05-292. Privacy Act of 1974, as Amended; Addition of a New System of Records  

  • Start Preamble

    AGENCY:

    U.S. Department of the Interior.

    ACTION:

    Proposed addition of a new system of records.

    SUMMARY:

    The Department of the Interior (DOI) is issuing public notice of its intent to create a Privacy Act (PA) system of records in its inventory of records systems subject to the Privacy Act of 1974 (5 U.S.C. 552a). This action is necessary to meet the requirements of the Privacy Act to publish in the Federal Register notice of the existence and character of records systems maintained by the agency (5 U.S.C. 552a(e)(4)). The new system of records is captioned, “Interior—DOI-15,” and is titled, “Authenticated Computer Access and Signature System (ACASS).”

    EFFECTIVE DATE:

    5 U.S.C. 552a(e)(11) requires that the public be provided a 30-day period in which to comment on the agency's intended use of the information in the system of records. The Office of Management and Budget, in its Circular A-130, requires an additional 10-day period (for a total of 40 days) in which to make these comments. Any persons interested in commenting on this proposed amendment may do so by submitting comments in writing to the Department of the Interior, Privacy Act Officer, Marilyn Legnini, U.S. Department of the Interior, Mail Stop (MS)-5312—Main Start Printed Page 1263Interior Building (MIB), 1849 C Street, NW., Washington, DC 20240. Comments received within 40 days of publication in the Federal Register will be considered. The system will be effective as proposed at the end of the comment period unless comments are received which would require a contrary determination. The Department will publish a revised notice if changes are made based upon a review of comments received.

    Start Further Info

    FOR FURTHER INFORMATION CONTACT:

    Bob Donelson, Senior Property Manager, Bureau of Land Management, Department of the Interior, 1620 L Street, NW., MS LS, Washington, DC 20036; 202-452-5190.

    End Further Info End Preamble Start Supplemental Information

    SUPPLEMENTARY INFORMATION:

    The primary purpose of ACASS is: (1) To ensure the security of DOI computer networks in order to maintain continuous communications and protect the information attached to the networks from unauthorized access, tampering or destruction; (2) To verify that all persons accessing DOI networks with “smart card” systems are authorized to access them; (3) To ensure that persons signing official documents are indeed the person represented and to provide assurance to the recipient that the signature is authentic; and (4) To enable an individual to encrypt and decrypt documents for secure transmission.

    The new “smart card” access control system is based on digitally encrypted certificates. The DOI is adding the capability for users to electronically sign documents and encrypt documents using digital certificates. The current password access control system is used to maintain access control to the various computer networks and computer systems in the DOI. The new access control system will be used to maintain access control to all DOI computer networks and systems that have installed “smart card” access controls. In addition to the information collected under the current access control system, the new access control system will record the personal identification numbers (PIN) of the “smart card” holder onto the “smart card”. The PIN will not be recorded elsewhere in the system. The data will be stored on a server located in the U.S. Department of the Interior, Bureau of Land Management, National Information Resources Management Center, Denver Federal Center, Lakewood, Colorado. A redundant, fail-over, server is located at BLM's Network Operations Center in Portland, Oregon.

    A copy of the system notice for Interior—DOI-15, Authenticated Computer Access and Signature System (ACASS), follows.

    Start Signature

    Dated: January 3, 2005.

    Marilyn Legnini,

    Departmental Privacy Act Officer, Department of the Interior.

    End Signature

    INTERIOR/DOI-15

    System name:

    Authenticated Computer Access and Signature System—Interior, DOI-15

    System location:

    (1) Data covered by this system are maintained in the following locations: U.S. Department of the Interior (DOI), Bureau of Land Management (BLM), National Information Resources Management Center, Denver Federal Center, Lakewood, Colorado. A redundant, fail-over, server is located at BLM's Network Operations Center in Portland, Oregon. A repository of digital certificates included in this system is maintained by the certificate authority. However, only the Department of Interior maintains a listing of individuals to whom the certificates are issued.

    (2) Limited access to data covered by this system is available at DOI locations, both Federal buildings and Federally-leased space, where DOI computer systems are located. System Administrators at those locations have access only to the information for employees who attempt to access computer systems at their location.

    Categories of individuals covered by the system:

    All individuals who have “smart card” IDs with authentication capability who are granted access to DOI computer networks or certain isolated systems at facilities that have the “smart card” access control system installed and individuals authorized to sign official DOI documents. These include, but are not limited to, the following groups: current agency employees, former agency employees until the records are disposed of in accordance with the proscribed records schedule, agency contractors, other Government employees from agencies with “smart card” systems and volunteers.

    Categories of records in the system:

    Records maintained on current agency employees and agency contractors include the following data fields: Name, organization/office of assignment, personal identification number (PIN), number of ID security cards issued, ID security card issue date, ID security card expiration date, and ID security card serial number. The Active Directory is a component of the computer network operating system used by DOI that performs network management functions and is the repository for the computer access data. A contracted certification authority provides the digital certificates and encryption services necessary for secure authentication and verification. The collected data will contain the individual's user ID/e-mail address. The Active Directory will generate the date of entry to the computer network/system, time of entry, location of entry, time of exit, security access category, and access status which will also become part of the record. The collected data retained in Active Directory may also contain: office telephone number, supervisor's name and Web home page address. Records on former agency employees are maintained in accordance with the proscribed records schedule.

    Authority for maintenance of the system:

    5 U.S.C. 301; Presidential Memorandum on Upgrading Security at Federal Facilities, June 28, 1995.

    Federal Information Security Act (Pub.L. 104-106), section 5113.

    E-Government Act (Pub.L. 104-347), section 203.

    Government Paperwork Elimination Act (Pub.L. 105-277).

    Routine uses of records maintained in the system including categories of users and the purposes of such uses:

    The primary purposes of the system are:

    (1) To ensure the security of DOI computer networks to maintain continuous communications and protect the information attached to the networks from unauthorized access, tampering or destruction.

    (2) To verify that all persons accessing DOI networks with “smart card” systems are authorized to access them.

    (3) To ensure that persons signing official documents are indeed the person represented and to provide for non-repudiation of the use of an electronic signature.

    (4) To enable an individual to encrypt and decrypt documents for secure transmission.

    Disclosures of records within DOI:

    Disclosure of these records may be made: (1) To those officers and employees of DOI who have a need for the record in the performance of their duties, or (2) when required by the Freedom of Information Act, 5 U.S.C. 552.

    Disclosures outside the DOI may be made:

    (1) To an expert, consultant, or contractor (including employees of the Start Printed Page 1264contractor) of DOI that performs, on DOI's behalf, services requiring access to these records.

    (2) To another agency with a similar “smart card” system when a person with a “smart card” requires access to that agency's facilities on a “need-to-know” basis.

    (3) To the Federal Protective Service and appropriate Federal, State, or local agencies responsible for investigating emergency response situations or investigating or prosecuting the violation of or for enforcing or implementing a statute, rule, regulation, order or license, when DOI becomes aware of a violation or potential violation of a statute, rule, regulation, order or license.

    (4)(a) To any of the following entities or individuals, when the circumstances set forth in (b) are met:

    (i) The Department of Justice (DOJ);

    (ii) A court, adjudicative or other administrative body;

    (iii) A party in litigation before a court or adjudicative or administrative body; or

    (iv) Any DOI employee acting in his or her individual capacity if DOI or DOJ has agreed to represent that employee or pay for private representation of the employee;

    (b) When

    (i) One of the following is a party to the proceeding or has an interest in the proceeding:

    (A) DOI or any component of DOI;

    (B) Any DOI employee acting in his or her official capacity;

    (C) Any DOI employee acting in his or her individual capacity if DOI or DOJ has agreed to represent that employee or pay for private representation of the employee;

    (D) The United States, when DOJ determines that DOI is likely to be affected by the proceeding; and

    (ii) DOI deems the disclosure to be:

    (A) Relevant and necessary to the proceeding; and

    (B) Compatible with the purposes for which the records were compiled.

    (5) To a congressional office in response to a written inquiry an individual covered by the system has made to the congressional office about him or herself.

    (6) To an official of another Federal agency to provide information needed in the performance of official duties related to reconciling or reconstructing data files, in support of the functions for which the records were collected and maintained.

    (7) To representatives of the National Archives and Records Administration to conduct records management inspections under the authority of 44 U.S.C. 2903 and 2904.

    Policies and practices for storing, retrieving, accessing, retaining, and disposing of records in the system:

    Storage:

    Records are stored in electronic media on hard disks, magnetic tapes and the ID authentication card itself and on paper records stored in file cabinets in secured locations.

    Retrievability:

    Records are retrievable from Active Directory by organization, agency point of contact, security access category that describes the type of access the user is allowed, date of system entry, time of entry, location of entry, time of exit, location of exit, ID security card issue date, ID security card expiration date, and ID security card serial number.

    Access Safeguards:

    The computer servers in which records are stored are located in computer facilities that are secured by alarm systems and off-master key access. Active Directory access granted to individuals is password-protected. Access to the certificate issuance portion of this system of records is controlled by a digital certificate in combination with a personal identification number (PIN). Each person granted access to the system must be individually authorized to use the system. A Privacy Act Warning Notice appears on the monitor screen when records containing information on individuals are first displayed. Backup tapes are stored in a locked and controlled room in a secure, off-site location. A Privacy Impact Assessment was used to ensure that Privacy Act requirements and safeguard requirements were met.

    Retention and disposal:

    Records relating to persons covered by this system are retained in accordance with General Records Schedule 18, Item No. 17. Unless retained for specific, ongoing security investigations:

    (1) Records relating to individuals other than employees are destroyed two years after the ID security card expiration date.

    (2) Records relating to date and time of system entry and exit of employees are destroyed two years after the date of entry and exit.

    (3) All other records relating to employees are destroyed two years after the ID security card expiration date.

    System manager(s) and address:

    Director, Information Resources Management Center, Bureau of Land Management, Denver Federal Center, Building 40, P.O. Box 25047, Denver, Colorado 80225-0047.

    Notification procedures:

    An individual requesting notification of the existence of records on himself or herself should address his/her request to the local office Information Technology Security Manager. The individual requesting notification must provide their full name and social security number. Interior bureaus/offices are listed at the Department of the Interior Web site at http://www.doi.gov. The request must be in writing and signed by the requester. (See 43 CFR 2.60.)

    Records access procedures:

    An individual requesting access to records maintained on himself or herself should address his/her request to the local office Information Technology Security Manager. The individual requesting access must provide their full name and social security number. The request must be in writing and signed by the requester. (See 43 CFR 2.63.)

    Contesting record procedures:

    An individual requesting amendment of a record maintained on himself or herself should address his/her request to the local office IT Security Manager. The individual requesting the amendment must provide their full name and social security number. The request must be in writing and signed by the requester. (See 43 CFR 2.71.)

    Record source categories:

    Individuals covered by the system, supervisors, and designated approving officials, certificate issuing authority, network system administrators.

    Exemptions claimed for the system:

    None.

    End Supplemental Information

    [FR Doc. 05-292 Filed 1-5-05; 8:45 am]

    BILLING CODE 4310-RK-P