95-24664. Privacy Program  

  • [Federal Register Volume 60, Number 192 (Wednesday, October 4, 1995)]
    [Rules and Regulations]
    [Pages 51918-51921]
    From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
    [FR Doc No: 95-24664]
    
    
    
    =======================================================================
    -----------------------------------------------------------------------
    
    DEPARTMENT OF DEFENSE
    
    Department of the Army
    
    32 CFR Part 505
    
    
    Privacy Program
    
    AGENCY: Department of the Army, DOD.
    ACTION: Final rule.
    
    -----------------------------------------------------------------------
    
    SUMMARY: The Department of the Army system of records notice A0381-
    45cDAMI was deleted October 4, 1995. Therefore, the exemption rule is 
    being deleted with this action.
        In addition, the Army is amending three existing exemption rules to 
    reflect the exemptions taken in the system of records notices. The 
    amendments to the existing rules change the system identifiers and 
    provide the provisions of 5 U.S.C. 552a from which the system of 
    records may be exempt, and the reasons therefore. The system 
    identifiers are A0381-20bDAMI, entitled Counterintelligence Operations 
    Files; A0614-115DAMI, entitled Department of the Army Operational 
    Support Activities; and A0318-100aDAMI, entitled Intelligence 
    Collection Files.
    EFFECTIVE DATE: October 4, 1995.
    FOR FURTHER INFORMATION CONTACT: Ms. Pat Turner at (602) 538-6856 or 
    DSN 879-6856.
    SUPPLEMENTARY INFORMATION:
    
    Executive Order 12866
    
        The Director, Administration and Management, Office of the 
    Secretary of Defense has determined that this proposed Privacy Act rule 
    for the Department of Defense does not constitute 'significant 
    regulatory action'. Analysis of the rule indicates that it does not 
    have an annual effect on the economy of $100 million or more; does not 
    create a serious inconsistency or otherwise interfere with an action 
    taken or planned by another agency; does not materially alter the 
    budgetary impact of entitlements, grants, user fees, or loan programs 
    or the rights and obligations of recipients thereof; does not raise 
    novel legal or policy issues arising out of legal mandates, the 
    President's priorities, or the principles set forth in Executive Order 
    12866 (1993).
    
    Regulatory Flexibility Act of 1980
    
        The Director, Administration and Management, Office of the 
    Secretary of Defense certifies that this Privacy Act rule for the 
    Department of Defense does not have significant economic impact on a 
    substantial number of small entities because it is concerned only with 
    the administration of Privacy Act systems of records within the 
    Department of Defense. 
    
    [[Page 51919]]
    
    
    Paperwork Reduction Act
    
        The Director, Administration and Management, Office of the 
    Secretary of Defense certifies that this Privacy Act proposed rule for 
    the Department of Defense imposes no information requirements beyond 
    the Department of Defense and that the information collected within the 
    Department of Defense is necessary and consistent with 5 U.S.C. 552a, 
    known as the Privacy Act of 1974.
        The Department of the Army system of records notice A0381-45cDAMI 
    was deleted October 4, 1995. Therefore, the exemption rule is being 
    deleted with this action.
        In addition, the Army is amending three existing exemption rules. 
    The amendments to the existing rules change the system identifiers and 
    provide the provisions of 5 U.S.C. 552a from which the system of 
    records may be exempt, and the reasons therefore. The system 
    identifiers are A0381-20bDAMI, entitled Counterintelligence Operations 
    Files; A0614-115DAMI, entitled Department of the Army Operational 
    Support Activities; and A0318-100aDAMI, entitled Intelligence 
    Collection Files.
    
    List of Subjects in 32 CFR Part 505
    
        Privacy.
    
        Accordingly, 32 CFR part 505 is amended as follows:
    
        1. The authority citation for 32 CFR part 505 continues to read as 
    follows:
    
        Authority: Pub. L. 93-579, 88 Stat 1896 (5 U.S.C.552a).
    
        2. Section 505.5, is amended by revising the text of paragraphs 
    (e)ac, (e)ad, and (e)af, and removing and reserving paragraph (e)ae as 
    follows:
    
    
    Sec.  505.5  Exemptions.
    
    * * * * *
        (e)  Exempt Army records. * * *
    
        ac. System identifier: A0381-20bDAMI.
        (1) System name: Counterintelligence/Security Files.
        (2) Exemption: All portions of this system of records may be exempt 
    from the provisions of subsections (c)(3), (d)(1) through (d)(5), 
    (e)(1), (e)(4)(G), (e)(4)(H), and (e)(4)(I), and (f) of 5 U.S.C. 552a.
        (3) Authority: 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5).
        (4) Reasons: (a) From subsection (c)(3) because disclosing the 
    agencies to which information from this system has been released could 
    inform the subject of an investigation of an actual or potential 
    criminal violation, or intelligence operation or investigation; or the 
    existence of that investigation or operation; of the nature and scope 
    of the information and evidence obtained as to his/her activities or of 
    the identify of confidential sources, witnesses, and intelligence 
    personnel and could provide information to enable the subject to avoid 
    detection or apprehension. Granting access to such information could 
    seriously impede or compromise an investigation; endanger the physical 
    safety of confidential sources, witnesses, intelligence personnel, and 
    their families; lead to the improper influencing of witnesses; the 
    destruction of evidence or the fabrication of testimony and disclose 
    investigative techniques and procedures. In addition, granting access 
    to such information could disclose classified and sensitive sources, 
    information, and operational methods and could constitute an 
    unwarranted invasion of the personal privacy of others.
        (b) From subsection (d)(1) through (d)(5) because granting access 
    to records in this system of records could inform the subject of a 
    counterintelligence operation or investigation of an actual or 
    potential criminal violation or the existence of that operation or 
    investigation; of the nature and scope of the information and evidence 
    obtained as to his/her activities; or of the identity of confidential 
    sources, witnesses and intelligence personnel and could provide 
    information to enable the subject to avoid detection or apprehension. 
    Granting access to such information could seriously impede or 
    compromise an operation or investigation; endanger the physical safety 
    of confidential sources, witnesses, intelligence personnel and their 
    families; lead to the improper influencing of witnesses; the 
    destruction of evidence or the fabrication of testimony and disclose 
    investigative techniques and procedures. In addition, the agency is 
    required to protect the confidentiality of sources who furnished 
    information to the Government under an expressed promise of 
    confidentiality or, prior to September 27, 1975, under an implied 
    promise that the identity of the source would be held in confidence. 
    This confidentiality is needed to maintain the Government's continued 
    access to information from persons who otherwise might refuse to give 
    it.
        (c) From subsection (e)(1) because it is not always possible to 
    detect the relevance or necessity of specific information in the early 
    stages of an investigation or operation. Relevance and necessity are 
    often questions of judgement and timing, an it is only after the 
    information is evaluated that the relevance and necessity of such 
    information can be established. In addition, during the course of the 
    investigation or operation, the investigator may obtain information 
    which is incidental to the main purpose of the investigative 
    jurisdiction of another agency. Such information cannot readily be 
    segregated. Furthermore, during the course of the investigation or 
    operation, the investigator may obtain information concerning 
    violations of laws other than those which are within the scope of his/
    her jurisdiction. In the interest of effective intelligence operations 
    and law enforcement, military intelligence agents should retain 
    information, since it an aid in establishing patterns of criminal or 
    intelligence activity and provide valuable leads for other law 
    enforcement or intelligence agencies.
    
        (d) From subsection (e)(4)(G), (e)(4)(H), and (f) because this 
    system or records is being exempt from subsections (d) of the Act, 
    concerning access to records. These requirements are inapplicable to 
    the extent that this system of records will be exempt from subsections 
    (d)(1) through (d)(5) of the Act. Although the system would be exempt 
    from these requirements, the Deputy Chief of Staff for Intelligence has 
    published information concerning its notification, access, and contest 
    procedures because under certain circumstances, the Deputy Chief of 
    Staff for Intelligence could decide it is appropriate for an individual 
    to have access to all or a portion of his/her records in this system of 
    records.
    
        (e) From subsection (e)(4)(I) because it is necessary to protect 
    the confidentiality of the sources of information, to protect the 
    privacy and physical safety of confidential sources and witnesses and 
    to avoid the disclosure of investigative techniques and procedures. 
    Although the system will be exempt from this requirement, the Deputy 
    Chief of Staff for Intelligence has published such a notice in broad, 
    generic terms.
    
        ad. System identifier: A0614-115DAMI.
        (1) System name: Department of the Army Operational Support 
    Activities.
        (2) Exemption: All portions of this system of records that fall 
    within the provisions of 5 U.S.C. 552a(k)(1), (k)(2), or (k)(5) may be 
    exempt from subsections 5 U.S.C. 552a(c)(3), (d)(1) through (d)(5), 
    (e)(1), (e)(4)(G), (e)(4)(H), and (e)(4)(I), and (f).
        (3) Authority: 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5).
        (4) Reasons: (a) From subsection (c)(3)because disclosing the 
    agencies to which information from this system has 
    
    [[Page 51920]]
    been released could reveal the subject's involvement in a sensitive 
    intelligence or counterintelligence operation or investigation of an 
    actual or potential criminal violation, or intelligence operation or 
    investigation; or the existence of that investigation or operation. 
    Granting access to such information could seriously impede or 
    compromise an investigation or operation; endanger the physical safety 
    of participants and their families, confidential sources, witnesses, 
    intelligence personnel, and their families; and lead to the improper 
    influencing of witnesses; the destruction of evidence or the 
    fabrication of testimony and disclose investigative techniques and 
    procedures.
        (b) From subsection (d)(1) through (d)(5) because granting access 
    to records could inform the subject of an intelligence or 
    counterintelligence operation or investigation of an actual or 
    potential criminal violation or the existence of that operation or 
    investigation; of the nature and scope of the information and evidence 
    obtained, or of the identity of confidential sources, witnesses and 
    intelligence personnel. Granting access to such information could 
    seriously impede or compromise an operation or investigation; endanger 
    the physical safety of confidential sources, witnesses, intelligence 
    personnel and their families; lead to the improper influencing of 
    witnesses; the destruction of evidence or the fabrication of testimony; 
    disclose investigative techniques and procedures; invade the privacy of 
    those individuals involved in intelligence programs and their families; 
    compromise and thus negate specialized techniques used to support 
    intelligence programs; and interfere with and negate the orderly 
    conduct of intelligence and counterintelligence operations and 
    investigations. In addition, the agency is required to protect the 
    confidentiality of sources who furnished information to the Government 
    under an expressed promise of confidentiality or, prior to September 
    27, 1975, under an implied promise that the identity of the source 
    would be held in confidence. This confidentiality is needed to maintain 
    the Government's continued access to information from persons who 
    otherwise might refuse to give it.
        (c) From subsection (e)(1) because it is not always possible to 
    detect the relevance of specific information in the early stages of an 
    investigation or operation. Relevance and necessity are often questions 
    of judgment and timing, and it is only after the information is 
    evaluated that the relevance and necessity of such information can be 
    established. In addition, during the course of the investigation or 
    operation, the investigator or operative may obtain information which 
    is incidental to the main purpose of the investigative jurisdiction of 
    another agency. Such information cannot readily be segregated. 
    Furthermore, during the course of the investigation or operation, the 
    investigator may obtain information concerning violations of law other 
    than those which are within the scope of his/her jurisdiction. In the 
    interest of effective intelligence operations and law enforcement, 
    military intelligence agents should retain information, since it is an 
    aid in establishing patterns of criminal or intelligence activity and 
    provides valuable leads for other law enforcement or intelligence 
    agencies.
        (d) From subsection (e)(4)(G), (e)(4)(H), and (f) because this 
    system or records is being exempt from subsections (d) of the Act, 
    concerning access to records. These requirements are inapplicable to 
    the extent that this system of records will be exempt from subsections 
    (d)(1) through (d)(5) of the Act. Although the system would be exempt 
    from these requirements, the Deputy Chief of Staff for Intelligence has 
    published information concerning its notification, access, and contest 
    procedures because under certain circumstances, the Deputy Chief of 
    Staff for Intelligence could decide it is appropriate for an individual 
    to have access to all or a portion os his/her records in this system of 
    records.
        (e) From subsection (e)(4)(I) because it is necessary to protect 
    the confidentiality of sources of information, to protectthe privacy 
    and physical safety of participants and their families, confidential 
    sources, and witnesses and to avoid the disclosure of specialized 
    techniques and procedures. Although the system will be exempt from this 
    requirement, the Deputy Chief of Staff for Intelligence has published 
    such a notice in broad, generic terms.
        ae. [Reserved.]
        af. System identifier: A0381-100aDAMI.
        (1) System name: Intelligence/Counterintelligence Source Files.
        (2) Exemption: All portions of this system of records that fall 
    within the provisions of 5 U.S.C. 552a(k)(1), (k)(2), or (k)(5) may be 
    exempt from subsections 5 U.S.C. 552a(c)(3), (d)(1) through (d)(5), 
    (e)(1), (e)(4)(G), (e)(4)(H), and (e)(4)(I), and (f).
        (3) Authority: 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5).
        (4) Reasons: (a) From subsection (c)(3)because disclosing the 
    agencies to which information from this system has been released could 
    reveal the subject's involvement in a sensitive intelligence or 
    counterintelligence operation or investigation of an actual or 
    potential criminal violation, or intelligence operation or 
    investigation; or the existence of that investigation or operation. 
    Granting access to such information could seriously impede or 
    compromise an investigation or operation; endanger the physical safety 
    of participants and their families, confidential sources, witnesses, 
    intelligence personnel, and their families; and lead to the improper 
    influencing of witnesses; the destruction of evidence or the 
    fabrication of testimony and disclose investigative techniques and 
    procedures.
        (b) From subsection (d)(1) through (d)(5) because granting access 
    to records could inform the subject of an intelligence or 
    counterintelligence operation or investigation of an actual or 
    potential criminal violation or the existence of that operation or 
    investigation; or the nature and scope of the information and evidence 
    obtained, or of the identity of confidential sources, witnesses and 
    intelligence personnel. Granting access to such information could 
    seriously impede or compromise an operation or investigation; endanger 
    the physical safety of confidential sources, witnesses, intelligence 
    personnel and their families; lead to the improper influencing of 
    witnesses; the destruction of evidence or the fabrication of testimony; 
    disclose investigative techniques and procedures; invade the privacy of 
    those individuals involved in intelligence programs and their families; 
    compromise and thus negate specialized techniques used to support 
    intelligence programs; and interfere with and negate the orderly 
    conduct of intelligence and counterintelligence operations and 
    investigations. In addition, the agency is required to protect the 
    confidentiality of sources who furnished information to the Government 
    under an expressed promise of confidentiality or, prior to September 
    27, 1975, under an implied promise that the identity of the source 
    would be held in confidence. This confidentiality is needed to maintain 
    the Government's continued access to information from persons who 
    otherwise might refuse to give it.
        (c) From subsection (e)(1) because it is not always possible to 
    detect the relevance or necessity of specific information in the early 
    stages of an investigation or operation. Relevance and necessity are 
    often questions of judgment and timing, and it is only after the 
    information is evaluated that the relevance and necessity of such 
    information can be established. In 
    
    [[Page 51921]]
    addition, during the course of the investigation or operation, the 
    investigator or operative may obtain information which is incidental to 
    the main purpose of the investigative jurisdiction of another agency. 
    Such information cannot readily be segregated. Furthermore, during the 
    course of the investigation or operation, the investigator may obtain 
    information concerning violations of law other than those which are 
    within the scope of his/her jurisdiction. In the interest of effective 
    intelligence operations and law enforcement, military intelligence 
    agents should retain information, since it is an aid in establishing 
    patterns of criminal or intelligence activity and provides valuable 
    leads for other law enforcement or intelligence agencies.
        (d) From subsection (e)(4)(G), (e)(4)(H), and (f) because this 
    system of records is being exempt from subsection (d) of the Act 
    concerning access to records. These requirements are inapplicable to 
    the extent that this system of records will be exempt from subsections 
    (d)(1) through (d)(5) of the Act. Although the system would be exempt 
    from these requirements, the Deputy Chief of Staff for Intelligence has 
    published information concerning its notification, access, and contest 
    procedures because under certain circumstances, the Deputy Chief of 
    staff for Intelligence could decide it is appropriate for an individual 
    to have access to all or a portion of his/her records in this system of 
    records.
        (e) From subsection (e)(4)(I) because it is necessary to protect 
    the confidentiality of sources of information, to protect the privacy 
    and physical safety of participants and their families, confidential 
    sources, and witnesses and to avoid the disclosure of specialized 
    techniques and procedures. Although the system will be exempt from this 
    requirement, the Deputy Chief of Staff for Intelligence has published 
    such a notice in broad generic terms.
    * * * * *
    
        Dated: September 28, 1995.
    
    
    L. M. Bynum,
    Alternate OSD Federal Register Liaison Officer, Department of Defense.
    [FR Doc. 95-24664 Filed 10-3-95; 8:45 am]
    BILLING CODE 5000-04-F
    
    

Document Information

Effective Date:
10/4/1995
Published:
10/04/1995
Department:
Army Department
Entry Type:
Rule
Action:
Final rule.
Document Number:
95-24664
Dates:
October 4, 1995.
Pages:
51918-51921 (4 pages)
PDF File:
95-24664.pdf
CFR: (1)
32 CFR 505.5