General Services Administration.
GSA reviewed its Privacy Act systems to ensure that they are relevant, necessary, accurate, up-to-date, covered by the appropriate legal or regulatory authority, and in response to OMB M-07-16. This notice is a compilation of updated Privacy Act system of record notices.
Effective May 27, 2008.Start Further Info
FOR FURTHER INFORMATION CONTACT:
Call or e-mail the GSA Privacy Act Officer: telephone 202-208-1317; e-mail firstname.lastname@example.org.End Further Info
GSA Privacy Act Officer (CIB), General Services Administration, 1800 F Street NW., Washington, DC 20405.End Preamble Start Supplemental Information
GSA undertook and completed an agency wide review of its Privacy Act systems of records. As a result of the review GSA is publishing updated Privacy Act systems of records notices. Rather than make numerous piecemeal revisions, GSA is republishing updated notices for one of its systems. Nothing in the revised system notices indicates a change in authorities or practices regarding the collection and maintenance of information. Nor do the changes impact individuals' rights to access or amend their records in the systems of records. The updated system notices also includes the new requirement from OMB Memorandum M-07-16 regarding a new routine use that allows agencies to disclose information in connection with a response and remedial efforts in the event of a data breach.Start Signature
Dated: April 16, 2008.
Cheryl M. Paige,
Director, Office of Information Management.
Access Certificates for Electronic Services (ACES).
System records are maintained for the General Services Administration (GSA) by contractors at various physical locations. A complete list of locations is available from: Administrative Contracting Officer, FEDCAC, Federal Technology Service, General Services Administration, 7th and D Streets, SW., Room 5060, Washington, DC 20407; telephone (202) 708-6099.
CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
Individuals covered are persons who have applied for the issuance of a digital signature certificate under the ACES program; have had their certificates amended, renewed, replaced, suspended, revoked, or denied; have used their certificates to electronically make contact with, retrieve information from, or submit information to an automated information system of a participating agency; have requested access to ACES records under the Freedom of Information Act (FOIA) or Privacy Act; and have corresponded with GSA or its ACES contractors concerning ACES services.
CATEGORIES OF RECORDS IN THE SYSTEM:
The system contains information needed to establish and verify the identity of ACES users, to maintain the system, and to establish accountability and audit controls. System records include:
a. Applications for the issuance, amendment, renewal, replacement, or revocation of digital signature certificates under the ACES program, including evidence provided by applicants or proof of identity and authority, and sources used to verify an applicant's identify and authority.
b. Certificates issued.
c. Certificates denied, suspended, and revoked, including reasons for denial, suspension, and revocation.
d. A list of currently valid certificates.
e. A list of currently invalid certificates.
f. A file of individuals requesting access and those granted access to ACES information under FOIA or the Privacy Act.
g. A file of individuals requesting access and those granted access for reasons other than FOIA or the Privacy Act.
h. A record of validation transactions attempted on digital signature certificates issued by the system.
i. A record of validation transactions completed on digital signature certificates issued by the system.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
Section 5124(b) of the Clinger-Cohen Act of 1996, 40 U.S.C. 1424, which provides authority for GSA to develop and facilitate governmentwide electronic commerce resources and services, and the Paperwork Reduction Act, 44 U.S.C. 3501, et. seq., which provides authority for GSA to manage Federal information resources.
To establish and maintain an electronic system to facilitate secure, on-line communication between Federal automated information systems and the public, using digital signature technologies to authenticate and verify identity.
ROUTINE USES OF THE SYSTEM RECORDS, INCLUDING CATEGORIES OF USERS AND THEIR PURPOSES FOR USING THE SYSTEM:
Information from this system may be disclosed as a routine use:
a. To GSA ACES program contractors to compile and maintain documentation on applicants for proofing applicants' identity and their authority to access information system applications of participating agencies.
b. To GSA ACES program contractors to establish and maintain documentation on information sources for verifying applicants' identities.
c. To Federal agencies participating in the ACES program to determine the validity of applicants' digital signature certificates in an on-line, near real time environment.
d. To GSA, participating Federal agencies, and ACES contractors, for ensuring proper management, ensuring data accuracy, and evaluation of the system.
e. To Federal, State, local or foreign agencies responsible for investigating, Start Printed Page 22381prosecuting, enforcing, or carrying out a statute, rule, regulation, or order when GSA becomes aware of a violation or potential violation of civil or criminal law or regulation.
f. To a member of Congress or to a congressional staff member in response to a request from the person who is the subject of the record.
g. To an expert, consultant, or contractor of GSA in the performance of a Federal duty to which the information is relevant.
h. To appropriate agencies, entities, and persons when (1) the Agency suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; (2) the Agency has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by GSA or another agency or entity) that rely upon the compromised information; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with GSA's efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm.
i. To a Federal agency in connection with the hiring or retention of an employee; the issuance of a security clearance; the reporting of an investigation; the letting of a contract; or the issuance of a grant, license, or other benefit to the extent that the information is relevant and necessary to a decision.
j. To the Office of Personnel Management (OPM), the Office of Management and Budget (OMB), or the Government Accountability Office (GAO) when the information is required for program evaluation purposes.
k. To an expert, consultant, or contractor of GSA in the performance of a Federal duty to which the information is relevant.
l. To the National Archives and Records Administration (NARA) for records management purposes.
Disclosure to consumer reporting agencies: Disclosure of system records to consumer reporting systems is not permitted.
POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING, AND DISPOSING OF SYSTEM RECORDS:
All records are stored by GSA ACES contractors or by GSA as hard copy documents and/or on electronic media.
Records are retrievable by a personal identifier or by other appropriate type of designation approved by GSA and made available to ACES participants at the time of their application for ACES services.
System records are safeguarded in accordance with the requirements of the Privacy Act, the Computer Security Act, and OMB Circular A-130, Appendices I and III. Technical, administrative, and personnel security measures are implemented to ensure confidentiality and integrity of the system data stored, processed, and transmitted. The ACES System Security Plan, approved by GSA for each ACES contractor, provides for inspections, testing, continuity of operations, and technical certification of security safeguards. GSA accredits and annually re-accredits each contractor system prior to its operation.
RETENTION AND DISPOSAL:
System records are retained and disposed of according to GSA records maintenance and disposition schedules and the requirements of the National Archives and Records Administration.
SYSTEM MANAGER AND ADDRESS:
Administrative Contracting Officer, FEDCAC, Federal Technology Service, General Services Administration, Room 5060, 7th and D Streets, SW., Washington, DC 20407.
Inquiries from individuals should be addressed to the system manager. Applicants for digital signature certificates will be notified by the GSA ACES contractor which facilitates individual access to the relevant Federal agency database as follows:
a. Each applicant will be provided, on a Government-approved form that can be retained by the individual applicant, the principal purposes of the ACES program; the authority for collecting the information; the fact that participation is voluntary; the fact that identity and authority information must be provided and verified before a certificate will be issued; the fact that the information provided is covered by the Privacy Act and the Computer Security Act; the routine uses that will be made of the information being provided; the limitations on the uses of the information being provided; the procedures to be followed for requesting access to the individual's own records; and the possible consequences of failing to provide all or part of the required information or intentionally providing false information.
b. Written notification in response to an individual's request to be advised if the system contains a record pertaining to him/her.
c. Written notification to an individual when any record on the individual is made available to any person under compulsory legal process when such process becomes a matter of public record.
d. Written notification of the right to appeal to GSA by any individual on any dispute concerning the accuracy of his/her record.
RECORD ACCESS PROCEDURE:
GSA ACES contractors will provide notification of, access to, review of, or copies of an individual's record upon his/her request as required by the Privacy Act.
CONTESTING RECORD PROCEDURE:
GSA ACES contractors will amend an individual's record upon his/her written request, as required by the Privacy Act and GSA's implementing regulations, 41 CFR part 105-64. If the ACES contractor determines that an amendment is inappropriate, the contractor shall submit the request to the System Manager for a determination by GSA whether to grant or deny the request for amendment and direct response to the requester.
RECORD SOURCES CATEGORIES:
The sources for information in the system are the individuals who apply for digital signature certificates, GSA ACES contractors using independent sources to verify identities, and internal system transactions designed to gather and maintain data needed to manage and evaluate the ACES program.End Supplemental Information
[FR Doc. E8-8886 Filed 4-24-08; 8:45 am]
BILLING CODE 6820-34-P