FOIA, Privacy & Records Management Conference 2009

Slides:



Advertisements
Similar presentations
PRIVACY ACT OF 1974 OVERVIEW. FAIR INFORMATION PRACTICES The Privacy Act is primarily concerned with fair information practices. The Privacy Act is primarily.
Advertisements

The Legal Foundation TRICARE Management Activity HEALTH AFFAIRS 2009 Data Protection Seminar TMA Privacy Office.
Privacy Impact Assessment Future Directions TRICARE Management Activity HEALTH AFFAIRS 2009 Data Protection Seminar TMA Privacy Office.
Privacy Reporting and Investment Certification TRICARE Management Activity HEALTH AFFAIRS 2009 Data Protection Seminar TMA Privacy Office.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Overview of the Privacy Act
National Science Foundation Division of Science Resources Statistics May The Confidential Information Protection and Statistical Efficiency Act.
Office of Health, Safety and Security
IT Security Law for Federal Agencies As of: 30 December 2002.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Defense Privacy Office 1 Budget Documentation and Justification Writing Class The Privacy Act of 1974: What Senior Leaders Need to Know.
The Privacy Office U.S. Department of Homeland Security Washington, DC t: ; f: Safeguarding.
Congress and Contractor Personal Conflicts of Interest May 21, 2008 Jon Etherton Etherton and Associates, Inc.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Annual Army FOIA/Privacy/Records Management Conference Privacy Leadership – Accountability - Action presented by Samuel P. Jenkins, Director Defense Privacy.
Data Classification & Privacy Inventory Workshop
PRIVACY ACT Federal Workers’ Compensation Conference 2014 Department of Labor.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Department of Commerce Records Management Training.
DEFENSE PRIVACY & CIVIL LIBERTIES OFFICE Safeguarding Personally Identifiable Information (PII) Samuel P. Jenkins Director for Privacy Defense Privacy.
DEFENSE PRIVACY & CIVIL LIBERTIES OFFICE Privacy Foundations Samuel P. Jenkins Director for Privacy Defense Privacy and Civil Liberties Office Identity.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
PRIVACY SAFEGUARDS ANNUAL TRAINING FY 2011 previous next Office of Management Privacy, Information and Records Management Services Privacy Safeguards Division.
HIPAA PRIVACY AND SECURITY AWARENESS.
FISMA Privacy Reporting Requirements United States Pacific Command (USPACOM) FOIA & Privacy Act Conference Presented by Samuel P. Jenkins, Director for.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
CAPPS II: A Case Study of Homeland Security Computer Applications Marcia Hofmann Staff Counsel Electronic Privacy Information Center Computer Freedom &
Ames Laboratory Privacy and Personally Identifiable Information (PII) Training Welcome to the Ames Laboratory’s training on Personally Identifiable Information.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
INFORMATION TECHNOLOGY SERVICES Privacy 101 Information Security and Privacy Office.
Family Educational Rights and Privacy Act. From the moment a child enters the school system, sensitive information is collected about the child (and even.
PII BREACH MANAGEMENT Army Privacy Office 7701 Telegraph Road Casey Building, Room 144 Alexandria, VA DSN: Fax:
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
(Compliance Training)
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
Research & Economic Development Office of Grants and Contracts Administration Data Security Presented by Debbie Bolick September 24, 2015.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
Privacy Act United States Army (Managerial Training)
FERPA for the Financial Aid Office NCASFAA Fall Conference November 2012.
FOIA Processing and Privacy Awareness at NOAA Prepared by Mark H. Graff NOAA FOIA Officer OCIO/GPD (301)
TASFAA 2016 Legacy of Leadership. TASFAA 2016 Legacy of Leadership Family Educational Rights and Privacy Act (FERPA) An Overview Molly Thompson Associate.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
Welcome to Workforce 3 One U.S. Department of Labor Employment and Training Administration Webinar Date: Thursday, October 23, 2014 Presented by: Division.
Understanding Privacy An Overview of our Responsibilities.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Nassau Association of School Technologists
Information Security and Privacy Office
Privacy and Security Basics for Falls Evidence Based Programs Data Collection . October 2016.
Privacy and Security Basics for CDSME Data Collection
Office of Health, Safety and Security
Privacy principles Individual written policies
Providing Access to Your Data: Handling sensitive data
Obligations of Educational Agencies: Parents’ Bill of Rights
Privacy principles Individual written policies
Privacy Breach Panel 11/16/2009
FOIA, Privacy & Records Management Conference 2009
FOIA, Privacy & Records Management Conference 2009
Red Flags Rule An Introduction County College of Morris
SPECIAL EDUCATION REQUIRED TRAINING
DATA BREACHES & PRIVACY Christine M
Protecting Student Data/ Financial Aid Data Sharing
Mandatory Coordination
Samuel P. Jenkins, Director Defense Privacy Office
Managing Perkins Funds
FOIA, Privacy & Records Management Conference 2009
Colorado “Protections For Consumer Data Privacy” Law
Garrison Okinawa Incoming Soldiers and Civilians Records Management Brief Lawrence L. Brown.
University of Pittsburgh
Presentation transcript:

FOIA, Privacy & Records Management Conference 2009 Office of the Administrative Assistant to the Secretary of the Army Records Management and Declassification Agency Privacy Program Overview Basic Privacy Principles Leroy Jones, Jr. Margaret Hamrick Army Privacy Office Army Privacy Office (703) 428-6185 (703) 428-6193 leroy.jonesjr1@us.army.mil margaret.hamrick@us.army.mil

The Privacy Act of 1974 Reasons for the Act: Key Principles: Individuals were often denied access to records the government maintained on them – the Act balances the government’s need to collect information with the Privacy rights of individuals Key Principles: Grant individuals rights of access to records maintained on them Allow individuals to seek amendment of their records Inaccurate, irrelevant, untimely or incomplete Provide a Privacy Act statement as information is collected Authority, Purpose, Routine Uses, Voluntary or Mandatory Publish record collections on individuals in the Federal Register System of Record Notices Restrict disclosure/sharing between government agencies Publish Computer Matching Agreements in the Federal Register

Office of Management and Budget November 2000 - Circular A-130 - Management of Federal Information Resources Defines schedule of reviews of Privacy Act requirements Annually: Computer Matching: ensure that statutory, regulatory and OMB guidelines have been met for each ongoing matching program Biennially: Section (m) Contracts: ensure the wording of random contracts for system of records binds the contractor to the Act Recordkeeping Practices: assure compliance with the Act and maintenance of automated records, disposal policies/practices Privacy Act Training: ensure that agency personnel are familiar with the requirements of the Act and implementing regulation Violations: determine the extent and prevent recurrence of agency civilly liable or employee criminally liable findings System of Record Notices: ensure accuracy of descriptions Every Four Years: Routine Use Disclosures: ensure recipient's use continues to be compatible with the purpose of the disclosing agency collection Exemption of Systems of Records: determine whether exemption is still needed

Electronic Government Act of 2002 Federal Information Security Management Act Reasons for the Act: Technology and automation throughout the government caused concerns about protection, use and disclosure of information maintained on individuals - protect information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction to ensure integrity, confidentiality and availability of data Key Principles: Agency funding for automation contingent upon assurances of security and authorized collection and use Privacy Impact Assessments (PIAs) Analysis of automated systems containing information on individuals Annual and Quarterly Reporting Statistics on a wide range of agency Privacy practices Narrative descriptions and responses to directed questions

2006 – VA Loss of Laptop Resulted in unprecedented heightened interest in Privacy Presidential, Congressional, media, public, leadership Numerous directives culminated latest guidance May 07 - OMB Memorandum 07-16, Safeguarding Against and Responding to the Breach of Personally Identifiable Information June 09 - DoD Memorandum, Safeguarding Against and Responding to the Breach of Personally Identifiable Information Established PII Breach Reporting Purpose is to alert the appropriate authorities and those affected when a loss, theft, or compromise of government PII occurs 1 hour to U.S. Computer Emergency Readiness Team (US-CERT) 24 hours to Army Privacy Office 10 working days for activities to notify individuals if warranted Army and DoD Leadership are provided PII breach reports Occasional Congressional and Presidential involvement 5

Implementing Recommendations of the 9/11 Commission Act of 2007 Public Law 110-53, Section 803 Purpose: Review development and implementation of laws, regulations, procedures, policies, and guidelines relating to protecting the Nation against terrorism to ensure they balance with the need to protect Privacy Appoint a senior officer to serve as the principal advisor to the department head and other officials in appropriately considering privacy concerns DAASA appointed and serves as Army Senior Agency Official for Privacy Army Privacy Office charged with implementation and oversight Key requirements: Establish procedures to redress privacy violation complaints Provide advice on governmental powers and privacy Submit quarterly reports to Congress and Privacy Board Number and types of reviews undertaken Type of advise provided and response given Number of complaints, description and disposition

Definition of PII Personally Identifiable Information (PII) Is any information that can be used to distinguish or trace an individual’s identity such as name, social security number (SSN), date of birth, home address, home phone number, personal email address, financial information, fingerprint, photograph, medical information, and civilian National Security Personnel System (NSPS) data. Or when combined with other personal or identifying information which is linked or linkable to a specific individual, such as date and place of birth, mother’s maiden name, etc. This information can be in hard copy (paper copy Files) or electronic format, stored on personal computers, laptops, and personal electronic devices such as blackberries and found within databases. This includes but is not limited to, education records, financial transactions, medical files, criminal records, or Employment history. DoD requirement expands the requirement to review all systems to determine if they collect PII and conduct a PIA on those systems regardless whether they collect PII on members of DoD. 7

Definition of PIA Privacy Impact Assessment (PIA) Is an analysis of how information is handled: Conforms to applicable legal, regulatory, and policy requirements regarding privacy; Determine the risks and effects of collecting, maintaining and disseminating information in identifiable electronic form; Examine and evaluate protections and alternative processes for handling information to mitigate potential privacy risks. 8

Purpose of the PIA To analyze how PII is handled in order to: Determine conformance with applicable legal, regulatory, and policy requirements regarding privacy Assess the risks and effects of collecting, maintaining and disseminating PII Examine and evaluate protections and alternative processes for handling information to mitigate potential privacy risks. This information can be in hard copy (paper copy Files) or electronic format, stored on personal computers, laptops, and personal electronic devices such as blackberries and found within databases. This includes but is not limited to, education records, financial transactions, medical files, criminal records, or Employment history. DoD requirement expands the requirement to review all systems to determine if they collect PII and conduct a PIA on those systems regardless whether they collect PII on members of DoD. 9

When is a PIA required? System that collect, maintain, use, or disseminate PII on the general public, federal personnel (government civilians, members of the military, and Non-appropriated fund employees), contractors, and Foreign Nationals employed on military bases overseas; Prior to developing or purchasing new DoD information or electronic systems, (this includes DoD information systems and electronic collections supported through contracts with external sources that collect, maintain, use, or disseminate PII); There is a significant change to a system, to include new application functionalities or changes in privacy risk; For legacy systems; When converting from paper-based records that contain PII to an electronic system. 10

REQUIREMENTS OVERVIEW PIA REQUIREMENTS OVERVIEW Must be submitted on New form – DD Form 2930 PIAs must be reviewed and updated every three years in conjunction with the Certification and Accreditation (C&A) cycle as a component of the DoD Information Assurance Certification and Accreditation Process (DIACAP) package. A System of Records Notice (SORN), is required if a group of files (paper or electronic) are retrieved by name, date of birth, social security number, contains a personal identifier assigned to an individual. The authorities in the PIA and the SORN should be consistent (use this instead) 11

Key References Privacy Act of 1974, as amended, 5 U.S.C. § 552a http://www.justice.gov/opcl/privstat.htm FISMA https://www.rmda.army.mil/privacy/docs/FISMA-final.pdf 9/11 Commission Act http://www.nctc.gov/docs/ir-of-the-9-11-comm-act-of-2007.pdf Guidance on Protecting Federal Employee Social Security Numbers and Combating Identity Theft, 2 July 2008 OMB Memorandum M-07-16, Safeguarding Against and Responding to the Breach of Personally Identifiable Information, 22 May 2007 http://www.whitehouse.gov/OMB/memoranda/fy2007/m07-16.pdf

Key References (con’t) DoD DA&M Memorandum, Safeguarding Against and Responding to the Breach of Personally Identifiable Information, 5 June 2009 http://www.dodig.mil/fo/Privacy/policy.htm DoD CIO/G-6 Memorandum, Army Privacy Impact Assessment (PIA) Compliance, 31Jul 2009 (available) DoD Directive-Type Memorandum, DoD Social Security Number (SSN) Reduction Plan, 28 Mar 2008 http://www.dodig.mil/fo/Privacy/PDFs/pr080328ssn_28Mar08_DrChu.pdf

Questions???