81_FR_31711 81 FR 31614 - Privacy Act of 1974; System of Records

81 FR 31614 - Privacy Act of 1974; System of Records

DEPARTMENT OF DEFENSE
Office of the Secretary

Federal Register Volume 81, Issue 97 (May 19, 2016)

Page Range31614-31618
FR Document2016-11703

The Office of the Secretary of Defense proposes to establish a new system of records, DUSDI 01-DoD, entitled the ``Department of Defense (DoD) Insider Threat Management and Analysis Center (DITMAC) and DoD Component Insider Threat Records System.'' This system has been established to enable DoD to implement the requirements of Executive Order 13587, Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information (October 7, 2011), and the National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs (November 21, 2012). For purposes of this system of records, the term ``insider threat'' is defined in the Minimum Standards for Executive Branch Insider Threat Programs which were issued by the National Insider Threat Task Force based on directions provided in Section 6.3(b) of Executive Order 13587. The system will be used to analyze, monitor, and audit insider threat information for insider threat detection and mitigation within DoD on threats that insiders may pose to DoD and U.S. Government installations, facilities, personnel, missions, or resources. The system will support the DITMAC and DoD Component insider threat programs, enable the identification of systemic insider threat issues and challenges, provide a basis for the development and recommendation of solutions to mitigate potential insider threats, and assist in identifying best practices amongst other Federal Government insider threat programs.

Federal Register, Volume 81 Issue 97 (Thursday, May 19, 2016)
[Federal Register Volume 81, Number 97 (Thursday, May 19, 2016)]
[Notices]
[Pages 31614-31618]
From the Federal Register Online  [www.thefederalregister.org]
[FR Doc No: 2016-11703]


-----------------------------------------------------------------------

DEPARTMENT OF DEFENSE

Office of the Secretary

[Docket ID: DoD-2016-OS-0060]


Privacy Act of 1974; System of Records

AGENCY: Office of the Secretary of Defense, DoD.

ACTION: Notice to add a New System of Records.

-----------------------------------------------------------------------

SUMMARY: The Office of the Secretary of Defense proposes to establish a 
new system of records, DUSDI 01-DoD, entitled the ``Department of 
Defense (DoD) Insider Threat Management and Analysis Center (DITMAC) 
and DoD Component Insider Threat Records System.'' This system has been 
established to enable DoD to implement the requirements of Executive 
Order 13587, Structural Reforms to Improve the Security of Classified 
Networks and the Responsible Sharing and Safeguarding of Classified 
Information (October 7, 2011), and the National Insider Threat Policy 
and Minimum Standards for Executive Branch Insider Threat Programs 
(November 21, 2012). For purposes of this system of records, the term 
``insider threat'' is defined in the Minimum Standards for Executive 
Branch Insider Threat Programs which were issued by the National 
Insider Threat Task Force based on directions provided in Section 
6.3(b) of Executive Order 13587. The system will be used to analyze, 
monitor, and audit insider threat information for insider threat 
detection and mitigation within DoD on threats that insiders may pose 
to DoD and U.S. Government installations, facilities, personnel, 
missions, or resources. The system will support the DITMAC and DoD 
Component insider threat programs, enable the identification of 
systemic insider threat issues and challenges, provide a basis for the 
development and recommendation of solutions to mitigate potential 
insider threats, and assist in identifying best practices amongst other 
Federal Government insider threat programs.

DATES: Comments will be accepted on or before June 20, 2016. This 
proposed action will be effective the day following the end of the 
comment period unless comments are received which result in a contrary 
determination.

ADDRESSES: The public, OMB, and Congress are invited to submit any 
comments, identified by docket number and title, by any of the 
following methods:
    * Federal Rulemaking Portal: http://www.regulations.gov. Follow the 
instructions for submitting comments.
    * Mail: Department of Defense, Office of the Deputy Chief 
Management Officer, Directorate of Oversight and Compliance, 4800 Mark 
Center Drive, Mailbox #24, Alexandria, VA 22350-1700.
    Instructions: All submissions received must include the agency name 
and docket number for this Federal Register document. The general 
policy for comments and other submissions from members of the public is 
to make these submissions available for public viewing on the Internet 
at http://www.regulations.gov as they are

[[Page 31615]]

received without change, including any personal identifiers or contact 
information.

FOR FURTHER INFORMATION CONTACT: Cindy Allard, Director of the Defense 
Privacy, Civil Liberties, and Transparency Division, 703-571-0070.

SUPPLEMENTARY INFORMATION: The Office of the Secretary of Defense 
notices for systems of records subject to the Privacy Act of 1974 (5 
U.S.C. 552a), as amended, have been published in the Federal Register 
and are available from the address in FOR FURTHER INFORMATION CONTACT 
or at http://dpcld.defense.gov/.The proposed system report, as 
required by 5 U.S.C. 552a(r) of the Privacy Act of 1974, as amended, 
was submitted on April 29, 2016, to the House Committee on Oversight 
and Government Reform, the Senate Committee on Governmental Affairs, 
and the Office of Management and Budget (OMB) pursuant to paragraph 4c 
of Appendix I to OMB Circular No. A-130, ``Federal Agency 
Responsibilities for Maintaining Records About Individuals,'' dated 
February 8, 1996 (February 20, 1996, 61 FR 6427).

    Dated: May 13, 2016.
Aaron Siegel,
Alternate OSD Federal Register Liaison Officer, Department of Defense.
DUSDI 01-DoD

System name:
    Department of Defense (DoD) Insider Threat Management and Analysis 
Center (DITMAC) and DoD Component Insider Threat Records System

System location:
    Primary location: Defense Security Service (DSS), 27130 Telegraph 
Rd., Quantico VA 22134-2253.

Secondary and Decentralized locations:
    Each of the DoD Components including the Departments of the Army, 
Air Force, and Navy and staffs, field operating agencies, major 
commands, installations, and activities. Official mailing addresses are 
published with each Component's compilation of systems of records 
notices.

Categories of individuals covered by the system:
    Individuals covered by the system are those who had or have been 
granted eligibility for access to classified information or eligibility 
to hold a sensitive position, and who have exhibited actual, probable, 
or possible indications of insider threat behaviors or activities. 
These individuals include active and reserve component (including 
National Guard) military personnel, civilian employees (including non-
appropriated fund employees), and DoD contractor personnel; this 
includes officials or employees from Federal, state, Local, Tribal and 
Private Sector entities affiliated with or working with DoD who have 
been granted access to classified information by DoD based on an 
eligibility determination made by DoD or by another Federal agency 
authorized to do so.
    Individuals or persons embedded with DoD units operating abroad who 
had or have been granted eligibility for access to classified 
information or eligibility to hold a sensitive positions, and who have 
exhibited actual, probable, or possible indications of insider threat 
behaviors or activities.
    Current members of the U.S. Coast Guard and mobilized retired 
military personnel, when activated, who had or have been granted 
eligibility for access to classified information or eligibility to hold 
a sensitive positions by DoD and when operating with the military 
services or DoD Components, and Limited Access Authorization grantees, 
who have exhibited actual, probable, or possible indications of insider 
threat behaviors or activities.

Categories of records in the system:
    Records containing information can be derived from:
    Responses to information requested by official questionnaires 
(e.g., SF 86 Questionnaire for National Security Positions) that 
include: Full name, former names and aliases; date and place of birth; 
social security number (SSN); height and weight; hair and eye color; 
gender; ethnicity and race; biometric data; mother's maiden name; DoD 
identification number; current and former home and work addresses, 
phone numbers, and email addresses; employment history; military record 
information; selective service registration record; residential 
history; education history and degrees earned; names of associates and 
references with their contact information; citizenship information; 
passport information; driver's license information; identifying numbers 
from access control passes or identification cards; criminal history; 
civil court actions; prior personnel security eligibility, 
investigative, and adjudicative information, including information 
collected through continuous evaluation; mental health history; records 
related to drug and/or alcohol use; financial record information; 
credit reports; the name, date and place of birth, social security 
number, and citizenship information for spouse or cohabitant; the name 
and marriage information for current and former spouse(s); the 
citizenship, name, date and place of birth, and address for relatives;
    Information on foreign contacts and activities; association 
records; information on loyalty to the United States; and other agency 
reports furnished to DoD or collected by DoD in connection with 
personnel security investigations, continuous evaluation for 
eligibility for access to classified information, and insider threat 
detection programs operated by DoD Components pursuant to Federal laws 
and Executive Orders and DoD regulations. These records can include, 
but are not limited to: Reports of personnel security investigations 
completed by investigative service providers (such as the Office of 
Personnel Management);
    Polygraph examination reports; nondisclosure agreements; document 
control registries; courier authorization requests; derivative 
classification unique identifiers; requests for access to sensitive 
compartmented information (SCI); facility access records; security 
violation files; travel records; foreign contact reports; briefing and 
debriefing statements for special programs, positions designated as 
sensitive, other information and documents required in connection with 
personnel security adjudications; and financial disclosure filings

DoD Component information, summaries or reports, and full reports, 
about potential insider threats from:
    a. Payroll information, travel vouchers, benefits information, 
credit reports, equal employment opportunity complaints, performance 
evaluations, disciplinary files, training records, substance abuse and 
mental health records of individuals undergoing law enforcement action 
or presenting an identifiable imminent threat, counseling statements, 
outside work and activities requests, and personal contact records.
    b. particularly sensitive or protected information, including 
information held by special access programs, law enforcement, inspector 
general, or other investigative sources or programs. Access to such 
information may require additional approval by the senior DoD official 
who is responsible for managing and overseeing the program.
    c. reports of investigation regarding security violations, 
including but not limited to: statements, declarations, affidavits and 
correspondence; incident reports; investigative records of a criminal, 
civil or administrative nature; letters, emails, memoranda, and 
reports; exhibits and evidence; and,

[[Page 31616]]

recommended remedial or corrective actions for security violations;
    DoD Component information, summaries of reports, and full reports, 
about potential insider threats regarding: Personnel user names and 
aliases, levels of network access, audit data, information regarding 
misuse of a DoD device, information regarding unauthorized use of 
removable media, and logs of printer, copier, and facsimile machine 
use.
    Information collected through user activity monitoring, which is 
the technical capability to observe and record the actions and 
activities of all users, at any time, on a computer network controlled 
by DoD or a component thereof in order to deter, detect, and/or 
mitigate insider threats as well as to support authorized 
investigations. Such information may include key strokes, screen 
captures, and content transmitted via email, chat, or data import or 
export.
    DoD Component summaries of reports, and full reports, about 
potential insider threats from records of usage of government telephone 
systems, including the telephone number initiating the call, the 
telephone number receiving the call, and the date and time of the call.
    DoD Component information, summaries of reports, and full reports, 
about potential insider threats obtained from other Federal Government 
sources, such as information regarding U.S. border crossings and 
financial information obtained from the Financial Crimes Enforcement 
Network.
    Information related to the management and operation of DoD 
Component insider threat programs, including but not limited to: 
Information related to investigative or analytical efforts by DoD 
insider threat program personnel to identify threats to DoD personnel, 
property, facilities, and information; information obtained from 
Intelligence Community members, the Federal Bureau of Investigation, or 
from other agencies or organizations about individuals known or 
suspected of being engaged in conduct constituting, preparing for, 
aiding, or relating to an insider threat, including but not limited to 
espionage or unauthorized disclosure of classified national security 
information.
    Publicly available information, such as information regarding: 
Arrests and detentions; real property; bankruptcy; liens or holds on 
property; vehicles; licensure (including professional and pilot's 
licenses, firearms and explosive permits); business licenses and 
filings; and from social media.

Authority for maintenance of the system:
    10 U.S.C. 137, Under Secretary of Defense for Intelligence; 44 
U.S.C. 3554, Federal agency responsibilities; 44 U.S.C. 3557, National 
security systems; Public Law 112-81, Section 922, National Defense 
Authorization Act for Fiscal Year 2012 (NDAA for FY12), Insider Threat 
Detection (10 U.S.C. 2224 note); Public Law 113-66, Section 
907(c)(4)(H), (NDAA for FY14), Personnel security (10 U.S.C. 1564 
note); Public Law 114-92, Section 1086 (NDAA for FY16), Reform and 
improvement of personnel security, insider threat detection and 
prevention, and physical security (10 U.S.C. 1564 note); E.O. 12829, as 
amended, National Industrial Security Program; E.O. 12968, as amended, 
Access to Classified Information; E.O. 13467, Reforming Processes 
Related to Suitability for Government Employment, Fitness for 
Contractor Employees, and Eligibility for Access to Classified National 
Security Information, June 30, 2008; E.O. 9397, as amended, Numbering 
System for Federal Accounts Relating to Individual Persons; E.O. 13587, 
Structural Reforms to Improve the Security of Classified Networks and 
the Responsible Sharing and Safeguarding of Classified Information; 
National Insider Threat Policy and Minimum Standards for Executive 
Branch Insider Threat Programs; and DoD Directive (DoDD) 5205.16, The 
DoD Insider Threat Program.

Purpose(s):
    The Department of Defense proposes to establish a new system of 
records to assist in the management of the DITMAC Program and DoD 
Component insider threat programs. The DITMAC was established by the 
Undersecretary of Defense for Intelligence in order to consolidate and 
analyze insider threat information reported by the DoD Component 
insider threat programs mandated by Presidential Executive Order 13587, 
issued October 7, 2011, which required Federal agencies to establish an 
insider threat detection and prevention program to ensure the security 
of classified networks and the responsible sharing and safeguarding of 
classified information consistent with appropriate protections for 
privacy and civil liberties. The DITMAC helps prevent, deter, detect, 
and/or mitigate the potential threat that personnel, including DoD 
military personnel, civilian employees, and contractor personnel, who 
have or had been granted eligibility for access to classified 
information or eligibility to hold a sensitive position may harm the 
security of the United States. This threat can include damage to the 
United States through espionage, terrorism, unauthorized disclosure of 
national security information, or through the loss or degradation of 
departmental resources or capabilities. The system will be used to 
analyze, monitor, and audit insider threat information for insider 
threat detection and mitigation within DoD on threats that persons who 
have or had been granted eligibility for access to classified 
information or eligibility to hold a sensitive position may pose to DoD 
and U.S. Government installations, facilities, personnel, missions, or 
resources. The system will support DoD Component insider threat 
programs, enable the identification of systemic insider threat issues 
and challenges, provide a basis for the development and recommendation 
of solutions to deter, detect, and/or mitigate potential insider 
threats. It will assist in identifying best practices among other 
Federal Government insider threat programs, through the use of existing 
DoD resources and functions and by leveraging existing authorities, 
policies, programs, systems, and architectures.

Routine uses of records maintained in the system, including categories 
of users and the purposes of such uses:
    In addition to disclosures permitted under 5 U.S.C. 552a(b) of the 
Privacy Act of 1974, as amended, these records may be disclosed outside 
DoD as a routine use pursuant to 5 U.S.C. 552(b)(3) as follows:
    Where a record, either alone or in conjunction with other 
information, indicates a violation or potential violation of law, 
whether civil, criminal, or regulatory in nature, and whether arising 
by general statute or by regulation, rule, or order issued pursuant 
thereto, the relevant records in the system of records may be referred, 
as a routine use, to the agency concerned, whether Federal, state, 
local, tribal, territorial, or foreign, charged with the responsibility 
of investigating or prosecuting such violation or charged with 
enforcing or implementing the statute, rule, regulation, or order 
issued pursuant thereto.
    To an appropriate federal, state, local, tribal, territorial, 
foreign, or international agency, if the information is relevant and 
necessary to a requesting agency's decision concerning the hiring or 
retention of an individual, or issuance of a security clearance, 
license, contract, grant, delegation or designation of authority, or 
other benefit, or if the information is relevant and necessary to a DoD 
decision concerning the hiring or retention of an

[[Page 31617]]

employee, the issuance of a security clearance, the reporting of an 
investigation of an employee, the letting of a contract, or the 
issuance of a license, grant, delegation or designation of authority, 
or other benefit and disclosure is appropriate to the proper 
performance of the official duties of the person making the request.
    To the Department of Justice for the purpose of representing the 
Department of Defense, or any officer, employee or member of the 
Department in pending or potential litigation to which the record is 
pertinent.
    A record consisting of, or relating to, terrorism information, 
homeland security information, counterintelligence, or law enforcement 
information may be disclosed to a Federal, state, local, tribal, 
territorial, foreign government, multinational agency, and to a private 
sector agent either in response to its request or upon the initiative 
of the DoD Component, for purposes of sharing such information as is 
necessary and relevant to the agency's investigations and inquiries 
related to the detection, prevention, disruption, preemption, and 
mitigation of the effects of terrorist activities against the 
territory, people, and interests of the United States of America as 
contemplated by the Intelligence Reform and Terrorism Protection Act of 
2004.
    To any person, organization, or governmental entity in order to 
notify them of a serious terrorist threat for the purpose of guarding 
against or responding to such a threat.
    To complainants and/or victims to the extent necessary to provide 
such persons with information and explanations concerning the progress 
and/or results of the investigation or case arising from the matters of 
which they complained and/or of which they were a victim.
    To contractors, grantees, experts, consultants, students, and 
others performing or working on a contract, service, grant, cooperative 
agreement, or other assignment for the Federal Government, when 
necessary to accomplish an agency function related to the DoD DITMAC 
system of records.
    To Federal, state, local, territorial, tribal, foreign, or 
international licensing agencies or associations that require 
information concerning the suitability or eligibility of an individual 
for a license.
    To a Congressional office from the record of an individual in 
response to an inquiry from the Congressional office made at the 
request of that individual.
    To the National Archives and Records Administration for the purpose 
of records management inspections conducted under the authority of 44 
U.S.C. 2904 and 2906.
    To appropriate agencies, entities, and persons when (1) the 
Component suspects or has confirmed that the security or 
confidentiality of the information in the system of records has been 
compromised; (2) the Component has determined that as a result of the 
suspected or confirmed compromise there is a risk of harm to economic 
or property interests, identity theft or fraud, or harm to the security 
or integrity of this system or other systems or programs (whether 
maintained by the Component or another agency or entity) that rely upon 
the compromised information; and (3) the disclosure made to such 
agencies, entities, and persons is reasonably necessary to assist in 
connection with the Component's efforts to respond to the suspected or 
confirmed compromise and prevent, minimize, or remedy such harm.
    To foreign law enforcement, security, investigatory, or 
administrative authorities to comply with requirements imposed by, or 
to claim rights conferred in, international agreements and 
arrangements, including those regulating the stationing and status in 
foreign countries of DoD military and civilian personnel.
    To any agency, organization, or individual for the purposes of 
performing audit or oversight of the DoD DITMAC as authorized by law 
and as necessary and relevant to such audit or oversight functions.
    To such recipients and under such circumstances and procedures as 
are mandated by Federal statute or treaty.
    To third parties during the course of an investigation to the 
extent necessary to obtain information pertinent to the investigation, 
provided disclosure is appropriate to the proper performance of the 
official duties of the individual making the disclosure.
    To a Federal agency or entity that may have information relevant to 
an allegation or investigation or was consulted regarding an insider 
threat for purposes of obtaining guidance, additional information, or 
advice from such Federal agency or entity regarding the handling of an 
insider threat matter.
    To a court or adjudicative body in a proceeding when: (a) The 
agency or any component thereof; or (b) any employee of the agency in 
his or her official capacity; or (c) any employee of the agency in his 
or her individual capacity where the Department of Justice has agreed 
to represent the employee; or (d) the United States Government is a 
party to litigation or has interest in such litigation, and by careful 
review, the agency determines that the records are both relevant and 
necessary to the litigation and the use of such records is therefore 
deemed by the agency to be for a purpose that is compatible with the 
purpose for which the agency collected the records.
    To the news media or the general public, factual information the 
disclosure of which would be in the public interest and which would not 
constitute an unwarranted invasion of personal privacy.
    To a Federal, state, or local agency, or other appropriate entities 
or individuals, or through established liaison channels to selected 
foreign governments, in order to enable an intelligence agency to carry 
out its responsibilities under the National Security Act of 1947 as 
amended, the CIA act of 1949 as emended, Executive Order 12333 or any 
successor order, applicable national security directives, or classified 
implementing procedures approved by the Attorney General and 
promulgated pursuant to such statutes, orders or directives.

Storage:
    Paper and electronic storage media.

Retrievability:
    Information in this system may be retrieved by name, SSN, and/or 
DoD identification number.

Safeguards:
    IT systems are protected by military personnel, civilian employee, 
or contract security personnel guards. Physical access to rooms is 
controlled by combination lock and by identification badges that are 
issued only to authorized individuals. Electronic authorization and 
authentication of users is required at all points before any system 
information can be accessed. All data transfers and information 
retrievals that use remote communication facilities are required to be 
encrypted. Paper records are contained and stored in safes and filing 
cabinets that are located in a secure area with access only by 
authorized personnel.

Retention and disposal:
    Disposition pending (until the National Archives and Records 
Administration (NARA) disposition schedule is approved, treat as 
permanent).

System manager(s) and address:
    Department of Defense Insider Threat Management and Analysis 
Center, Assistant Director, Enterprise Tools and Architecture, Defense 
Security Service, 27130 Telegraph Road, Quantico, VA 22134-2253.

[[Page 31618]]

    DoD Components including the Departments of the Army, Air Force, 
and Navy and staffs, field operating agencies, major commands, 
installations, and activities. Official mailing addresses are published 
as an appendix to each Service's compilation of systems of records 
notices.

Notification procedures:
    Individuals seeking to determine whether information about 
themselves is contained in the DITMAC system of records should address 
written inquires to the Defense Security Service, Office of FOIA and 
PA, 27130 Telegraph Road, Quantico, VA 22134-2253.
    Individuals seeking to determine whether information about 
themselves is contained in any specific DoD Component's insider threat 
program system of records should address written inquiries to the 
official mailing address for that Component, which is published with 
each Component's compilation of systems of records notices.

DoD Component addresses are also listed at: http://dpcld.defense.gov/Privacy/PrivacyContacts.aspx.
    Signed, written requests must contain the full name (and any alias 
and/or alternate names used), SSN, and date and place of birth.

Record Access Procedures:
    Individuals seeking information about themselves contained in the 
DITMAC system of record should address written inquires to the Defense 
Security Service, Office of FOIA and PA, 27130 Telegraph Road, 
Quantico, VA 22134-2253.
    Individuals seeking information about themselves contained in any 
specific DoD Component's insider threat program system of records 
should address written inquiries to the official mailing address for 
that Component, which is published with each Component's compilation of 
systems of records notices.

DoD Component addresses are also listed at: http://dpcld.defense.gov/Privacy/PrivacyContacts.aspx.
    Individuals should provide their full name (and any alias and/or 
alternate name), SSN, and date and place of birth, and the address 
where the records are to be returned.
    In addition, the requester must provide a notarized statement or an 
unsworn declaration made in accordance with 28 U.S.C. 1746, in the 
following format:

If executed outside of the United States:
    `I declare (or certify, verify, or state) under penalty of perjury 
under the laws of the United States of America that the foregoing is 
true and correct. Executed on (date). (Signature).'

If executed within the United States, its territories, possessions, or 
commonwealths:
    `I declare (or certify, verify, or state) under penalty of perjury 
that the foregoing is true and correct. Executed on (date). 
(Signature). '
    Attorneys or other persons acting on behalf of an individual must 
provide written authorization from that individual for the 
representative to act on their behalf.

Contesting Record Procedures:
    The DoD rules for accessing records and for contesting or appealing 
agency determinations are published in DoD Regulation 5400.11; 32 CFR 
310; or may be obtained from the Defense Privacy, Civil Liberties, and 
Transparency Division, 4800 Mark Center Drive; ATTN: DPCLTD, Mailbox 
#24; Alexandria, VA 22350-1700.

Record source categories:
    Information in the system is received from DoD Components and 
program offices throughout DoD and DoD contractor databases, external 
sources, including counterintelligence and security databases and 
files; personnel security databases and files; DoD Component human 
resources databases and files; Office of the Chief Information Officer 
and information assurance databases and files; information collected 
through user activity monitoring; DoD telephone usage records; Federal, 
state, tribal, territorial, and local law enforcement and investigatory 
records; Inspector General records; available U.S. Government 
intelligence and counterintelligence reporting information and analytic 
products pertaining to adversarial threats; other Federal agencies; and 
publicly available information.

Exemptions claimed for the system:
    The Department of Defense is exempting records maintained in DUSDI 
01-DoD, the ``Department of Defense (DoD) Insider Threat Management and 
Analysis Center (DITMAC) and DoD Component Insider Threat Records 
System,'' from subsections (c)(3) and (4); (d)(1), (2), (3), and (4); 
(e)(1), (2), (3), (4)(G), (H), and (I), (5), and (8); (f); and (g) of 
the Privacy Act pursuant to 5 U.S.C. 552a(j)(2) and (k)(1), (2), (4), 
(5), (6), (7). In addition, exempt records received from other systems 
of records in the course of DITMAC or Component record checks may, in 
turn, become part of the case records in this system. When records are 
exempt from disclosure in systems of records for record sources 
accessed by this system, DoD also claims the same exemptions for any 
copies of such records received by and stored in this system.
    An exemption rule for this system has been promulgated in 
accordance with requirements of 5 U.S.C. 553(b)(1), (2), and (3), (c) 
and (e) and published in 32 CFR part 310. For additional information 
contact the system manager.

[FR Doc. 2016-11703 Filed 5-18-16; 8:45 am]
 BILLING CODE 5001-06-P



                                                  31614                           Federal Register / Vol. 81, No. 97 / Thursday, May 19, 2016 / Notices

                                                  RETRIEVABILITY:                                          about themselves contained in this                    Analysis Center (DITMAC) and DoD
                                                    Delete entry and replace with ‘‘By                     system should address written inquiries               Component Insider Threat Records
                                                  owner’s or animal’s name, animal’s                       to the veterinary facility at the                     System.’’ This system has been
                                                  microchip number.’’                                      installation where their animal was                   established to enable DoD to implement
                                                                                                           treated or euthanized.                                the requirements of Executive Order
                                                  SAFEGUARDS:
                                                                                                              Individuals should provide their full              13587, Structural Reforms to Improve
                                                     Delete entry and replace with                         name, home address, telephone number,                 the Security of Classified Networks and
                                                  ‘‘Records are maintained in buildings                    and any identifiable information for                  the Responsible Sharing and
                                                  which are locked when unattended and                     their animal, to include microchip                    Safeguarding of Classified Information
                                                  are accessed only by authorized                          number if applicable.                                 (October 7, 2011), and the National
                                                  personnel having an official need-to-                       In addition, the requester must                    Insider Threat Policy and Minimum
                                                  know. DoD Components and approved                        provide a notarized statement or an                   Standards for Executive Branch Insider
                                                  users ensure that electronic and paper                   unsworn declaration made in                           Threat Programs (November 21, 2012).
                                                  records collected and used are                           accordance with 28 U.S.C. 1746, in the                For purposes of this system of records,
                                                  maintained in controlled areas                           following format:                                     the term ‘‘insider threat’’ is defined in
                                                  accessible only to authorized personnel.                    If executed outside the United States:             the Minimum Standards for Executive
                                                  Access to computerized data is                           ‘I declare (or certify, verify, or state)             Branch Insider Threat Programs which
                                                  restricted by use of common access                       under penalty of perjury under the laws               were issued by the National Insider
                                                  cards (CACs) and is accessible only by                   of the United States of America that the              Threat Task Force based on directions
                                                  users with an authorized account. The                    foregoing is true and correct. Executed               provided in Section 6.3(b) of Executive
                                                  system and electronic backups are                        on (date). (Signature).’                              Order 13587. The system will be used
                                                  maintained in controlled facilities that                    If executed within the United States,              to analyze, monitor, and audit insider
                                                  employ physical restrictions and                         its territories, possessions, or                      threat information for insider threat
                                                  safeguards such as security guards,                      commonwealths: ‘I declare (or certify,                detection and mitigation within DoD on
                                                  identification badges, key cards, and                    verify, or state) under penalty of perjury            threats that insiders may pose to DoD
                                                  locks.’’                                                 that the foregoing is true and correct.               and U.S. Government installations,
                                                  RETENTION AND DISPOSAL:                                  Executed on (date). (Signature).’                     facilities, personnel, missions, or
                                                                                                              Personal visits may be made to the                 resources. The system will support the
                                                     Delete entry and replace with ‘‘Paper                                                                       DITMAC and DoD Component insider
                                                  records are destroyed upon death of the                  veterinary facility where animal was
                                                                                                           treated. Owners must provide personal                 threat programs, enable the
                                                  animal, transfer of owner, or 3 years                                                                          identification of systemic insider threat
                                                  after last entry in the record. Paper                    identification such as a valid military
                                                                                                           identification card or driver’s license.’’            issues and challenges, provide a basis
                                                  records are shredded. Electronic records                                                                       for the development and
                                                  are maintained permanently.’’                            CONTESTING RECORD PROCEDURES:                         recommendation of solutions to mitigate
                                                  *      *     *     *     *                                  Delete entry and replace with ‘‘The                potential insider threats, and assist in
                                                  NOTIFICATION PROCEDURE:                                  Army’s rules for accessing records, and               identifying best practices amongst other
                                                                                                           for contesting contents and appealing                 Federal Government insider threat
                                                     Delete entry and replace with
                                                                                                           initial agency determinations are                     programs.
                                                  ‘‘Individuals seeking to determine if
                                                                                                           contained in 32 CFR part 505, Army                    DATES: Comments will be accepted on or
                                                  information about themselves is
                                                                                                           Privacy Program; or may be obtained                   before June 20, 2016. This proposed
                                                  contained in this system should address
                                                                                                           from the system manager.’’                            action will be effective the day
                                                  written inquiries to the veterinary
                                                  facility at the installation where their                 RECORD SOURCE CATEGORIES:                             following the end of the comment
                                                  animal was treated or euthanized.                                                                              period unless comments are received
                                                                                                             Delete entry and replace with ‘‘From
                                                     Individuals should provide their full                                                                       which result in a contrary
                                                                                                           the individual and veterinarian
                                                  name, home address, telephone number,                                                                          determination.
                                                                                                           reports.’’
                                                  and any identifiable information for                                                                           ADDRESSES: The public, OMB, and
                                                  their animal, to include microchip                       *     *    *    *     *
                                                                                                           [FR Doc. 2016–11808 Filed 5–18–16; 8:45 am]           Congress are invited to submit any
                                                  number if applicable.                                                                                          comments, identified by docket number
                                                                                                           BILLING CODE 5001–06–P
                                                  IN ADDITION, THE REQUESTER MUST PROVIDE A                                                                      and title, by any of the following
                                                  NOTARIZED STATEMENT OR AN UNSWORN                                                                              methods:
                                                  DECLARATION MADE IN ACCORDANCE WITH 28                   DEPARTMENT OF DEFENSE                                    * Federal Rulemaking Portal: http://
                                                  U.S.C. 1746, IN THE FOLLOWING FORMAT:                                                                          www.regulations.gov. Follow the
                                                     If executed outside the United States:                Office of the Secretary                               instructions for submitting comments.
                                                  ‘I declare (or certify, verify, or state)                                                                         * Mail: Department of Defense, Office
                                                                                                           [Docket ID: DoD–2016–OS–0060]
                                                  under penalty of perjury under the laws                                                                        of the Deputy Chief Management
                                                  of the United States of America that the                 Privacy Act of 1974; System of                        Officer, Directorate of Oversight and
                                                  foregoing is true and correct. Executed                  Records                                               Compliance, 4800 Mark Center Drive,
                                                  on (date). (Signature).’                                                                                       Mailbox #24, Alexandria, VA 22350–
                                                     If executed within the United States,                 AGENCY:  Office of the Secretary of                   1700.
                                                  its territories, possessions, or                         Defense, DoD.                                            Instructions: All submissions received
                                                                                                                                                                 must include the agency name and
mstockstill on DSK3G9T082PROD with NOTICES




                                                  commonwealths: ‘I declare (or certify,                   ACTION: Notice to add a New System of
                                                  verify, or state) under penalty of perjury               Records.                                              docket number for this Federal Register
                                                  that the foregoing is true and correct.                                                                        document. The general policy for
                                                  Executed on (date). (Signature).’ ’’                     SUMMARY:   The Office of the Secretary of             comments and other submissions from
                                                                                                           Defense proposes to establish a new                   members of the public is to make these
                                                  RECORD ACCESS PROCEDURES:                                system of records, DUSDI 01–DoD,                      submissions available for public
                                                     Delete entry and replace with                         entitled the ‘‘Department of Defense                  viewing on the Internet at http://
                                                  ‘‘Individuals seeking access to records                  (DoD) Insider Threat Management and                   www.regulations.gov as they are


                                             VerDate Sep<11>2014    18:47 May 18, 2016   Jkt 238001   PO 00000   Frm 00029   Fmt 4703   Sfmt 4703   E:\FR\FM\19MYN1.SGM   19MYN1


                                                                                 Federal Register / Vol. 81, No. 97 / Thursday, May 19, 2016 / Notices                                            31615

                                                  received without change, including any                  personnel, civilian employees                         marriage information for current and
                                                  personal identifiers or contact                         (including non-appropriated fund                      former spouse(s); the citizenship, name,
                                                  information.                                            employees), and DoD contractor                        date and place of birth, and address for
                                                  FOR FURTHER INFORMATION CONTACT:
                                                                                                          personnel; this includes officials or                 relatives;
                                                  Cindy Allard, Director of the Defense                   employees from Federal, state, Local,                    Information on foreign contacts and
                                                  Privacy, Civil Liberties, and                           Tribal and Private Sector entities                    activities; association records;
                                                  Transparency Division, 703–571–0070.                    affiliated with or working with DoD                   information on loyalty to the United
                                                                                                          who have been granted access to                       States; and other agency reports
                                                  SUPPLEMENTARY INFORMATION: The Office
                                                                                                          classified information by DoD based on                furnished to DoD or collected by DoD in
                                                  of the Secretary of Defense notices for                 an eligibility determination made by                  connection with personnel security
                                                  systems of records subject to the Privacy               DoD or by another Federal agency                      investigations, continuous evaluation
                                                  Act of 1974 (5 U.S.C. 552a), as amended,                authorized to do so.                                  for eligibility for access to classified
                                                  have been published in the Federal                         Individuals or persons embedded                    information, and insider threat
                                                  Register and are available from the                     with DoD units operating abroad who                   detection programs operated by DoD
                                                  address in FOR FURTHER INFORMATION                      had or have been granted eligibility for              Components pursuant to Federal laws
                                                  CONTACT or at http://dpcld.                             access to classified information or                   and Executive Orders and DoD
                                                  defense.gov/.The proposed system                        eligibility to hold a sensitive positions,            regulations. These records can include,
                                                  report, as required by 5 U.S.C. 552a(r) of              and who have exhibited actual,                        but are not limited to: Reports of
                                                  the Privacy Act of 1974, as amended,                    probable, or possible indications of                  personnel security investigations
                                                  was submitted on April 29, 2016, to the                 insider threat behaviors or activities.               completed by investigative service
                                                  House Committee on Oversight and                           Current members of the U.S. Coast                  providers (such as the Office of
                                                  Government Reform, the Senate                           Guard and mobilized retired military                  Personnel Management);
                                                  Committee on Governmental Affairs,                      personnel, when activated, who had or                    Polygraph examination reports;
                                                  and the Office of Management and                        have been granted eligibility for access              nondisclosure agreements; document
                                                  Budget (OMB) pursuant to paragraph 4c                   to classified information or eligibility to           control registries; courier authorization
                                                  of Appendix I to OMB Circular No. A–                    hold a sensitive positions by DoD and                 requests; derivative classification
                                                  130, ‘‘Federal Agency Responsibilities                  when operating with the military                      unique identifiers; requests for access to
                                                  for Maintaining Records About                           services or DoD Components, and                       sensitive compartmented information
                                                  Individuals,’’ dated February 8, 1996                   Limited Access Authorization grantees,                (SCI); facility access records; security
                                                  (February 20, 1996, 61 FR 6427).                        who have exhibited actual, probable, or               violation files; travel records; foreign
                                                    Dated: May 13, 2016.                                  possible indications of insider threat                contact reports; briefing and debriefing
                                                  Aaron Siegel,                                           behaviors or activities.                              statements for special programs,
                                                  Alternate OSD Federal Register Liaison                  CATEGORIES OF RECORDS IN THE SYSTEM:                  positions designated as sensitive, other
                                                  Officer, Department of Defense.                           Records containing information can                  information and documents required in
                                                                                                          be derived from:                                      connection with personnel security
                                                  DUSDI 01–DoD                                                                                                  adjudications; and financial disclosure
                                                                                                            Responses to information requested
                                                  SYSTEM NAME:                                            by official questionnaires (e.g., SF 86               filings
                                                    Department of Defense (DoD) Insider                   Questionnaire for National Security                   DOD COMPONENT INFORMATION, SUMMARIES OR
                                                  Threat Management and Analysis                          Positions) that include: Full name,                   REPORTS, AND FULL REPORTS, ABOUT POTENTIAL
                                                  Center (DITMAC) and DoD Component                       former names and aliases; date and                    INSIDER THREATS FROM:
                                                  Insider Threat Records System                           place of birth; social security number                   a. Payroll information, travel
                                                                                                          (SSN); height and weight; hair and eye                vouchers, benefits information, credit
                                                  SYSTEM LOCATION:
                                                                                                          color; gender; ethnicity and race;                    reports, equal employment opportunity
                                                    Primary location: Defense Security                    biometric data; mother’s maiden name;                 complaints, performance evaluations,
                                                  Service (DSS), 27130 Telegraph Rd.,                     DoD identification number; current and                disciplinary files, training records,
                                                  Quantico VA 22134–2253.                                 former home and work addresses, phone                 substance abuse and mental health
                                                  SECONDARY AND DECENTRALIZED LOCATIONS:                  numbers, and email addresses;                         records of individuals undergoing law
                                                    Each of the DoD Components                            employment history; military record                   enforcement action or presenting an
                                                  including the Departments of the Army,                  information; selective service                        identifiable imminent threat, counseling
                                                  Air Force, and Navy and staffs, field                   registration record; residential history;             statements, outside work and activities
                                                  operating agencies, major commands,                     education history and degrees earned;                 requests, and personal contact records.
                                                  installations, and activities. Official                 names of associates and references with                  b. particularly sensitive or protected
                                                  mailing addresses are published with                    their contact information; citizenship                information, including information held
                                                  each Component’s compilation of                         information; passport information;                    by special access programs, law
                                                  systems of records notices.                             driver’s license information; identifying             enforcement, inspector general, or other
                                                                                                          numbers from access control passes or                 investigative sources or programs.
                                                  CATEGORIES OF INDIVIDUALS COVERED BY THE                identification cards; criminal history;               Access to such information may require
                                                  SYSTEM:                                                 civil court actions; prior personnel                  additional approval by the senior DoD
                                                     Individuals covered by the system are                security eligibility, investigative, and              official who is responsible for managing
                                                  those who had or have been granted                      adjudicative information, including                   and overseeing the program.
                                                  eligibility for access to classified                    information collected through                            c. reports of investigation regarding
mstockstill on DSK3G9T082PROD with NOTICES




                                                  information or eligibility to hold a                    continuous evaluation; mental health                  security violations, including but not
                                                  sensitive position, and who have                        history; records related to drug and/or               limited to: statements, declarations,
                                                  exhibited actual, probable, or possible                 alcohol use; financial record                         affidavits and correspondence; incident
                                                  indications of insider threat behaviors                 information; credit reports; the name,                reports; investigative records of a
                                                  or activities. These individuals include                date and place of birth, social security              criminal, civil or administrative nature;
                                                  active and reserve component                            number, and citizenship information for               letters, emails, memoranda, and reports;
                                                  (including National Guard) military                     spouse or cohabitant; the name and                    exhibits and evidence; and,


                                             VerDate Sep<11>2014   18:47 May 18, 2016   Jkt 238001   PO 00000   Frm 00030   Fmt 4703   Sfmt 4703   E:\FR\FM\19MYN1.SGM   19MYN1


                                                  31616                          Federal Register / Vol. 81, No. 97 / Thursday, May 19, 2016 / Notices

                                                  recommended remedial or corrective                      AUTHORITY FOR MAINTENANCE OF THE SYSTEM:              include damage to the United States
                                                  actions for security violations;                          10 U.S.C. 137, Under Secretary of                   through espionage, terrorism,
                                                     DoD Component information,                           Defense for Intelligence; 44 U.S.C. 3554,             unauthorized disclosure of national
                                                  summaries of reports, and full reports,                 Federal agency responsibilities; 44                   security information, or through the loss
                                                  about potential insider threats                         U.S.C. 3557, National security systems;               or degradation of departmental
                                                  regarding: Personnel user names and                     Public Law 112–81, Section 922,                       resources or capabilities. The system
                                                  aliases, levels of network access, audit                National Defense Authorization Act for                will be used to analyze, monitor, and
                                                  data, information regarding misuse of a                 Fiscal Year 2012 (NDAA for FY12),                     audit insider threat information for
                                                  DoD device, information regarding                       Insider Threat Detection (10 U.S.C. 2224              insider threat detection and mitigation
                                                  unauthorized use of removable media,                    note); Public Law 113–66, Section                     within DoD on threats that persons who
                                                  and logs of printer, copier, and facsimile              907(c)(4)(H), (NDAA for FY14),                        have or had been granted eligibility for
                                                  machine use.                                            Personnel security (10 U.S.C. 1564                    access to classified information or
                                                     Information collected through user                   note); Public Law 114–92, Section 1086                eligibility to hold a sensitive position
                                                  activity monitoring, which is the                       (NDAA for FY16), Reform and                           may pose to DoD and U.S. Government
                                                  technical capability to observe and                     improvement of personnel security,                    installations, facilities, personnel,
                                                  record the actions and activities of all                insider threat detection and prevention,              missions, or resources. The system will
                                                  users, at any time, on a computer                       and physical security (10 U.S.C. 1564                 support DoD Component insider threat
                                                  network controlled by DoD or a                          note); E.O. 12829, as amended, National               programs, enable the identification of
                                                  component thereof in order to deter,                    Industrial Security Program; E.O. 12968,              systemic insider threat issues and
                                                  detect, and/or mitigate insider threats as              as amended, Access to Classified                      challenges, provide a basis for the
                                                  well as to support authorized                           Information; E.O. 13467, Reforming                    development and recommendation of
                                                  investigations. Such information may                    Processes Related to Suitability for                  solutions to deter, detect, and/or
                                                  include key strokes, screen captures,                   Government Employment, Fitness for                    mitigate potential insider threats. It will
                                                  and content transmitted via email, chat,                Contractor Employees, and Eligibility                 assist in identifying best practices
                                                  or data import or export.                               for Access to Classified National                     among other Federal Government
                                                     DoD Component summaries of                           Security Information, June 30, 2008;                  insider threat programs, through the use
                                                  reports, and full reports, about potential              E.O. 9397, as amended, Numbering                      of existing DoD resources and functions
                                                  insider threats from records of usage of                System for Federal Accounts Relating to               and by leveraging existing authorities,
                                                  government telephone systems,                           Individual Persons; E.O. 13587,                       policies, programs, systems, and
                                                  including the telephone number                          Structural Reforms to Improve the                     architectures.
                                                  initiating the call, the telephone number               Security of Classified Networks and the
                                                                                                          Responsible Sharing and Safeguarding                  ROUTINE USES OF RECORDS MAINTAINED IN THE
                                                  receiving the call, and the date and time                                                                     SYSTEM, INCLUDING CATEGORIES OF USERS AND
                                                  of the call.                                            of Classified Information; National
                                                                                                                                                                THE PURPOSES OF SUCH USES:
                                                     DoD Component information,                           Insider Threat Policy and Minimum
                                                                                                          Standards for Executive Branch Insider                   In addition to disclosures permitted
                                                  summaries of reports, and full reports,                                                                       under 5 U.S.C. 552a(b) of the Privacy
                                                                                                          Threat Programs; and DoD Directive
                                                  about potential insider threats obtained                                                                      Act of 1974, as amended, these records
                                                                                                          (DoDD) 5205.16, The DoD Insider Threat
                                                  from other Federal Government sources,                                                                        may be disclosed outside DoD as a
                                                                                                          Program.
                                                  such as information regarding U.S.                                                                            routine use pursuant to 5 U.S.C.
                                                  border crossings and financial                          PURPOSE(S):                                           552(b)(3) as follows:
                                                  information obtained from the Financial                   The Department of Defense proposes                     Where a record, either alone or in
                                                  Crimes Enforcement Network.                             to establish a new system of records to               conjunction with other information,
                                                     Information related to the                           assist in the management of the                       indicates a violation or potential
                                                  management and operation of DoD                         DITMAC Program and DoD Component                      violation of law, whether civil, criminal,
                                                  Component insider threat programs,                      insider threat programs. The DITMAC                   or regulatory in nature, and whether
                                                  including but not limited to:                           was established by the Undersecretary                 arising by general statute or by
                                                  Information related to investigative or                 of Defense for Intelligence in order to               regulation, rule, or order issued
                                                  analytical efforts by DoD insider threat                consolidate and analyze insider threat                pursuant thereto, the relevant records in
                                                  program personnel to identify threats to                information reported by the DoD                       the system of records may be referred,
                                                  DoD personnel, property, facilities, and                Component insider threat programs                     as a routine use, to the agency
                                                  information; information obtained from                  mandated by Presidential Executive                    concerned, whether Federal, state, local,
                                                  Intelligence Community members, the                     Order 13587, issued October 7, 2011,                  tribal, territorial, or foreign, charged
                                                  Federal Bureau of Investigation, or from                which required Federal agencies to                    with the responsibility of investigating
                                                  other agencies or organizations about                   establish an insider threat detection and             or prosecuting such violation or charged
                                                  individuals known or suspected of                       prevention program to ensure the                      with enforcing or implementing the
                                                  being engaged in conduct constituting,                  security of classified networks and the               statute, rule, regulation, or order issued
                                                  preparing for, aiding, or relating to an                responsible sharing and safeguarding of               pursuant thereto.
                                                  insider threat, including but not limited               classified information consistent with                   To an appropriate federal, state, local,
                                                  to espionage or unauthorized disclosure                 appropriate protections for privacy and               tribal, territorial, foreign, or
                                                  of classified national security                         civil liberties. The DITMAC helps                     international agency, if the information
                                                  information.                                            prevent, deter, detect, and/or mitigate               is relevant and necessary to a requesting
                                                     Publicly available information, such                 the potential threat that personnel,                  agency’s decision concerning the hiring
mstockstill on DSK3G9T082PROD with NOTICES




                                                  as information regarding: Arrests and                   including DoD military personnel,                     or retention of an individual, or
                                                  detentions; real property; bankruptcy;                  civilian employees, and contractor                    issuance of a security clearance, license,
                                                  liens or holds on property; vehicles;                   personnel, who have or had been                       contract, grant, delegation or
                                                  licensure (including professional and                   granted eligibility for access to classified          designation of authority, or other
                                                  pilot’s licenses, firearms and explosive                information or eligibility to hold a                  benefit, or if the information is relevant
                                                  permits); business licenses and filings;                sensitive position may harm the security              and necessary to a DoD decision
                                                  and from social media.                                  of the United States. This threat can                 concerning the hiring or retention of an


                                             VerDate Sep<11>2014   18:47 May 18, 2016   Jkt 238001   PO 00000   Frm 00031   Fmt 4703   Sfmt 4703   E:\FR\FM\19MYN1.SGM   19MYN1


                                                                                 Federal Register / Vol. 81, No. 97 / Thursday, May 19, 2016 / Notices                                             31617

                                                  employee, the issuance of a security                    conducted under the authority of 44                   both relevant and necessary to the
                                                  clearance, the reporting of an                          U.S.C. 2904 and 2906.                                 litigation and the use of such records is
                                                  investigation of an employee, the letting                  To appropriate agencies, entities, and             therefore deemed by the agency to be for
                                                  of a contract, or the issuance of a                     persons when (1) the Component                        a purpose that is compatible with the
                                                  license, grant, delegation or designation               suspects or has confirmed that the                    purpose for which the agency collected
                                                  of authority, or other benefit and                      security or confidentiality of the                    the records.
                                                  disclosure is appropriate to the proper                 information in the system of records has                 To the news media or the general
                                                  performance of the official duties of the               been compromised; (2) the Component                   public, factual information the
                                                  person making the request.                              has determined that as a result of the                disclosure of which would be in the
                                                     To the Department of Justice for the                 suspected or confirmed compromise                     public interest and which would not
                                                  purpose of representing the Department                  there is a risk of harm to economic or                constitute an unwarranted invasion of
                                                  of Defense, or any officer, employee or                 property interests, identity theft or                 personal privacy.
                                                  member of the Department in pending                     fraud, or harm to the security or                        To a Federal, state, or local agency, or
                                                  or potential litigation to which the                    integrity of this system or other systems             other appropriate entities or
                                                  record is pertinent.                                    or programs (whether maintained by the                individuals, or through established
                                                     A record consisting of, or relating to,              Component or another agency or entity)                liaison channels to selected foreign
                                                  terrorism information, homeland                         that rely upon the compromised                        governments, in order to enable an
                                                  security information,                                   information; and (3) the disclosure                   intelligence agency to carry out its
                                                  counterintelligence, or law enforcement                 made to such agencies, entities, and                  responsibilities under the National
                                                  information may be disclosed to a                       persons is reasonably necessary to assist             Security Act of 1947 as amended, the
                                                  Federal, state, local, tribal, territorial,             in connection with the Component’s                    CIA act of 1949 as emended, Executive
                                                  foreign government, multinational                       efforts to respond to the suspected or                Order 12333 or any successor order,
                                                  agency, and to a private sector agent                   confirmed compromise and prevent,                     applicable national security directives,
                                                  either in response to its request or upon               minimize, or remedy such harm.                        or classified implementing procedures
                                                  the initiative of the DoD Component, for                   To foreign law enforcement, security,              approved by the Attorney General and
                                                  purposes of sharing such information as                 investigatory, or administrative                      promulgated pursuant to such statutes,
                                                  is necessary and relevant to the agency’s               authorities to comply with requirements               orders or directives.
                                                  investigations and inquiries related to                 imposed by, or to claim rights conferred
                                                  the detection, prevention, disruption,                  in, international agreements and                      STORAGE:
                                                  preemption, and mitigation of the                       arrangements, including those                           Paper and electronic storage media.
                                                  effects of terrorist activities against the             regulating the stationing and status in
                                                                                                                                                                RETRIEVABILITY:
                                                  territory, people, and interests of the                 foreign countries of DoD military and
                                                                                                          civilian personnel.                                     Information in this system may be
                                                  United States of America as
                                                                                                             To any agency, organization, or                    retrieved by name, SSN, and/or DoD
                                                  contemplated by the Intelligence Reform
                                                                                                          individual for the purposes of                        identification number.
                                                  and Terrorism Protection Act of 2004.
                                                     To any person, organization, or                      performing audit or oversight of the DoD              SAFEGUARDS:
                                                  governmental entity in order to notify                  DITMAC as authorized by law and as                      IT systems are protected by military
                                                  them of a serious terrorist threat for the              necessary and relevant to such audit or               personnel, civilian employee, or
                                                  purpose of guarding against or                          oversight functions.                                  contract security personnel guards.
                                                  responding to such a threat.                               To such recipients and under such                  Physical access to rooms is controlled
                                                     To complainants and/or victims to the                circumstances and procedures as are                   by combination lock and by
                                                  extent necessary to provide such                        mandated by Federal statute or treaty.                identification badges that are issued
                                                  persons with information and                               To third parties during the course of
                                                                                                                                                                only to authorized individuals.
                                                  explanations concerning the progress                    an investigation to the extent necessary
                                                                                                                                                                Electronic authorization and
                                                  and/or results of the investigation or                  to obtain information pertinent to the
                                                                                                                                                                authentication of users is required at all
                                                  case arising from the matters of which                  investigation, provided disclosure is
                                                                                                                                                                points before any system information
                                                  they complained and/or of which they                    appropriate to the proper performance
                                                                                                                                                                can be accessed. All data transfers and
                                                  were a victim.                                          of the official duties of the individual
                                                                                                                                                                information retrievals that use remote
                                                     To contractors, grantees, experts,                   making the disclosure.
                                                                                                             To a Federal agency or entity that may             communication facilities are required to
                                                  consultants, students, and others                                                                             be encrypted. Paper records are
                                                  performing or working on a contract,                    have information relevant to an
                                                                                                          allegation or investigation or was                    contained and stored in safes and filing
                                                  service, grant, cooperative agreement, or                                                                     cabinets that are located in a secure area
                                                  other assignment for the Federal                        consulted regarding an insider threat for
                                                                                                          purposes of obtaining guidance,                       with access only by authorized
                                                  Government, when necessary to                                                                                 personnel.
                                                  accomplish an agency function related                   additional information, or advice from
                                                  to the DoD DITMAC system of records.                    such Federal agency or entity regarding               RETENTION AND DISPOSAL:
                                                     To Federal, state, local, territorial,               the handling of an insider threat matter.               Disposition pending (until the
                                                  tribal, foreign, or international licensing                To a court or adjudicative body in a               National Archives and Records
                                                  agencies or associations that require                   proceeding when: (a) The agency or any                Administration (NARA) disposition
                                                  information concerning the suitability                  component thereof; or (b) any employee                schedule is approved, treat as
                                                  or eligibility of an individual for a                   of the agency in his or her official                  permanent).
                                                                                                          capacity; or (c) any employee of the
mstockstill on DSK3G9T082PROD with NOTICES




                                                  license.
                                                     To a Congressional office from the                   agency in his or her individual capacity              SYSTEM MANAGER(S) AND ADDRESS:
                                                  record of an individual in response to                  where the Department of Justice has                     Department of Defense Insider Threat
                                                  an inquiry from the Congressional office                agreed to represent the employee; or (d)              Management and Analysis Center,
                                                  made at the request of that individual.                 the United States Government is a party               Assistant Director, Enterprise Tools and
                                                     To the National Archives and Records                 to litigation or has interest in such                 Architecture, Defense Security Service,
                                                  Administration for the purpose of                       litigation, and by careful review, the                27130 Telegraph Road, Quantico, VA
                                                  records management inspections                          agency determines that the records are                22134–2253.


                                             VerDate Sep<11>2014   18:47 May 18, 2016   Jkt 238001   PO 00000   Frm 00032   Fmt 4703   Sfmt 4703   E:\FR\FM\19MYN1.SGM   19MYN1


                                                  31618                          Federal Register / Vol. 81, No. 97 / Thursday, May 19, 2016 / Notices

                                                    DoD Components including the                          of the United States of America that the              systems of records for record sources
                                                  Departments of the Army, Air Force,                     foregoing is true and correct. Executed               accessed by this system, DoD also
                                                  and Navy and staffs, field operating                    on (date). (Signature).’                              claims the same exemptions for any
                                                  agencies, major commands,                                                                                     copies of such records received by and
                                                                                                          IF EXECUTED WITHIN THE UNITED STATES, ITS
                                                  installations, and activities. Official                 TERRITORIES, POSSESSIONS, OR
                                                                                                                                                                stored in this system.
                                                  mailing addresses are published as an                   COMMONWEALTHS:
                                                                                                                                                                  An exemption rule for this system has
                                                  appendix to each Service’s compilation                                                                        been promulgated in accordance with
                                                                                                            ‘I declare (or certify, verify, or state)
                                                  of systems of records notices.                                                                                requirements of 5 U.S.C. 553(b)(1), (2),
                                                                                                          under penalty of perjury that the
                                                                                                          foregoing is true and correct. Executed               and (3), (c) and (e) and published in 32
                                                  NOTIFICATION PROCEDURES:
                                                                                                          on (date). (Signature). ’                             CFR part 310. For additional
                                                     Individuals seeking to determine                                                                           information contact the system manager.
                                                                                                            Attorneys or other persons acting on
                                                  whether information about themselves                                                                          [FR Doc. 2016–11703 Filed 5–18–16; 8:45 am]
                                                                                                          behalf of an individual must provide
                                                  is contained in the DITMAC system of
                                                                                                          written authorization from that                       BILLING CODE 5001–06–P
                                                  records should address written inquires
                                                                                                          individual for the representative to act
                                                  to the Defense Security Service, Office
                                                                                                          on their behalf.
                                                  of FOIA and PA, 27130 Telegraph Road,                                                                         DEPARTMENT OF DEFENSE
                                                  Quantico, VA 22134–2253.                                CONTESTING RECORD PROCEDURES:
                                                     Individuals seeking to determine                       The DoD rules for accessing records                 Department of the Navy
                                                  whether information about themselves                    and for contesting or appealing agency                [Docket ID: USN–2015–HQ–0013]
                                                  is contained in any specific DoD                        determinations are published in DoD
                                                  Component’s insider threat program                      Regulation 5400.11; 32 CFR 310; or may                Submission for OMB Review;
                                                  system of records should address                        be obtained from the Defense Privacy,                 Comment Request
                                                  written inquiries to the official mailing               Civil Liberties, and Transparency
                                                  address for that Component, which is                    Division, 4800 Mark Center Drive;                     ACTION:   Notice.
                                                  published with each Component’s                         ATTN: DPCLTD, Mailbox #24;
                                                  compilation of systems of records                                                                             SUMMARY:    The Department of Defense
                                                                                                          Alexandria, VA 22350–1700.
                                                  notices.                                                                                                      has submitted to OMB for clearance, the
                                                                                                          RECORD SOURCE CATEGORIES:                             following proposal for collection of
                                                  DOD COMPONENT ADDRESSES ARE ALSO LISTED                    Information in the system is received              information under the provisions of the
                                                  AT: http://dpcld.defense.gov/Privacy/                                                                         Paperwork Reduction Act.
                                                                                                          from DoD Components and program
                                                  PrivacyContacts.aspx.
                                                                                                          offices throughout DoD and DoD                        DATES: Consideration will be given to all
                                                     Signed, written requests must contain                contractor databases, external sources,               comments received by June 20, 2016.
                                                  the full name (and any alias and/or                     including counterintelligence and                     FOR FURTHER INFORMATION CONTACT: Fred
                                                  alternate names used), SSN, and date                    security databases and files; personnel               Licari, 571–372–0493.
                                                  and place of birth.                                     security databases and files; DoD                     SUPPLEMENTARY INFORMATION:
                                                  RECORD ACCESS PROCEDURES:                               Component human resources databases                     Title, Associated Form and OMB
                                                    Individuals seeking information about                 and files; Office of the Chief Information            Number: Risk Management Information
                                                  themselves contained in the DITMAC                      Officer and information assurance                     (RMI) System; OPNAV 5102/10, OSHA
                                                  system of record should address written                 databases and files; information                      Form 301; OMB Control Number 0703–
                                                  inquires to the Defense Security Service,               collected through user activity                       XXXX.
                                                  Office of FOIA and PA, 27130 Telegraph                  monitoring; DoD telephone usage                         Type of Request: New Collection.
                                                  Road, Quantico, VA 22134–2253.                          records; Federal, state, tribal, territorial,           Number of Respondents: 25.
                                                                                                          and local law enforcement and                           Responses per Respondent: 1.
                                                    Individuals seeking information about
                                                                                                          investigatory records; Inspector General                Annual Responses: 25.
                                                  themselves contained in any specific                                                                            Average Burden per Response: 1.5
                                                  DoD Component’s insider threat                          records; available U.S. Government
                                                                                                          intelligence and counterintelligence                  hours.
                                                  program system of records should                                                                                Annual Burden Hours: 37.5.
                                                  address written inquiries to the official               reporting information and analytic
                                                                                                          products pertaining to adversarial                      Needs and Uses: The information
                                                  mailing address for that Component,                                                                           collection requirement is necessary to
                                                  which is published with each                            threats; other Federal agencies; and
                                                                                                          publicly available information.                       collect information on injuries/fatalities,
                                                  Component’s compilation of systems of                                                                         occupational illnesses required of
                                                  records notices.                                        EXEMPTIONS CLAIMED FOR THE SYSTEM:                    Federal governmental agencies by the
                                                  DOD COMPONENT ADDRESSES ARE ALSO LISTED                    The Department of Defense is                       Occupational Safety and Health
                                                  AT: http://dpcld.defense.gov/Privacy/                   exempting records maintained in DUSDI                 Administration (OSHA), and pertinent
                                                  PrivacyContacts.aspx.                                   01–DoD, the ‘‘Department of Defense                   information for property damage
                                                    Individuals should provide their full                 (DoD) Insider Threat Management and                   occurring during DON operations. The
                                                  name (and any alias and/or alternate                    Analysis Center (DITMAC) and DoD                      data maintained in this system will be
                                                  name), SSN, and date and place of birth,                Component Insider Threat Records                      used for analytical purposes to improve
                                                  and the address where the records are                   System,’’ from subsections (c)(3) and (4);            the Department of the Navy’s accident
                                                  to be returned.                                         (d)(1), (2), (3), and (4); (e)(1), (2), (3),          prevention policies, procedures,
                                                    In addition, the requester must                       (4)(G), (H), and (I), (5), and (8); (f); and          standards and operations, as well as to
                                                                                                          (g) of the Privacy Act pursuant to 5                  ensure internal data quality assurance.
mstockstill on DSK3G9T082PROD with NOTICES




                                                  provide a notarized statement or an
                                                  unsworn declaration made in                             U.S.C. 552a(j)(2) and (k)(1), (2), (4), (5),          The collection will also help to ensure
                                                  accordance with 28 U.S.C. 1746, in the                  (6), (7). In addition, exempt records                 that all individuals receive required
                                                  following format:                                       received from other systems of records                safety, fire, security, force protection,
                                                                                                          in the course of DITMAC or Component                  and emergency management training
                                                  IF EXECUTED OUTSIDE OF THE UNITED STATES:               record checks may, in turn, become part               courses necessary to perform assigned
                                                    ‘I declare (or certify, verify, or state)             of the case records in this system. When              duties and comply with Federal, DoD,
                                                  under penalty of perjury under the laws                 records are exempt from disclosure in                 and DON related regulations.


                                             VerDate Sep<11>2014   18:47 May 18, 2016   Jkt 238001   PO 00000   Frm 00033   Fmt 4703   Sfmt 4703   E:\FR\FM\19MYN1.SGM   19MYN1



Document Created: 2018-02-07 15:01:35
Document Modified: 2018-02-07 15:01:35
CategoryRegulatory Information
CollectionFederal Register
sudoc ClassAE 2.7:
GS 4.107:
AE 2.106:
PublisherOffice of the Federal Register, National Archives and Records Administration
SectionNotices
ActionNotice to add a New System of Records.
DatesComments will be accepted on or before June 20, 2016. This proposed action will be effective the day following the end of the comment period unless comments are received which result in a contrary determination.
ContactCindy Allard, Director of the Defense Privacy, Civil Liberties, and Transparency Division, 703-571-0070.
FR Citation81 FR 31614 

2025 Federal Register | Disclaimer | Privacy Policy
USC | CFR | eCFR