Ir al contenido principal
Bandera de los Estados Unidos Un sitio web oficial del gobierno de los Estados Unidos
Los sitios web oficiales usan .gov
Un sitio web .gov pertenece a una organización gubernamental oficial de los Estados Unidos.
Los sitios web .gov seguros usan HTTPS
Un candado () o https:// significa que se conectó de forma segura al sitio web .gov. Comparta información sensible solo en sitios web oficiales y seguros.
Mostrar

Valoración del impacto en la privacidad para ePACS

Fiscal Year 2023

About this Document

A Privacy Impact Assessment (PIA) is an analysis of how PII is handled to ensure that handling conforms to applicable privacy requirements, to determine the privacy risks associated with an information system or activity, and to evaluate ways to mitigate privacy risks. A PIA is both an analysis and a formal document detailing the process and the outcome of the analysis.

Program offices and system owners are required to complete a PIA whenever they develop, procure, or use information technology to create, collect, use, process, store, maintain, disseminate, disclose, or dispose of PII.1 Completion of a PIA is a precondition for the issuance of an authorization to operate.2

Basic Information about the System

System Name: Enterprise Physical Access Control System (ePACS)

NCUA Office of Primary Interest: Office of Continuity and Security Management

Threshold

Describe the system in 1-2 sentences.

The ePACS system is an application that includes a network of cameras throughout NCUA buildings that are monitored live and maintained so that any individual who may be in NCUA buildings, facilities or parking lots may be recorded by the cameras on a video format. The application authenticates the identity of federal employees, contractors or authorized individuals by accepting and storing cardholder credential/identification data including names, photographs, access authorizations specifying the NCUA facilities and areas that cardholders are permitted to enter, and the time periods when entry is authorized.

Purpose and Authority

The NCUA should only create, collect, use, process, store, maintain, disseminate, or disclose PII if it has authority to do so, and such authority should be identified in the appropriate notice.

The NCUA should provide notice of the specific purpose for which PII is collected and should only use, process, store, maintain, disseminate, or disclose PII for a purpose that is explained in the notice and is compatible with the purpose for which the PII was collected, or that is otherwise legally authorized.

Purpose and Authority

1. What is the purpose of the system?

The purpose of this system is to secure and regulate physical access to NCUA facilities, to promote public safety in NCUA facilities, to prevent crime, to assist law enforcement agencies in criminal investigations and prosecutions, and to address internal personnel, suitability and security clearance issues and potential insider threats.

2. How is the PII collected/maintained/used in the system relevant and necessary to achieve the purpose described above?

The relevance of collecting each individual's name, work phone number and email address, work PIV card number and picture is to verify the identity of each individual, and that each individual is authorized to access NCUA's facilities. Access to view and use video images is limited to authorized OCSM personnel and Security Guards with a need to know to perform their official duties.

3. What is the legal authority to collect, maintain, use, or share the PII contained in the system?

12 U.S.C. § 1751 et seq.; Homeland Security Presidential Directive 12 (HSPD -12) “Policy for a Common Identification Standard for Federal Employees and Contractors”; Federal Information Processing Standard 201-2 (FIPS 201-2): Personal Identity Verification (PIV) of Federal Employees and Contractors; 5 U.S.C. Section 301 et. seq;

Minimization

The NCUA should only create, collect, use, process, store, maintain, disseminate, or disclose PII that is directly relevant and necessary to accomplish a legally authorized purpose, and should only maintain PII for as long as is necessary to accomplish that purpose.

The NCUA recognizes the increased sensitivity of Social Security numbers (SSNs) and therefore makes every effort to limit the collection and maintenance of them. The NCUA also limits its collection of other types of PII to those that are necessary.

SSNs

1. Will the system collect, maintain, or share social security numbers?

No

PII

1. Basic Demographic

  • Dirección de email
  • Nombre
  • Apellido
  • Middle Name (or initial)
  • Phone Number

1.1. Who is it collected for?

  • NCUA Contractors
  • Empleados de la NCUA

3. Financial

Ninguno

4. Biometric

  • Photograph
  • Other: Video and physical movements

4.1. Who is this information collected for?

  • NCUA Contractors
  • Empleados de la NCUA
  • Others: For video and physical movements, other members of the public who visit NCUA facilities.

5. Employment and Education

Employment Identification Number (EIN)

5.1. Who is this information collected for?

  • NCUA Contractors
  • Empleados de la NCUA

7. NCUA Employment

  • NCUA Email Address
  • NCUA Employee ID Number
  • NCUA Office Phone Number
  • Physical Movements (Key Entry records, Video, etc.)
  • Other: PIV card number

7.1. Who is this information collected for?

  • NCUA Contractors
  • Empleados de la NCUA

Collection and Consent

The NCUA should create, collect, use, process, store, maintain, disseminate, or disclose PII with such accuracy, relevance, timeliness, and completeness as is reasonably necessary to ensure fairness to the individual.

The NCUA should involve the individual in the process of using PII and, to the extent practicable, seek individual consent for the creation, collection, use, processing, storage, maintenance, dissemination, or disclosure of PII. The NCUA should also establish procedures to receive and address individuals' privacy-related complaints and inquiries.

The NCUA endeavors both to collect information from the subject individual, and to attain affirmative informed consent, whenever possible. The NCUA's use of Privacy Act statements and privacy notices on forms are critical to this effort. For more information see the Transparency section below.

Collection and Consent

1. What are the sources from which the PII will be collected?

Within NCUA

2. How will the information be collected?

En persona

3. Will the individuals whose information is collected/maintained in the system consent to their personal information?

Not specifically, but the individuals consented to providing the information originally and likely anticipated that their information would also be maintained and used this way.

4. Will individuals be able to “opt-out” by declining to provide PII or by consenting only to a particular use?

No

Procedures to Address Individuals’ Privacy Related Complaints and Inquiries

The Privacy team knows that complaints, concerns, and questions from individuals can be a valuable source of input that improves operational models, uses of technology, data collection practices, and privacy safeguards. To facilitate this type of feedback, the Privacy team has established the Privacy Complaint Process to receive and respond to complaints, concerns, and questions from individuals about the NCUA's privacy practices. The process is described on the NCUA’s privacy website. The Privacy team appropriately records and tracks complaints, concerns, and questions to ensure prompt remediation.

Maintenance and Use

The NCUA should establish administrative, technical, and physical safeguards to protect PII commensurate with the risk and magnitude of the harm that would result from its unauthorized access, use, modification, loss, destruction, dissemination, or disclosure.

The NCUA implements, documents, and tests security and privacy controls as required by applicable NIST and OMB guidance. Access controls are of particular importance with regard to protecting individuals' privacy. Records management, both keeping records for the required time frame and timely destroying or accessioning them, is also a key component of managing privacy risks.

Maintenance and Use

1. Which statement is most accurate?

NCUA owns the System.

2. Who has access to PII in the system?

  • Empleados de la NCUA
  • NCUA Contractors
  • Other: Restricted to authorized OCSM personnel ONLY

3. Which roles have access to PII in the system?

  • Some System Users
  • System Administrators
  • Other: Restricted to authorized OCSM personnel ONLY

Records Management

1. Which records retention schedule(s) will apply to this system?

General Record Schedule - General Operations Support (GRS 5.0)

Transparency

The NCUA should be transparent about information policies and practices with respect to PII, and should provide clear and accessible notice regarding creation, collection, use, processing, storage, maintenance, dissemination, and disclosure of PII.

The NCUA's transparency efforts include providing adequate notice to individuals prior to collection of their PII. The NCUA achieves this with Privacy Act statements, or privacy notices (the latter if the collection is not associated with a Privacy Act System of Records), and compliance with the Paperwork Reduction Act.3 The NCUA also publishes Systems of Records Notices in the Federal Register and makes them available on the privacy page of the NCUA’s website.

Transparency

1. Will any forms or surveys be used to collect the information?

No

SORN

1. Is the information in the system retrieved by a personal identifier?

2. Applicable SORN

NCUA-01

Accountability

The NCUA should be accountable for complying with these principles and applicable privacy requirements, and should appropriately monitor, audit, and document compliance. The NCUA should also clearly define the roles and responsibilities with respect to PII for all employees and contractors, and should provide appropriate training to all employees and contractors who have access to PII.

Compliance with the Fair Information Privacy Principles

As evidenced by this PIA (and the other information publicly available on the privacy page of NCUA’s website), the NCUA is committed to achieving and maintaining compliance with the Fair Information Privacy Principles.

Roles and Responsibilities of NCUA Staff

As detailed in the NCUA Acceptable Use Policy and applicable Rules of Behavior, all NCUA staff are responsible for protecting PII from unauthorized exposure and for reducing the volume and types of PII necessary for program functions. Staff must protect all PII that they handle, process, compile, maintain, store, transmit, or report on in their daily work.

To protect PII, staff must use proper collection, storage, transportation, transmission, and disposal methods, must not access PII beyond what they need to complete their job duties, and must not disclose PII to unauthorized parties. Managers are also responsible for providing their subordinates with context-specific practical guidance about protecting PII.

All NCUA staff are required to review and acknowledge receipt and acceptance of applicable Rules of Behavior upon gaining access to the NCUA’s information systems and associated data.

Failure to protect PII may result in administrative sanctions, and criminal and/or civil penalties.4

Capacitación

Together with the Office of Human Resources, the Privacy team ensures that new employees complete mandatory privacy training, and all existing employees and contractor employees complete privacy refresher training once every fiscal year. NCUA staff electronically certify acceptance of their privacy responsibilities as a part of annual privacy refresher training. The Privacy team keeps auditable records of completion of all mandatory trainings.

Analysis and Approval

This PIA was approved by or on behalf of the Senior Agency Official for Privacy. Below are additional details regarding the review and approval of the PIA.

Analysis and Approval

Privacy Risk: Acceptable

Approval Date: May 8, 2023


Acotaciones


1 44 U.S.C. § 3501, note; Pub. L. 107–347, § 208(b).

2 OMB Memorandum M-14-04, Fiscal Year 2013 Reporting Instructions for the Federal Information Security Act and Agency Privacy Management (2013).

3 See the Collection and Consent section above.

4 5 U.S.C. § 552a(i)(3); NCUA Computer Security Rules of Behavior.

Última modificación el