaking pursuant to 5 U.S.C. 552a(j) or (k).</p>
    <p>(c) Appeals. A requester may appeal a denial of a request for an accounting to the Component Appeals Officer or the DHS Office of the General Counsel or its designee in the same manner as a denial of a request for access to records (see § 5.25) and the same procedures will be followed.</p>

    <p><b>&amp;#167; 5.28
 Preservation of records. 
</b></p>
    <p>Each component will preserve all correspondence pertaining to the requests that it receives under this subpart, as well as copies of all requested records, until disposition or destruction is authorized by title 44 of the United States Code or the National Archives and Records Administration’s General Records Schedule 4.2. Records will not be disposed of while they are the subject of a pending request, appeal, lawsuit, or litigation or audit hold under the Act.</p>
<p><b>&amp;#167; 5.29
 Fees. 
</b></p>
    <p>(a) Fees for access requests granted in full under the Privacy Act are limited to duplication fees, which are chargeable to the same extent that fees are chargeable under subpart A of this part. An access request not granted in full under the Privacy Act will be processed under the FOIA and will be subject to all fees chargeable under the applicable FOIA regulations. Fees are not charged for processing amendment and accounting requests.</p>
    <p>(b) DHS will not process a request under the Privacy Act or JRA from persons with an unpaid fee from any previous Privacy Act or JRA request to any Federal agency until that outstanding fee has been paid in full to the agency.</p>

    <p><b>&amp;#167; 5.30
 Notice of court-ordered and emergency disclosures. 
</b></p>
    <p>(a) Court-ordered disclosures. When the component discloses an individual’s information covered by a system of records pursuant to an order from a court of competent jurisdiction, and the order is a matter of public record, the Privacy Act requires the component to send a notice of the disclosure to the last known address of the person whose record was disclosed. Notice will be given within a reasonable time after the component’s receipt of the order, except that in a case in which the order is not a matter of public record, the notice will be given only after the order becomes public. This notice will be mailed to the individual’s last known address and will contain a copy of the order and a description of the information disclosed. Notice will not be given if disclosure is made from a criminal law enforcement system of records that has been exempted from the notice requirement.</p>
    <p>(b) Court. For purposes of this section, a court is an institution of the judicial branch of the U.S. Federal Government consisting of one or more judges who seek to adjudicate disputes and administer justice. Entities not in the judicial branch of the Federal Government are not courts for purposes of this section.</p>
    <p>(c) If a request does not adequately describe the records sought, DHS may at its discretion either seek additional information from the requester, or administratively close the request.  Requests for clarification or more information will be made in writing electronically whenever possible (either via electronic mail or portal message) except when DHS requests to speak on the phone to discuss the request. If DHS communicates via a phone call, DHS will summarize the call in a follow up electronic mail or portal message.  If DHS corresponds only electronically via electronic mail or portal message, requesters must respond to requests for additional information also by electronic mail or portal message in the same medium as the DHS correspondence. In order to be considered timely, responses to requests for additional information must be received by electronic mail or portal message within 30 working days of the electronic mail or portal message request for additional information. If the requester does not respond to a request for additional information within 30 working days, the request may be administratively closed at DHS's discretion. This administrative closure does not prejudice the requester's ability to submit a new request for further consideration with additional information.  Upon request, DHS FOIA public liaisons may facilitate, in limited circumstances (e.g., incarceration), an alternative method to submit requests for requesters who are unable to submit electronic requests. Please direct such requests to the liaison of the Office or DHS Component you wish to seek records from, which can be found listed in Appendix A to Subpart 5 or found here: https://www.dhs.gov/foia-contact-information</p>
    <p>(1) It is issued under the authority of a Federal court;</p>
    <p>(2) (2) A requester may send their request to the Privacy Office, U.S. Department of Homeland Security, via the internet at https://www.dhs.gov/foia or for any of the Headquarters Offices of the Department of Homeland Security listed in Appendix A to Subpart 5, or https://www.foia.gov/. Upon request, DHS FOIA public liaisons may facilitate, in limited circumstances (e.g., incarceration), an alternative method to submit requests for requesters who are unable to submit electronic requests. Please direct such requests to the liaison of the Office or DHS Component you wish to seek records from, which can be found listed in Appendix A to Subpart 5 or found here: https://www.dhs.gov/foia-contact-information.  In addition, if a requester does not know which DHS component may maintain responsive records to a request, the requester may explicitly ask for assistance from the DHS Privacy Office with identifying the proper component that most likely maintains any potential responsive records. Upon a request for assistance and based on information provided in the FOIA request and by the requester, the Privacy Office will forward the request to the DHS component(s) that it determines to be most likely, as of the date of the request for information, to maintain the records that are sought. The Privacy Office will notify the requester that it is forwarding the request, including identifying the component(s) where the request has been sent, provide the FOIA Public Liaison contact information for the respective component(s), and provide administrative appeal rights in the response. If the requester does not agree with the Privacy Office's determination regarding which components would likely have records responsive to the request, the requester must submit a timely appeal of the Privacy Office's determination. Although these are not to be considered misdirected requests, the recipient DHS component shall be granted the same number of days to respond as permitted by 6 CFR 5.4(c) and 5.5(a).</p>
    <p>(3) It commands or permits DHS to disclose the Privacy Act protected information at issue; and</p>
    <p>(4) The court is a court of competent jurisdiction.</p>
    <p>(d) Court of competent jurisdiction. It is the view of DHS that under the Privacy Act the Federal Government has not waived sovereign immunity, which precludes state court jurisdiction over a Federal agency or official. Therefore, DHS will not honor state court orders as a basis for disclosure, unless DHS does so under its own discretion.</p>
    <p>(e) Conditions for disclosure under a court order of competent jurisdiction. The component may disclose information in compliance with an order of a court of competent jurisdiction if—</p>
    <p>(1) Another section of this part specifically allows such disclosure, or</p>
    <p>(2) DHS, the Secretary, or any officer or employee of DHS in their official capacity is properly a party in the proceeding, or</p>
    <p>(3) Disclosure of the information is necessary to ensure that an individual who is accused of criminal activity receives due process of law in a criminal proceeding under the jurisdiction of the judicial branch of the Federal Government.</p>
    <p>(f) In other circumstances. DHS may disclose information to a court of competent jurisdiction in circumstances other than those stated in paragraph (e) of this section. DHS will make its decision regarding disclosure by balancing the needs of a court while preserving the confidentiality of information. For example, DHS may disclose information under a court order that restricts the use and redisclosure of the information by the participants in the proceeding; DHS may offer the information for inspection by the court in camera and under seal; or DHS may arrange for the court to exclude information identifying individuals from that portion of the record of the proceedings that is available to the public.</p>
    <p>(g) Emergency disclosures. Upon disclosing a record pertaining to an individual made under compelling circumstances affecting the health or safety of an individual, the component will notify the individual to whom the record pertains of the disclosure. This notice will be mailed to the individual’s last known address and will state the nature of the information disclosed; the person, organization, or agency to which it was disclosed; the date of disclosure; and the compelling circumstances justifying the disclosure.</p>
    <p>(h) Other regulations on disclosure of information in litigation. See subpart C to this part for additional rules covering disclosure of information and records governed by this part and requested in connection with legal proceedings.</p>

    <p><b>&amp;#167; 5.31
 Security of systems of records. 
</b></p>
    <p>(a) In general. Each component will establish administrative and physical controls to prevent unauthorized access to its systems of records, to prevent unauthorized disclosure of records, and to prevent physical damage to or destruction of records. The stringency of these controls will correspond to the sensitivity of the records that the controls protect. At a minimum, each component’s administrative and physical controls will ensure that:</p>
    <p>(1) Records are protected from public view;</p>
    <p>(2) The area in which records are kept is supervised during business hours to prevent unauthorized persons from having access to them;</p>
    <p>(3) Records are inaccessible to unauthorized persons outside of business hours; and</p>
    <p>(4) Records are not disclosed to unauthorized persons or under unauthorized circumstances in either oral or written form.</p>
    <p>(b) Procedures required. Each component will have procedures that restrict access to records to only those individuals within the Department who must have access to those records to perform their duties and that prevent inadvertent disclosure of records.</p>

    <p><b>&amp;#167; 5.32
 Contracts for the operation of record systems. 
</b></p>
    <p>As required by 5 U.S.C. 552a(m), any approved contract for the operation of a system of records to accomplish an agency function will contain the standard contract requirements issued by the General Services Administration to ensure compliance with the requirements of the Privacy Act for that system. The contracting component will be responsible for ensuring that the contractor complies with these contract requirements.</p>
<p><b>&amp;#167; 5.33
 Use and collection of social security numbers. 
</b></p>
    <p>Each component will ensure that employees authorized to collect information are aware:</p>
    <p>(a) That individuals may not be denied any right, benefit, or privilege because of refusing to provide their Social Security numbers, unless the collection is authorized either by a statute or by a regulation issued prior to 1975; and</p>
    <p>(b) That individuals requested to provide their Social Security numbers must be informed of:</p>
    <p>(1) Whether providing Social Security numbers is mandatory or voluntary;</p>
    <p>(2) Any statutory or regulatory authority that authorizes the collection of Social Security numbers; and</p>
    <p>(3) The uses that will be made of the numbers.</p>
    <p>(c) Including Social Security numbers of an individual on any document sent by mail is not permitted unless the Secretary determines that the inclusion of the number on the document is necessary.</p>

    <p><b>&amp;#167; 5.34
 Standards of conduct for administration of the Privacy Act. 
</b></p>
    <p>Each component will inform its employees of the provisions of the Privacy Act, including the Act’s civil liability and criminal penalty provisions referenced in § 5.35. Unless otherwise permitted by law, the Department will:</p>
    <p>(a) Maintain only such information about an individual as is relevant and necessary to accomplish a purpose of the Component or the Department that is required to be accomplished by statute or by Executive order of the President;</p>
    <p>(b) Collect information about an individual directly from that individual whenever practicable and when the information may result in adverse determinations about an individual's rights, benefits, and privileges under federal programs;</p>
    <p>(c) Inform each individual from whom information is collected of:</p>
    <p>(1) The legal authority to collect the information and whether providing it is mandatory or voluntary;</p>
    <p>(2) The principal purpose for which the Department intends to use the information;</p>
    <p>(3) The routine uses the Department may make of the information; and</p>
    <p>(4) The effects on the individual, if any, of not providing the information;</p>
    <p>(d) Ensure that the component maintains no system of records without public notice and that it notifies appropriate Department officials of the existence or development of any system of records that is not the subject of a current or planned public notice;</p>
    <p>(e) Maintain all records that are used by the Department in making any determination about an individual with such accuracy, relevance, timeliness, and completeness as is reasonably necessary to ensure fairness to the individual in the determination;</p>
    <p>(f) Except as to disclosures made to an agency or made under the FOIA, make reasonable efforts, prior to disseminating any record about an individual, to ensure that the record is accurate, relevant, timely, and complete;</p>
    <p>(g) Maintain no record describing how an individual exercises their First Amendment rights, unless it is expressly authorized by statute or by the individual about whom the record is maintained, or is pertinent to and within the scope of an authorized law enforcement activity;</p>
    <p>(h) When required by the Act, maintain an accounting in the specified form of all disclosures of records by the Department to persons, organizations, or agencies;</p>
    <p>(i) Maintain and use records with care to prevent the unauthorized or inadvertent disclosure of a record to anyone; and</p>
    <p>(j) Disclose Privacy Act or JRA records only as permitted by 5 U.S.C. 552a(b).</p>

    <p><b>&amp;#167; 5.35
 Sanctions and penalties. 
</b></p>
    <p>Each component will inform its employees and contractors of the Privacy Act’s civil liability provisions (5 U.S.C. 552a(g)) and criminal penalty provisions (5 U.S.C. 552a(i)) as they apply to Privacy Act and JRA complaints.</p>
<p><b>&amp;#167; 5.36
 Other rights and services. 
</b></p>
    <p>Nothing in this subpart will be construed to entitle any person, as of right, to any service or to the disclosure of any record to which such person is not entitled under the Privacy Act or JRA.</p>

<p><b>Appendix A to Part 5--FOIA/Privacy Act Offices of the Department of Homeland Security 
</b></p>
    <p>I. For Headquarters Offices of the Department of Homeland Security, FOIA and Privacy Act (or JRA if applicable) requests should either be mailed to the Department’s Privacy Office, Mail Stop 0655, U.S. Department of Homeland Security, 2707 Martin Luther King Jr. Ave. SE, Washington D.C. 20528-0655, or submitted electronically via https://foiarequest.dhs.gov/.  For a listing of Headquarters Offices and contact information, please see https://www.dhs.gov/foia-contact-information. To help us respond to your request as quickly as possible, we strongly encourage you to submit your request electronically. Additional contact information for questions: Phone: 202-343-1743 or 866-431-0486, Fax: 202-343-4011, or Email: foia@hq.dhs.gov. The Public Liaison may also be contacted using this information.</p>
    <p>II. For the following components and offices of the Department of Homeland Security, FOIA and Privacy Act (or JRA if applicable) requests should be sent to the component’s FOIA Office, unless otherwise noted below. For each component, the Public Liaison may also be contacted using the information below. The components are:</p>
    <p>Cybersecurity and Infrastructure Security Agency (CISA)</p>
    <p>All requests should be either be mailed to the Department’s Privacy Office, Mail Stop 0655, U.S. Department of Homeland Security, 2707 Martin Luther King Jr. Ave. SE, Washington D.C. 20528-0655, or submitted electronically by way of instructions at https://www.dhs.gov/foia-contact-information. To help us respond to your request as quickly as possible, we strongly encourage you to submit your request electronically. Additional contact information for questions: Phone: 202-343-1743 or 866-431-0486, Fax: 202-343-4011, or Email: CISAFOIA@hq.dhs.gov.</p>
    <p>U.S. Customs and Border Protection (CBP)</p>
    <p>All requests should be mailed to U.S. Customs and Border Protection, Office of Privacy and Diversity Office, 90 K Street, NE, Mail Stop 1181, 9th Floor, Washington DC 20002 or submitted electronically by way of instructions at https://www.dhs.gov/foia-contact-information. To help us respond to your request as quickly as possible, we strongly encourage you to submit your request electronically. Additional contact information for questions:  Phone: 202-325-0150 or Email: cbpfoiapublicliaison@cbp.dhs.gov</p>
    <p>Federal Emergency Management Agency (FEMA)</p>
    <p>All requests should be mailed to FOIA Officer, 500 C Street, S.W., Room 840, Washington, D.C. 20472, or submitted electronically by way of instructions at https://www.dhs.gov/foia-contact-information. To help us respond to your request as quickly as possible, we strongly encourage you to submit your request electronically. Additional contact information for questions: Phone: 202-646-3323, Fax: 202-646-3347, or Email: fema-foia@fema.dhs.gov.</p>
    <p>Federal Law Enforcement Training Center (FLETC)</p>
    <p>All requests should be mailed to Freedom of Information Act Officer, Building #681, Suite B187, 1131 Chapel Crossing Road, Glico, GA 31524, or submitted electronically by way of instructions at https://www.dhs.gov/foia-contact-information. To help us respond to your request as quickly as possible, we strongly encourage you to submit your request electronically. Additional contact information for questions: Phone: 912-267-3103, Fax: 912-267-3113, or Email: fletc-foia@dhs.gov.</p>
    <p>Immigration and Customs Enforcement (ICE)</p>
    <p>All requests should be mailed to Freedom of Information Act Office, 500 12th Street, SW, Stop 5009, Washington, D.C. 20536-5009, or submitted electronically by way of instructions at https://www.dhs.gov/foia-contact-information. To help us respond to your request as quickly as possible, we strongly encourage you to submit your request electronically. Additional contact information for questions: Phone: 866-633-1182, Fax: 202-732-4265, or Email: ice-foia@ice.dhs.gov.</p>
    <p>Office of Inspector General</p>
    <p>All requests should be mailed to the OIG Office of Counsel, 245 Murray Lane SW, Mail Stop – 0305, Washington, D.C. 20528-0305, or submitted electronically by way of instructions at https://www.dhs.gov/foia-contact-information.  To help us respond to your request as quickly as possible, we strongly encourage you to submit your request electronically. Additional contact information for questions: Phone: 202-981-6100, or Email:  foia.oig@oig.dhs.gov.</p>
    <p>Transportation Security Administration (TSA)</p>
    <p>All requests should be mailed to Freedom of Information Act Branch, 6595 Springfield Center Drive, Springfield, VA 20598 – 6020, or submitted electronically by way of instructions at https://www.dhs.gov/foia-contact-information. To help us respond to your request as quickly as possible, we strongly encourage you to submit your request electronically. Additional contact information for questions: Phone: 1-866-FOIA-TSA or 571-227-2300, Fax: 571-227-1406, or Email: foia@tsa.dhs.gov.</p>
    <p>U.S. Citizenship and Immigration Services (USCIS)</p>
    <p>All requests should be mailed to National Records Center, FOIA/PA Office, P. O. Box 648010, Lee's Summit, MO. 64064-8010 or submitted electronically by way of instructions at https://www.dhs.gov/foia-contact-information. To help us respond to your request as quickly as possible, we strongly encourage you to submit your request electronically. Additional contact information for questions: Phone:1-800-375-5283, USCIS Contact Center, or Email: FOIAPAQuestions@uscis.dhs.gov.</p>
    <p>U.S. Coast Guard (USCG)</p>
    <p>All requests should be mailed to Commandant (CG-6P), 2703 Martin Luther King Jr. Ave., SE, Stop 7710, Washington, DC 20593-7710, or submitted electronically by way of instructions at https://www.dhs.gov/foia-contact-information. To help us respond to your request as quickly as possible, we strongly encourage you to submit your request electronically. Additional contact information for questions: Phone: 202-475-3522, Fax: 202-372-8413, or Email: efoia@uscg.mil.</p>
    <p>U.S. Secret Service (USSS)</p>
    <p>All requests should be mailed to Freedom of Information Act and Privacy Act Branch, 245 Murray Lane, SW Building T-5, Washington, D.C. 20223, or submitted electronically by way of instructions at https://www.dhs.gov/foia-contact-information.  To help us respond to your request as quickly as possible, we strongly encourage you to submit your request electronically. Additional contact information for questions: Phone: 202-406-6370, Fax: 202-406-5586, or Email: FOIA@usss.dhs.gov.</p>


    <p><b>Appendix C to Part 5--DHS Systems of Records Exempt From the Privacy Act
</b></p>
<p>This appendix implements provisions of the Privacy Act of 1974 that permit the Department of Homeland Security (DHS) to exempt its systems of records from provisions of the Act. During the course of normal agency operations, exempt materials from other systems of records may become part of the records in these and other DHS systems. To the extent that copies of records from other exempt systems of records are entered into any DHS system, DHS hereby claims the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions in accordance with this rule.
</p>
<p>Portions of the following DHS systems of records are exempt from certain provisions of the Privacy Act pursuant to 5 U.S.C. 552(j) and (k):
</p>
<p>1. The DHS/ALL--001 Freedom of Information Act and Privacy Act Records System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/ALL--001 Freedom of Information Act and Privacy Act Records System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; national security and intelligence activities; and protection of the President of the United States or other individuals pursuant to section 3056 and 3056A of Title 18. The DHS/ALL--001 Freedom of Information Act and Privacy Act Records System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3) and (4): (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8), (e)(12); (f); (g)(1); and (h) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3): (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) pursuant to 5 U.S.C. &amp;amp;amp;amp;amp;#167; 552a(k)(1), (k)(2), (k)(3), (k)(5), and (k)(6). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.
</p>
<p>(f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with subsection (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (e)(12) (Computer Matching) if the agency is a recipient agency or a source agency in a matching program with a non-Federal agency, with respect to any establishment or revision of a matching program, at least 30 days prior to conducting such program, publish in the <i>Federal Register</i> notice of such establishment or revision.
</p>
<p>(j) From subsection (g)(1) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.
</p>
<p>(k) From subsection (h) (Legal Guardians) the parent of any minor, or the legal guardian of any individual who has been declared to be incompetent due to physical or mental incapacity or age by a court of competent jurisdiction, may act on behalf of the individual.
</p>
<p>2. The DHS/ALL-029 Civil Rights and Civil Liberties Records System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/ALL-029 Civil Rights and Civil Liberties Records System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to the enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; national security and intelligence activities; and protection of the President of the United States or other individuals pursuant to Section 3056 and 3056A of Title 18. The DHS/ALL-029 Civil Rights and Civil Liberties Records System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, state, local, Tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) pursuant to 5 U.S.C. &amp;amp;amp;amp;amp;#167; 552a(k)(1), (k)(2), (k)(3), and (k)(5). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the individual who is the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would, therefore, present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the individual who is the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>3. DHS-ALL-005, Redress and Response Records System. A portion of the following system of records is exempt from 5 U.S.C. 552a(c)(3) and (4); (d)(1), (2), (3), and (4); (e)(1), (2), (3), (4)(G) through (I), (5), and (8); (f), and (g); however, these exemptions apply only to the extent that information in this system records is recompiled or is created from information contained in other systems of records subject to such exemptions pursuant to 5 U.S.C. 552a(j)(2), (k)(1), (k)(2), and (k)(5). Further, no exemption shall be asserted with respect to information submitted by and collected from the individual or the individual’s representative in the course of any redress process associated with this system of records. After conferring with the appropriate component or agency, DHS may waive applicable exemptions in appropriate circumstances and where it would not appear to interfere with or adversely affect the law enforcement or national security purposes of the systems from which the information is recompiled or in which it is contained. Exemptions from the above particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, when information in this system records is recompiled or is created from information contained in other systems of records subject to exemptions for the following reasons:
</p>
<p>(a) From subsection (c)(3) because making available to a record subject the accounting of disclosures from records concerning him or her would specifically reveal any investigative interest in the individual. Revealing this information could reasonably be expected to compromise ongoing efforts to investigate a known or suspected terrorist by notifying the record subject that he or she is under investigation. This information could also permit the record subject to take measures to impede the investigation, e.g., destroy evidence, intimidate potential witnesses, or flee the area to avoid or impede the investigation.
</p>
<p>(b) From subsection (c)(4) because portions of this system are exempt from the access and amendment provisions of subsection (d).
</p>
<p>(c) From subsections (d)(1), (2), (3), and (4) because these provisions concern individual access to and amendment of certain records contained in this system, including law enforcement counterterrorism, investigatory, and intelligence records. Compliance with these provisions could alert the subject of an investigation of the fact and nature of the investigation, and/or the investigative interest of intelligence or law enforcement agencies; compromise sensitive information related to national security; interfere with the overall law enforcement process by leading to the destruction of evidence, improper influencing of witnesses, fabrication of testimony, and/or flight of the subject; could identify a confidential source or disclose information which would constitute an unwarranted invasion of another’s personal privacy; reveal a sensitive investigative or intelligence technique; or constitute a potential danger to the health or safety of law enforcement personnel, confidential informants, and witnesses. Amendment of these records would interfere with ongoing counterterrorism, law enforcement, or intelligence investigations and analysis activities and impose an impossible administrative burden by requiring investigations, analyses, and reports to be continuously reinvestigated and revised.
</p>
<p>(d) From subsection (e)(1) because it is not always possible for DHS or other agencies to know in advance what information is relevant and necessary for it to complete an identity comparison between the individual seeking redress and a known or suspected terrorist. Also, because DHS and other agencies may not always know what information about an encounter with a known or suspected terrorist will be relevant to law enforcement for the purpose of conducting an operational response.
</p>
<p>(e) From subsection (e)(2) because application of this provision could present a serious impediment to counterterrorism, law enforcement, or intelligence efforts in that it would put the subject of an investigation, study, or analysis on notice of that fact, thereby permitting the subject to engage in conduct designed to frustrate or impede that activity. The nature of counterterrorism, law enforcement, or intelligence investigations is such that vital information about an individual frequently can be obtained only from other persons who are familiar with such individual and his/her activities. In such investigations it is not feasible to rely upon information furnished by the individual concerning his own activities.
</p>
<p>(f) From subsection (e)(3), to the extent that this subsection is interpreted to require DHS to provide notice to an individual if DHS or another agency receives or collects information about that individual during an investigation or from a third party. Should the subsection be so interpreted, exemption from this provision is necessary to avoid impeding counterterrorism, law enforcement, or intelligence efforts by putting the subject of an investigation, study, or analysis on notice of that fact, thereby permitting the subject to engage in conduct intended to frustrate or impede that activity.
</p>
<p>(g) From subsections (e)(4)(G), (H) and (I) (Agency Requirements) because portions of this system are exempt from the access and amendment provisions of subsection (d).
</p>
<p>(h) From subsection (e)(5) because many of the records in this system coming from other system of records are derived from other domestic and foreign agency record systems and therefore it is not possible for DHS to vouch for their compliance with this provision; however, the DHS has implemented internal quality assurance procedures to ensure that data used in the redress process is as thorough, accurate, and current as possible. In addition, in the collection of information for law enforcement, counterterrorism, and intelligence purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. With the passage of time, seemingly irrelevant or untimely information may acquire new significance as further investigation brings new details to light. The restrictions imposed by (e)(5) would limit the ability of those agencies’ trained investigators and intelligence analysts to exercise their judgment in conducting investigations and impede the development of intelligence necessary for effective law enforcement and counterterrorism efforts. The DHS has, however, implemented internal quality assurance procedures to ensure that the data used in the redress process is as thorough, accurate, and current as possible.
</p>
<p>(i) From subsection (e)(8) because to require individual notice of disclosure of information due to compulsory legal process would pose an impossible administrative burden on DHS and other agencies and could alert the subjects of counterterrorism, law enforcement, or intelligence investigations to the fact of those investigations when not previously known.
</p>
<p>(j) From subsection (f) (Agency Rules) because portions of this system are exempt from the access and amendment provisions of subsection (d).
</p>
<p>(k) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act.
</p>
<p>4. The Department of Homeland Security Automated Biometric Identification System (IDENT) consists of electronic and paper records and will be used by DHS and its components. IDENT is the primary repository of biometric information held by DHS in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws (including the immigration law); investigations, inquiries, and proceedings thereunder; and national security and intelligence activities. IDENT is a centralized and dynamic DHS-wide biometric database that also contains limited biographic and encounter history information needed to place the biometric information in proper context. The information is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies.
</p>
<p>Pursuant to exemptions 5 U.S.C. 552a(j)(2) of the Privacy Act, portions of this system are exempt from 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and (e)(8); (f)(2) through (5); and (g). Pursuant to 5 U.S.C. 552a(k)(2), this system is exempt from the following provisions of the Privacy Act, subject to the limitations set forth in those subsections: 5 U.S.C. 552a (c)(3), (d), (e)(1), (e)(4)(G), and (e)(4)(H). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation; and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.
</p>
<p>(f) From subsections (e)(4)(G) and (H) (Agency Requirements), and (f)(2 through 5) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) and thereby would not require DHS to establish requirements or rules for records which are exempted from access.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act.
</p>
    <p> 5. The DHS/OIG-002 Investigative Records System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/OIG-002 Investigative Records System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; national security and intelligence activities; and protection of the President of the U.S. or other individuals pursuant to Section 3056 and 3056A of Title 18. The DHS/OIG-002 Investigative Records System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies.  The Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C.  552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8), (f); and (g)(1). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(k)(1), (k)(2), and (k)(5), has exempted this system from the following provisions of the Privacy Act, 5 U.S.C. sec. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f).  Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process. When an investigation has been completed, information on disclosures made may continue to be exempted if the fact that an investigation occurred remains sensitive after completion.</p>
    <p>(b) From subsection (d) (Access and Amendment to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.</p>
    <p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.</p>
    <p>(f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.</p>
    <p> (g) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with subsection (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.</p>
    <p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.</p>
    <p> (j) From subsection (g)(1) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.</p>
    <p>6. The Immigration and Customs Enforcement (ICE) Pattern Analysis and Information Collection (ICEPIC) System consists of electronic and paper records and will be used by DHS and its components. ICEPIC is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws (including the immigration law); investigations, inquiries, and proceedings there under; and national security and intelligence activities. ICEPIC contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies.
</p>
<p>Pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act, portions of this system are exempt from 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and (e)(8); (f), and (g). Pursuant to 5 U.S.C. 552a(k)(2), this system is exempt from the following provisions of the Privacy Act, subject to the limitations set forth in those subsections: 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), and (f). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by: revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identity of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G) and (H) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: Refusal to amend a record; Refusal to comply with a request for access to records; failure to maintain accurate, relevant timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>7. The Office of Intelligence and Analysis (I&amp;A) Enterprise Records System (ERS) consists of records including intelligence information and other properly acquired information received from agencies and components of the federal government, foreign governments, organizations or entities, international organizations, state and local government agencies (including law enforcement agencies), and private sector entities, as well as information provided by individuals, regardless of the medium used to submit the information or the agency to which it was submitted. This system also contains: Information regarding persons on watch lists with known or suspected links to terrorism; the results of intelligence analysis and reporting; ongoing law enforcement investigative information, information systems security analysis and reporting; active immigration, customs, border and transportation, security related records; historical law enforcement, operational, immigration, customs, border and transportation security, and other administrative records; relevant and appropriately acquired financial information; and public-source data such as that contained in media reports and commercially available databases, as appropriate. Data about the providers of information, including the means of transmission of the data, is also retained.
</p>
<p>(a) Pursuant to 5 U.S.C. 552a(k)(1), (2), (3), and (5), this system of records is exempt from 5 U.S.C. 552a(c)(3), (d)(1), (2), (3), (4), and (5), (e)(1), (e)(4)(G), (H), and (I), and (f). These exemptions apply only to the extent that information in this system is subject to exemption. Where compliance would not appear to interfere with or adversely affect the intelligence, counterterrorism, homeland security, and related law enforcement purposes of this system, the applicable exemption may be waived by DHS.
</p>
<p>(b) Exemptions from the particular subsections are justified for the following reasons:
</p>
<p>(1) From subsection (c)(3) (Accounting for Disclosures) because making available to a record subject the accounting of disclosures from records concerning him/her would specifically reveal any interest in the individual of an intelligence, counterterrorism, homeland security, or related investigative nature. Revealing this information could reasonably be expected to compromise ongoing efforts of the Department to identify, understand, analyze, investigate, and counter the activities of:
</p>
<p>(i) Known or suspected terrorists and terrorist groups;
</p>
<p>(ii) Groups or individuals known or believed to be assisting or associated with known or suspected terrorists or terrorist groups;
</p>
<p>(iii) Individuals known, believed to be, or suspected of being engaged in activities constituting a threat to homeland security, including (1) activities which impact or concern the security, safety, and integrity of our international borders, including any illegal activities that either cross our borders or are otherwise in violation of the immigration or customs laws and regulations of the United States; (2) activities which could reasonably be expected to assist in the development or use of a weapon of mass effect; (3) activities meant to identify, create, or exploit the vulnerabilities of, or undermine, the "key resources" (as defined in section 2(9) of the Homeland Security Act of 2002) and "critical infrastructure" (as defined in 42 U.S.C. 5195c(c)) of the United States, including the cyber and national telecommunications infrastructure and the availability of a viable national security and emergency preparedness communications infrastructure; (4) activities detrimental to the security of transportation and transportation systems; (5) activities which violate or are suspected of violating the laws relating to counterfeiting of obligations and securities of the United States and other financial crimes, including access device fraud, financial institution fraud, identity theft, computer fraud; and computer-based attacks on our nation’s financial, banking, and telecommunications infrastructure; (6) activities, not wholly conducted within the United States, which violate or are suspected of violating the laws which prohibit the production, transfer, or sale of narcotics or substances controlled in accordance with Title 21 of the United States Code, or those associated activities otherwise prohibited by Titles 21 and 46 of the United States Code; (7) activities which impact, concern, or otherwise threaten the safety and security of the President and Vice President, their families, heads of state, and other designated individuals; the White House, Vice President’s residence, foreign missions, and other designated buildings within the United States; (8) activities which impact, concern, or otherwise threaten domestic maritime safety and security, maritime mobility and navigation, or the integrity of the domestic maritime environment; (9) activities which impact, concern, or otherwise threaten the national operational capability of the Department to respond to natural and manmade major disasters and emergencies, including acts of terrorism; (10) activities involving the importation, possession, storage, development, or transportation of nuclear or radiological material without authorization or for use against the United States;
</p>
<p>(iv) Foreign governments, organizations, or persons (foreign powers); and
</p>
<p>(v) Individuals engaging in intelligence activities on behalf of a foreign power or terrorist group.
</p>
<p>Thus, by notifying the record subject that he/she is the focus of such efforts or interest on the part of DHS, or other agencies with whom DHS is cooperating and to whom the disclosures were made, this information could permit the record subject to take measures to impede or evade such efforts, including the taking of steps to deceive DHS personnel and deny them the ability to adequately assess relevant information and activities, and could inappropriately disclose to the record subject the sensitive methods and/or confidential sources used to acquire the relevant information against him/her. Moreover, where the record subject is the actual target of a law enforcement investigation, this information could permit him/her to take measures to impede the investigation, for example, by destroying evidence, intimidating potential witnesses, or avoiding detection or apprehension.
</p>
<p>(2) From subsections (d)(1), (2), (3), and (4) (Access to Records) because these provisions concern individual rights of access to and amendment of records (including the review of agency denials of either) contained in this system, which consists of intelligence, counterterrorism, homeland security, and related investigatory records concerning efforts of the Department, as described more fully in subsection (b)(1), above. Compliance with these provisions could inform or alert the subject of an intelligence, counterterrorism, homeland security, or investigatory effort undertaken on behalf of the Department, or by another agency with whom DHS is cooperating, of the fact and nature of such efforts, and/or the relevant intelligence, counterterrorism, homeland security, or investigatory interest of DHS and/or other intelligence, counterterrorism, or law enforcement agencies. Moreover, compliance could also compromise sensitive information either classified in the interest of national security, or which otherwise requires, as appropriate, safeguarding and protection from unauthorized disclosure; identify a confidential source or disclose information which would constitute an unwarranted invasion of another individual’s personal privacy; reveal a sensitive intelligence or investigative technique or method, including interfering with intelligence or law enforcement investigative processes by permitting the destruction of evidence, improper influencing or intimidation of witnesses, fabrication of statements or testimony, and flight from detection or apprehension; or constitute a potential danger to the health or safety of intelligence, counterterrorism, homeland security, and law enforcement personnel, confidential sources and informants, and potential witnesses. Amendment of the records would interfere with ongoing intelligence, counterterrorism, homeland security, and law enforcement investigations and activities, including incident reporting and analysis activities, and impose an impossible administrative burden by requiring investigations, reports, and analyses to be continuously reinvestigated and revised.
</p>
<p>(3) From subsection (e)(1) (Relevant and Necessary) because it is not always possible for DHS to know in advance of its receipt the relevance and necessity of each piece of information it acquires in the course of an intelligence, counterterrorism, or investigatory effort undertaken on behalf of the Department, or by another agency with whom DHS is cooperating. In the context of the authorized intelligence, counterterrorism, and investigatory activities undertaken by DHS personnel, relevance and necessity are questions of analytic judgment and timing, such that what may appear relevant and necessary when acquired ultimately may be deemed unnecessary upon further analysis and evaluation. Similarly, in some situations, it is only after acquired information is collated, analyzed, and evaluated in light of other available evidence and information that its relevance and necessity can be established or made clear. Constraining the initial acquisition of information included within the ERS in accordance with the relevant and necessary requirement of subsection (e)(1) could discourage the appropriate receipt of and access to information which DHS and I&amp;amp;amp;amp;amp;amp;A are otherwise authorized to receive and possess under law, and thereby impede efforts to detect, deter, prevent, disrupt, or apprehend terrorists or terrorist groups, and/or respond to terrorist or other activities which threaten homeland security. Notwithstanding this claimed exemption, which would permit the acquisition and temporary maintenance of records whose relevance to the purpose of the ERS may be less than fully clear, DHS will only disclose such records after determining whether such disclosures are themselves consistent with the published ERS routine uses. Moreover, it should be noted that, as concerns the receipt by I&amp;amp;amp;amp;amp;amp;A, for intelligence purposes, of information in any record which identifies a U.S. Person, as defined in Executive Order 12333, as amended, such receipt, and any subsequent use or dissemination of that identifying information, is undertaken consistent with the procedures established and adhered to by I&amp;amp;amp;amp;amp;amp;A pursuant to that Executive Order. Specifically, I&amp;amp;amp;amp;amp;amp;A intelligence personnel may acquire information which identifies a particular U.S. Person, retain it within or disseminate it from ERS, as appropriate, only when it is determined that the personally identifying information is necessary for the conduct of I&amp;amp;amp;amp;amp;amp;A’s functions, and otherwise falls into one of a limited number of authorized categories, each of which reflects discrete activities for which information on individuals would be utilized by the Department in the overall execution of its statutory mission.
</p>
<p>(4) From subsections (e)(4) (G), (H) and (I) (Access), and (f) (Agency Rules), inasmuch as it is unnecessary for the publication of rules and procedures contemplated therein since the ERS, pursuant to subsections (1) and (2), above, will be exempt from the underlying duties to provide to individuals notification about, access to, and the ability to amend or correct the information pertaining to them in, this system of records. Furthermore, to the extent that subsection (e)(4)(I) is construed to require more detailed disclosure than the information accompanying the system notice for ERS, as published in today’s <i>Federal Register,</i> exemption from it is also necessary to protect the confidentiality, privacy, and physical safety of sources of information, as well as the methods for acquiring it. Finally, greater specificity concerning the description of categories of sources of properly classified records could also compromise or otherwise cause damage to the national or homeland security.
</p>
    <p> 8. The DHS/USCG-061 Maritime Analytic Support System (MASS) System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/USCG-061 Maritime Analytic Support System (MASS) System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; and national security and intelligence activities. The DHS/USCG-061 Maritime Analytic Support System (MASS) System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3) and (c)(4); (d); (e)(1) through (3), (e)(4)(G) through (I), (e)(5) and (e)(8), (f); and (g)(1) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G) through (e)(4)(I); and (f) pursuant to 5 U.S.C. 552a(k)(1) and (k)(2). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.</p>
    <p>(b) From subsection (d) (Access and Amendment to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.</p>
    <p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.</p>
    <p>(f) From subsections (e)(4)(G) through (I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.</p>
    <p> (g) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with subsection (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.</p>
    <p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.</p>
    <p> (i)  From subsection (g)(1) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.</p>

    <p>9. The Law Enforcement Information Data Base (LEIDB)/Pathfinder is a historical repository of selected Coast Guard message traffic. LEIDB/Pathfinder supports law enforcement intelligence activities. LEIDB/Pathfinder users can query archived message traffic and link relevant information across multiple data records within LEIDB/Pathfinder. Users have system tools enabling the user to identify potential relationships between information contained in otherwise unrelated documents. These tools allow the analysts to build high precision and low return queries, which minimize false hits and maximize analyst productivity while working with unstructured, unformatted, free test documents.
</p>
<p>(a) Pursuant to 5 U.S.C. 552a(j)(2), (k)(1), and (k)(2) certain records or information in the above mentioned system of records are exempt from 5 U.S.C. 552a(c)(3) and (4); (d)(1), (2), (3), and (4); (e)(1), (2), (3), (4)(G) through (I), (e)(5), and (8); (f), and (g). These exemptions apply only to the extent that information in this system is subject to exemption. Where compliance would not appear to interfere with or adversely affect the intelligence, counterterrorism, homeland security, and related law enforcement purposes of this system, the applicable exemption may be waived by DHS.
</p>
<p>(b) Exemptions from the particular subsections are justified for the following reasons:
</p>
<p>(1) From subsection (c)(3) (Accounting for Disclosures) because making available to a record subject the accounting of disclosures from records concerning him/her would specifically reveal any interest in the individual of an intelligence, counterterrorism, homeland security, or related investigative nature. Revealing this information could reasonably be expected to compromise ongoing efforts of the Department to identify, understand, analyze, investigate, and counter the activities of:
</p>
<p>(i) Known or suspected terrorists and terrorist groups;
</p>
<p>(ii) Groups or individuals known or believed to be assisting or associated with known or suspected terrorists or terrorist groups;
</p>
<p>(iii) Individuals known, believed to be, or suspected of being engaged in activities constituting a threat to homeland security, including (1) activities which impact or concern the security, safety, and integrity of our international borders, including any illegal activities that either cross our borders or are otherwise in violation of the immigration or customs laws and regulations of the United States; (2) activities which could reasonably be expected to assist in the development or use of a weapon of mass effect; (3) activities meant to identify, create, or exploit the vulnerabilities of, or undermine, the "key resources" (as defined in section 2(9) of the Homeland Security Act of 2002) and "critical infrastructure" (as defined in 42 U.S.C. 5195c(c)) of the United States, including the cyber and national telecommunications infrastructure and the availability of a viable national security and emergency preparedness communications infrastructure; (4) activities detrimental to the security of transportation and transportation systems; (5) activities which violate or are suspected of violating the laws relating to counterfeiting of obligations and securities of the United States and other financial crimes, including access device fraud, financial institution fraud, identity theft, computer fraud; and computer-based attacks on our nation’s financial, banking, and telecommunications infrastructure; (6) activities, not wholly conducted within the United States, which violate or are suspected of violating the laws which prohibit the production, transfer, or sale of narcotics or substances controlled in accordance with Title 21 of the United States Code, or those associated activities otherwise prohibited by Titles 21 and 46 of the United States Code; (7) activities which impact, concern, or otherwise threaten the safety and security of the President and Vice President, their families, heads of state, and other designated individuals; the White House, Vice President’s residence, foreign missions, and other designated buildings within the United States; (8) activities which impact, concern, or otherwise threaten domestic maritime safety and security, maritime mobility and navigation, or the integrity of the domestic maritime environment; (9) activities which impact, concern, or otherwise threaten the national operational capability of the Department to respond to natural and manmade major disasters and emergencies, including acts of terrorism; (10) activities involving the importation, possession, storage, development, or transportation of nuclear or radiological material without authorization or for use against the United States;
</p>
<p>(iv) Foreign governments, organizations, or persons (foreign powers); and
</p>
<p>(v) Individuals engaging in intelligence activities on behalf of a foreign power or terrorist group.
</p>
<p>Thus, by notifying the record subject that he/she is the focus of such efforts or interest on the part of DHS, or other agencies with whom DHS is cooperating and to whom the disclosures were made, this information could permit the record subject to take measures to impede or evade such efforts, including the taking of steps to deceive DHS personnel and deny them the ability to adequately assess relevant information and activities, and could inappropriately disclose to the record subject the sensitive methods and/or confidential sources used to acquire the relevant information against him/her. Moreover, where the record subject is the actual target of a law enforcement investigation, this information could permit him/her to take measures to impede the investigation, for example, by destroying evidence, intimidating potential witnesses, or avoiding detection or apprehension.
</p>
<p>(2) From subsection (c)(4) (Accounting for Disclosure, notice of dispute) because certain records in this system are exempt from the access and amendment provisions of subsection (d), this requirement to inform any person or other agency about any correction or notation of dispute that the agency made with regard to those records, should not apply.
</p>
<p>(3) From subsections (d)(1), (2), (3), and (4) (Access to Records) because these provisions concern individual rights of access to and amendment of records (including the review of agency denials of either) contained in this system, which consists of intelligence, counterterrorism, homeland security, and related investigatory records concerning efforts of the Department, as described more fully in subsection (b)(1), above. Compliance with these provisions could inform or alert the subject of an intelligence, counterterrorism, homeland security, or investigatory effort undertaken on behalf of the Department, or by another agency with whom DHS is cooperating, of the fact and nature of such efforts, and/or the relevant intelligence, counterterrorism, homeland security, or investigatory interest of DHS and/or other intelligence, counterterrorism, or law enforcement agencies. Moreover, compliance could also compromise sensitive information either classified in the interest of national security, or which otherwise requires, as appropriate, safeguarding and protection from unauthorized disclosure; identify a confidential source or disclose information which would constitute an unwarranted invasion of another individual’s personal privacy; reveal a sensitive intelligence or investigative technique or method, including interfering with intelligence or law enforcement investigative processes by permitting the destruction of evidence, improper influencing or intimidation of witnesses, fabrication of statements or testimony, and flight from detection or apprehension; or constitute a potential danger to the health or safety of intelligence, counterterrorism, homeland security, and law enforcement personnel, confidential sources and informants, and potential witnesses. Amendment of the records would interfere with ongoing intelligence, counterterrorism, homeland security, and law enforcement investigations and activities, including incident reporting and analysis activities, and impose an impossible administrative burden by requiring investigations, reports, and analyses to be continuously reinvestigated and revised.
</p>
<p>(4) From subsection (e)(1) (Relevant and Necessary) because it is not always possible for DHS to know in advance of its receipt the relevance and necessity of each piece of information it acquires in the course of an intelligence, counterterrorism, or investigatory effort undertaken on behalf of the Department, or by another agency with whom DHS is cooperating. In the context of the authorized intelligence, counterterrorism, and investigatory activities undertaken by DHS personnel, relevance and necessity are questions of analytic judgment and timing, such that what may appear relevant and necessary when acquired ultimately may be deemed unnecessary upon further analysis and evaluation. Similarly, in some situations, it is only after acquired information is collated, analyzed, and evaluated in light of other available evidence and information that its relevance and necessity can be established or made clear. Constraining the initial acquisition of information included within the LEIDB in accordance with the relevant and necessary requirement of subsection (e)(1) could discourage the appropriate receipt of and access to information which DHS and USCG are otherwise authorized to receive and possess under law, and thereby impede efforts to detect, deter, prevent, disrupt, or apprehend terrorists or terrorist groups, and/or respond to terrorist or other activities which threaten homeland security. Notwithstanding this claimed exemption, which would permit the acquisition and temporary maintenance of records whose relevance to the purpose of the LEIDB may be less than fully clear, DHS will only disclose such records after determining whether such disclosures are themselves consistent with the published LEIDB routine uses. Moreover, it should be noted that, as concerns the receipt by USCG, for intelligence purposes, of information in any record which identifies a U.S. Person, as defined in Executive Order 12333, as amended, such receipt, and any subsequent use or dissemination of that identifying information, is undertaken consistent with the procedures established and adhered to by USCG pursuant to that Executive Order. Specifically, USCG intelligence personnel may acquire information which identifies a particular U.S. Person, retain it within or disseminate it from LEIDB, as appropriate, only when it is determined that the personally identifying information is necessary for the conduct of USCG’s functions, and otherwise falls into one of a limited number of authorized categories, each of which reflects discrete activities for which information on individuals would be utilized by the Department in the overall execution of its statutory mission.
</p>
<p>(5) From subsection (e)(2) (Collection of Information from Individuals) because application of this provision could present a serious impediment to counterterrorism or law enforcement efforts in that it would put the subject of an investigation, study or analysis on notice of that fact, thereby permitting the subject to engage in conduct designed to frustrate or impede that activity. The nature of counterterrorism, and law enforcement investigations is such that vital information about an individual frequently can be obtained only from other persons who are familiar with such individual and his/her activities. In such investigations it is not feasible to rely solely upon information furnished by the individual concerning his own activities.
</p>
<p>(6) From subsection (e)(3) (Notice to Subjects), to the extent that this subsection is interpreted to require DHS to provide notice to an individual if DHS or another agency receives or collects information about that individual during an investigation or from a third party. Should the subsection be so interpreted, exemption from this provision is necessary to avoid impeding counterterrorism or law enforcement efforts by putting the subject of an investigation, study or analysis on notice of that fact, thereby permitting the subject to engage in conduct intended to frustrate or impede that activity.
</p>
<p>(7) From subsections (e)(4) (G), (H) and (I) (Access), inasmuch as it is unnecessary for the publication of rules and procedures contemplated therein since the LEIDB, pursuant to subsections (2) and (3), above, will be exempt from the underlying duties to provide to individuals notification about, access to, and the ability to amend or correct the information pertaining to them in, this system of records. Furthermore, to the extent that subsection (e)(4)(I) is construed to require more detailed disclosure than the information accompanying the system notice for LEIDB, as published in today’s <i>Federal Register,</i> exemption from it is also necessary to protect the confidentiality, privacy, and physical safety of sources of information, as well as the methods for acquiring it. Finally, greater specificity concerning the description of categories of sources of properly classified records could also compromise or otherwise cause damage to the national or homeland security.
</p>
<p>(8) From subsection (e)(5) (Collection of Information) because many of the records contained in this system are derived from other domestic and foreign sources, it is not possible for DHS to vouch for those records’ compliance with this provision; however, the DHS has implemented internal quality assurance procedures to ensure that data used in its screening processes is as complete, accurate, and current as possible. In addition, in the collection of information for law enforcement and counterterrorism purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. With the passage of time, seemingly irrelevant or untimely information may acquire new significance as further investigation brings new details to light. The restrictions imposed by (e)(5) would limit the ability of those agencies’ trained investigators and intelligence analysts to exercise their judgment in conducting investigations and impede the development of intelligence necessary for effective law enforcement and counterterrorism efforts.
</p>
<p>(9) From subsection (e)(8) (Notice on Individuals) because to require individual notice of disclosure of information due to compulsory legal process would pose an impossible administrative burden on DHS and other agencies and could alert the subjects of counterterrorism or law enforcement investigations to the fact of those investigations then not previously known.
</p>
<p>(10) From subsection (f) (Agency Rules) because portions of this system are exempt from the access and amendment provisions of subsection (d). Access to, and amendment of, system records that are not exempt or for which exemption is waived may be obtained under procedures described in the related SORN or Subpart B of this Part.
</p>
<p>(11) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: Refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
    <p> 10. The DHS/ICE-001 Student and Exchange Visitor Program System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/ICE-001 Student and Exchange Visitor Program System of Records is a repository of information held by DHS in connection with collecting and maintaining pertinent information on nonimmigrant students and exchange visitors, schools and exchange visitor programs, school officials and exchange visitor sponsors that host exchange visitors while in the United States. In addition, SEVP maintains and collects information pertinent to the certification and oversight of academic and vocational schools (U.S.-based schools) that seek to enroll F and M nonimmigrant students to ensure compliance with federal laws and regulations. Failure to comply will result in the withdrawal of the school’s certification, prohibiting the school from enrolling F and M nonimmigrant students.</p>
    <p> This system of records permits DHS to monitor compliance by these persons with the terms of their admission to the United States, and assists DHS with its several and varied missions and functions, including, but not limited to, the enforcement of civil and criminal laws, and the investigations, inquiries, and proceedings thereunder, and national security and intelligence activities. The DHS/ICE-001 Student and Exchange Visitor Program System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies.  </p>
    <p> The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2) has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3), (c)(4), (d), (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (f); and (g)(1). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(1) and (k)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).</p>
    <p>  Where a record received from another system has been exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.</p>
    <p>Exemptions from these particular subsections are justified, on a case-by-case basis, to be determined at the time a request is made, for the following reasons:</p>
    <p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process. When an investigation has been completed, information on disclosures made may continue to be exempted if the fact that an investigation occurred remains sensitive after completion.</p>
    <p>(b) From subsection (d) (Access and Amendment to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interest of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.</p>
    <p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.</p>
    <p>(f) From subsections (e)(4)(G) through (I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to the existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, potential witnesses, and confidential informants.</p>
    <p> (g) From subsection (e)(5) (Collection of Information) because, with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with subsection (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.</p>
    <p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in the disclosure of investigative techniques, procedures, and evidence.</p>
    <p> (j) From subsection (g)(1) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.</p>

    <p>11. The General Counsel Electronic Management System (GEMS) consists of records and information created or collected by attorneys for U.S. Immigration and Customs Enforcement, which will be used in the preparation and presentation of cases before a court or other adjudicative body. ICE attorneys work closely with ICE law enforcement personnel throughout the process of adjudicating immigration cases. GEMS allows ICE attorneys to store all the materials pertaining to immigration adjudications, including documents related to investigations, case notes and other hearing related information, and briefs and memoranda of law related to cases. Having this information in one system should not only facilitate the work of the ICE attorneys involved in the particular case, but also will provide a legal resource for other attorneys who are adjudicating similar cases. The system will also provide management capabilities for tracking time and effort expended in the preparation and presentation of cases. Pursuant to exemptions 5 U.S.C. 552a(j)(2) of the Privacy Act, portions of this system are exempt from 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and (e)(8); (f)(2) through (5); and (g). Pursuant to 5 U.S.C. 552a (k)(1) and (k)(2), this system is exempt from the following provisions of the Privacy Act, subject to the limitations set forth in those subsections: 5 U.S.C. 552a (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), and (f). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, which in some cases may be classified, and reveal investigative interest on the part of DHS or ICE. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, tamper with witnesses or evidence, and avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation pertaining to an immigration matter, which in some cases may be classified, and prematurely reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, tamper with witnesses or evidence, and avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal immigration law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement and for the protection of national security, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject of the nature or existence of an investigation, which could cause interference with the investigation, a related inquiry or other law enforcement activities, some of which may be classified.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.
</p>
<p>(f) From subsections (e)(4)(G) and (H) (Agency Requirements), (f) (Agency Rules), and (g) (Civil Remedies) because portions of this system are exempt from the individual access provisions of subsection (d).
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with ICE’s ability to obtain, serve, and issue subpoenas, warrants and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act.
</p>
<p>12. DHS/CBP-005, Advanced Passenger Information System. A portion of the following system of records is exempt from 5 U.S.C. 552a(c)(3) and (4); (d)(1), (2), (3), and (4); (e)(1), (2), (3), (4)(G) through (I), (5), and (8); (f), and (g); however, these exemptions apply only to the extent that information in this system records is recompiled or is created from information contained in other systems of records subject to such exemptions pursuant to 5 U.S.C. 552a(j)(2), and (k)(2). Further, no exemption shall be asserted with respect to information submitted by and collected from the individual or the individual’s representative in the course of any redress process associated with this system of records. After conferring with the appropriate component or agency, DHS may waive applicable exemptions in appropriate circumstances and where it would not appear to interfere with or adversely affect the law enforcement or national security purposes of the systems from which the information is recompiled or in which it is contained. Exemptions from the above particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, when information in this system records is recompiled or is created from information contained in other systems of records subject to exemptions for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosure) because making available to a record subject the accounting of disclosures from records concerning him or her would specifically reveal any investigative interest in the individual. Revealing this information could reasonably be expected to compromise ongoing efforts to investigate a known or suspected terrorist by notifying the record subject that he or she is under investigation. This information could also permit the record subject to take measures to impede the investigation, e.g., destroy evidence, intimidate potential witnesses, or flee the area to avoid or impede the investigation.
</p>
<p>(b) From subsection (c)(4) (Accounting for Disclosure, notice of dispute) because portions of this system are exempt from the access and amendment provisions of subsection (d).
</p>
<p>(c) From subsections (d)(1), (2), (3), and (4) (Access to Records) because these provisions concern individual access to and amendment of certain records contained in this system, including law enforcement counterterrorism, investigatory, and intelligence records. Compliance with these provisions could alert the subject of an investigation of the fact and nature of the investigation, and/or the investigative interest of intelligence or law enforcement agencies; compromise sensitive information related to national security; interfere with the overall law enforcement process by leading to the destruction of evidence, improper influencing of witnesses, fabrication of testimony, and/or flight of the subject; could identify a confidential source or disclose information which would constitute an unwarranted invasion of another’s personal privacy; reveal a sensitive investigative or intelligence technique; or constitute a potential danger to the health or safety of law enforcement personnel, confidential informants, and witnesses. Amendment of these records would interfere with ongoing counterterrorism, law enforcement, or intelligence investigations and analysis activities and impose an impossible administrative burden by requiring investigations, analyses, and reports to be continuously reinvestigated and revised.
</p>
<p>(d) From subsection (e)(1) (Relevancy and Necessity of Information) because it is not always possible for DHS or other agencies to know in advance what information is relevant and necessary for it to complete an identity comparison between the individual seeking redress and a known or suspected terrorist. Also, because DHS and other agencies may not always know what information about an encounter with a known or suspected terrorist will be relevant to law enforcement for the purpose of conducting an operational response.
</p>
<p>(e) From subsection (e)(2) (Collection of Information from Individuals) because application of this provision could present a serious impediment to counterterrorism, law enforcement, or intelligence efforts in that it would put the subject of an investigation, study, or analysis on notice of that fact, thereby permitting the subject to engage in conduct designed to frustrate or impede that activity. The nature of counterterrorism, law enforcement, or intelligence investigations is such that vital information about an individual frequently can be obtained only from other persons who are familiar with such individual and his/her activities. In such investigations it is not feasible to rely upon information furnished by the individual concerning his own activities.
</p>
<p>(f) From subsection (e)(3) (Notice to Subjects), to the extent that this subsection is interpreted to require DHS to provide notice to an individual if DHS or another agency receives or collects information about that individual during an investigation or from a third party. Should the subsection be so interpreted, exemption from this provision is necessary to avoid impeding counterterrorism, law enforcement, or intelligence efforts by putting the subject of an investigation, study, or analysis on notice of that fact, thereby permitting the subject to engage in conduct intended to frustrate or impede that activity.
</p>
<p>(g) From subsections (e)(4)(G), (H) and (I) (Agency Requirements) because portions of this system are exempt from the access and amendment provisions of subsection (d).
</p>
<p>(h) From subsection (e)(5) (Collection of Information) because many of the records in this system coming from other system of records are derived from other domestic and foreign agency record systems and therefore it is not possible for DHS to vouch for their compliance with this provision; however, the DHS has implemented internal quality assurance procedures to ensure that data used in the redress process is as thorough, accurate, and current as possible. In addition, in the collection of information for law enforcement, counterterrorism, and intelligence purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. With the passage of time, seemingly irrelevant or untimely information may acquire new significance as further investigation brings new details to light. The restrictions imposed by (e)(5) would limit the ability of those agencies’ trained investigators and intelligence analysts to exercise their judgment in conducting investigations and impede the development of intelligence necessary for effective law enforcement and counterterrorism efforts. The DHS has, however, implemented internal quality assurance procedures to ensure that the data used in the redress process is as thorough, accurate, and current as possible.
</p>
<p>(i) From subsection (e)(8) (Notice on Individuals) because to require individual notice of disclosure of information due to compulsory legal process would pose an impossible administrative burden on DHS and other agencies and could alert the subjects of counterterrorism, law enforcement, or intelligence investigations to the fact of those investigations when not previously known.
</p>
<p>(j) From subsection (f) (Agency Rules) because portions of this system are exempt from the access and amendment provisions of subsection (d).
</p>
<p>(k) From subsection (g) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.
</p>
<p>13. The Department of Homeland Security General Training Records system of records consists of electronic and paper records and will be used by DHS and its components. The Department of Homeland Security General Training Records system of records consists of electronic and paper records and will be used by DHS and its components and offices to maintain records about individual training, including enrollment and participation information, information pertaining to class schedules, programs, and instructors, training trends and needs, testing and examination materials, and assessments of training efficacy. The data will be collected by employee name or other unique identifier. The collection and maintenance of this information will assist DHS in meeting its obligation to train its personnel and contractors in order to ensure that the agency mission can be successfully accomplished. Pursuant to exemptions 5 U.S.C. 552a(k)(6) of the Privacy Act, portions of this system are exempt from 5 U.S.C. 552a(d) to the extent that records in this system relate to testing or examination materials used solely to determine individual qualifications for appointment in the Federal service. Access to or amendment of this information by the data subject would compromise the objectivity and fairness of the testing and examination process.
</p>
<p>14. The U.S. ICE-005 Trade Transparency Analysis and Research (TTAR) System consists of electronic and paper records and will be used by the Department of Homeland Security (DHS). TTAR is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; and national security and intelligence activities. TTAR contains information that is collected by other federal and foreign government agencies and may contain personally identifiable information. Pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act, portions of this system are exempt from 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and (e)(8); (f), and (g). Pursuant to 5 U.S.C. 552a(k)(2), this system is exempt from the following provisions of the Privacy Act, subject to the limitations set forth in those subsections: 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), and (f). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by: Revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identity of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G) and (H) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: Refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant, timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>15. The DHS/ALL--013 Claims Records system of records consists of electronic and paper records and will be used by DHS and its components. The DHS/ALL--013 Claims Records system is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; and national security, intelligence activities; and protection of the President of the United States or other individuals pursuant to section 3056 and 3056A of Title 18. The DHS/ALL--013 Claims Records system contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, Tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f), and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (I), and (f) pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(3). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by: revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identity of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>16. [Reserved]
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by: revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identity of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: Refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>17. The DHS/ALL--006 Accident Records system of records consists of electronic and paper records and will be used by DHS and its components. The DHS/ALL--006 Accident Records system is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: the enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; national security and intelligence activities; and protection of the President of the United States or other individuals pursuant to section 3056 and 3056A of Title 18. The DHS/ALL--006 Accident Records system contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(d) pursuant to 5 U.S.C. 552a(k)(3). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons: From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of information related to the protection of a President of the United States or other individuals pursuant to section 3056 and 3056A of Title 18. Permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>18. The DHS/ALL--020 Internal Affairs Records system of records consists of electronic and paper records and will be used by DHS and its components. The DHS/ALL--020 Internal Affairs Records system is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; national security and intelligence activities; and protection of the President of the United States or other individuals pursuant to section 3056 and 3056A of Title 18. The DHS/ALL--020 Internal Affairs Records system contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f), and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 552a(k)(1), (k)(2), (k)(3), and (k)(5). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by: revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identity of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training, and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>19. The DHS/ALL--024 Facility and Perimeter Access Control and Visitor Management system of records consists of electronic and paper records and will be used by DHS and its components. The DHS/ALL--024 Facility and Perimeter Access Control and Visitor Management system is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; and national security and intelligence activities. The DHS/ALL--024 Facility and Perimeter Access Control and Visitor Management system contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
    <p> 20. The Department of Homeland Security (DHS)/ALL-038 Insider Threat Program System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/ALL-038 Insider Threat Program System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; national security and intelligence activities; and protection of the President of the U.S. or other individuals pursuant to Section 3056 and 3056A of Title 18. The DHS/ALL-038 Insider Threat Program System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. secs. 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8), (e)(12); (f); and (g)(1). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. secs. 552a(k)(1), (k)(2), and (k)(5), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. secs. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). Where a record received from another system has been exempted in that source system under 5 U.S.C. sec. 552a(j)(2), 5 U.S.C. secs. 552a(k)(1), (k)(2), and (k)(5), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here. Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process. When an investigation has been completed, information on disclosures made may continue to be exempted if the fact that an investigation occurred remains sensitive after completion.</p>
    <p>(b) From subsection (d) (Access and Amendment to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.</p>
    <p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.</p>
    <p>(f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.</p>
    <p>(g) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with subsection (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.</p>
    <p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.</p>
    <p>(i) From subsection (e)(12) (Matching Agreements) because requiring DHS to provide notice of a new or revised matching agreement with a non-Federal agency, if one existed, would impair DHS operations by indicating which data elements and information are valuable to DHS's analytical functions, thereby providing harmful disclosure of information to individuals who would seek to circumvent or interfere with DHS's missions.</p>
    <p>
        (j) From subsection (g)(1) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.
      </p>


    <p>21. The DHS/CBP--010 Persons Engaged in International Trade in CBP Licensed/Regulated Activities system of records consists of electronic and paper records and will be used by DHS and its components. The DHS/CBP--010 Persons Engaged in International Trade in CBP Licensed/Regulated Activities is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; and national security and intelligence activities. The DHS/CBP--010 Persons Engaged in International Trade in CBP Licensed/Regulated Activities contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f), and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 552a(k)(2). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to national security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by: Revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identity of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: Refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant, timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>22. The DHS/CBP--011 TECS system of records consists of electronic and paper records and will be used by DHS, its Components, and other Federal agencies. The DHS/CBP-011 TECS is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; and national security and intelligence activities. The DHS/CBP-011 TECS contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, Tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f), and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 552a(k)(2). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to national security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation or subject of interest would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities or national security matter.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by: Revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identity of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: Refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant, timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>23. The DHS/CBP--012 Closed Circuit Television system of records consists of electronic and paper records and will be used by DHS and its components. The DHS/CBP--012 Closed Circuit Television system is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; and national security and intelligence activities. The DHS/CBP--012 Closed Circuit Television system contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f), and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 552a(k)(2). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by: Revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identity of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: Refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant, timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>24. The DHS/CBP--013 Seized Assets and Case Tracking System (SEACATS) consists of electronic and paper records and will be used by DHS and its components. The DHS/CBP--013 Seized Assets and Case Tracking System is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; and national security and intelligence activities. The DHS/CBP--013 Seized Assets and Case Tracking System contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f), and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (I), and (f) pursuant to 5 U.S.C. 552a(k)(2). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to national security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by: Revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identity of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude the officers and agents of DHS components’ from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: Refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
    <p>25. The U.S. Department of Homeland Security (DHS)/U.S. Customs and Border Protection (CBP)-014 Regulatory Audit Archive System (RAAS) System of Records consists of electronic and paper records and will be used by DHS and its Components. The DHS/CBP-014 RAAS System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to, the enforcement of civil and criminal laws, and investigations, inquiries, and proceedings there under. The DHS/CBP-014 RAAS System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its Components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    (a)	<p> From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.</p>

    <p>(b) [Reserved]</p>

    
    <p> 26. DHS/CBP-001, Import Information System (IIS). A portion of the following system of records is exempt from 5 U.S.C. 552a(c)(3), (e)(8), and (g)(1) pursuant to 5 U.S.C. 552a(j)(2), and from 5 U.S.C. 552a(c)(3) pursuant to 5 U.S.C. 552a(k)(2). Further, no exemption shall be asserted with respect to information maintained in the system as it relates to data submitted by or on behalf of a person who travels to visit the United States and crosses the border, nor shall an exemption be asserted with respect to the resulting determination (approval or denial). After conferring with the appropriate component or agency, DHS may waive applicable exemptions in appropriate circumstances and where it would not appear to interfere with or adversely affect the law enforcement purposes of the systems from which the information is recompiled or in which it is contained.  Exemptions from the above particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, when information in this system of records is may impede a law enforcement, intelligence activities and national security investigation:</p>
    <p> (a) From subsection (c)(3) (Accounting for Disclosure) because making available to a record subject the accounting of disclosures from records concerning him or her would specifically reveal any investigative interest in the individual. Revealing this information could reasonably be expected to compromise ongoing efforts to investigate a violation of U.S. law, including investigations of a known or suspected terrorist, by notifying the record subject that he or she is under investigation. This information could also permit the record subject to take measures to impede the investigation, e.g., destroy evidence, intimidate potential witnesses, or flee the area to avoid or impede the investigation.</p>
    <p> (b) From subsection (e)(8) (Notice on Individuals) because to require individual notice of disclosure of information due to compulsory legal process would pose an impossible administrative burden on DHS and other agencies and could alert the subjects of counterterrorism or law enforcement investigations to the fact of those investigations when not previously known.</p>
    <p> (c) From subsection (g)(1) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.</p>

    <p>27. The DHS/CBP-009 Nonimmigrant Information system of records consists of electronic and paper records and will be used by DHS and it’s Components. The DHS/CBP-009 Nonimmigrant Information System is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws; Investigations, inquiries, and proceedings thereunder; and national security and intelligence activities. The DHS/CBP-009 Nonimmigrant Information System contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, Tribal, foreign, or international government agencies. This system may contain records or information pertaining to the accounting of disclosures made from the Nonimmigrant Information System to other law enforcement and counterterrorism agencies (Federal, State, Local, Foreign, International or Tribal) in accordance with the published routine uses. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 522(c)(3), (e) (8), and (g) of the Privacy Act of 1974, as amended, as necessary and appropriate to protect accounting of these disclosures only, pursuant to 5 U.S.C. 552a (j)(2), and (k)(2). Further, no exemption shall be asserted with respect to biographical or travel information submitted by, and collected from, a person’s travel documents or submitted from a government computer system to support or to validate those travel documents. After conferring with the appropriate component or agency, DHS may waive applicable exemptions in appropriate circumstances and where it would not appear to interfere with or adversely affect the law enforcement purposes of the systems from which the information is recompiled or in which it is contained. Exemptions from the above particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, when information in this system of records is recompiled or is created from information contained in other systems of records subject to exemptions for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosure) because making available to a record subject the accounting of disclosures from records concerning him or her would specifically reveal any investigative interest in the individual. Revealing this information could reasonably be expected to compromise ongoing efforts to investigate a violation of U.S. law, including investigations of a known or suspected terrorist, by notifying the record subject that he or she is under investigation. This information could also permit the record subject to take measures to impede the investigation, e.g., destroy evidence, intimidate potential witnesses, or flee the area to avoid or impede the investigation.
</p>
<p>(b) From subsection (e)(8) (Notice on Individuals) because to require individual notice of disclosure of information due to compulsory legal process would pose an impossible administrative burden on DHS and other agencies and could alert the subjects of counterterrorism or law enforcement investigations to the fact of those investigations when not previously known.
</p>
<p>(c) From subsection (g) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.
</p>
<p>28. The DHS/ICE--007 Law Enforcement Support Center (LESC) Alien Criminal Response Information Management (ACRIMe) system of records consists of electronic and paper records and will be used by DHS and its components. The DHS/ICE--007 Law Enforcement Support Center Alien Criminal Response Information Management system is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; and national security and intelligence activities. The DHS/ICE--007 Law Enforcement Support Center Alien Criminal Response Information Management system contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system of records from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), and (e)(5) and (e)(8); (f), and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), and (f) pursuant to 5 U.S.C. 552a(k)(2). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in identifying or establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by: Revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identity of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G), (H) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: Refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant, timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>29. The DHS/ICE--008 Search, Arrest, and Seizure system of records consists of electronic and paper records and will be used by DHS and its components. The DHS/ICE--008 Search, Arrest, and Seizure system is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; and national security and intelligence activities. The DHS/ICE--008 Search, Arrest, and Seizure system contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and (e)(8); (f), and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), and (f) pursuant to 5 U.S.C. 552a(k)(2). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by: Revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identity of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G) and (H) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: Refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant, timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>30. The DHS/ICE--009 External Investigations system of records consists of electronic and paper records and will be used by DHS and its components. The DHS/ICE--009 External Investigations system is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; and national security and intelligence activities. The DHS/ICE--009 External Investigations system contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), and (e)(5) and (e)(8); (f), and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), and (f) pursuant to 5 U.S.C. 552a(k)(2). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by: Revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identity of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G) and (H) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: Refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant, timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>31. The DHS/ICE--010 Confidential and Other Sources of Information (COSI) system of records consists of electronic and paper records and will be used by DHS and its components. The DHS/ICE--010 Confidential and Other Sources of Information system is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: the enforcement of civil and criminal laws; and investigations, inquiries, and proceedings there under; and national security and intelligence activities. The DHS/ICE--010 Confidential and Other Sources of Information system contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and (e)(8); (f), and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), and (f) pursuant to 5 U.S.C. 552a(k)(2). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by: Revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identity of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G) and (H) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: Refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant, timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>32. The DHS/USCIS--006 Fraud Detection and National Security Data System (FDNS-DS) system of records consists of a stand alone database and paper files that will be used by DHS and its components. The DHS/USCIS--006 Fraud Detection and National Security Data System is a case management system used to record, track, and manage immigration inquiries, investigative referrals, law enforcement requests, and case determinations involving benefit fraud, criminal activity, public safety and national security concerns. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 552a (k)(2). These exemptions apply only to the extent that records in the system are subject to exemption pursuant to 5 U.S.C. 552a (k)(2). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation; and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsections (e)(4)(G) and (e)(4)(H) (Agency Requirements) because portions of this system are exempt from the individual access provisions of subsection (d) which exempts providing access because it could alert a subject to the nature or existence of an investigation, and thus there could be no procedures for that particular data. Procedures do exist for access for those portions of the system that are not exempted.
</p>
<p>(e) From subsection (e)(4)(I) (Agency Requirements) because providing such source information would impede law enforcement or intelligence by compromising the nature or existence of a confidential investigation.
</p>
<p>(f) From subsection (f) (Agency Rules) because portions of this system are exempt from the access and amendment provisions of subsection (d).
</p>
<p>33. The DHS/USCG--028 Family Advocacy Case Records system of records consists of electronic and paper records and will be used by DHS and its components. The DHS/USCG--028 Family Advocacy Case Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under. The DHS/USCG--028 Family Advocacy Case Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 552a(k)(2). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>34. The DHS/USCG--029 Notice of Arrival and Departure system consists of electronic and paper records and will be used by DHS and its components. The DHS/USCG--029 Notice of Arrival and Departure system is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder. The DHS/USCG--029 Notice of Arrival and Departure system contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies, as well as private corporate or other entities. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f), and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 552a(k)(2). However, these exemptions apply only to the extent that information in this system of records is recompiled or is created from information contained in other systems of records. After conferring with the appropriate component or agency, DHS may waive applicable exemptions in appropriate circumstances and where it would not appear to interfere with or adversely affect the law enforcement purposes of the systems from which the information is recompiled or in which it is contained. Exemptions from the above particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, when information in this system of records is recompiled or is created from information contained in other systems of records subject to exemptions for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to national security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation or subject of interest would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities or national security matter.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by: Revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identity of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: Refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>35. The DHS/Secret Service--001 Criminal Investigation Information system of records consists of electronic and paper records and will be used by DHS and its components. The DHS/Secret Service--001 Criminal Investigation Information system is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; the protection of the President of the United States or other individuals and locations pursuant to section 3056 and 3056A of Title 18. The DHS/Secret Service--001 Criminal Investigation Information system contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, international government agencies, as well as private corporate, education and other entities. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f), and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (I), and (f) pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(3). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, or protective inquiry, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or the Secret Service’s protective mission. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, or inquiry, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative or inquiry process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, or protective inquiry to the existence of the investigation or inquiry, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation or inquiry, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement or protective activities and/or could disclose security-sensitive information that could be detrimental to homeland security or the protective mission of the Secret Service.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law or protective inquiries, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation or protective inquiry. In the interests of effective law enforcement, and/or the protective mission of the Secret Service, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity, or a threat to an individual, location or event protected or secured by the Secret Service.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation or protective inquiry would alert the subject to the nature or existence of an investigation or inquiry, thereby interfering with the related investigation or inquiry and law enforcement or protective activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Individuals Providing Information) because providing such detailed information would impede law enforcement or protective activities in that it could compromise investigations or inquires by: Revealing the existence of an otherwise confidential investigation or inquiry and thereby provide an opportunity for the subject of an investigation or inquiry to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative or protective efforts; reveal the identity of witnesses in investigations or inquiries, thereby providing an opportunity for the subjects of the investigations or inquiries or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations or protective activities and discourage members of the public from cooperating as confidential informants in any future investigations or protective activities.
</p>
<p>(f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to the existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative or protective efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Maintenance of Information Used in Making any Determination) because in the collection of information for law enforcement and protective purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude Secret Service DHS agents from using their investigative and protective training and exercising good judgment to both conduct and report on investigations or other protective activities.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, or/and could result in disclosure of investigative or protective techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: Refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant, timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>36. The DHS/Secret Service--003 Non-Criminal Investigation Information system of records consists of electronic and paper records and will be used by DHS and its components. The DHS/Secret Service--003 Non-Criminal Investigation Information system is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws; criminal, civil, protective and background investigations and inquiries, and proceedings thereunder; the protection of the President of the United States or other individuals and locations pursuant to section 3056 and 3056A of Title 18; and the hiring of employees through an application process which includes the use of polygraph examinations. The DHS/Secret Service--003 Non-Criminal Investigation Information system contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies, as well as private corporate, educational and other entities. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f), and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 552a(k)(1), (k)(2), (k)(3), (k)(5), and (k)(6). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, or protective inquiry, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or the Secret Service’s protective mission. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation or inquiry, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative or inquiry process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, or protective inquiry to the existence of the investigation or inquiry, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation or inquiry, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement or protective activities and/or could disclose security-sensitive information that could be detrimental to homeland security or the protective mission of the Secret Service.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law or protective inquiries, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation or protective inquiry. In the interests of effective law enforcement and/or the protective mission of the Secret Service, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity, or a threat to an individual, location or event protected or secured by the Secret Service.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation or protective inquiry would alert the subject to the nature or existence of an investigation or inquiry, thereby interfering with the related investigation or inquiry and law enforcement or protective activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Individuals Providing Information) because providing such detailed information would impede law enforcement or protective activities in that it could compromise investigations or inquiries by: Revealing the existence of an otherwise confidential investigation or inquiry and thereby provide an opportunity for the subject of an investigation or inquiry to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative or protective efforts; reveal the identity of witnesses in investigations or inquiries, thereby providing an opportunity for the subjects of the investigations or inquiries or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations or protective activities and discourage members of the public from cooperating as confidential informants in any future investigations or protective activities.
</p>
<p>(f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to the existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative or protective efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Maintenance of Information Used in Making any Determination) because in the collection of information for law enforcement and protective purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude Secret Service agents from using their investigative and protective training, and exercising good judgment to both conduct and report on investigations or other protective activities.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, or could result in disclosure of investigative or protective techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: Refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant, timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>37. The DHS/Secret Service--004 Protection Information system of records consists of electronic and paper records and will be used by DHS and its components. The DHS/Secret Service--004 Protection Information system is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: the enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; and the protection of the President of the United States or other individuals and locations pursuant to Sections 3056 and 3056A of Title 18. The DHS/Secret Service--004 Protection Information system contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, Tribal, foreign, or international government agencies, as well as private corporate or other entities. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f), and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(3). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation or a protective inquiry to the existence of the investigation or inquiry, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or the Secret Service’s protective mission. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation or inquiry, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative or inquiry process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, or protective inquiry to the existence of the investigation or inquiry, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, or inquiry to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations, law enforcement or protective activities and/or could disclose security-sensitive information that could be detrimental to homeland security or the protective mission of the Secret Service.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law or protective inquiries, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation or protective inquiry. In the interests of effective law enforcement and/or the protective mission of the Secret Service, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity, or a possible threat to an individual, location or event protected or secured by the Secret Service.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation or protective inquiry would alert the subject to the nature or existence of an investigation or inquiry, thereby interfering with the related investigation or inquiry and law enforcement or protective activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Individuals Providing Information) because providing such detailed information would impede law enforcement or protective activities in that it could compromise investigations or inquiries by: Revealing the existence of an otherwise confidential investigation or inquiry and thereby provide an opportunity for the subject of an investigation or inquiry to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative or protective efforts; reveal the identity of witnesses, thereby providing an opportunity for the subjects of the investigations or inquiries or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations or protective activities and discourage members of the public from cooperating as confidential informants in any future investigations or protective activities.
</p>
<p>(f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to the existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative and protective efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Maintenance of Information Used in Making any Determination) because in the collection of information for law enforcement and protective purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude Secret Service agents from using their investigative and protective training and exercising good judgment to both conduct and report on investigations or other protective activities.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative or protective techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant, timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>38. The DHS/ALL--025 Law Enforcement Authority in Support of the Protection of Property Owned or Occupied by the Department of Homeland Security system of records consists of electronic and paper records and will be used by DHS and its components. The DHS/ALL--025 Law Enforcement Authority in Support of the Protection of Property Owned or Occupied by the Department of Homeland Security system is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; and national security and intelligence activities. The DHS/ALL--025 Law Enforcement Authority in Support of the Protection of Property Owned or Occupied by the Department of Homeland Security system contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>39. The DHS/ALL--017 General Legal Records system of records consists of electronic and paper records and will be used by DHS and its components. The DHS/ALL--017 General Legal Records system of records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; national security and intelligence activities; and protection of the President of the United States or other individuals pursuant to section 3056 and 3056A of Title 18. The DHS/ALL--017 General Legal Records system of records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f), and (g), pursuant to exemption 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (I), and (f), pursuant to 5 U.S.C. 552a(k)(1), (k)(2), (k)(3) and (k)(5). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by: Revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identity of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: Refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant, timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>40. The DHS/ALL--023 Personnel Security Management system of records consists of electronic and paper records and will be used by DHS and its components. The DHS/ALL--023 Personnel Security Management system is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; national security and intelligence activities; and protection of the President of the United States or other individuals pursuant to section 3056 and 3056A of Title 18. The DHS/ALL--023 Personnel Security Management system contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 552a(k)(1), (k)(2), (k)(3), and (k)(5). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>41. The DHS/NPPD/US-VISIT--001 Arrival and Departure Information system of records notice is a system for the storage and use of biographic, biometric indicator, and encounter data consolidated from various systems regarding aliens who have applied for entry, entered, or departed the United States. Information in the DHS/NPPD/US-VISIT--001 Arrival and Departure Information system of records notice is used primarily to facilitate the investigation of subjects of interest who may have violated their immigration status by remaining in the United States beyond their authorized stay; thereby supporting the several and varied missions and functions of DHS, including but not limited to: the enforcement of civil and criminal laws (including the immigration law); investigations, inquiries; national security and intelligence activities in support of the DHS mission to identify and prevent acts of terrorism against the United States. The information is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and (e)(8); (f); and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H); and (f) pursuant to 5 U.S.C. 552a(k)(1), (k)(2), (k)(3) and (k)(5). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation; and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by: revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identities of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G) and (H) (Agency Requirements), and (f) (Agency Requirements) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant, timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>42. The DHS/NPPD/US-VISIT--003 Technical Reconciliation Analysis Classification system of records (TRACS) consists of stand alone database and paper files that will be used by DHS and its components. This system of records will be used to perform a range of information management and analytic functions involving collecting, verifying, and resolving tracking of data primarily on individuals who are not United States citizens or legal permanent residents (LPRs). However, it will contain data on: (1.) U.S. citizens or LPRs who have a connection to the DHS mission (e.g., individuals who have submitted a visa application to the UK, or have made requests for a license or credential as part of a background check or security screening in connection with their hiring or retention, performance of a job function or the issuance of a license or credential for employment at DHS); (2.) U.S. citizens and LPRs who have an incidental connection to the DHS mission (e.g., individuals living at the same address as individuals who have remained in this country beyond their authorized stays); and (3.) individuals who have, over time, changed their status and became U.S. citizens or LPRs. The DHS/NPPD/US-VISIT--003 Technical Reconciliation Analysis Classification system of records is managed and maintained by the US-VISIT Program. The data contained in the DHS/NPPD/US-VISIT--003 Technical Reconciliation Analysis Classification system of records is primarily derived from DHS/NPPD/U.S-VISIT--001 Arrival and Departure Information System (ADIS); DHS/CBP--011 TECS; DHS/ICE--001 Student and Exchange Visitor Information System (SEVIS); DHS/ICE/CBP/USCIS--001--03 Enforcement Operational Immigration Records (ENFORCE/IDENT); DHS/ICE--011 Removable Alien Records System (RARS); DHS/USCIS--001 Alien File (A-File) and Central Index System (CIS); DHS/USCIS--007 Benefits Information System covering Computer Linked Application Information Management System 3 (Claims 3) and Computer Linked Application Information Management System 4 (Claims 4); DHS/USCIS Refugees, Asylum &amp;amp;amp;amp;amp;amp; Parole System (RAPS); and from the Department of State’s Consolidated Consular Database (CCD). The DHS/NPPD/US-VISIT--003 Technical Reconciliation Analysis Classification system of records also contains data from web searches for addresses and phone numbers. This data is collected by, on behalf of, in support of, or in cooperation with DHS and its components. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f); and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by: revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identity of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G), and (e)(4)(H) (Agency Requirements) because portions of this system are exempt from the individual access provisions of subsection (d) which exempts providing access because it could alert a subject to the nature or existence of an investigation, and thus there could be no procedures for that particular data. Procedures do exist for access for those portions of the system that are not exempted.
</p>
<p>(g) From subsection (e)(4)(I) (Agency Requirements) because providing such source information would impede enforcement or intelligence by compromising the nature or existence of a confidential investigation.
</p>
<p>(h) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(i) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures and evidence.
</p>
<p>(j) From subsection (f) (Agency Rules) because portions of this system are exempt from the access and amendment provisions of subsection (d).
</p>
<p>(k) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act.
</p>
<p>43. The DHS/USCG--013 Marine Information for Safety and Law Enforcement system of records consists of electronic and paper records and will be used by DHS and its components. The DHS/USCG--013 Marine Information for Safety and Law Enforcement system of records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; national security and intelligence activities. The DHS/USCG--013 Marine Information for Safety and Law Enforcement system of records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f); and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H); (I); and (f) pursuant to 5 U.S.C. 552a(k)(2). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by: revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identity of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>44. The DHS/USCG--030 Merchant Seaman’s Records system of records consists of electronic and paper records and will be used by DHS and its components. The DHS/USCG--030 Merchant Seaman’s Records system of records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under. The DHS/USCG--030 Merchant Seaman’s Records system of records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) pursuant to 5 U.S.C. 552a(k)(2). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>45. The DHS/CBP--006 Automated Targeting system of records performs screening of both inbound and outbound cargo, travelers, and conveyances. As part of this screening function and to facilitate DHS’s border enforcement mission, the DHS/CBP--006 Automated Targeting system of records compares information received with CBP’s law enforcement databases, the Federal Bureau of Investigation Terrorist Screening Center’s Terrorist Screening Database (TSDB), information on outstanding wants or warrants, information from other government agencies regarding high-risk parties, and risk-based rules developed by analysts using law enforcement data, intelligence, and past case experience. The modules also facilitate analysis of the screening results of these comparisons. This supports the several and varied missions and functions of DHS, including but not limited to: The enforcement of civil and criminal laws (including the immigration law); investigations, inquiries; national security and intelligence activities in support of the DHS mission to identify and prevent acts of terrorism against the United States. The information is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. Certain records or information in DHS/CBP--006 Automated Targeting system of records are exempt from the Privacy Act. With respect to the ATS-P module, exempt records are the targeting rule sets, risk assessment analyses, and business confidential information contained in the PNR that relates to the air and vessel carriers. No exemption shall be asserted regarding PNR data about the requester, provided by either the requester or a booking agent, brokers, or another person on the requester’s behalf. This information, upon request, may be provided to the requester in the form in which it was collected from the respective carrier, but may not include certain business confidential information of the air carrier that is also contained in the record, such as use and application of frequent flier miles, internal annotations to the air fare, etc. For other DHS/CBP--006 Automated Targeting system of records modules the only information maintained in the system is the targeting rule sets, risk assessment analyses, and a pointer to the data from the source system of records. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d)(1), (2), (3), and (4); (e)(1), (2), (3), (4)(G) through (I), (e)(5), and (8); (f); and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d)(1), (2), (3), and (4); (e)(1), (2), (3), (4)(G) through (I), (e)(5), and (8); (f); and (g) pursuant to 5 U.S.C. 552a(k)(2). These exemptions also apply to the extent that information in this system of records is recompiled or is created from information contained in other systems of records. After conferring with the appropriate component or agency, DHS may waive applicable exemptions in appropriate circumstances and where it would not appear to interfere with or adversely affect the law enforcement purposes of the systems from which the information is recompiled or in which it is contained. Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosure) because making available to a record subject the accounting of disclosures from records concerning him or her would specifically reveal any investigative interest in the individual. Revealing this information could reasonably be expected to compromise ongoing efforts to investigate a known or suspected criminal or terrorist, or other person of interest, by notifying the record subject that he or she is under investigation. This information could also permit the record subject to take measures to impede the investigation, e.g., destroy evidence, intimidate potential witnesses, or flee the area to avoid or impede the investigation. Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons: (a) From subsection (c)(3) (Accounting for Disclosure) because making available to a record subject the accounting of disclosures from records concerning him or her would specifically reveal any investigative interest in the individual. Revealing this information could reasonably be expected to compromise ongoing efforts to investigate a known or suspected terrorist by notifying the record subject that he or she is under investigation. This information could also permit the record subject to take measures to impede the investigation, e.g., destroy evidence, intimidate potential witnesses, or flee the area to avoid or impede the investigation.
</p>
<p>(b) From subsection (c)(4) (Accounting for Disclosure, notice of dispute) because certain records in this system are exempt from the access and amendment provisions of subsection (d), this requirement to inform any person or other agency about any correction or notation of dispute that the agency made with regard to those records, should not apply.
</p>
<p>(c) From subsections (d)(1), (2), (3), and (4) (Access to Records) because these provisions concern individual access to and amendment of certain records contained in this system, including law enforcement, counterterrorism, and investigatory records. Compliance with these provisions could alert the subject of an investigation to the fact and nature of the investigation, and/or the investigative interest of intelligence or law enforcement agencies; compromise sensitive information related to law enforcement, including matters bearing on national security; interfere with the overall law enforcement process by leading to the destruction of evidence, improper influencing of witnesses, fabrication of testimony, and/or flight of the subject; could identify a confidential source; reveal a sensitive investigative or intelligence technique; or constitute a potential danger to the health or safety of law enforcement personnel, confidential informants, and witnesses. Amendment of these records would interfere with ongoing counterterrorism or law enforcement investigations and analysis activities and impose an impossible administrative burden by requiring investigations, analyses, and reports to be continuously reinvestigated and revised.
</p>
<p>(d) From subsection (e)(1) (Relevancy and Necessity of Information) because it is not always possible for DHS or other agencies to know in advance what information is relevant and necessary for it to complete screening of cargo, conveyances, and passengers. Information relating to known or suspected criminals or terrorists or other persons of interest, is not always collected in a manner that permits immediate verification or determination of relevancy to a DHS purpose. For example, during the early stages of an investigation, it may not be possible to determine the immediate relevancy of information that is collected--only upon later evaluation or association with further information, obtained subsequently, may it be possible to establish particular relevance to a law enforcement program. Lastly, this exemption is required because DHS and other agencies may not always know what information about an encounter with a known or suspected criminal or terrorist or other person of interest will be relevant to law enforcement for the purpose of conducting an operational response.
</p>
<p>(e) From subsection (e)(2) (Collection of Information from Individuals) because application of this provision could present a serious impediment to counterterrorism or other law enforcement efforts in that it would put the subject of an investigation, study or analysis on notice of that fact, thereby permitting the subject to engage in conduct designed to frustrate or impede that activity. The nature of counterterrorism, and law enforcement investigations is such that vital information about an individual frequently can be obtained only from other persons who are familiar with such individual and his/her activities. In such investigations it is not feasible to rely solely upon information furnished by the individual concerning his own activities.
</p>
<p>(f) From subsection (e)(3) (Notice to Subjects), to the extent that this subsection is interpreted to require DHS to provide notice to an individual if DHS or another agency receives or collects information about that individual during an investigation or from a third party. Should the subsection be so interpreted, exemption from this provision is necessary to avoid impeding counterterrorism or other law enforcement efforts by putting the subject of an investigation, study or analysis on notice of that fact, thereby permitting the subject to engage in conduct intended to frustrate or impede that activity.
</p>
<p>(g) From subsections (e)(4)(G), (H) and (I) (Agency Requirements) because portions of this system are exempt from the access and amendment provisions of subsection (d).
</p>
<p>(h) From subsection (e)(5) (Collection of Information) because many of the records in this system coming from other systems of records are derived from other domestic and foreign agency record systems and therefore it is not possible for DHS to vouch for their compliance with this provision; however, the DHS has implemented internal quality assurance procedures to ensure that data used in its screening processes is as complete, accurate, and current as possible. In addition, in the collection of information for law enforcement and counterterrorism purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. With the passage of time, seemingly irrelevant or untimely information may acquire new significance as further investigation brings new details to light. The restrictions imposed by (e)(5) would limit the ability of those agencies’ trained investigators and intelligence analysts to exercise their judgment in conducting investigations and impede the development of intelligence necessary for effective law enforcement and counterterrorism efforts.
</p>
<p>(i) From subsection (e)(8) (Notice on Individuals) because to require individual notice of disclosure of information due to compulsory legal process would pose an impossible administrative burden on DHS and other agencies and could alert the subjects of counterterrorism or law enforcement investigations to the fact of those investigations when not previously known.
</p>
<p>(j) From subsection (f) (Agency Rules) because portions of this system are exempt from the access and amendment provisions of subsection (d). Access to, and amendment of, system records that are not exempt or for which exemption is waived may be obtained under procedures described in the related SORN or Subpart B of this Part.
</p>
<p>(k) From subsection (g) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.
</p>
    <p> 46. The DHS/CBP-007 Border Crossing Information System of Records consists of electronic and paper records and will be used by DHS and its Components. The DHS/CBP-007 Border Crossing Information System of Records is a repository of information held by DHS in connection with its several and varied missions and functions including, but not limited to the enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; and law enforcement, border security, and intelligence activities. The DHS/CBP-007 Border Crossing Information System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its Components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. At the time of border crossing and during the process of determining admissibility, CBP collects two types of data for which it claims different exemptions.</p>
    <p> (a) CBP will not assert any exemption to limit an individual from accessing or amending his or her record with respect to information maintained in the system that is collected from a person at the time of crossing and submitted by that person’s air, sea, bus, or rail carriers.</p>
    <p> The Privacy Act requires DHS to maintain an accounting of the disclosures made pursuant to all routine uses. Pursuant to 5 U.S.C. 552a(j)(2), CBP will not disclose the fact that a law enforcement or intelligence agency has sought particular records because it may affect ongoing law enforcement activities. The Secretary of Homeland Security has exempted this system from subsections (c)(3), (e)(8), and (g) of the Privacy Act of 1974, as amended, as is necessary and appropriate to protect this information. Further, DHS will claim exemption from subsection (c)(3) of the Privacy Act of 1974, as amended, pursuant to 5 U.S.C. 552a(k)(2) as is necessary and appropriate to protect this information. Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p> (i) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.</p>
    <p> (ii) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.</p>
    <p> (iii) From subsection (g) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.</p>
    <p> (b) Additionally, this system contains records or information recompiled from or created from information contained in other systems of records that are exempt from certain provisions of the Privacy Act. For these records or information only, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3), (c)(4); (d)(1)-(4); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f); and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2), has exempted this system from the following provisions of the Privacy Act, 5 U.S.C. 552a(c)(3); (d)(1)-(4); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>(i) From subsection (c)(3) and (c)(4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.</p>
    <p> (ii) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p> (iii) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p> (iv) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.</p>
    <p> (v) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.</p>
    <p> (vi) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, potential witnesses, and confidential informants.</p>
    <p> (vii) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with subsection (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.</p>
    <p> (viii) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.</p>
    <p>  (ix) From subsection (g) (Civil Remedies) to the extent that the system is exempt</p>
    <p>from other specific subsections of the Privacy Act.</p>

    <p>47. The Visa Security Program Records (VSPR) system of records consists of electronic and paper records and will be used by the Department of Homeland Security (DHS) U.S. Immigration and Customs Enforcement (ICE). VSPR consists of information created in support of the Visa Security Program, the purpose of which is to identify persons who may be ineligible for a U.S. visa because of criminal history, terrorism association, or other factors and convey that information to the State Department, which decides whether to issue the visa. VSPR contains records on visa applicants for whom a visa security review is conducted. VSPR contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, Tribal, foreign, or international government agencies. Pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act, portions of this system are exempt from 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), and (e)(4)(H), (e)(5) and (e)(8); (f); and (g). Pursuant to 5 U.S.C. 552a(k)(1) and (k)(2), this system is exempt from the following provisions of the Privacy Act, subject to the limitations set forth in those subsections: 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), and (f). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the individual to the existence of an investigation in the form of a visa security review predicated on classified, national security, law enforcement, foreign government, or other sensitive information. Disclosure of the accounting would therefore present a serious impediment to ICE’s Visa Security Program, immigration enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, thereby undermining the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could alert the individual to the existence of an investigation in the form of a visa security review predicated on classified, national security, law enforcement, foreign government, or other sensitive information. Revealing the existence of an otherwise confidential investigation could also provide the visa applicant an opportunity to conceal adverse information or take other actions that could thwart investigative efforts; and reveal the identity of other individuals with information pertinent to the visa security review, thereby providing an opportunity for the applicant to interfere with the collection of adverse or other relevant information from such individuals. Access to the records would therefore present a serious impediment to the enforcement of Federal immigration laws, law enforcement efforts and/or efforts to preserve national security. Amendment of the records could interfere with ICE’s ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose classified and other security-sensitive information that could be detrimental to national or homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations of visa applications, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interest of effective enforcement of Federal immigration laws, it is appropriate to retain all information that may be relevant to the determination whether an individual is eligible for a U.S. visa.
</p>
<p>(d) From subsection (e)(2) (Collection of Information From Individuals) because requiring that information be collected from the visa applicant would alert the subject to the fact of an investigation in the form of a visa security review, and to the existence of adverse information about the individual, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede immigration enforcement activities in that it could compromise investigations by: Revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the visa applicant to conceal adverse information, or take other actions that could thwart investigative efforts; Reveal the identity of other individuals with information pertinent to the visa security review, thereby providing an opportunity for the applicant to interfere with the collection of adverse or other relevant information from such individuals; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G) and (H) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative and immigration enforcement efforts as described above.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) because to require individual notice of disclosure of information due to compulsory legal process would pose an impossible administrative burden on DHS and other agencies and could alert the subjects of counterterrorism, law enforcement, or intelligence investigations to the fact of those investigations when not previously known.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: Refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant, timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>48. The DHS/ICE-011 Immigration and Enforcement Operational Records system of records consists of electronic and paper records and will be used by DHS and its components. The DHS/ICE-011 Immigration and Enforcement Operational Records system of records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; and national security and intelligence activities. The DHS/ICE-011 Immigration and Enforcement Operational Records system of records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5), and (e)(8); (f); and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H); and (f) pursuant to 5 U.S.C. 552a(k)(2). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by: Revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identity of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G) and (H) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: Refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>49. The DHS/USCIS--009 Compliance Tracking and Management System of Records consists of electronic and paper files that will be used by DHS and its components. This system of records will be used to perform a range of information management and analytic functions involving minimizing misuse, abuse, discrimination, breach of privacy, and fraudulent use of SAVE and E-Verify. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitation set forth in 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 552a(k)(2). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interest of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsections (e)(4)(G), (H), and (I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>50. The Immigration and Customs Enforcement (ICE)--006 Intelligence Records System (IIRS) consists of electronic and paper records and will be used by the Department of Homeland Security (DHS). IIRS is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: the enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; and national security and intelligence activities. IIRS contains information that is collected by other federal and foreign government agencies and may contain personally identifiable information. Pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act, portions of this system are exempt from 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and (e)(8); (f), and (g). Pursuant to 5 U.S.C. 552a(k)(2), this system is exempt from the following provisions of the Privacy Act, subject to the limitations set forth in those subsections: 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), and (f). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by: revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identity of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G) and (H) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>51. The DHS/ALL--027 The History of the Department of Homeland Security System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/ALL--027 The History of the Department of Homeland Security System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to the enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; national security and intelligence activities; and protection of the President of the United States or other individuals pursuant to section 3056 and 3056A of Title 18. The DHS/ALL--027 The History of the Department of Homeland Security System of Records contain information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8), (e)(12); (f); (g)(1); and (h) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) pursuant to 5 U.S.C. 552a(k)(1), (k)(2), (k)(3), and (k)(5). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.
</p>
<p>(f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with subsection (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (e)(12) (Computer Matching) if the agency is a recipient agency or a source agency in a matching program with a non-Federal agency, with respect to any establishment or revision of a matching program, at least 30 days prior to conducting such program, publish in the <i>Federal Register</i> notice of such establishment or revision.
</p>
<p>(j) From subsection (g)(1) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.
</p>
<p>(k) From subsection (h) (Legal Guardians) the parent of any minor, or the legal guardian of any individual who has been declared to be incompetent due to physical or mental incapacity or age by a court of competent jurisdiction, may act on behalf of the individual.
</p>
<p>52. The DHS/ALL--031 ISE SAR Initiative System of Records consists of electronic records and will be used by DHS and its components. The DHS/ALL--031 ISE SAR Initiative System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; national security and intelligence activities; and protection of the President of the U.S. or other individuals pursuant to Section 3056 and 3056A of Title 18. The DHS/ALL--031 ISE SAR Initiative System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS, its components, as well as other federal, state, local, tribal, or foreign agencies or private sector organization and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8), and (e)(12); (f); (g)(1); and (h) of the Privacy Act pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitation set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) of the Privacy Act pursuant to 5 U.S.C. 552a(k)(2) and (k)(3). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (c)(4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.
</p>
<p>(f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with subsection (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (e)(12) (Computer Matching) if the agency is a recipient agency or a source agency in a matching program with a non-Federal agency, with respect to any establishment or revision of a matching program, at least 30 days prior to conducting such program, publish in the <i>Federal Register</i> notice of such establishment or revision.
</p>
<p>(j) From subsection (g)(1) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.
</p>
<p>(k) From subsection (h) (Legal Guardians) the parent of any minor, or the legal guardian of any individual who has been declared to be incompetent due to physical or mental incapacity or age by a court of competent jurisdiction, may act on behalf of the individual.
</p>
<p>53. The DHS/USCIS-012 CIDR System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/USCIS-012 CIDR System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to the enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; national security and intelligence activities; and protection of the President of the U.S. or other individuals pursuant to Section 3056 and 3056A of Title 18. The DHS/USCIS-012 CIDR System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain PII collected by other federal, state, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) pursuant to 5 U.S.C. 552a (k)(1) and (k)(2). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting could also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>54. The DHS/USCG--008 Courts Martial Case Files System of Records consists of electronic and paper records and will be used by DHS/USCG. The DHS/USCG--008 Courts Martial Case Files System of Records is a repository of information held by DHS/USCG in connection with its several and varied missions and functions, including, but not limited to: the enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; and national security and intelligence activities. The DHS/USCG--008 Courts Martial Case Files System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS/USCG and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f); and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitations set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) pursuant to 5 U.S.C. 552a(k)(1) and (k)(2). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (c)(4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation, and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation, to the existence of the investigation, and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an impossible administrative burden by requiring investigations to be continuously reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of an investigation, thereby interfering with the related investigation and law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information would impede law enforcement in that it could compromise investigations by revealing the existence of an otherwise confidential investigation and thereby provide an opportunity for the subject of an investigation to conceal evidence, alter patterns of behavior, or take other actions that could thwart investigative efforts; reveal the identity of witnesses in investigations, thereby providing an opportunity for the subjects of the investigations or others to harass, intimidate, or otherwise interfere with the collection of evidence or other information from such witnesses; or reveal the identity of confidential informants, which would negatively affect the informant’s usefulness in any ongoing or future investigations and discourage members of the public from cooperating as confidential informants in any future investigations.
</p>
<p>(f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements), and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’ ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal, and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s: refusal to amend a record; refusal to comply with a request for access to records; failure to maintain accurate, relevant, timely and complete records; or failure to otherwise comply with an individual’s right to access or amend records.
</p>
<p>55. The DHS/FEMA-011 Training and Exercise Program Records System of Records consists of electronic and paper records and will be used by FEMA. The DHS/FEMA-011 Training and Exercise Program Records System of Records consists of electronic and paper records and will be used by DHS and its components and offices to maintain records about individual training, including enrollment and participation information, information pertaining to class schedules, programs, and instructors, training trends and needs, testing and examination materials, and assessments of training efficacy. The data will be collected by employee name or other unique identifier. The collection and maintenance of this information will assist DHS in meeting its obligation to train its personnel and contractors in order to ensure that the agency mission can be successfully accomplished. The DHS/FEMA-011 General Training and Exercise Program Records System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) pursuant to 5 U.S.C. 552a (k)(6) where it states: "For testing or examination material used solely to determine individual qualifications for appointment or promotion in the Federal service the disclosure of which would compromise the objectivity or fairness of the testing or examination process."
</p>
<p>Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>56. The DHS/TSA-023 Workplace Violence Prevention Program System of Records consists of electronic and paper records and is used by the TSA in the administration of its Workplace Violence Prevention Program, an internal TSA program designed to prevent and respond to workplace violence. The DHS/TSA-023 Workplace Violence Prevention Program System of Records is a repository of information held by TSA in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under. The DHS/TSA-023 Workplace Violence Prevention Program System of Records contains information collected by TSA, and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted portions of this system from the following provisions of the Privacy Act, subject to the limitations set forth in (c)(3); (d); (e)(1), (e)(4)(G); (e)(4)(H); (e)(4)(I); and (f) of the Privacy Act pursuant to 5 U.S.C. 552a(k)(2). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>57. The DHS/OPS-002 National Operations Center Tracker and Senior Watch Officer Logs Records System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/OPS-002 National Operations Center Tracker and Senior Watch Officer Logs Records System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; national security and intelligence activities; and protection of the President of the U.S. or other individuals pursuant to Section 3056 and 3056A of Title 18. The DHS/OPS-002 National Operations Center Tracker and Senior Watch Officer Logs Records System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security is exempting this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(3). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>59. The DHS/NPPD-001 NICC Records System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/NPPD-001 NICC Records System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; national security and intelligence activities The DHS/NPPD-001 NICC Records System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, state, local, Tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f) pursuant to 5 U.S.C. 552a(k)(1) and (k)(2). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants. 
</p>
<p>64. The DHS/USCIS-015 Electronic Immigration System-2 Account and Case Management System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/USCIS-015 Electronic Immigration System-2 Account and Case Management is a repository of information held by USCIS to serve its mission of processing immigration benefits. This system also supports certain other DHS programs whose functions include, but are not limited to, the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; and national security and intelligence activities. The DHS/USCIS-015 Electronic Immigration System-2 Account and Case Management System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, Tribal, foreign, or international government agencies. This system is exempted from the following provisions of the Privacy Act pursuant to 5 U.S.C. 552a(k)(2): 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). Additionally, many of the functions in this system require retrieving records from law enforcement systems. Where a record received from another system has been exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions in accordance with this rule. Exemptions from these particular subsections are justified, on a case-by-case basis determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and/or reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records, or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system, would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>65. The DHS/USCIS-016 Electronic Immigration System-3 Automated Background Functions System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/USCIS-016 Electronic Immigration System-3 Automated Background Functions System of Records is a repository of information held by USCIS to serve its mission of processing immigration benefits. This system also supports certain other DHS programs whose functions include, but are not limited to, the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; and national security and intelligence activities. The DHS/USCIS-016 Electronic Immigration System-3 Automated Background Functions System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, Tribal, foreign, or international government agencies. This system is exempted from the following provisions of the Privacy Act pursuant to 5 U.S.C. 552a(k)(2): 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). Additionally, many of the functions in this system require retrieving records from law enforcement systems. Where a record received from another system has been exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions in accordance with this rule. Exemptions from these particular subsections are justified, on a case-by-case basis determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and/or reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records, or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system, would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
    <p> 66. The DHS/ALL-030 Use of the Terrorist Screening Database System of Records consists of electronic and paper records and will be used by DHS and its Components. The DHS/ALL-030 Use of the Terrorist Screening Database System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, the enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; and national security and intelligence activities. The Terrorist Screening Database belongs to the Department of Justice (DOJ)/Federal Bureau of Investigation (FBI). DHS does not change or alter these records. All records within the DHS/ALL-030 Use of the Terrorist Screening Database System of Records are collected and disseminated by the DOJ/FBI and are covered by the DOJ/FBI-019, "Terrorist Screening Records Center System," 72 FR 77846 (Dec. 14, 2011). Because DHS does not make any changes to the records obtained from DOJ/FBI, the same exemptions outlined in the DOJ/FBI SORN, and reasons provided in its implementing regulations for use of such exemptions at 28 CFR 16.96, transfer and apply.  The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3), (c)(4), (d), (e)(1), (e)(2), (e)(3), (e)(5), (e)(8), and (g). When a record has been received from DOJ/FBI-019 Terrorist Screening Records System of Records and has been exempted in that source system, DHS will claim the same exemptions for those records that are claimed for that original primary system of records from which they originated and claims any additional exemptions set forth here.  Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.</p>
    <p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.</p>
    <p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.</p>
    <p>(f) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with subsection (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.</p>
    <p>(g) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.</p>
    <p>(h) From subsection (g) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.</p>

    <p>67. The DHS/FEMA-012 Suspicious Activity Reporting System of Records consists of electronic and paper records and will be used by DHS/FEMA and its components. The DHS/FEMA--012 Suspicious Activity Reporting System of Records is a repository of information held by DHS/FEMA to serve its mission to support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, recover from, and mitigate all hazards. This system also supports certain other DHS/FEMA programs whose functions include, but are not limited to, the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; and national security and intelligence activities. The DHS/FEMA-012 Suspicious Activity Reporting System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS/FEMA and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act pursuant to 5 U.S.C. 552a(k)(2); (c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). Exemptions from these particular subsections are justified, on a case-by-case basis determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS/FEMA as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS/FEMA or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS/FEMA is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>68. The DHS OPS-003 Operations Collection, Planning, Coordination, Reporting, Analysis, and Fusion System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS OPS-003 Operations Collection, Planning, Coordination, Reporting, Analysis, and Fusion System of Records is a repository of information held by DHS to serve its several and varied missions and functions. This system also supports certain other DHS programs whose functions include, but are not limited to, the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; national security and intelligence activities; and protection of the President of the U.S. or other individuals pursuant to Section 3056 and 3056A of Title 18. The DHS OPS-003 Operations Collection, Planning, Coordination, Reporting, Analysis, and Fusion System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies. This system is exempted from the following provisions of the Privacy Act pursuant to 5 U.S.C. 552a(k)(1), (k)(2), (k)(3): 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access and Amendment) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>69. The DHS/CBP--017 Analytical Framework for Intelligence (AFI) System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/CBP--017 Analytical Framework for Intelligence (AFI) System of Records is a repository of information held by DHS to enhance DHS’s ability to: Identify, apprehend, and/or prosecute individuals who pose a potential law enforcement or security risk; aid in the enforcement of the customs and immigration laws, and other laws enforced by DHS at the border; and enhance United States security. This system also supports certain other DHS programs whose functions include, but are not limited to, the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; and national security and intelligence activities. The DHS/CBP--017 Analytical Framework for Intelligence (AFI) System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies.
</p>
<p>(a) The Secretary of Homeland Security has exempted this system from certain provisions of the Privacy Act as follows:
</p>
<p>(1) Pursuant to 5 U.S.C. 552a(j)(2), the system is exempt from 5 U.S.C. 552a(c)(3) and (c)(4), (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8), (f), and (g).
</p>
<p>(2) Pursuant to 5 U.S.C. 552a(j)(2), the system (except for any records that were ingested by AFI where the source system of records already provides access and/or amendment under the Privacy Act) is exempt from 5 U.S.C. 552a(d)(1), (d)(2), (d)(3), and (d)(4).
</p>
<p>(3) Pursuant to 5 U.S.C. 552a(k)(1), the system is exempt from 5 U.S.C. 552a(c)(3); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).
</p>
<p>(4) Pursuant to 5 U.S.C. 552a(k)(1), the system is exempt from (d)(1), (d)(2), (d)(3), and (d)(4).
</p>
<p>(5) Pursuant to 5 U.S.C. 552a(k)(2), the system is exempt from 5 U.S.C. 552a(c)(3); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).
</p>
<p>(6) Pursuant to 5 U.S.C. 552a(k)(2),the system (except for any records that were ingested by AFI where the source system of records already provides access and/or amendment under the Privacy Act) is exempt from (d)(1), (d)(2), (d)(3), and (d)(4).
</p>
<p>(b) Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(1) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(2) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(3) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement and national security, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(4) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement and national security activities.
</p>
<p>(5) From subsection (e)(3) (Notice to Individuals) because providing such detailed information could impede law enforcement and national security by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.
</p>
<p>(6) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
</p>
<p>(7) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with subsection (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
</p>
<p>(8) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(9) From subsection (g)(1) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.
</p>
<p>70. DHS/USCIS-ICE-CBP-001 Alien File, Index, and National File Tracking System of Records consists of electronic and paper records and will be used by USCIS, ICE, and CBP. DHS/USCIS-ICE-CBP-001 Alien File, Index, and National File Tracking System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to: The enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; and national security and intelligence activities. DHS/USCIS-ICE-CBP-001 Alien File, Index, and National File Tracking System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, territorial, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act pursuant to 5 U.S.C. 552a(j)(2): 5 U.S.C. 552a(c)(3) and (c)(4), (d), (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8), (e)(12), (f), (g)(1), and (h). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act pursuant to 5 U.S.C. 552a(k)(1) and (k)(2): 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f). Exemptions from these particular subsections may be justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.
</p>
<p>(e) From subsection (e)(3) (Notice to Individuals) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses, DHS employees, or confidential informants.
</p>
<p>(f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, potential witnesses, and confidential informants.
</p>
<p>(g) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with subsection (e)(5) would impede DHS officials’ ability to effectively use their investigative training and exercise good judgment to both conduct and report on investigations.
</p>
<p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.
</p>
<p>(i) From subsection (e)(12) (Computer Matching) if the agency is a recipient agency or a source agency in a matching program with a non-Federal agency, with respect to any establishment or revision of a matching program, at least 30 days prior to conducting such program, publish in the <i>Federal Register</i> notice of such establishment or revision.
</p>
<p>(j) From subsection (g)(1) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act. (k) From subsection (h) (Legal Guardians) if the parent of any minor, or the legal guardian of any individual who has been declared to be incompetent due to physical or mental incapacity or age by a court of competent jurisdiction, is acting on behalf of the individual.
</p>
<p>71. The Department of Homeland Security (DHS)/Transportation Security Administration (TSA)-021 TSA Pre&amp;amp;amp;amp;amp;#10003;&amp;amp;amp;amp;amp;#174; Application Program System of Records consists of electronic and paper records and will be used by DHS/TSA. The DHS/TSA-021 Pre&amp;amp;amp;amp;amp;#10003;&amp;amp;amp;amp;amp;#174; Application Program System of Records is a repository of information held by DHS/TSA on individuals who voluntarily provide personally identifiable information (PII) to TSA in return for enrollment in a program that will make them eligible for expedited security screening at designated airports. This System of Records contains PII in biographic application data, biometric information, pointer information to law enforcement databases, payment tracking, and U.S. application membership decisions that support the TSA Pre&amp;amp;amp;amp;amp;#10003;&amp;amp;amp;amp;amp;#174; Application Program membership decisions. The DHS/TSA-021 TSA Pre&amp;amp;amp;amp;amp;#10003;&amp;amp;amp;amp;amp;#174; Application Program System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain PII collected by other federal, state, local, tribal, territorial, or foreign government agencies. The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(1) and (k)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3); (d); (e)(1); (e)(4)(G), (H), and (I); and (f). Where a record received from another system has been exempted in that source system under 5 U.S.C. 552a(k)(1) and (k)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here. Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting also would permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsections (e)(4)(G), (H), and (I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to the existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, potential witnesses, and confidential informants.
</p>
<p>72.
</p>
    <p>The DHS/ICE-014 Homeland Security Investigations Forensic Laboratory System of Records consists of electronic and paper records that will be used by DHS and its components. The DHS/ICE-014 Homeland Security Investigations Forensic Laboratory System of Records contains records of evidence and cases submitted to the HSI-FL. This information will include information on the individual submitting the request, identify the evidence submitted, track the evidence as it moves throughout the HSI-FL, capture case notes and results of examinations, store electronic images of evidence, and produce reports of findings. Other case-related records are maintained, including descriptions of expert witness testimony provided by HSI-FL employees. Records in the DHS/ICE-014 Homeland Security Investigations Forensic Laboratory System of Records also include the library of genuine, altered, and counterfeit travel and identity documents provided to the HSI-FL by international organizations, government agencies, and law enforcement organizations from across the United States and around the world to research methods of document production and authenticate documents through comparative forensic examinations. The DHS/ICE-014 Homeland Security Investigations Forensic Laboratory System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components, and may contain personally identifiable information (PII) collected by other federal, state, local, tribal, foreign, or international government agencies. The Secretary of the Department of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (f); and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2), has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). Where a record received from another system has been exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here. Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>
        (a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
    </p>
    <p>
        (b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
    </p>
    <p>
        (c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
    </p>
    <p>
        (d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.
    </p>
    <p>
        (e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.
    </p>
    <p>
        (f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.
    </p>
    <p>
        (g) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with subsection (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.
    </p>
        <p>
            (h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS's ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.
        </p>
    <p>
        (i) From subsection (g)(1) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.
    </p>
    <p>73. The DHS/NPPD--002 Chemical Facility Anti-Terrorism Standards Personnel Surety Program System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/NPPD--002 Chemical Facility Anti-Terrorism Standards Personnel Surety Program System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to the enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; and national security and intelligence activities. The DHS/NPPD--002 Chemical Facility Anti-Terrorism Standards Personnel Surety Program System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth therein: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). These exemptions are made pursuant to 5 U.S.C. 552a(k)(1) and (k)(2).
</p>
<p>In addition to records under the control of DHS, the DHS/NPPD--002 Chemical Facility Anti-Terrorism Standards Personnel Surety Program System of Records may include records originating from systems of records of other law enforcement and intelligence agencies, which may be exempt from certain provisions of the Privacy Act. DHS does not, however, assert exemption from any provisions of the Privacy Act with respect to information submitted by high-risk chemical facilities.
</p>
<p>To the extent the DHS/NPPD--002 Chemical Facility Anti-Terrorism Standards Personnel Surety Program System of Records contains records originating from other systems of records, DHS will rely on the exemptions claimed for those records in the originating systems of records. Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:
</p>
<p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest, on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.
</p>
<p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.
</p>
<p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.
</p>
<p>(d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, potential witnesses, and confidential informants.
</p>
    <p>74. The DHS/CBP-022 Electronic Visa Update System (EVUS) System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/CBP-022 EVUS System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including the enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; national security and intelligence activities. This system of records covers information collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies. As part of the process of determining EVUS eligibility or admissibility to the United States, CBP collects two types of data for which it claims different exemptions.</p>
    <p>(a) CBP will not assert any exemption to limit an individual from accessing or amending his or her record under subsection 552a(d) with respect to information maintained in the system as it relates to data submitted by or on behalf of a person who travels to visit the United States and crosses the border, nor shall an exemption be asserted with respect to the resulting determination (approval or denial). However, pursuant to 5 U.S.C. 552a(j)(2), CBP will not disclose the fact that a law enforcement or intelligence agency has sought particular records because it may affect ongoing law enforcement activities, and thus, the Secretary of Homeland Security has exempted such records covered by this system from sections (c)(3), (e)(8), and (g) of the Privacy Act of 1974, as amended, as is necessary and appropriate to protect this information. Further, DHS will claim exemption from section (c)(3) of the Privacy Act of 1974, as amended, pursuant to 5 U.S.C. 552a(k)(2) as is necessary and appropriate to protect this information.</p>
    <p>(b) Additionally, this system contains law enforcement and other derogatory records or information recompiled from or created from information contained in other systems of records that are exempt from certain provisions of the Privacy Act, and possibly relied upon as the basis for denial of an EVUS application. For these records or information only, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3), (c)(4); (d)(1)-(4); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), and (e)(8); (f); and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2), has exempted this system from the following provisions of the Privacy Act, 5 U.S.C. 552a(c)(3); (d)(1)-(4); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).</p>
    <p>Exemptions from these particular subsections cited above under (a) and (b) are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>(i) From subsection (c)(3) and (c)(4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.</p>
    <p>(ii) From subsection (d) (Access and Amendment to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p>(iii) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p>(iv) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.</p>
    <p>(v) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.</p>
    <p>(vi) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, potential witnesses, and confidential informants.</p>
    <p>(vii) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with subsection (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.</p>
    <p>(viii) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS's ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.</p>
    <p>
        (ix) From subsection (g) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.
     </p>
    <p>75. The DHS/ICE-015 LeadTrac System of Records consists of electronic and paper records and will be used by ICE investigative and homeland security personnel. The DHS/ICE-015 LeadTrac System of Records is a repository of information held by ICE for analytical and investigative purposes. The system is used to conduct research supporting the production of law enforcement activities; provide lead information for investigative inquiry and follow-up; assist in the conduct of ICE criminal and administrative investigations; assist in the disruption of terrorist or other criminal activity; and discover previously unknown connections among existing ICE investigations. The DHS/ICE-015 LeadTrac System of Records contains aggregated data from ICE and DHS law enforcement and homeland security IT systems, as well as data uploaded by ICE personnel for analysis from various public, private, and commercial sources during the course of an investigation or analytical project. The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (f); and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3), (c)(4); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). When a record received from another system has been exempted in that source system under 5 U.S.C. 552a(j)(2) or (k)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.</p>
    <p>Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process. Disclosure of corrections or notations of dispute may impede investigations by requiring DHS to inform each witness or individual contacted during the investigation of each correction or notation pertaining to information provided them during the investigation.</p>
    <p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose classified and other security-sensitive information that could be detrimental to homeland security.</p>
    <p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.</p>
    <p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.</p>
    <p>(f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise establishing procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, potential witnesses, and confidential informants.</p>
    <p>(g) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with subsection (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.</p>
    <p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS's ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.</p>
    <p>(i) From subsection (g)(1) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.</p>
    <p>76. The DHS/CBP-023 Border Patrol Enforcement Records (BPER) System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/CBP-023 BPER System of Records is a repository of information held by DHS/CBP in connection with its several and varied missions and functions, including, but not limited to the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; and national security and intelligence activities. The DHS/CBP-023 BPER System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a (c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5), (e)(8); and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a (c)(3); (d); (e)(1), (e)(4)(G), and (e)(4)(H). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.</p>
    <p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.</p>
    <p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.</p>
    <p>(f) From subsections (e)(4)(G) and (e)(4)(H) (Agency Requirements) because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.</p>
    <p>(g) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with subsection (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.</p>
    <p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS's ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.</p>
    <p>(i) From subsection (g)(1) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.</p>
    <p>77. The DHS/USCG-031 USCG Law Enforcement (ULE) System of Records
        consists of electronic and paper records and will be used by DHS and its components. The DHS/USCG-031 USCG Law Enforcement (ULE) System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; and national security and intelligence activities. The DHS/USCG-031 USCG Law Enforcement (ULE) System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies.  The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a (c)(3-4); (d); (e)(1-3), (e)(5), (e)(8); and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2) has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a (c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).  When a record received from another system has been exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.
    </p>
    <p>Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.</p>
    <p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.</p>
    <p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.</p>
    <p>(f) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with subsection (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.</p>
    <p>(g) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.</p>
    <p>(h) From subsection (g) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.</p>
    <p> 78. The DHS/ALL-039 Foreign Access Management System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/ALL-039 Foreign Access Management System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; and national security and intelligence activities. The DHS/ALL-039 Foreign Access Management System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies.  The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). When a record received from another system has been exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.  Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process. When an investigation has been completed, information on disclosures made may continue to be exempted if the fact that an investigation occurred remains sensitive after completion.</p>
    <p>(b) From subsection (d) (Access and Amendment to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p>(d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.</p>
    <p>79. The DHS/CBP-024 CBP Intelligence Records System (CIRS) System of Records consists of electronic and paper records and will be used by DHS and its components. The CIRS is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; and national security and intelligence activities. The CIRS contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, state, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I); (e)(5), and (e)(8); (f); and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(1) and (k)(2), has exempted this system from the following provisions of the Privacy Act, 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f). When this system receives a record from another system exempted in that source system under 5 U.S.C. 552a(k)(1), (k)(2), or (j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here. Exemptions from these particular subsections are justified, on a case by case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process. Information on a completed investigation may be withheld and exempt from disclosure if the fact that an investigation occurred remains sensitive after completion.</p>
    <p>(b) From subsection (d) (Access and Amendment to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of Federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.</p>
    <p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.</p>
    <p>(f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules) because portions of this system are exempt from the individual access and amendment provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access, amend, and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.</p>
    <p>(g) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with subsection (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.</p>
    <p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.</p>
    <p>(i) From subsection (g) to the extent that the system is exempt from other specific subsections of the Privacy Act relating to individuals’ rights to access and amend their records contained in the system. Therefore, DHS is not required to establish rules or procedures pursuant to which individuals may seek a civil remedy for the agency’s refusal to amend a record, refusal to comply with a request for access to records, failure to maintain accurate, relevant timely and complete records, or its failure to otherwise comply with an individual’s right to access or amend records.</p>
    <p> 80. The DHS/ICE-007 Criminal History and Immigration Verification (CHIVe) System of Records consists of electronic and paper records and will be used by DHS and its components. The CHIVe System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including the enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; and national security and intelligence activities. The CHIVe System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3) and (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (f); and (g). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H); and (f). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process. Information on a completed investigation may be withheld and exempt from disclosure if the fact that an investigation occurred remains sensitive after completion.</p>
    <p>(b) From subsection (d) (Access and Amendment to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.</p>
    <p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.</p>
    <p>(f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.</p>
    <p> (g) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with subsection (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.</p>
    <p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.</p>
    <p> (j) From subsection (g) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.</p>

    <p>81. The DHS/ICE-016 FALCON Search and Analysis (FALCON-SA) System of Records consists of electronic and paper records and will be used by DHS and its components. The FALCON-SA System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including the enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; and national security and intelligence activities. The FALCON-SA System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3) and (c)(4): (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (f); and (g) pursuant to 5 U.S.C. 552a(j)(2).  Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) pursuant to 5 U.S.C. 552a(k)(2). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process. Information on a completed investigation may be withheld and exempt from disclosure if the fact that an investigation occurred remains sensitive after completion.</p>
    <p>(b) From subsection (d) (Access and Amendment to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.</p>
    <p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.</p>
    <p>(f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.</p>
    <p>(g) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete. Compliance with subsection (e)(5) would preclude DHS agents from using their investigative training and exercise of good judgment to both conduct and report on investigations.</p>
    <p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.</p>
    <p>(j) From subsection (g) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.</p>
    <p> 82. The DHS/ALL-045 Statistical Immigration Data Production and Reporting System of Records consists of electronic and paper records and will be used by DHS and its Components. The DHS/ALL-045 Statistical Immigration Data Production and Reporting System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; national security and intelligence activities. The DHS/ALL-045 Statistical Immigration Data Production and Reporting System of Records System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies.</p>
    <p> For records created and aggregated by DHS OIS, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(4), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). In addition to the reasons stated below, the reason for exempting the system of records is that disclosure of statistical records (including release of accounting for disclosures) would in most instances be of no benefit to a particular individual since the records do not have a direct effect on a given individual.</p>
    <p>Where a record received from another system has been exempted in that source system under 5 U.S.C. 552a(j)(2) or (k)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.</p>
    <p>Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures for records derived from DHS operational systems could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process. When an investigation has been completed, information on disclosures made may continue to be exempted if the fact that an investigation occurred remains sensitive after completion.</p>
    <p>(b) From subsection (d) (Access and Amendment to Records) because access to the records contained in this system of records that are derived from records from DHS operational systems could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and would impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity, including statistics records covered by this system that derived from records originating from DHS operational systems.</p>
    <p>(f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.</p>
        <p> 83. The Department of Homeland Security (DHS)/ALL-046 Counterintelligence Program System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/ALL-046 Counterintelligence Program System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; national security and intelligence activities; and protection of the President of the U.S. or other individuals pursuant to Section 3056 and 3056A of Title 18. The system of records covers information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies.</p>
    <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act, 5 U.S.C. secs. 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8), (e)(12); (f); and (g)(1). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. secs. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.</p>
    <p>(b) From subsection (d) (Access and Amendment to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities. Further, permitting amendment to counterintelligence records after an investigation has been completed would impose an unmanageable administrative burden. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.</p>
    <p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.</p>
    <p>(f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.</p>
    <p> (g) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete.</p>
    <p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.</p>
    <p>(i) From subsection (e)(12) (Matching Agreements) because requiring DHS to provide notice of a new or revised matching agreement with a non-Federal agency, if one existed, would impair DHS operations by indicating which data elements and information are valuable to DHS’s analytical functions, thereby providing harmful disclosure of information to individuals who would seek to circumvent or interfere with DHS’s missions.</p>
    <p>
        (j) From subsection (g)(1) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.
    </p>
    <p> 84. The U.S. Department of Homeland Security (DHS)/U.S. Customs and Border Protection (CBP)-002 Trusted and Registered Traveler Program (TRTP) System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/CBP-002 TRTP System of Records collects and maintains records on individuals who voluntarily provide personally identifiable information to U.S. Customs and Border Protection in return for enrollment in a program that will make them eligible for dedicated CBP processing at designated U.S. border ports of entry and foreign preclearance facilities. The DHS/CBP-002 TRTP system of records contains personally identifiable information in biographic application data, biometric information, conveyance information, pointer information to other law enforcement databases that support the DHS/CBP membership decision, Law Enforcement risk assessment worksheets, payment tracking numbers, and U.S. or foreign trusted traveler membership decisions in the form of a "pass/fail."</p>
    <p> The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (f); and (g)(1). Additionally, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2), has exempted records created during the background check and vetting process from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).</p>
    <p>Also, the Privacy Act requires DHS maintain an accounting of such disclosures made pursuant to all routine uses. However, disclosing the fact that CBP has disclosed records to an external law enforcement and/or intelligence agency may affect ongoing law enforcement, intelligence, or national security activity. As such, the Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2) and (k)(2) has exempted these records from (c)(3), (e)(8), and (g)(1) of the Privacy Act, as is necessary and appropriate to protect this information.</p>
    <p>In addition, when a record received from another system has been exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.</p>
    <p> Finally, in its discretion, CBP will not assert any exemptions with regard to accessing or amending an individual’s application data in a trusted or registered traveler program or accessing their final membership determination in the trusted or registered traveler programs.</p>
    <p> Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process. When an investigation has been completed, information on disclosures made may continue to be exempted if the fact that an investigation occurred remains sensitive after completion.</p>
    <p>(b) From subsection (d) (Access and Amendment to Records) because access to certain records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to certain records could also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of certain records could interfere with ongoing investigations and law enforcement activities.  Further, permitting amendment to counterintelligence records after an investigation has been completed would impose an unmanageable administrative burden. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.</p>
    <p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.</p>
    <p>(f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.</p>
    <p>(g) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete.</p>
    <p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.</p>
    <p>(i) From subsection (g)(1) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act. </p>
    <p> 85. The U.S. Department of Homeland Security (DHS)/U.S. Customs and Border Protection (CBP)-018 Customs Trade Partnership Against Terrorism (CTPAT) System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/CBP-018 CTPAT System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to, the enforcement of civil and criminal laws; investigations, inquiries, and proceedings thereunder; and national security activities. The system of records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies.</p>
    <p> The Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act, 5 U.S.C. secs. 552a(c)(3), (c)(4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5),(e)(8); (f); and (g). Additionally, the Secretary of Homeland Security pursuant to 5 U.S.C. sec. 552a(k)(2) has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. secs. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.</p>
    <p>(b) From subsection (d) (Access to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities when weighing and evaluating all available information. Further, permitting amendment to records after an investigation has been completed could impose administrative burdens on investigators. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.</p>
    <p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.</p>
    <p>(f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.</p>
    <p>(g) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete.</p>
    <p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.</p>
    <p>(i) From subsection (g)(1) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.</p>
    <p> 86. The DHS/ICE-018 Analytical Records System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/ICE-018 Analytical Records System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; national security and intelligence activities. The DHS/ICE-018 Analytical Records System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3) and (4), (d), (e)(1), (e)(2) and (3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8); (f); and (g) pursuant to 5 U.S.C. 552a(j)(2). Additionally, the Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), and (f) pursuant to 5 U.S.C. 552a(k)(2). Where a record received from another system has been exempted in that source system under 5 U.S.C. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here. Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.</p>
    <p>(b) From subsection (d) (Access and Amendment to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities. Further, permitting amendment to counterintelligence records after an investigation has been completed would impose an unmanageable administrative burden. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.</p>
    <p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.</p>
    <p>(f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.</p>
    <p>(g) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete.</p>
    <p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS’s ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.</p>
    <p>(i) From subsection (g)(1) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.</p>
    <p> 87. The DHS/OIDO-001 Office of the Immigration Detention Ombudsman System of Records consists of electronic and paper records and will be used by DHS and its components. The DHS/OIDO-001 Office of the Immigration Detention Ombudsman System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to the enforcement of civil and criminal laws, and investigations, inquiries, and proceedings there under. The DHS/OIDO-001 Office of the Immigration Detention Ombudsman System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other Federal, State, local, tribal, foreign, or international government agencies.</p>
    <p>The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2) and (k)(5), has exempted this system from the following provisions of the Privacy Act: 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). Where a record received from another system has been exempted in that source system under 5 U.S.C. 552a(j)(2), (k)(2), or (k)(5), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.</p>
    <p>Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>(a) From subsection (c)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process. When an investigation has been completed, information on disclosures made may continue to be exempted if the fact that an investigation occurred remains sensitive after completion.</p>
    <p>(b) From subsection (d) (Access and Amendment to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities. Further, permitting amendment to law enforcement records after an investigation has been completed would impose an unmanageable administrative burden. In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p> (d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.</p>
    <p> 88. The DHS/CBP-027 Customs Broker Management System of Records consists of electronic and paper records and will be used by DHS and its components. DHS/CBP-027 Customs Broker Management System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; and national security and intelligence activities. DHS/CBP-027 Customs Broker Management System of Records maintains information about individuals, associations, corporations, or partnerships to administer the Customs Broker License Exam, determine suitability for providing an individual a Customs Broker license, and determine whether a licensed Customs Broker continues to meet the eligibility requirements to maintain a Customs Broker license.</p>
    <p>The Secretary of Homeland Security has exempted this system pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act, portions of this system are exempt from 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), and (e)(8); (f); and (g). Additionally, the Secretary has exempted this system pursuant to 5 U.S.C. 552a(k)(2) of the Privacy Act from subsections (c)(3), (d), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), and (f). Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, for the following reasons:</p>
    <p>(a) From subsection (c)(3) and (4) (Accounting for Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension, which would undermine the entire investigative process.</p>
    <p>(b) From subsection (d) (Access and Amendment to Records) because access to the records contained in this system of records could inform the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of that investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, to tamper with witnesses or evidence, and to avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities when weighing and evaluating all available information.  In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p>(d) From subsection (e)(2) (Collection of Information from Individuals) because requiring that information be collected from the subject of an investigation would alert the subject to the nature or existence of the investigation, thereby interfering with that investigation and related law enforcement activities.</p>
    <p>(e) From subsection (e)(3) (Notice to Subjects) because providing such detailed information could impede law enforcement by compromising the existence of a confidential investigation or reveal the identity of witnesses or confidential informants.</p>
    <p>(f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and therefore DHS is not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals with respect to existence of records pertaining to them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, and potential witnesses, and confidential informants.</p>
    <p>(g) From subsection (e)(5) (Collection of Information) because with the collection of information for law enforcement purposes, it is impossible to determine in advance what information is accurate, relevant, timely, and complete.</p>
    <p>(h) From subsection (e)(8) (Notice on Individuals) because compliance would interfere with DHS's ability to obtain, serve, and issue subpoenas, warrants, and other law enforcement mechanisms that may be filed under seal and could result in disclosure of investigative techniques, procedures, and evidence.</p>
    <p>(i) From subsection (g)(1) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.</p>
    <p> 89. The DHS/U.S. Customs and Border Protection (CBP)-020 Export Information System (EIS) System of Records consists of electronic and paper records and will be used by DHS and its components. CBP uses EIS to collect and process information to comply with export laws and facilitate legitimate international trade. CBP is charged with enforcing all U.S. export laws at the border and the exporting community is required to report export data to CBP that contains personally identifiable information (PII).</p>
    <p> The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(j)(2), has exempted this system from the following provisions of the Privacy Act: 552a(c)(3); (e)(8); and (g)(1). Additionally, the Secretary of Homeland Security pursuant to 5 U.S.C. sec. 552a(k)(2) has exempted records created during the background check and vetting process from the following provision of the Privacy Act, 5 U.S.C. 552a(c)(3).</p>
    <p> Further, no exemption shall be asserted with respect to information maintained in the system as it relates to data submitted by or on behalf of a person who travels from the United States and crosses the border, nor shall an exemption be asserted with respect to the resulting determination (approval or denial). After conferring with the appropriate component or agency, DHS may waive applicable exemptions in appropriate circumstances and where it would not appear to interfere with or adversely affect the law enforcement purposes of the systems from which the information is recompiled or in which it is contained. Exemptions from these particular subsections are justified, on a case-by-case basis to be determined at the time a request is made, when information in this system of records may impede a law enforcement, intelligence-related, or national security investigation:</p>
    <p>(a) From subsection (c)(3) (Accounting for Disclosures) because making available to a record subject the accounting of disclosures from records concerning him or her would specifically reveal any investigative interest in the individual. Revealing this information could reasonably be expected to compromise ongoing efforts to investigate a violation of U.S. law, including investigations of a known or suspected terrorist, by notifying the record subject that he or she is under investigation. This information could also permit the record subject to take measures to impede the investigation (e.g., destroy evidence), intimidate potential witnesses, or flee the area to avoid or impede the investigation.</p>
    <p>(b) From subsection (e)(8) (Notice on Individuals) because to require individual notice of disclosure of information due to compulsory legal process would pose an impossible administrative burden on DHS and other agencies and could alert the subjects of counterterrorism or law enforcement investigations to the fact of those investigations when not previously known.</p>
    <p>(c) From subsection (g)(1) (Civil Remedies) to the extent that the system is exempt from other specific subsections of the Privacy Act.</p>
    <p>90. The DHS/FEMA-015 Fraud Investigations System of Records consists of electronic and paper records that DHS and its components will use. The DHS/FEMA-015 Fraud Investigations System of Records is a repository of information held by DHS in connection with its several and varied missions and functions, including, but not limited to, the enforcement of civil and criminal laws; investigations, inquiries, and proceedings there under; national security and intelligence activities; and protection of the President of the U.S. or other individuals pursuant to Section 3056 and 3056A of Title 18. The DHS/ FEMA-015 Fraud Investigations System of Records contains information that is collected by, on behalf of, in support of, or in cooperation with DHS and its components and may contain personally identifiable information collected by other federal, state, local, tribal, foreign, or international government agencies. The Secretary of Homeland Security, pursuant to 5 U.S.C. sec. 522a (k)(2), has exempted this system from the following provisions of the Privacy Act, subject to limitations set forth in 5 U.S.C. secs. 552a(c)(3); (d); (e)(1); (e)(4)(G); (e)(4)(H); (e)(4)(I); and (f). When a record received from another system has been exempted in that source system under 5 U.S.C. sec. 552a(j)(2), DHS will claim the same exemptions for those records that are claimed for the original primary systems of records from which they originated and claims any additional exemptions set forth here.</p>
    <p>Exemptions from these particular subsections are justified on a case-by-case basis to be determined at the time a request is made for the following reasons:</p>
    <p>(a) From subsection (c)(3) (Accounting for Disclosures) because the release of the accounting of disclosures could alert the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation and reveal investigative interest on the part of DHS as well as the recipient agency. Disclosure of the accounting would, therefore, present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting would also permit the individual who is the subject of a record to impede the investigation, tamper with witnesses or evidence, and avoid detection or apprehension, which would undermine the entire investigative process.</p>
    <p>(b) From subsection (d) (Access and Amendment to Records) because access to the records contained in this system of records could apprise the subject of an investigation of an actual or potential criminal, civil, or regulatory violation to the existence of the investigation and reveal investigative interest on the part of DHS or another agency. Access to the records could permit the individual who is the subject of a record to impede the investigation, tamper with witnesses or evidence, and avoid detection or apprehension. Amendment of the records could interfere with ongoing investigations and law enforcement activities and impose an unreasonable administrative burden by requiring investigations to be continually reinvestigated.  In addition, permitting access and amendment to such information could disclose security-sensitive information that could be detrimental to homeland security.</p>
    <p>(c) From subsection (e)(1) (Relevancy and Necessity of Information) because in the course of investigations into potential violations of federal law, the accuracy of information obtained or introduced occasionally may be unclear, or the information may not be strictly relevant or necessary to a specific investigation. In the interests of effective law enforcement, it is appropriate to retain all information that may aid in establishing patterns of unlawful activity.</p>
    <p>(d) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency Requirements) and (f) (Agency Rules), because portions of this system are exempt from the individual access provisions of subsection (d) for the reasons noted above, and DHS is therefore not required to establish requirements, rules, or procedures with respect to such access. Providing notice to individuals concerning the existence of records about them in the system of records or otherwise setting up procedures pursuant to which individuals may access and view records pertaining to themselves in the system would undermine investigative efforts and reveal the identities of witnesses, potential witnesses, and confidential informants.</p>

    [71 FR 20523, Apr. 21, 2006]
<p>Editorial Note:</p>
<p>For <i>Federal Register</i> citations affecting appendix C to part 5, see the List of CFR Sections Affected, which appears in the Finding Aids section of the printed volume and at <i>www.govinfo.gov</i>.</p>
</xhtmlContent>
</regulationsPart>
</regulationsChapter>
</regulationsTitle>
</regulations>
	<regulations id="reg2" toc="yes">
<regulationsTitle number="44">
<heading>Emergency Management and Assistance </heading>
<regulationsChapter number="I">
<heading> Federal Emergency Management Agency, Department of Homeland Security </heading>
<regulationsPart number="6">
<heading> IMPLEMENTATION OF THE PRIVACY ACT OF 197</heading>
<xhtmlContent>
	<p><b>Subpart A—General</b>
</p>
<p>Sec.
</p>
<p>6.1 Purpose and scope of part.
</p>
<p>6.2 Definitions.
</p>
<p>6.3 Collection and use of information (Privacy Act statements).
</p>
<p>6.4 Standards of accuracy.
</p>
<p>6.5 Rules of conduct.
</p>
<p>6.6 Safeguarding systems of records.
</p>
<p>6.7 Records of other agencies.
</p>
<p>6.8 Subpoena and other legal demands.
</p>
<p>6.9 Inconsistent issuances of FEMA and/or its predecessor agencies superseded.
</p>
<p>6.10 Assistance and referrals.
</p><p><b>Subpart B--Disclosure of Records
</b></p>
<p>6.20 Conditions of disclosure.
</p>
<p>6.21 Procedures for disclosure.
</p>
<p>6.22 Accounting of disclosures.
</p><p><b>Subpart C--Individual Access to Records
</b></p>
<p>6.30 Form of requests.
</p>
<p>6.31 Special requirements for medical records.
</p>
<p>6.32 Granting access.
</p>
<p>6.33 Denials of access.
</p>
<p>6.34 Appeal of denial of access within FEMA.
</p><p><b>Subpart D--Requests To Amend Records
</b></p>
<p>6.50 Submission of requests to amend records.
</p>
<p>6.51 Review of requests to amend records.
</p>
<p>6.52 Approval of requests to amend records.
</p>
<p>6.53 Denial of requests to amend records.
</p>
<p>6.54 Agreement to alternative amendments.
</p>
<p>6.55 Appeal of denial of request to amend a record.
</p>
<p>6.56 Statement of disagreement.
</p>
<p>6.57 Judicial review.
</p><p><b>Subpart E--Report on New Systems and Alterations of Existing Systems
</b></p>
<p>6.70 Reporting requirement.
</p>
<p>6.71 Federal Register notice of establishment of new system or alteration of existing system.
</p>
<p>6.72 Effective date of new system of records or alteration of an existing system of records.
</p><p><b>Subpart F--Fees
</b></p>
<p>6.80 Records available at fee.
</p>
<p>6.81 Additional copies.
</p>
<p>6.82 Waiver of fee.
</p>
<p>6.83 Prepayment of fees.
</p>
<p>6.84 Form of payment.
</p>
<p>6.85 Reproduction fees.
</p><p><b>Subpart G--Exempt Systems of Records
</b></p>
<p>6.86 General exemptions.
</p>
<p>6.87 Specific exemptions.
</p>
<p><b>Authority:</b> 5 U.S.C. 552a; Reorganization Plan No. 3 of 1978; and E.O. 12127.
</p>
<p><b>Source:</b> 44 FR 50293, Aug. 27, 1979, unless otherwise noted.</p>
<p><b>Subpart A--General
</b></p>
<p><b>&amp; #167; 6.1
 Purpose and scope of part.
</b></p>
<p>This part sets forth policies and procedures concerning the collection, use and dissemination of records maintained by the Federal Emergency Management Agency (FEMA) which are subject to the provision of 5 U.S.C. 552a, popularly known as the "Privacy Act of 1974" (hereinafter referred to as the Act). These policies and procedures govern only those records as defined in &amp;amp;amp;amp;amp;#167; 6.2. Policies and procedures governing the disclosure and availability of records in general are in part 5 of this chapter. This part also covers: (a) Procedures for notification to individuals of a FEMA system of records pertaining to them; (b) guidance to individuals in obtaining information, including inspections of, and disagreement with, the content of records; (c) accounting of disclosure; (d) special requirements for medical records; and (e) fees.
</p>
<p><b>&amp; #167; 6.2
 Definitions.
</b></p>
<p>For the purpose of this part:
</p>
<p>(a) <i>Agency</i> includes any executive department, military department, Government corporation, Government controlled corporation, or other establishment in the executive branch of the Government (including the Executive Office of the President), or any independent regulatory agency (see 5 U.S.C. 552(e)).
</p>
<p>(b) <i>Individual</i> means a citizen of the United States or an alien lawfully admitted for permanent residence.
</p>
<p>(c) <i>Maintain</i> includes maintain, collect, use, and disseminate.
</p>
<p>(d) <i>Record</i> means any item, collection, or grouping of information about an individual that is maintained by an agency, including, but not limited to those concerning education, financial transactions, medical history, and criminal or employment history, and that contains the name or other identifying particular assigned to the individual, such as a fingerprint, voiceprint, or photograph.
</p>
<p>(e) <i>System of records</i> means a group of any records under the control of an agency from which information is retrieved by the name of the individual or by some identifying number, symbol, or other identification assigned to that individual.
</p>
<p>(f) <i>Statistical record</i> means a record in a system of records maintained for statistical research or reporting purposes only and not used in whole or in part in making any determination about an identifiable individual, except as provided by 13 U.S.C. 8.
</p>
<p>(g) <i>Routine use</i> means, with respect to the disclosure of a record, the use of that record for a purpose which is compatible with the purpose for which it was collected.
</p>
<p>(h) <i>System manager</i> means the employee of FEMA who is responsible for the maintenance of a system of records and for the collection, use, and dissemination of information therein.
</p>
<p>(i) <i>Subject individual</i> means the individual named or discussed in a record of the individual to whom a record otherwise pertains.
</p>
<p>(j) <i>Disclosure</i> means a transfer of a record, a copy of a record, or any or all of the information contained in a record to a recipient other than the subject individual, or the review of a record by someone other than the subject individual.
</p>
<p>(k) <i>Access</i> means a transfer of a record, a copy of a record, or the information in a record to the subject individual, or the review of a record by the subject individual.
</p>
<p>(l) <i>Solicitation</i> means a request by an officer or employee of FEMA that an individual provide information about himself or herself.
</p>
<p>(m) <i>Administrator</i> means the Administrator, FEMA.
</p>
<p>(n) <i>Deputy Administrator</i> means the Deputy Administrator, FEMA, or, in the case of the absence of the Deputy Administrator, or a vacancy in that office, a person designated by the Administrator to perform the functions under this regulation of the Deputy Administrator.
</p>
<p>(o) <i>Privacy Appeals Officer</i> means the FOIA/Privacy Act Specialist or his/her designee.
</p>
<p>[44 FR 50293, Aug. 27, 1979, as amended at 45 FR 17152, Mar. 18, 1980; 51 FR 34604, Sept. 30, 1986]
</p>
<p><b>&amp; #167; 6.3
 Collection and use of information (Privacy Act statements).
</b></p>
<p>(a) <i>General.</i> Any information used in whole or in part in making a determination about an individual’s rights, benefits, or privileges under FEMA programs will be collected directly from the subject individual to the extent practicable. The system manager also shall ensure that information collected is used only in conformance with the provisions of the Act and these regulations.
</p>
<p>(b) <i>Solicitation of information.</i> System managers shall ensure that at the time information is solicited the solicited individual is informed of the authority for collecting that information, whether providing the information is mandatory or voluntary, the purpose for which the information will be used, the routine uses to be made of the information, and the effects on the individual, if any, of not providing the information. The Director, Records Management Division, Office of Management and Regional Administrators shall ensure that forms used to solicit information are in compliance with the Act and these regulations.
</p>
<p>(c) <i>Solicitation of Social Security numbers.</i> Before an employee of FEMA can deny to any individual a right, benefit, or privilege provided by law because such individual refuses to disclose his/her social security account number, the employee of FEMA shall ensure that either:
</p>
<p>(1) The disclosure is required by Federal statute; or
</p>
<p>(2) The disclosure of a social security number was required under a statute or regulation adopted before January 1, 1975, to verify the identity of an individual, and the social security number will become a part of a system of records in existence and operating before January 1, 1975.
</p>
<p>If solicitation of the social security number is authorized under paragraph (c) (1) or (2) of this section, the FEMA employee who requests an individual to disclose the social security account number shall first inform that individual whether that disclosure is mandatory or voluntary, by what statutory or other authority the number is solicited, and the use that will be made of it.
</p>
<p>(d) <i>Soliciting information from third parties.</i> An employee of FEMA shall inform third parties who are requested to provide information about another individual of the purposes for which the information will be used.
</p>
<p>[44 FR 50293, Aug. 27, 1979, as amended at 47 FR 13149, Mar. 29, 1982; 48 FR 12091, Mar. 23, 1983; 50 FR 40006, Oct. 1, 1985]
</p>
<p><b>&amp;  #167; 6.4
 Standards of accuracy.
</b></p>
<p>The system manager shall ensure that all records which are used by FEMA to make determinations about any individual are maintained with such accuracy, relevance, timeliness, and completeness as is reasonably necessary to ensure fairness to the individual.
</p>
<p><b>&amp; #167; 6.5
 Rules of conduct.
</b></p>
<p>Employees of FEMA involved in the design, development, operation, or maintenance of any system of records or in maintaining any record, shall conduct themselves in accordance with the rules of conduct concerning the protection of personal information in &amp;amp;amp;amp;amp;#167; 3.25 of this chapter.
</p>
<p><b>&amp;amp;amp;amp;amp;#167; 6.6
 Safeguarding systems of records.
</b></p>
<p>(a) Systems managers shall ensure that appropriate administrative, technical, and physical safeguards are established to ensure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or integrity which could result in substantial harm, embarrassment, inconvenience, or unfairness to any individual on whom information is maintained.
</p>
<p>(b) Personnel information contained in both manual and automated systems of records shall be protected by implementing the following safeguards:
</p>
<p>(1) Official personnel folders, authorized personnel operating or work folders and other records of personnel actions effected during an employee’s Federal service or affecting the employee’s status and service, including information on experience, education, training, special qualification, and skills, performance appraisals, and conduct, shall be stored in a lockable metal filing cabinet when not in use by an authorized person. A system manager may employ an alternative storage system providing that it furnished an equivalent degree of physical security as storage in a lockable metal filing cabinet.
</p>
<p>(2) System managers, at their discretion, may designate additional records of unusual sensitivity which require safeguards similar to those described in paragraph (a) of this section.
</p>
<p>(3) A system manager shall permit access to and use of automated or manual personnel records only to persons whose official duties require such access, or to a subject individual or his or her representative as provided by this part.
</p>
<p><b>&amp;#167; 6.7
 Records of other agencies.
</b></p>
<p>If FEMA receives a request for access to records which are the primary responsibility of another agency, but which are maintained by or in the temporary possession of FEMA on behalf of that agency, FEMA will advise the requestor that the request has been forwarded to the responsible agency. Records in the custody of FEMA which are the primary responsibility of the Office of Personnel Management are governed by the rules promulgated by it pursuant to the Privacy Act.
</p>
<p><b>&amp;#167; 6.8
 Subpoena and other legal demands.
</b></p>
<p>Access to records in systems of records by subpoena or other legal process shall be in accordance with the provisions of part 5 of this chapter.
</p>
<p><b>&amp;#167; 6.9
 Inconsistent issuances of FEMA and/or its predecessor agencies superseded.
</b></p>
<p>Any policies and procedures in any issuances of FEMA or any of its predecessor agencies which are inconsistent with the policies and procedures in this part are superseded to the extent of that inconsistency.
</p>
<p><b>&amp;#167; 6.10
 Assistance and referrals.
</b></p>
<p>Requests for assistance and referral to the responsible system manager or other FEMA employee charged with implementing these regulations should be made to the Privacy Appeals Officer, Federal Emergency Management Agency, Washington, DC 20472.
</p>
<p>[45 FR 17152, Mar. 18, 1980]
</p><p><b>Subpart B--Disclosure of Records
</b></p>
<p><b>&amp;#167; 6.20
 Conditions of disclosure.
</b></p>
<p>No employee of FEMA shall disclose any record to any person or to another agency without the express written consent of the subject individual unless the disclosure is:
</p>
<p>(a) To officers or employees of FEMA who have a need for the information in the official performance of their duties;
</p>
<p>(b) Required by the provisions of the Freedom of Information Act, 5 U.S.C. 552.
</p>
<p>(c) For a routine use as published in the notices in the <i>Federal Register;</i>
</p>
<p>(d) To the Bureau of the Census for use pursuant to title 13, United States Code;
</p>
<p>(e) To a recipient who has provided FEMA with advance adequate written assurance that the record will be used solely as a statistical research or reporting record subject to the following: The record shall be transferred in a form that is not individually identifiable. The written statement should include as a minimum (1) a statement of the purpose for requesting the records; and (2) certification that the records will be used only for statistical purposes. These written statements should be maintained as accounting records. In addition to deleting personal identifying information from records released for statistical purposes, the system manager shall ensure that the identity of the individual cannot reasonably be deduced by combining various statistical records;
</p>
<p>(f) To the National Archives of the United States as a record which has sufficient historical or other value to warrant its continued preservation by the United States Government, or for evaluation by the Administrator of The National Archives and Records Administration or his designee to determine whether the record has such value;
</p>
<p>(g) To another agency or instrumentality of any governmental jurisdiction within or under the control of the United States for civil or criminal law enforcement activity, if the activity is authorized by law, and if the head of the agency or instrumentality or his designated representative has made a written request to the Administrator specifying the particular portion desired and the law enforcement activity for which the record is sought;
</p>
<p>(h) To a person showing compelling circumstances affecting the health and safety of an individual to whom the record pertains. (Upon such disclosure, a notification must be sent to the last known address of the subject individual.)
</p>
<p>(i) To either House of Congress or to a subcommittee or committee (joint or of either House, to the extent that the subject matter falls within their jurisdiction;
</p>
<p>(j) To the Comptroller General or any duly authorized representatives of the Comptroller General in the course of the performance of the duties of the Government Accountability Office; or
</p>
<p>(k) Pursuant to the order of a court of competent jurisdiction.
</p>
<p>(l) To consumer reporting agencies as defined in the Fair Credit Reporting Act (35 U.S.C. 1681a(f) or the Debt Collection Act of 1982 (31 U.S.C. 3711(d)(4)).
</p>
<p>[44 FR 50293, Aug. 27, 1979, as amended at 48 FR 44543, Sept. 29, 1983; 50 FR 40006, Oct. 1, 1985]
</p>
<p><b>&amp;#167; 6.21
 Procedures for disclosure.
</b></p>
<p>(a) Upon receipt of a request for disclosure, the system manager shall verify the right of the requestor to obtain disclosure pursuant to &amp;#167; 6.20. Upon that verification and subject to other requirements of this part, the system manager shall make the requested records available.
</p>
<p>(b) If the system manager determines that the disclosure is not permitted under the provisions of &amp;#167; 6.20 or other provisions of this part, the system manager shall deny the request in writing and shall inform the requestor of the right to submit a request for review and final determination to the Administrator or designee.
</p>
<p><b>&amp;#167; 6.22
 Accounting of disclosures.
</b></p>
<p>(a) Except for disclosures made pursuant to &amp;#167; 6.20 (a) and (b), an accurate accounting of each disclosure shall be made and retained for 5 years after the disclosure or for the life of the record, whichever is longer. The accounting shall include the date, nature, and purpose of each disclosure, and the name and address of the person or agency to whom the disclosure is made;
</p>
<p>(b) The system manager also shall maintain in conjunction with the accounting of disclosures;
</p>
<p>(1) A full statement of the justification for the disclosure.
</p>
<p>(2) All documentation surrounding disclosure of a record for statistical or law enforcement purposes; and
</p>
<p>(3) Evidence of written consent to a disclosure given by the subject individual.
</p>
<p>(c) Except for the accounting of disclosures made to agencies or instrumentalities in law enforcement activities in accordance with &amp;#167; 6.20 (g) or of disclosures made from exempt systems the accounting of disclosures shall be made available to the individual upon request. Procedures for requesting access to the accounting are in subpart C of this part.
</p><p><b>Subpart C--Individual Access to Records
</b></p>
<p><b>&amp;#167; 6.30
 Form of requests.
</b></p>
<p>(a) An individual who seeks access to his or her record or to any information pertaining to the individual which is contained in a system of records should notify the system manager at the address indicated in the <i>Federal Register</i> notice describing the pertinent system. The notice should bear the legend "Privacy Act Request" both on the request letter and on the envelope. It will help in the processing of a request if the request letter contains the complete name and identifying number of the system as published in the <i>Federal Register;</i> the full name and address of the subject individual; a brief description of the nature, time, place, and circumstances of the individual’s association with FEMA; and any other information which the individual believes would help the system manager to determine whether the information about the individual is included in the system of records. The system manager shall answer or acknowledge the request within 10 workdays of its receipt by FEMA.
</p>
<p>(b) The system manager, at his discretion, may accept oral requests for access subject to verification of identity.
</p>
<p><b>&amp;#167; 6.31
 Special requirements for medical records.
</b></p>
<p>(a) A system manager who receives a request from an individual for access to those official medical records which belong to the U.S. Office of Personnel Management and are described in Chapter 339, Federal Personnel Manual (medical records about entrance qualifications or fitness for duty, or medical records which are otherwise filed in the Official Personnel Folder), shall refer the pertinent system of records to a Federal Medical Officer for review and determination in accordance with this section. If no Federal Medical Officer is available to make the determination required by this section, the system manager shall refer the request and the medical reports concerned to the Office of Personnel Management for determination.
</p>
<p>(b) If, in the opinion of a Federal Medical Officer, medical records requested by the subject individual indicate a condition about which a prudent physician would hesitate to inform a person suffering from such a condition of its exact nature and probable outcome, the system manager shall not release the medical information to the subject individual nor to any person other than a physician designated in writing by the subject individual, or the guardian or conservator of the individual.
</p>
<p>(c) If, in the opinion of a Federal Medical Officer, the medical information does not indicate the presence of any condition which would cause a prudent physician to hesitate to inform a person suffering from such a condition of its exact nature and probable outcome, the system manager shall release it to the subject individual or to any person, firm, or organization which the individual authorizes in writing to receive it.
</p>
<p><b>&amp;#167; 6.32
 Granting access.
</b></p>
<p>(a) Upon receipt of a request for access to non-exempt records, the system manager shall make these records available to the subject individual or shall acknowledge the request within 10 workdays of its receipt by FEMA. The acknowledgment shall indicate when the system manager will make the records available.
</p>
<p>(b) If the system manager anticipates more than a 10 day delay in making a record available, he or she also shall include in the acknowledgment specific reasons for the delay.
</p>
<p>(c) If a subject individual’s request for access does not contain sufficient information to permit the system manager to locate the records, the system manager shall request additional information from the individual and shall have 10 workdays following receipt of the additional information in which to make the records available or to acknowledge receipt of the request and indicate when the records will be available.
</p>
<p>(d) Records will be available for authorized access during normal business hours at the offices where the records are located. A requestor should be prepared to identify himself or herself by signature; i.e., to note by signature the date of access and/or produce other identification verifying the signature.
</p>
<p>(e) Upon request, a system manager shall permit an individual to examine the original of a non-exempt record, shall provide the individual with a copy of the record, or both. Fees shall be charged in accordance with subpart F.
</p>
<p>(f) An individual may request to pick up a record in person or to receive it by mail, directed to the name and address provided by the individual in the request. A system manager shall not make a record available to a third party for delivery to the subject individual except for medical records as outlined in &amp;amp;amp;amp;amp;#167; 6.31.
</p>
<p>(g) An individual who selects another person to review, or to accompany the individual in reviewing or obtaining a copy of the record must, prior to the disclosure, sign a statement authorizing the disclosure of the record. The system manager shall maintain this statement with the record.
</p>
<p>(h) The procedure for access to an accounting of disclosure is identical to the procedure for access to a record as set forth in this section.
</p>
<p><b>&amp;#167; 6.33
 Denials of access.
</b></p>
<p>(a) A system manager may deny an individual access to that individual’s record only upon the grounds that FEMA has published the rules in the <i>Federal Register</i> exempting the pertinent system of records from the access requirement. These exempt systems of records are described in subpart G of this part.
</p>
<p>(b) Upon receipt of a request for access to a record which the system manager believes is contained within an exempt system of records he or she shall forward the request to the appropriate official listed below or to his or her delegate through normal supervisory channels.
</p>
<p>(1) Deputy Administrators.
</p>
<p>(2) [Reserved]
</p>
<p>(3) Federal Insurance Administrator.
</p>
<p>(4) Assistant Administrators.
</p>
<p>(5) United States Fire Administrator.
</p>
<p>(6) Chief of Staff.
</p>
<p>(7) Office Directors.
</p>
<p>(8) Chief Counsel.
</p>
<p>(9) [Reserved]
</p>
<p>(10) Chief Financial Officer.
</p>
<p>(11) Regional Administrators.
</p>
<p>(c) In the event that the system manager serves in one of the positions listed in paragraph (b) of this section, he or she shall retain the responsibility for denying or granting the request.
</p>
<p>(d) The appropriate official listed in paragraph (b) of this section shall, in consultation with the Office of Chief Counsel and such other officials as deemed appropriate, determine if the request record is contained within an exempt system of records and:
</p>
<p>(1) If the record is not contained within an exempt system of records, the above official shall notify the system manager to grant the request in accordance with &amp;amp;amp;amp;amp;#167; 6.32, or
</p>
<p>(2) If the record is contained within an exempt system said official shall;
</p>
<p>(i) Notify the requestor that the request is denied, including a statement justifying the denial and advising the requestor of a right to judicial review of that decision as provided in &amp;amp;amp;amp;amp;#167; 6.57, or
</p>
<p>(ii) Notify the system manager to make record available to the requestor in accordance with &amp;amp;amp;amp;amp;#167; 6.31, notwithstanding the record’s inclusion within an exempt system.
</p>
<p>(e) The appropriate official listed in paragraph (b) of this section shall provide the Privacy Appeals Office with a copy of any denial of a requested access.
</p>
<p>[44 FR 50293, Aug. 27, 1979, as amended at 48 FR 44543, Sept. 29, 1983; 50 FR 40006, Oct. 1, 1985; 51 FR 34604, Sept. 30, 1986; 74 FR 15334, Apr. 3, 2009]
</p>
<p><b>&amp;#167; 6.34
 Appeal of denial of access within FEMA.
</b></p>
<p>A requestor denied access in whole or in part, to records pertaining to that individual, exclusive of those records for which the system manager is the Administrator, may file an administrative appeal of that denial. Appeals of denied access will be processed in the same manner as processing for appeals from a denial of a request to amend a record set out in &amp;amp;amp;amp;amp;#167; 6.55, regardless whether the denial being appealed is made at headquarters or by a regional official.
</p><p><b>Subpart D--Requests To Amend Records
</b></p>
<p><b>&amp;#167; 6.50
 Submission of requests to amend records.
</b></p>
<p>An individual who desires to amend any record containing personal information about the individual should direct a written request to the system manager specified in the pertinent <i>Federal Register</i> notice concerning FEMA’s systems of records. A current FEMA employee who desires to amend personnel records should submit a written request to the Director, Human Capital Division, Washington, DC 20472. Each request should include evidence of and justification for the need to amend the pertinent record. Each request should bear the legend "Privacy Act--Request to Amend Record" prominently marked on both the face of the request letter and the envelope.
</p>
<p><b>&amp;#167; 6.51
 Review of requests to amend records.
</b></p>
<p>(a) The system manager shall acknowledge the receipt of a request to amend a record within 10 workdays. If possible, the acknowledgment shall include the system manager’s determination either to amend the record or to deny the request to amend as provided in &amp;amp;amp;amp;amp;#167; 6.53.
</p>
<p>(b) When reviewing a record in response to a request to amend, the system manager shall assess the accuracy, relevance, timeliness, and completeness of the existing record in light of the proposed amendment and shall determine whether the request for the amendment is justified. With respect to a request to delete information, the system manager also shall review the request and the existing record to determine whether the information is relevant and necessary to accomplish an agency purpose required to be accomplished by statute or Executive Order.
</p>
<p><b>&amp;#167; 6.52
 Approval of requests to amend records.
</b></p>
<p>If the system manager determines that amendment of a record is proper in accordance with the request to amend, he or she promptly shall make the necessary corrections to the record and shall send a copy of the corrected record to the individual. Where an accounting of disclosure has been maintained, the system manager shall advise all previous recipients of the record of the fact that a correction has been made and the substance of the correction. Where practicable, the system manager shall advise the Privacy Appeals Officer that a request to amend has been approved.
</p>
<p><b>&amp;#167; 6.53
 Denial of requests to amend records.
</b></p>
<p>(a) If the system manager determines that an amendment of a record is improper or that the record should be amended in a manner other than that requested by an individual, he shall refer the request to amend and his determinations and recommendations to the appropriate official listed in &amp;amp;amp;amp;amp;#167; 6.33(b) through normal supervisory channels.
</p>
<p>(b) If the official listed in &amp;#167; 6.33, after reviewing the request to amend a record, determines to amend the record in accordance with the request, said official promptly shall return the request to the system manager with instructions to make the requested amendments in accordance with &amp;amp;amp;amp;amp;#167; 6.52.
</p>
<p>(c) If the appropriate official listed in &amp;#167; 6.33, after reviewing the request to amend a record, determines not to amend the record in accordance with the request, the requestor shall be promptly advised in writing of the determination. The refusal letter (1) shall state the reasons for the denial of the request to amend; (2) shall include proposed alternative amendments, if appropriate; (3) shall state the requestor’s right to appeal the denial of the request to amend; and (4) shall state the procedures for appealing and the name and title of the official to whom the appeal is to be addressed.
</p>
<p>(d) The appropriate official listed in &amp;#167; 6.33 shall furnish the Privacy Appeals Officer a copy of each initial denial of a request to amend a record.
</p>
<p>[44 FR 50293, Aug. 27, 1979, as amended at 45 FR 17152, Mar. 18, 1980]
</p>
<p><b>&amp;#167; 6.54
 Agreement to alternative amendments.
</b></p>
<p>If the denial of a request to amend a record includes proposed alternative amendments, and if the requestor agrees to accept them, he or she must notify the official who signed the denial. That official immediately shall instruct the system manager to make the necessary amendments in accordance with &amp;amp;amp;amp;amp;#167; 6.52.
</p>
<p><b>&amp;#167; 6.55
 Appeal of denial of request to amend a record.
</b></p>
<p>(a) A requestor who disagrees with a denial of a request to amend a record may file an administrative appeal of that denial. The requestor should address the appeal to the FEMA Privacy Appeals Officer, Washington, DC 20472. If the requestor is an employee of FEMA and the denial to amend involves a record maintained in the employee’s Official Personnel Folder covered by an Office of Personnel Management Government-wide system notice, the appeal should be addressed to the Assistant Director, Information Systems, Agency Compliance and Evaluation Group, Office of Personnel Management, Washington, DC 20415.
</p>
<p>(b) Each appeal to the Privacy Act Appeals Officer shall be in writing and must be received by FEMA no later than 30 calendar days from the requestor’s receipt of a denial of a request to amend a record. The appeal should bear the legend "Privacy Act--Appeal," both on the face of the letter and the envelope.
</p>
<p>(c) Upon receipt of an appeal, the Privacy Act Appeals Officer shall consult with the system manager, the official who made the denial, the Chief Counsel or a member of that office, and such other officials as may be appropriate. If the Privacy Act Appeals Officer in consultation with these officials, determines that the record should be amended, as requested, the system manager shall be instructed immediately to amend the record in accordance with &amp;amp;amp;amp;amp;#167; 6.52 and shall notify the requestor of that action.
</p>
<p>(d) If the Privacy Act Appeals Officer, in consultation with the officials specified in paragraph (c) of this section, determines that the appeal should be rejected, the Privacy Act Appeals Officer shall submit the file on the request and appeal, including findings and recommendations, to the Deputy Administrator for a final administrative determination.
</p>
<p>(e) If the Deputy Administrator determines that the record should be amended as requested, he or she immediately shall instruct the system manager in writing to amend the record in accordance with &amp;amp;amp;amp;amp;#167; 6.52. The Deputy Administrator shall send a copy of those instructions to the Privacy Act Appeals Officer, who shall notify the requester of that action.
</p>
<p>(f) If the Deputy Administrator determines to reject the appeal, the requestor shall immediately be notified in writing of that determination. This action shall constitute the final administrative determination on the request to amend the record and shall include:
</p>
<p>(1) The reasons for the rejection of the appeal.
</p>
<p>(2) Proposed alternative amendments, if appropriate, which the requestor subsequently may accept in accordance with &amp;amp;amp;amp;amp;#167; 6.54.
</p>
<p>(3) Notice of the requestor’s right to file a Statement of Disagreement for distribution in accordance with &amp;amp;amp;amp;amp;#167; 6.56.
</p>
<p>(4) Notice of the requestor’s right to seek judicial review of the final administrative determination, as provided in &amp;amp;amp;amp;amp;#167; 6.57.
</p>
<p>(g) The final agency determination must be made no later than 30 workdays from the date on which the appeal is received by the Privacy Act Appeals Officer.
</p>
<p>(h) In extraordinary circumstances, the Administrator may extend this time limit by notifying the requestor in writing before the expiration of the 30 workdays. The Administrator’s notification will include a justification for the extension.
</p>
<p>[44 FR 50293, Aug. 27, 1979, as amended at 45 FR 17152, Mar. 18, 1980]
</p>
<p><b>&amp;#167; 6.56
 Statement of disagreement.
</b></p>
<p>Upon receipt of a final administrative determination denying a request to amend a record, the requestor may file a Statement of Disagreement with the appropriate system manager. The Statement of Disagreement should include an explanation of why the requestor believes the record to be inaccurate, irrelevant, untimely, or incomplete. The system manager shall maintain the Statement of Disagreement in conjunction with the pertinent record, and shall include a copy of the Statement of Disagreement in any disclosure of the pertinent record. The system manager shall provide a copy of the Statement of Disagreement to any person or agency to whom the record has been disclosed only if the disclosure was subject to the accounting requirements of &amp;amp;amp;amp;amp;#167; 6.22.
</p>
<p><b>&amp;#167; 6.57
 Judicial review.
</b></p>
<p>Within 2 years of receipt of a final administrative determination as provided in &amp;amp;amp;amp;amp;#167; 6.34 or &amp;amp;amp;amp;amp;#167; 6.55, a requestor may seek judicial review of that determination. A civil action must be filed in the Federal District Court in which the requestor resides or has his or her principal place of business or in which the agency records are situated, or in the District of Columbia.
</p><p><b>Subpart E--Report on New Systems and Alterations of Existing Systems
</b></p>
<p><b>&amp;#167; 6.70
 Reporting requirement.
</b></p>
<p>(a) No later than 90 calendar days prior to the establishment of a new system of records, the prospective system manager shall notify the Privacy Appeals Officer of the proposed new system. The prospective system manager shall include with the notification a completed FEMA Form 11-2, System of Records Covered by the Privacy Act of 1974, and a justification for each system of records proposed to be established. If the Privacy Appeals Officer determines that the establishment of the proposed system is in the best interest of the Government, then no later than 60 calendar days prior to the establishment of that system of records, a report of the proposal shall be submitted by the Administrator or a designee thereof, to the President of the Senate, the Speaker of the House of Representatives, and the Administrator, Office of Information and Regulatory Affairs, Office of Management and Budget for their evaluation of the probable or potential effect of that proposal on the privacy and other personal or property rights of individuals.
</p>
<p>(b) No later than 90 calendar days prior to the alteration of a system of records, the system manager responsible for the maintenance of that system of records shall notify the Privacy Appeals Officer of the proposed alteration. The system manager shall include with the notification a completed FEMA Form 11-2. System of Records Covered by the Privacy Act of 1974, and a justification for each system of records he proposes to alter. If it is determined that the proposed alteration is in the best interest of the Government, then, the Administrator, or a designee thereof, shall submit, no later than 60 calendar days prior to the establishment of that alteration, a report of the proposal to the President of the Senate, the Speaker of the House of Representatives, and the Administrator, Office of Information and Regulatory Affairs, Office of Management and Budget for their evaluation of the probable or potential effect of that proposal on the privacy and other personal or property rights of individuals.
</p>
<p>(c) The reports required by this regulation are exempt from reports control.
</p>
<p>(d) The Administrator, Office of Information and Regulatory Affairs, Office of Management and Budget may waive the time requirements set out in this section upon a finding that a delay in the establishing or amending the system would not be in the public interest and showing how the public interest would be adversely affected if the waiver were not granted and otherwise complying with OMB Circular A-130.
</p>
<p>[44 FR 50293, Aug. 27, 1979, as amended at 45 FR 17152, Mar. 18, 1980; 51 FR 34604, Sept. 30, 1986]
</p>
<p><b>&amp;#167; 6.71
 Federal Register notice of establishment of new system or alteration of existing system.
</b></p>
<p>Notice of the proposed establishment or alteration of a system of records shall be published in the <i>Federal Register,</i> in accordance with FEMA procedures when:
</p>
<p>(a) Notice is received that the Senate, the House of Representatives, and the Office of Management and Budget do not object to the establishment of a new system or records or to the alteration of an existing system of records, or
</p>
<p>(b) No fewer than 30 calendar days elapse from the date of submission of the proposal to the Senate, the House of Representatives, and the Office of Management and Budget without receipt of an objection to the proposal. The notice shall include all of the information required to be provided in FEMA Form 11-2, System of Records Covered by the Privacy Act of 1974, and such other information as the Administrator deems necessary.
</p>
<p><b>&amp;#167; 6.72
 Effective date of new system of records or alteration of an existing system of records.
</b></p>
<p>Systems of records proposed to be established or altered in accordance with the provisions of this subpart shall be effective no sooner than 30 calendar days from the publication of the notice required by &amp;amp;amp;amp;amp;#167; 6.71.
</p><p><b>Subpart F--Fees
</b></p>
<p><b>&amp;#167; 6.80
 Records available at fee.
</b></p>
<p>The system manager shall provide a copy of a record to a requestor at a fee prescribed in &amp;amp;amp;amp;amp;#167; 6.85 unless the fee is waived under &amp;amp;amp;amp;amp;#167; 6.82.
</p>
<p>[44 FR 50293, Aug. 27, 1979, as amended at 45 FR 17152, Mar. 18, 1980]
</p>
<p><b>&amp;#167; 6.81
 Additional copies.
</b></p>
<p>A reasonable number of additional copies shall be provided for the applicable fee to a requestor who indicates that he has no access to commercial reproduction services.
</p>
<p><b>&amp;#167; 6.82
 Waiver of fee.
</b></p>
<p>The system manager shall make one copy of a record, up to 300 pages, available without charge to a requestor who is an employee of FEMA. The system manager may waive the fee requirement for any other requestor if the cost of collecting the fee is an unduly large part of, or greater than, the fee, or when furnishing the record without charge conforms to generally established business custom or is in the public interest.
</p>
<p>[44 FR 50287, Aug. 27, 1979, as amended at 52 FR 13679, Apr. 24, 1987]
</p>
<p><b>&amp;#167; 6.83
 Prepayment of fees.
</b></p>
<p>(a) When FEMA estimates or determines that allowable charges that a requester may be required to pay are likely to exceed $250.00, FEMA may require a requester to make an advance payment of the entire fee before continuing to process the request.
</p>
<p>(b) When a requester has previously failed to pay a fee charged in a timely fashion (i.e., within 30 days of the date of the billing), FEMA may require the requester to pay the full amount owed plus any applicable interest as provided in &amp;amp;amp;amp;amp;#167; 6.85(d), and to make an advance payment of the full amount of the estimated fee before the agency begins to process a new request or a pending request from that requester.
</p>
<p>(c) When FEMA acts under &amp;#167; 5.44 (a) or (b), the administrative time limits prescribed in subsection (a)(6) of the FOIA (i.e., 10 working days from the receipt of initial requests and 20 working days from receipt of appeals from initial denial, plus permissible extensions of these time limits) will begin only after FEMA has received fee payments described under &amp;amp;amp;amp;amp;#167; 5.44 (a) or (b).
</p>
<p>[52 FR 13679, Apr. 24, 1987]
</p>
<p><b>&amp;#167; 6.84
 Form of payment.
</b></p>
<p>Payment shall be by check or money order payable to The Federal Emergency Management Agency and shall be addressed to the system manager.
</p>
<p><b>&amp;amp;amp;amp;amp;#167; 6.85
 Reproduction fees.
</b></p>
<p>(a) <i>Duplication costs.</i> (1) For copies of documents reproduced on a standard office copying machine in sizes up to 8 1/2 x 14 inches, the charge will be $.15 per page.
</p>
<p>(2) The fee for reproducing copies of records over 8 1/2 x 14 inches or whose physical characteristics do not permit reproduction by routine electrostatic copying shall be the direct cost of reproducing the records through Government or commercial sources. If FEMA estimates that the allowable duplication charges are likely to exceed $25, it shall notify the requester of the estimated amount of fees, unless the requester has indicated in advance his/her willingness to pay fees as high as those anticipated. Such a notice shall offer a requester the opportunity to confer with agency personnel with the objective of reformulating the request to meet his/her needs at a lower cost.
</p>
<p>(3) For other methods of reproduction or duplication, FEMA shall charge the actual direct costs of producing the document(s). If FEMA estimates that the allowable duplication charges are likely to exceed $25, it shall notify the requester of the estimated amount of fees, unless the requester has indicated in advance his/her willingness to pay fees as high as those anticipated. Such a notice shall offer a requester the opportunity to confer with agency personnel with the objective of reformulating the request to meet his/her needs at a lower cost.
</p>
<p>(b) Interest may be charge to those requesters who fail to pay fees charged. FEMA may begin assessing interest charges on the amount billed starting on the 31st day following the day on which the billing was sent. Interest will be at the rate prescribed in section 3717 of title 31 U.S.C.
</p>
<p>[52 FR 13679, Apr. 24, 1987]
</p><p><b>Subpart G--Exempt Systems of Records
</b></p>
<p><b>&amp;#167; 6.86
 General exemptions.
</b></p>
<p>(a) Whenever the Administrator, Federal Emergency Management Agency, determines it to be necessary and proper, with respect to any system of records maintained by the Federal Emergency Management Agency, to exercise the right to promulgate rules to exempt such systems in accordance with the provisions of 5 U.S.C. 552a (j) and (k), each specific exemption, including the parts of each system to be exempted, the provisions of the Act from which they are exempted, and the justification for each exemption shall be published in the <i>Federal Register</i> as part of FEMA’s Notice of Systems of Records.
</p>
<p>(b) Exempt under 5 U.S.C. 552a(j)(2) from the requirements of 5 U.S.C. 552a(c) (3) and (4), (d), (e) (1), (2), (3), (e)(4) (G), (H), and (I), (e) (5) and (8) (f) and (g) of the Privacy Act.
</p>
<p>(1) <i>Exempt systems.</i> The following systems of records, which contain information of the type described in 5 U.S.C. 552(j)(2), shall be exempt from the provisions of 5 U.S.C. 552a listed in paragraph (b) of this section.
</p>
<p>General Investigative Files (FEMA/IG-2)--Limited Access
</p>
<p>(2) <i>Reasons for exemptions.</i> (i) 5 U.S.C. 552a (e)(4)(G) and (f)(1) enable individuals to be notified whether a system of records contains records pertaining to them. The Federal Emergency Management Agency believes that application of these provisions to the above-listed system of records would give individuals an opportunity to learn whether they are of record either as suspects or as subjects of a criminal investigation; this would compromise the ability of the Federal Emergency Management Agency to complete investigations and identify or detect violators of laws administered by the Federal Emergency Management Agency or other Federal agencies. Individuals would be able (A) to take steps to avoid detection, (B) to inform co-conspirators of the fact that an investigation is being conducted, (C) to learn the nature of the investigation to which they are being subjected, (D) to learn the type of surveillance being utilized, (E) to learn whether they are only suspects or identified law violators, (F) to continue to resume their illegal conduct without fear of detection upon learning that they are not in a particular system of records, and (G) to destroy evidence needed to prove the violation.
</p>
<p>(ii) 5 U.S.C. 552a (d)(1), (e)(4)(H) and (f)(2), (3) and (5) enable individuals to gain access to records pertaining to them. The Federal Emergency Management Agency believes that application of these provisions to the above-listed system of records would compromise its ability to complete or continue criminal investigations and to detect or identify violators of laws administered by the Federal Emergency Management Agency or other Federal agencies. Permitting access to records contained in the above-listed system of records would provide individuals with significant information concerning the nature of the investigation, and this could enable them to avoid detection or apprehension in the following ways:
</p>
<p>(A) By discovering the collection of facts which would form the basis for their arrest, (B) by enabling them to destroy evidence of criminal conduct which would form the basis for their arrest, and (C) by learning that the criminal investigators had reason to believe that a crime was about to be committed, they could delay the commission of the crime or change the scene of the crime to a location which might not be under surveillance. Granting access to ongoing or closed investigative files would also reveal investigative techniques and procedures, the knowledge of which could enable individuals planning criminal activity to structure their future operations in such a way as to avoid detection or apprehension, thereby neutralizing law enforcement officers’ established investigative tools and procedures. Further, granting access to investigative files and records could disclose the identity of confidential sources and other informers and the nature of the information which they supplied, thereby endangering the life or physical safety of those sources of information by exposing them to possible reprisals for having provided information relating to the criminal activities of those individuals who are the subjects of the investigative files and records; confidential sources and other informers might refuse to provide criminal investigators with valuable information if they could not be secure in the knowledge that their identities would not be revealed through disclosure of either their names or the nature of the information they supplied, and this would seriously impair the ability of the Federal Emergency Management Agency to carry out its mandate to enforce criminal and related laws. Additionally, providing access to records contained in the above-listed system of records could reveal the identities of undercover law enforcement personnel who compiled information regarding individual’s criminal activities, thereby endangering the life or physical safety of those undercover personnel or their families by exposing them to possible reprisals.
</p>
<p>(iii) 5 U.S.C. 552a(d) (2), (3) and (4), (e)(4)(H) and (f)(4), which are dependent upon access having been granted to records pursuant to the provisions cited in paragraph (b)(2)(ii) of this section, enable individuals to contest (seek amendment to) the content of records contained in a system of records and require an agency to note an amended record and to provide a copy of an individual’s statement (of disagreement with the agency’s refusal to amend a record) to persons or other agencies to whom the record has been disclosed. The Federal Emergency Management Agency believes that the reasons set forth in paragraph (b)(2)(ii) of this section are equally applicable to this paragraph and, accordingly, those reasons are hereby incorporated herein by reference.
</p>
<p>(iv) 5 U.S.C. 552a(c)(3) requires that an agency make accountings of disclosures of records available to individuals named in the records at their request; such accountings must state the date, nature and purpose of each disclosure of a record and the name and address of the recipient. The Federal Emergency Management Agency believes that application of this provision to the above-listed system of records would impair the ability of other law enforcement agencies to make effective use of information provided by the Federal Emergency Management Agency in connection with the investigation, detection and apprehension of violators of the criminal laws enforced by those other law enforcement agencies. Making accountings of disclosure available to violators or possible violators would alert those individuals to the fact that another agency is conducting an investigation into their criminal activities, and this could reveal the geographic location of the other agency’s investigation, the nature and purpose of that investigation, and the dates on which that investigation was active. Violators possessing such knowledge would thereby be able to take appropriate measures to avoid detection or apprehension by altering their operations, by transferring their criminal activities to other geographic areas or by destroying or concealing evidence which would form the basis for their arrest. In addition, providing violators with accountings of disclosure would alert those individuals to the fact that the Federal Emergency Management Agency has information regarding their criminal activities and could inform those individuals of the general nature of that information; this, in turn, would afford those individuals a better opportunity to take appropriate steps to avoid detection or apprehension for violations of criminal and related laws.
</p>
<p>(v) 5 U.S.C. 552a(c)(4) requires that an agency inform any person or other agency about any correction or notation of dispute made by the agency in accordance with 5 U.S.C. 552a(d) of any record that has been disclosed to the person or agency if an accounting of the disclosure was made. Since this provision is dependent on an individual’s having been provided an opportunity to contest (seek amendment to) records pertaining to him/her, and since the above-listed system of records is proposed to be exempt from those provisions of 5 U.S.C. 552a relating to amendments of records as indicated in paragraph (b)(2)(iii) of this section, the Federal Emergency Management Agency believes that this provision should not be applicable to the above system of records.
</p>
<p>(vi) 5 U.S.C. 552a(e)(4)(I) requires that an agency publish a public notice listing the categories of sources for information contained in a system of records. The categories of sources of this system of records have been published in the <i>Federal Register</i> in broad generic terms in the belief that this is all that subsection (e)(4)(I) of the Act requires. In the event, however, that this subsection should be interpreted to require more detail as to the identity of sources of the records in this system, exemption from this provision is necessary in order to protect the confidentiality of the sources of criminal and other law enforcement information. Such exemption is further necessary to protect the privacy and physical safety of witnesses and informants.
</p>
<p>(vii) 5 U.S.C. 552a(e)(1) requires that an agency maintain in its records only such information about an individual as is relevant and necessary to accomplish a purpose of the agency required to be accomplished by statute or executive order. The term <i>maintain</i> as defined in 5 U.S.C. 552a(a)(3) includes "collect" and "disseminate." At the time that information is collected by the Federal Emergency Management Agency, there is often insufficient time to determine whether the information is relevant and necessary to accomplish a purpose of the Federal Emergency Management Agency; in many cases information collected may not be immediately susceptible to a determination of whether the information is relevant and necessary, particularly in the early stages of an investigation, and in many cases, information which initially appears to be irrelevant or unnecessary may, upon further evaluation or upon continuation of the investigation, prove to have particular relevance to an enforcement program of the Federal Emergency Management Agency. Further, not all violations of law discovered during a criminal investigation fall within the investigative jurisdiction of the Federal Emergency Management Agency; in order to promote effective law enforcement, it often becomes necessary and desirable to disseminate information pertaining to such violations to other law enforcement agencies which have jurisdiction over the offense to which the information relates. The Federal Emergency Management Agency should not be placed in a position of having to ignore information relating to violations of law not within its jurisdiction when that information comes to the attention of the Federal Emergency Management Agency through the conduct of a lawful FEMA investigation. The Federal Emergency Management Agency, therefore, believes that it is appropriate to exempt the above-listed system of records from the provisions of 5 U.S.C. 552a(e)(1).
</p>
<p>(viii) 5 U.S.C. 552a(e)(2) requires that an agency collect information to the greatest extent practicable directly from the subject individual when the information may result in adverse determinations about an individual’s rights, benefits, and privileges under Federal programs. The Federal Emergency Management Agency believes that application of this provision to the above-listed system of records would impair the ability of the Federal Emergency Management Agency to conduct investigations and to identify or detect violators of criminal or related laws for the following reasons:
</p>
<p>(A) Most information collected about an individual under criminal investigations is obtained from third parties such as witnesses and informers, and it is usually not feasible to rely upon the subject of the investigation as a source for information regarding his/her criminal activities, (B) an attempt to obtain information from the subject of a criminal investigation will often alert that individual to the existence of an investigation, thereby affording the individual an opportunity to attempt to conceal his/her criminal activities so as to avoid apprehension, (C) in certain instances, the subject of a criminal investigation is not required to supply information to criminal investigators as a matter of legal duty, and (D) during criminal investigations it is often a matter of sound investigative procedures to obtain information from a variety of sources in order to verify information already obtained.
</p>
<p>(ix) 5 U.S.C. 552a(e)(3) requires that an agency inform each individual whom it asks to supply information, either on the form which the agency uses to collect the information or on a separate form which can be retained by the individual, with the following information: The authority which authorizes the solicitation of the information and whether disclosure of such information is mandatory or voluntary; the principal purposes for which the information is intended to be used; the routine uses which may be made of the information; and the effects on the individual of not providing all or part of the requested information. The Federal Emergency Management Agency believes that the above-listed system of records should be exempted from this provision in order to avoid adverse effects on its ability to identify or detect violators of criminal or related laws. In many cases, information is obtained by confidential sources, other informers or undercover law enforcement officers under circumstances where it is necessary that the true purpose of their actions be kept secret so as to avoid alerting the subject of the investigation or his/her associates that a criminal investigation is in process. Further, if it became known that the undercover officer was assisting in a criminal investigation, that officer’s life or physical safety could be endangered through reprisal, and, under such circumstances it may not be possible to continue to utilize that officer in the investigation. In many cases, individuals, for personal reasons, would feel inhibited in talking to a person representing a criminal law enforcement agency but would be willing to talk to a confidential source or undercover officer who they believe is not involved in law enforcement activities. In addition, providing a source of information with written evidence that he was a source, as required by this provision, could increase the likelihood that the source of information would be the subject of retaliatory action by the subject of the investigation. Further, application of this provision could result in an unwarranted invasion of the personal privacy of the subject of the criminal investigation, particularly where further investigation would result in a finding that the subject was not involved in any criminal activity.
</p>
<p>(x) 5 U.S.C. 552a(e)(5) requires that an agency maintain all records used by the agency in making any determination about any individual with such accuracy, relevance, timeliness and completeness as is reasonably necessary to assure fairness to the individual in the determination. Since 5 U.S.C. 552a(a)(3) defines "maintain" to include "collect" and "disseminate," application of this provision to the above-listed system of records would hinder the initial collection of any information which could not, at the moment of collection, be determined to be accurate, relevant, timely and complete. Similarly, application of this provision would seriously restrict the necessary flow of information from the Federal Emergency Management Agency to other law enforcement agencies when a FEMA investigation revealed information pertaining to a violation of law which was under investigative jurisdiction of another agency. In collecting information during the course of a criminal investigation, it is not possible or feasible to determine accuracy, relevance, timeliness or completeness prior to collection of the information; in disseminating information to other law enforcement agencies it is often not possible to determine accuracy, relevance, timeliness or completeness prior to dissemination because the disseminating agency may not have the expertise with which to make such determinations. Further, information which may initially appear to be inaccurate, irrelevant, untimely or incomplete may, when gathered, grouped, and evaluated with other available information, become more pertinent as an investigation progresses. In addition, application of this provision could seriously impede criminal investigators and intelligence analysts in the exercise of their judgment in reporting on results obtained during criminal investigations. The Federal Emergency Management Agency believes that it is appropriate to exempt the above-listed system of records from the provisions of 5 U.S.C. 552a(e)(5).
</p>
<p>(xi) 5 U.S.C. 552a(e)(8) requires that an agency make reasonable effort to serve notice on an individual when any record on the individual is made available to any person under compulsory legal process when such process becomes a matter of public record. The Federal Emergency Management Agency believes that the above-listed system of records should be exempt from this provision in order to avoid revealing investigative techniques and procedures outlined in those records and in order to prevent revelation of the existence on an on-going investigation where there is a need to keep the existence of the investigation secret.
</p>
<p>(xii) 5 U.S.C. 552a(g) provides civil remedies to an individual for an agency’s refusal to amend a record or to make a review of a request for amendment; for an agency’s refusal to grant access to a record; for an agency’s failure to maintain accurate, relevant, timely and complete records which are used to make a determination which is adverse to the individual; and for an agency’s failure to comply with any other provision of 5 U.S.C. 552a in such a way as to have an adverse effect on an individual. The Federal Emergency Management Agency believes that the above-listed system of records should be exempted from this provision to the extent that the civil remedies provided therein may relate to provisions of 5 U.S.C. 552a from which the above-listed system of records is proposed to be exempt. Since the provisions of 5 U.S.C. 552a enumerated in paragraphs (b)(2)(i) through (xi) of this section are proposed to be inapplicable to the above-listed systems of records for the reasons stated therein, there should be no corresponding civil remedies for failure to comply with the requirements of those provisions to which the exemption is proposed to apply. Further, the Federal Emergency Management Agency believes that application of this provision to the above-listed system of records would adversely affect its ability to conduct criminal investigations by exposing to civil court action every stage of the criminal investigative process in which information is compiled or used in order to identify, detect, or otherwise investigate persons suspected or known to be engaged in criminal conduct.
</p>
<p>(xiii) Individuals may not have access to another agency’s records, which are contained in files maintained by the Federal Emergency Management Agency, when that other agency’s regulations provide that such records are subject to general exemption under 5 U.S.C. 552a(j). If such exempt records are within a request for access, FEMA will advise the individual of their existence and of the name and address of the source agency. For any further information concerning the record and the exemption, the individual must contact that source agency.
</p>
<p>[45 FR 64580, Sept. 30, 1980]
</p>
<p><b>&amp;#167; 6.87
 Specific exemptions.
</b></p>
<p>(a) <i>Exempt under 5 U.S.C. 552a(k)(1).</i> The Administrator, Federal Emergency Management Agency has determined that certain systems of records may be exempt from the requirements of (c)(3) and (d) pursuant to 5 U.S.C. 552a(k)(1) to the extent that the system contains any information properly classified under Executive Order 12356 or any subsequent Executive order and which are required to be kept secret in the interest of national defense or foreign policy. To the extent that this occurs, such records in the following systems would be exempt:
</p>
<p>Claims (litigation) (FEMA/GC-1)--Limited Access
</p>
<p>FEMA Enforcement (Compliance) (FEMA/GC-2)--Limited Access
</p>
<p>General Investigative Files (FEMA/IG-1)--Limited Access
</p>
<p>Security Management Information System (FEMA/SEC-1)--Limited Access
</p>
<p>(b) <i>Exempt under 5 U.S.C. 552a(k)(2) from the requirements of 5 U.S.C. 552a (c)(3), (d), (e)(1), (e)(4) (G), (H), and (I), and (f).</i> The Federal Emergency Management Agency will not deny individuals access to information which has been used to deny them a right, privilege, or benefit to which they would otherwise be entitled.
</p>
<p>(1) <i>Exempt systems.</i> The following systems of records, which contain information of the type described in 5 U.S.C. 552a(k)(2), shall be exempt from the provisions of 5 U.S.C. 552a(k)(2) listed in paragraph (b) of this section.
</p>
<p>Claims (litigation) (FEMA/GC-1)--Limited Access
</p>
<p>FEMA Enforcement (Compliance) (FEMA/GC-2)--Limited Access
</p>
<p>General Investigative Files (FEMA/IG-1)--Limited Access
</p>
<p>Equal Employment Opportunity Complaints of Discrimination Files (FEMA/PER-2)--Limited Access
</p>
<p>(2) <i>Reasons for exemptions.</i> (i) 5 U.S.C. 552a (e)(4)(G) and (f)(1) enable individuals to be notified whether a system of records contains records pertaining to them. The Federal Emergency Management Agency believes that application of these provisions to the above-listed systems of records would impair the ability of FEMA to successfully complete investigations and inquiries of suspected violators of civil and criminal laws and regulations under its jurisdiction. In many cases investigations and inquiries into violations of civil and criminal laws and regulations involve complex and continuing patterns of behavior. Individuals, if informed, that they have been identified as suspected violators of civil or criminal laws and regulations, would have an opportunity to take measures to prevent detection of illegal action so as to avoid prosecution or the imposition of civil sanctions. They would also be able to learn the nature and location of the investigation or inquiry, the type of surveillance being utilized, and they would be able to transmit this knowledge to co-conspirators. Finally, violators might be given the opportunity to destroy evidence needed to prove the violation under investigation or inquiry.
</p>
<p>(ii) 5 U.S.C. 552a (d)(1), (e)(4)(H) and (f)(2), (3) and (5) enable individuals to gain access to records pertaining to them. The Federal Emergency Management Agency believes that application of these provisions to the above-listed systems of records would impair its ability to complete or continue civil or criminal investigations and inquiries and to detect violators of civil or criminal laws. Permitting access to records contained in the above-listed systems of records would provide violators with significant information concerning the nature of the civil or criminal investigation or inquiry. Knowledge of the facts developed during an investigation or inquiry would enable violators of criminal and civil laws and regulations to learn the extent to which the investigation or inquiry has progressed, and this could provide them with an opportunity to destroy evidence that would form the basis for prosecution or the imposition of civil sanctions. In addition, knowledge gained through access to investigatory material could alert a violator to the need to temporarily postpone commission of the violation or to change the intended point where the violation is to be committed so as to avoid detection or apprehension. Further, access to investigatory material would disclose investigative techniques and procedures which, if known, could enable violators to structure their future operations in such a way as to avoid detection or apprehension, thereby neutralizing investigators’ established and effective investigative tools and procedures. In addition, investigatory material may contain the identity of a confidential source of information or other informer who would not want his/her identity to be disclosed for reasons of personal privacy or for fear of reprisal at the hands of the individual about whom he/she supplied information. In some cases mere disclosure of the information provided by an informer would reveal the identity of the informer either through the process of elimination or by virtue of the nature of the information supplied. If informers cannot be assured that their identities (as sources for information) will remain confidential, they would be very reluctant in the future to provide information pertaining to violations of criminal and civil laws and regulations, and this would seriously compromise the ability of the Federal Emergency Management Agency to carry out its mission. Further, application of 5 U.S.C. 552a (d)(1), (e)(4)(H) and (f)(2), (3) and (5) to the above-listed systems of records would make available attorney’s work product and other documents which contain evaluations, recommendations, and discussions of on-going civil and criminal legal proceedings; the availability of such documents could have a chilling effect on the free flow of information and ideas within the Federal Emergency Management Agency which is vital to the agency’s predecisional deliberative process, could seriously prejudice the agency’s or the Government’s position in a civil or criminal litigation, and could result in the disclosure of investigatory material which should not be disclosed for the reasons stated above. It is the belief of the Federal Emergency Management Agency that, in both civil actions and criminal prosecutions, due process will assure that individuals have a reasonable opportunity to learn of the existence of, and to challenge, investigatory records and related materials which are to be used in legal proceedings.
</p>
<p>(iii) 5 U.S.C. 552a (d)(2), (3) and (4), (e)(4)(H) and (f)(4) which are dependent upon access having been granted to records pursuant to the provisions cited in paragraph (b)(2)(ii) of this section, enable individuals to contest (seek amendment to) the content of records contained in a system of records and require an agency to note an amended record and to provide a copy of an individual’s statement (of disagreement with the agency’s refusal to amend a record) to persons or other agencies to whom the record has been disclosed. The Federal Emergency Management Agency believes that the reasons set forth in paragraphs (b)(2)(i) of this section are equally applicable to this paragraph, and, accordingly, those reasons are hereby incorporated herein by reference.
</p>
<p>(iv) 5 U.S.C. 552a(c)(3) requires that an agency make accountings of disclosures of records available to individuals named in the records at their request; such accountings must state the date, nature, and purpose of each disclosure of a record and the name and address of the recipient. The Federal Emergency Management Agency believes that application of this provision to the above-listed systems of records would impair the ability of the Federal Emergency Management Agency and other law enforcement agencies to conduct investigations and inquiries into civil and criminal violations under their respective jurisdictions. Making accountings available to violators would alert those individuals to the fact that the Federal Emergency Management Agency or another law enforcement authority is conducting an investigation or inquiry into their activities, and such accountings could reveal the geographic location of the investigation or inquiry, the nature and purpose of the investigation or inquiry and the nature of the information disclosed, and the date on which that investigation or inquiry was active. Violators possessing such knowledge would thereby be able to take appropriate measures to avoid detection or apprehension by altering their operations, transferring their activities to other locations or destroying or concealing evidence which would form the basis for prosecution or the imposition of civil sanctions.
</p>
<p>(v) 5 U.S.C. 552a(e)(1) requires that an agency maintain in its records only such information about an individual as is relevant and necessary to accomplish a purpose of the agency required to be accomplished by statute or executive order. The term <i>maintain</i> as defined in 5 U.S.C. 552a(a)(3) includes "collect" and "disseminate." At the time that information is collected by the Federal Emergency Management Agency there is often insufficient time to determine whether the information is relevant and necessary to accomplish a purpose of the Federal Emergency Management Agency; in many cases information collected may not be immediately susceptible to a determination of whether the information is relevant and necessary, particularly in the early stages of investigation or inquiry, and in many cases information which initially appears to be irrelevant or unnecessary may, upon further evaluation or upon continuation of the investigation or inquiry, prove to have particular relevance to an enforcement program of the Federal Emergency Management Agency. Further, not all violations of law uncovered during a Federal Emergency Management Agency inquiry fall within the civil or criminal jurisdiction of the Federal Emergency Management Agency; in order to promote effective law enforcement, it often becomes necessary and desirable to disseminate information pertaining to such violations to other law enforcement agencies which have jurisdiction over the offense to which the information relates. The Federal Emergency Management Agency should not be placed in a position of having to ignore information relating to violations of law not within its jurisdiction when that information comes to the attention of the Federal Emergency Management Agency through the conduct of a lawful FEMAs civil or criminal investigation or inquiry. The Federal Emergency Management Agency therefore believes that it is appropriate to exempt the above-listed systems of records from the provisions of 5 U.S.C. 552a(e)(1).
</p>
<p>(c) <i>Exempt under 5 U.S.C. 552a(k)(5).</i> The Administrator, Federal Emergency Management Agency has determined that certain systems of records are exempt from the requirements of (c)(3) and (d) of 5 U.S.C. 552a.
</p>
<p>(1) <i>Exempt systems.</i> The following systems of records, which contain information of the type described in 5 U.S.C. 552a(k)(5), shall be exempted from the provisions of 5 U.S.C. 552a listed in paragraph (c) of this section.
</p>
<p>Claims (litigation) (FEMA/GC-1)--Limited Access
</p>
<p>FEMA Enforcement (Compliance) (FEMA/GC-2)--Limited Access
</p>
<p>General Investigative Files (FEMA/IG-2)--Limited Access
</p>
<p>Security Management Information Systems (FEMA/SEC-1)--Limited Access
</p>
<p>(2) <i>Reasons for exemptions.</i> All information about individuals in these records that meet the criteria stated in 5 U.S.C. 552a(k)(5) is exempt from the requirements of 5 U.S.C. 552a (c)(3) and (d). These provisions of the Privacy Act relate to making accountings of disclosure available to the subject and access to and amendment of records. These exemptions are claimed because the system of records entitled, FEMA/SEC-1, Security Management Information System, contains investigatory material compiled solely for the purpose of determining suitability, eligibility, or qualifications for access to classified information or classified Federal contracts, but only to the extent that the disclosure would reveal the identity of a source who furnished information to the Government under an express promise or, prior to September 27, 1975, under an implied promise that the identity of the source would be held in confidence. During the litigation process and investigations, it is possible that certain records from the system of records entitled, FEMA/SEC-1, Security Management System may be necessary and relevant to the litigation or investigation and included in these systems of records. To the extent that this occurs, the Administrator, FEMA, has determined that the records would also be exempted from subsections (c)(3) and (d) pursuant to 5 U.S.C. 552a(k)(5) to protect such records. A determination will be made at the time of the request for a record concerning whether specific information would reveal the identity of a source. This exemption is required in order to protect the confidentiality of the sources of information compiled for the purpose of determining access to classified information. This confidentiality helps maintain the Government’s continued access to information from persons who would otherwise refuse to give it.
</p>
<p>[45 FR 64580, Sept. 30, 1980, as amended at 47 FR 54816, Dec. 6, 1982; 52 FR 5114, Feb. 19, 1987]
</p>
</xhtmlContent>
</regulationsPart>
</regulationsChapter>
</regulationsTitle>
</regulations>


<regulations id="reg3" toc="yes">
<regulationsTitle number="48">
<heading> Federal Acquisition Regulations System </heading>
<regulationsChapter number="30">
<heading> Department of Homeland Security </heading>
<regulationsPart number="3204">
<heading> PROTECTION OF PRIVACY AND FREEDOM OF INFORMATION </heading>
<xhtmlContent>
<p><b>Subpart 3024.1--Protection of Individual Privacy
</b></p>
<p>Sec.
</p>
<p>3024.102-70 General.
</p>
<p><b>Authority:</b> 41 U.S.C. 418b (a) and (b).
</p>
<p><b>Source:</b> 68 FR 67871, Dec. 4, 2003, unless otherwise note.</p>
<p><b>Subpart 3024.1--Protection of Individual Privacy
</b></p>
<p>3024.102-70 General.
</p>
<p>Procedures for implementing the Privacy Act of 1974 are contained in Departmental regulations under 6 CFR part 5,
subpart B, Privacy Act.</p>

</xhtmlContent>
</regulationsPart>
</regulationsChapter>
</regulationsTitle>
</regulations>
</agency>
</pai>
