(a) Information Collections. No information collections are required by this publication.
(b) Records. Retain and dispose of Privacy Act records according to Air Force Manual 37-139, Records Disposition Schedule. \12\---------------------------------------------------------------------------
\12\ http://www.e-publishing.af.mil/pubfiles/af/37/afman37-139/afman37-139.pdf.---------------------------------------------------------------------------
(c) Forms or Information Management Tools (Adopted and Prescribed).
(1) Adopted Forms or Information Management Tools. Air Force Form 624, Base/Unit Locator and PSC Directory, and AF Form 847, Recommendation for Change of Publication.
(2) Prescribed Forms or Information Management Tools. AF Form 3227, Privacy Act Cover Sheet, Air Force Form 771, Accounting of Disclosures, and Air Force Visual Aid 33-276.
Sec. Appendix A to Part 806b--Definitions
Access: Allowing individuals to review or receive copies of their records.
Amendment: The process of adding, deleting, or changing information in a system of records to make the data accurate, relevant, timely, or complete.
Computer matching: A computerized comparison of two or more automated systems of records or a system of records with non-Federal records to establish or verify eligibility for payments under Federal benefit programs or to recover delinquent debts for these programs.
Confidential source: A person or organization giving information under an express or implied promise of confidentiality made before September 27, 1975.
Confidentiality: An expressed and recorded promise to withhold the identity of a source or the information provided by a source. The Air Force promises confidentiality only when the information goes into a system with an approved exemption for protecting the identity of confidential sources.
Cookie: Data created by a Web server that is stored on a user's computer either temporarily for that session only or permanently on the hard disk (persistent cookie). It provides a way for the Web site to identify users and keep track of their preferences. It is commonly used to ``maintain the state'' of the session. A third-party cookie either originates on or is sent to a Web site different from the one you are currently viewing.
Defense Data Integrity Board: Composed of representatives from DoD components and the services who oversee, coordinate, and approve all DoD computer matching programs covered by the Act.
Denial Authority: The individuals with authority to deny requests for access or amendment of records under the Privacy Act.
Disclosure: Giving information from a system, by any means, to anyone other than the record subject.
Federal benefit program: A Federally funded or administered program for individuals that provides cash or in-kind assistance (payments, grants, loans, or loan guarantees).
Individual: A living U.S. citizen or a permanent resident alien.
Minor: Anyone under the age of majority according to local state law. If there is no applicable state law, a minor is anyone under age 18. Military members and married persons are not minors, no matter what their chronological age.
Personal identifier: A name, number, or symbol that is unique to an individual, usually the person's name or Social Security Number.
Personal information: Information about an individual other than items of public record.
Privacy Act request: An oral or written request by an individual about his or her records in a system of records.
Privacy advisory: A statement required when soliciting personally-identifying information by an Air Force web site and the information is not maintained in a system of records. The Privacy Advisory informs the individual why the information is being solicited and how it will be used.
Privacy Impact Assessment: A written assessment of an information system that addresses the information to be collected, the purpose and intended use; with whom the information will be shared; notice or opportunities for consent to individuals; how the information will be secured; and whether a new system of records is being created under the Privacy Act.
Record: Any information about an individual.
Routine use: A disclosure of records to individuals or agencies outside DoD for a use that is compatible with the purpose for which the Air Force created the records.
System manager: The official who is responsible for managing a system of records, including policies and procedures to operate and safeguard it. Local system managers operate record systems or are responsible for part of a decentralized system.
System of records: A group of records retrieved by the individual's name, personal identifier; or individual identifier through a cross-reference system.
System notice: The official public notice published in the Federal Register of the existence and content of the system of records.
Sec. Appendix B to Part 806b--Preparing a System Notice
The following elements comprise a system of records notice for publication in the Federal Register:
System identifier: Air Force Chief Information Officer/P assigns the notice number, for example, F033 AF PC A, where ``F'' indicates ``Air Force,'' the next number represents the publication series number related to the subject matter, and the final letter group shows the system manager's command or Deputy Chief of Staff. The last character ``A'' indicates that this is the first notice for this series and system manager.
System name: Use a short, specific, plain-language title that identifies the system's general purpose (limited to 55 characters).
System location: Specify the address of the primary system and any decentralized elements, including automated data systems with a central computer facility and input or output terminals at separate locations. Use street address, 2-letter state abbreviations and 9-digit ZIP Codes. Spell out office names. Do not use office symbols.
Categories of individuals covered by the system: Use nontechnical, specific categories of individuals about whom the Air Force keeps records. Do not use categories like ``all Air Force personnel'' unless they are actually true.
Categories of records in the system: Describe in clear, plain language, all categories of records in the system. List only documents actually kept in the system. Do not show source documents that are used to collect data and then destroyed. Do not list form numbers.
Authority for maintenance of the system: Cite the specific law or Executive Order that authorizes the program the records support. Cite the DoD directive/instruction or Air Force instruction(s) that authorizes the system of records. Always include titles with the citations.
Note: Executive Order 9397 authorizes using the Social Security Number as a personal identifier. Include this authority whenever the Social Security Number is used to retrieve records.
Purpose: Describe briefly and specifically what the Air Force does with the information collected.
Routine uses of records maintained in the system including categories of users and the purpose of such uses: List each specific agency or activity outside DoD to whom the records may be released and the purpose for such release.
The DoD `Blanket Routine Uses' published in the Air Force Directory of System Notices apply to all system notices unless you indicate otherwise.
Polices and practices for storing, retrieving, accessing, retaining, and disposing of records in the system:
Storage: State the medium in which the Air Force keeps the records; for example, in file folders, card files, microfiche, computer, or a combination of those methods. Storage does not refer to the storage container.
Retrievability: State how the Air Force retrieves the records; for example, by name, Social Security Number, or personal characteristics (such as fingerprints or voiceprints).
Safeguards: List the kinds of officials who have immediate access to the system. List those responsible for safeguarding the records. Identify the system safeguards; for example, storage in safes, vaults, locked cabinets or rooms, use of guards, visitor controls, personnel screening, computer systems software, and so on. Describe safeguards fully without compromising system security.
Retention and disposal: State how long Air Force Manual 37-139 requires the activity to maintain the record. Indicate when or if the records may be transferred to a Federal Records Center and how long the record stays there. Specify when the Records Center sends the record to the National Archives or destroys it. Indicate how the records may be destroyed.
System manager(s) and address: List the position title and duty address of the system manager. For decentralized systems, show the locations and the position or duty title of each category of officials responsible for any segment of the system.
Notification procedure: List the title and duty address of the official authorized to tell requesters if their records are in the system. Specify the information a requester must submit; for example, full name, military status, Social Security Number, date of birth, or proof of identity, and so on.
Record access procedures: Explain how individuals may arrange to access their records. Include the titles or categories of officials who may assist; for example, the system manager.
Contesting records procedures: Air Force Chief Information Officer/P provides this standard caption.
Record source categories: Show categories of individuals or other information sources for the system.
Exemptions claimed for the system: When a system has no approved exemption, write ``none'' under this heading. Specifically list any approved exemption including the subsection in the Act.
Sec. Appendix C to Part 806b--DoD `Blanket Routine Uses'
Certain DoD ``blanket routine uses'' have been established that are applicable to every record system maintained by the Department of the Air Force, unless specifically stated otherwise within the particular record system notice. These additional routine uses of the records are published only once in the Air Force's Preamble to its compilation of records systems in the interest of simplicity, economy and to avoid redundancy.
a. Law Enforcement Routine Use
If a system of records maintained by a DoD Component to carry out its functions indicates a violation or potential violation of law, whether civil, criminal, or regulatory in nature, and whether arising by general statute or by regulation, rule, or order issued pursuant thereto, the relevant records in the system of records may be referred, as a routine use, to the agency concerned, whether federal, state, local, or foreign, charged with the responsibility of investigating or prosecuting such violation or charged with enforcing or implementing the statute, rule, regulation, or order issued pursuant thereto.
b. Disclosure when Requesting Information Routine Use
A record from a system of records maintained by a Component may be disclosed as a routine use to a federal, state, or local agency maintaining civil, criminal, or other relevant enforcement information or other pertinent information, such as current licenses, if necessary to obtain information relevant to a Component decision concerning the hiring or retention of an employee, the issuance of a security clearance, the letting of a contract, or the issuance of a license, grant, or other benefit.
c. Disclosure of Requested Information Routine Use
A record from a system of records maintained by a Component may be disclosed to a federal agency, in response to its request, in connection with the hiring or retention of an employee, the issuance of a security clearance, the reporting of an investigation of an employee, the letting of a contract, or the issuance of a license, grant, or other benefit by the requesting agency, to the extent that the information is relevant and necessary to the requesting agency's decision on the matter.
d. Congressional Inquiries Routine Use
Disclosure from a system of records maintained by a Component may be made to a congressional office from the record of an individual in response to an inquiry from the congressional office made at the request of that individual.
e. Private Relief Legislation Routine Use
Relevant information contained in all systems of records of the Department of Defense published on or before August 22, 1975, will be disclosed to the Office of Management and Budget in connection with the review of private relief legislation as set forth in Office of Management and Budget Circular A-19 (reference (u)) at any stage of the legislative coordination and clearance process as set forth in that Circular.
f. Disclosures Required by International Agreements Routine Use
A record from a system of records maintained by a Component may be disclosed to foreign law enforcement, security, investigatory, or administrative authorities to comply with requirements imposed by, or to claim rights conferred in, international agreements and arrangements including those regulating the stationing and status in foreign countries of DoD military and civilian personnel.
g. Disclosure to State and Local Taxing Authorities Routine Use
Any information normally contained in Internal Revenue Service (IRS) Form W-2 which is maintained in a record from a system of records maintained by a Component may be disclosed to state and local taxing authorities with which the Secretary of the Treasury has entered into agreements under 5 U.S.C., sections 5516, 5517, and 5520 (reference (v)) and only to those state and local taxing authorities for which an employee or military member is or was subject to tax regardless of whether tax is or was withheld. This routine use is in accordance with Treasury Fiscal Requirements Manual Bulletin No. 76-07.
h. Disclosure to the Office of Personnel Management Routine Use
A record from a system of records subject to the Privacy Act and maintained by a Component may be disclosed to the Office of Personnel Management (OPM) concerning information on pay and leave, benefits, retirement deduction, and any other information necessary for the OPM to carry out its legally authorized government-wide personnel management functions and studies.
i. Disclosure to the Department of Justice for Litigation Routine Use
A record from a system of records maintained by this component may be disclosed as a routine use to any component of the Department of Justice for the purpose of representing the Department of Defense, or any officer, employee or member of the Department in pending or potential litigation to which the record is pertinent.
j. Disclosure to Military Banking Facilities Overseas Routine Use
Information as to current military addresses and assignments may be provided to military banking facilities who provide banking services overseas and who are reimbursed by the Government for certain checking and loan losses. For personnel separated, discharged, or retired from the Armed Forces, information as to last known residential or home of record address may be provided to the military banking facility upon certification by a banking facility officer that the facility has a returned or dishonored check negotiated by the individual or the individual has defaulted on a loan and that if restitution is not made by the individual, the U.S. Government will be liable for the losses the facility may incur.
k. Disclosure of Information to the General Services Administration
(GSA) Routine Use
A record from a system of records maintained by this component may be disclosed as a routine use to the General Services Administration (GSA) for the purpose of records management inspections conducted under authority of 44 U.S.C. 2904 and 2906.
l. Disclosure of Information to the National Archives and Records
Administration (NARA) Routine Use
A record from a system of records maintained by this component may be disclosed as a routine use to the National Archives and Records Administration (NARA) for the purpose of records management inspections conducted under authority of 44 U.S.C. 2904 and 2906.
m. Disclosure to the Merit Systems Protection Board Routine Use
A record from a system of records maintained by this component may be disclosed as a routine use to the Merit Systems Protection Board, including the Office of the Special Counsel for the purpose of litigation, including administrative proceedings, appeals, special studies of the civil service and other merit systems, review of OPM or component rules and regulations, investigation of alleged or possible prohibited personnel practices; including administrative proceedings involving any individual subject of a DoD investigation, and such other functions, promulgated in 5 U.S.C. 1205 and 1206, or as may be authorized by law.
n. Counterintelligence Purpose Routine Use
A record from a system of records maintained by this component may be disclosed as a routine use outside the DoD or the U.S. Government for the purpose of counterintelligence activities authorized by U.S. Law or Executive Order or for the purpose of enforcing laws, which protect the national security of the United States.
Sec. Appendix D to Part 806b--General and Specific Exemptions
(a) All systems of records maintained by the Department of the Air Force shall be exempt from the requirements of 5 U.S.C. 552a(d) pursuant to 5 U.S.C. 552a(k)(1) to the extent that the system contains any information properly classified under Executive Order 12958 and that is required by Executive Order to be kept classified in the interest of national defense or foreign policy. This exemption is applicable to parts of all systems of records including those not otherwise specifically designated for exemptions herein, which contain isolated items of properly classified information.
(b) An individual is not entitled to have access to any information compiled in reasonable anticipation of a civil action or proceeding (5 U.S.C. 552a(d)(5)).
(c) No system of records within Department of the Air Force shall be considered exempt under subsection (j) or (k) of the Privacy Act until the exemption rule for the system of records has been published as a final rule in the Federal Register.
(d) Consistent with the legislative purpose of the Privacy Act of 1974, the Department of the Air Force will grant access to non-exempt material in the records being maintained. Disclosure will be governed by the Department of the Air Force's Privacy Instruction, but will be limited to the extent that identity of confidential sources will not be compromised; subjects of an investigation of an actual or potential violation will not be alerted to the investigation; the physical safety of witnesses, informants and law enforcement personnel will not be endangered, the privacy of third parties will not be violated; and that the disclosure would not otherwise impede effective law enforcement. Whenever possible, information of the above nature will be deleted from the requested documents and the balance made available. The controlling principle behind this limited access is to allow disclosures except those indicated above. The decisions to release information from these systems will be made on a case-by-case basis.
(e) General Exemptions. The following systems of records claim an exemption under 5 U.S.C. 552a(j)(2), with the exception of F090 AF IG B, Inspector General Records and F051 AF JA F, Courts-Martial and Article 15 Records. They claim both the (j)(2) and (k)(2) exemption, and are listed under this part:
(1) System identifier and name: F071 AF OSI A, Counter Intelligence Operations and Collection Records.
(2) System identifier and name: F071 AF OSI C, Criminal Records.
(3) System identifier and name: F071 AF OSI D, Investigative Support Records.
(4) System identifier and name: F031 AF SP E, Security Forces Management Information System (SFMIS).
(i) Exemption: Parts of this system may be exempt pursuant to 5 U.S.C. 552a(j)(2) if information is compiled and maintained by a component of the agency which performs as its principle function any activity pertaining to the enforcement of criminal laws. Therefore, portions of this system of records may be exempt pursuant to 5 U.S.C. 552a(j)(2) from the following subsections of 5 U.S.C. 552a(c)(3), (c)(4), (d), (e)(1), (e)(2), (e)(3), (e)(4)(G), and (I), (e)(5), (e)(8), (f), and (g).
(ii) Authority: 5 U.S.C. 552a(j)(2).
(iii) Reasons: (A) To protect ongoing investigations and to protect from access criminal investigation information contained in this record system, so as not to jeopardize any subsequent judicial or administrative process taken as a result of information contained in the file.
(B) From subsection (c)(3) because the release of the disclosure accounting, for disclosures pursuant to the routine uses published for this system, would permit the subject criminal investigation or matter under investigation to obtain valuable information concerning the nature of that investigation which will present a serious impediment to law enforcement.
(C) From subsection (c)(4) because an exemption is being claimed for subsection this subsection will not be applicable.
(D) From subsection (d) because access the records contained in this system would inform the subject of an investigation of existence of that investigation, provide subject of the investigation with information that might enable him to avoid detection, and would present a serious impediment to law enforcement.
(E) From subsection (e)(4)(H) because system of records is exempt from individual access pursuant to subsection (j) of the Privacy Act of 1974.
(F) From subsection (f) because this system of records has been exempted from access provisions of subsection (d).
(5) System identifier and name: F031 AF SF A, Correction and Rehabilitation Records.
(i) Exemption: Parts of this system may be exempt pursuant to 5 U.S.C. 552a(j)(2) if information is compiled and maintained by a component of the agency which performs as its principle function any activity pertaining to the enforcement of criminal laws. Portions of this system of records may be exempt pursuant to 5 U.S.C. 552a(j)(2) from the following subsections of 5 U.S.C. 552a(c)(3), (c)(4), (d), (e)(3), (e)(4)(G), (H) and (I), (e)(5), (e)(8), (f), and (g).
(ii) Authority: 5 U.S.C. 552a(j)(2).
(iii) Reasons: (A) From subsection (c)(3) because the release of the disclosure accounting, for disclosures pursuant to the routine uses published for this system, would permit the subject of a criminal investigation or matter under investigation to obtain valuable information concerning the nature of that investigation which will present a serious impediment to law enforcement.
(B) From subsection (c)(4) because an exemption is being claimed for subsection (d), this subsection will not be applicable.
(C) From subsection (d) because access to the records contained in this system would inform the subject of a criminal investigation of the existence of that investigation, provide the subject of the investigation with information that might enable him to avoid detection or apprehension, and would present a serious impediment to law enforcement.
(D) From subsection (e)(3) would constitute a serious impediment to law enforcement in that it could compromise the existence of a confidential investigation, reveal the identity of confidential sources of information and endanger the life and physical safety of confidential informants.
(E) From subsections (e)(4)(G) and (H) because this system of records is exempt from individual access pursuant to subsections (j)(2) of the Privacy Act of 1974.
(F) From subsection (e)(4)(I) because the identity of specific sources must be withheld in order to protect the confidentiality of the sources of criminal and other law enforcement information. This exemption is further necessary to protect the privacy and physical safety of witnesses and informants.
(G) From subsection (e)(5) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. With the passage of time, seemingly irrelevant or untimely information may acquire new significance as further investigation brings new details to light and the accuracy of such information can only be determined in a court of law. The restrictions of subsection (e)(5) would restrict the ability of trained investigators and intelligence analysts to exercise their judgment reporting on investigations and impede the development of intelligence necessary for effective law enforcement.
(H) From subsection (e)(8) because the individual notice requirements of subsection (e)(8) could present a serious impediment to law enforcement as this could interfere with the ability to issue search authorizations and could reveal investigative techniques and procedures.
(I) From subsection (f) because this system of records has been exempted from the access provisions of subsection (d).
(J) From subsection (g) because this system of records compiled for law enforcement purposes and has been exempted from the access provisions of subsections (d) and (f).
(6) System identifier and name: F090 AF IG B, Inspector General Records.
(i) Exemption: (A) Parts of this system of records may be exempt pursuant to 5 U.S.C. 552a(j)(2) if the information is compiled and maintained by a component of the agency which performs as its principle function any activity pertaining to the enforcement of criminal laws. Therefore, portions of this system of records may be exempt pursuant to 5 U.S.C. 552a(j)(2) from the following subsections of 5 U.S.C. 552a(c)(3), (c)(4), (d), (e)(1), (e)(2), (e)(3), (e)(4)(G), (H), and (I), (e)(5), (e)(8), (f), and (g).
(B) Investigative material compiled for law enforcement purposes, other than material within the scope of subsection 5 U.S.C. 552a(j)(2), may be exempt pursuant to 5 U.S.C. 552a(k)(2). However, if an individual is denied any right, privilege, or benefit for which he would otherwise be entitled by Federal law or for which he would otherwise be eligible, as a result of the maintenance of the information, the individual will be provided access to the information exempt to the extent that disclosure would reveal the identity of a confidential source. Note: When claimed, this exemption allows limited protection of investigative reports maintained in a system of records used in personnel or administrative actions. Therefore, portions of this system of records may be exempt pursuant to 5 U.S.C. 552a(k)(2) from the following subsections of 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (H) and (I), and (f).
(ii) Authority: 5 U.S.C. 552a(j)(2) and (k)(2).
(iii) Reasons: (A) From subsection (c)(3) because the release of accounting of disclosure would inform a subject that he or she is under investigation. This information would provide considerable advantage to the subject in providing him or her with knowledge concerning the nature of the investigation and the coordinated investigative efforts and techniques employed by the cooperating agencies. This would greatly impede the Air Force IG's criminal law enforcement.
(B) From subsection (c)(4) and (d), because notification would alert a subject to the fact that an open investigation on that individual is taking place, and might weaken the ongoing investigation, reveal investigative techniques, and place confidential informants in jeopardy.
(C) From subsection (e)(1) because the nature of the criminal and/or civil investigative function creates unique problems in prescribing a specific parameter in a particular case with respect to what information is relevant or necessary. Also, information may be received which may relate to a case under the investigative jurisdiction of another agency. The maintenance of this information may be necessary to provide leads for appropriate law enforcement purposes and to establish patterns of activity that may relate to the jurisdiction of other cooperating agencies.
(D) From subsection (e)(2) because collecting information to the fullest extent possible directly from the subject individual may or may not be practical in a criminal and/or civil investigation.
(E) From subsection (e)(3) because supplying an individual with a form containing a Privacy Act Statement would tend to inhibit cooperation by many individuals involved in a criminal and/or civil investigation. The effect would be somewhat adverse to established investigative methods and techniques.
(F) From subsections (e)(4)(G), (H), and (I) because this system of records is exempt from the access provisions of subsection (d) and (f).
(G) From subsection (e)(5) because the requirement that records be maintained with attention to accuracy, relevance, timeliness, and completeness would unfairly hamper the investigative process. It is the nature of law enforcement for investigations to uncover the commission of illegal acts at diverse stages. It is frequently impossible to determine initially what information is accurate, relevant, timely, and least of all complete. With the passage of time, seemingly irrelevant or untimely information may acquire new significance as further investigation brings new details to light.
(H) From subsection (e)(8) because the notice requirements of this provision could present a serious impediment to law enforcement by revealing investigative techniques, procedures, and existence of confidential investigations.
(I) From subsection (f) because the agency's rules are inapplicable to those portions of the system that are exempt and would place the burden on the agency of either confirming or denying the existence of a record pertaining to a requesting individual might in itself provide an answer to that individual relating to an ongoing investigation. The conduct of a successful investigation leading to the indictment of a criminal offender precludes the applicability of established agency rules relating to verification of record, disclosure of the record to that individual, and record amendment procedures for this record system.
(J) From subsection (g) because this system of records should be exempt to the extent that the civil remedies relate to provisions of 5 U.S.C. 552a from which this rule exempts the system.
(7) System identifier and name: F051 AF JA F, Courts-Martial and Article 15 Records.
(i) Exemptions: (A) Parts of this system may be exempt pursuant to 5 U.S.C. 552a(j)(2) if the information is compiled and maintained by a component of the agency which performs as its principle function any activity pertaining to the enforcement of criminal laws. Therefore, portions of this system of records may be exempt pursuant to 5 U.S.C. 552a(j)(2) from the following subsection of 5 U.S.C. 552a(c)(3), (c)(4), (d), (e)(1), (e)(2), (e)(3), (e)(4)(G), (H) and (I), (e)(5), (e)(8), (f), and (g).
(B) Investigatory material compiled for law enforcement purposes, other than material within the scope of subsection 5 U.S.C. 552a(j)(2), may be exempt pursuant to 5 U.S.C. 552a(k)(2). However, if an individual is denied any right, privilege, or benefit for which he would otherwise be entitled by Federal law or for which he would otherwise be eligible, as a result of the maintenance of the information, the individual will be provided access to the information exempt to the extent that disclosure would reveal the identity of a confidential source. NOTE: When claimed, this exemption allows limited protection of investigative reports maintained in a system of records used in personnel or administrative actions. Therefore, portions of this system of records may be exempt pursuant to 5 U.S.C. 552a(k)(2) from the following subsections of 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (H) and (I), and (f).
(ii) Authority: 5 U.S.C. 552a(j)(2) and (k)(2).
(iii) Reason: (A) From subsection (c)(3) because the release of the disclosure accounting, for disclosures pursuant to the routine uses published for this system, would permit the subject of a criminal investigation or matter under investigation to obtain valuable information concerning the nature of that investigation which will present a serious impediment to law enforcement.
(B) From subsection (c)(4) because an exemption is being claimed for subsection (d), his subsection will not be applicable.
(C) From subsection (d) because access to the records contained in this system would inform the subject of a criminal investigation of the existence of that investigation, provide the subject of the investigation with information that might enable him to avoid detection or apprehension, and would present a serious impediment to law enforcement.
(D) From subsection (e)(1) because in the course of criminal investigations information is often obtained concerning the violation of laws or civil obligations of others not relating to an active case or matter. In the interests of effective law enforcement, it is necessary that this information be retained since it can aid in establishing patterns of activity and provide valuable leads for other agencies and future cases that may be brought.
(E) From subsection (e)(2) because in a criminal investigation the requirement that information be collected to the greatest extent possible from the subject individual would present a serious impediment to law enforcement in that the subject of the investigation would be placed on notice of the existence of the investigation and would therefore be able to avoid detection.
(F) From subsection (e)(3) because the requirement that individuals supplying information be provided with a form stating the requirements of subsection (e)(3) would constitute a serious impediment to law enforcement in that it could compromise the existence of a confidential investigation, reveal the identity of confidential sources of information and endanger the life and physical safety of confidential informants.
(G) From subsections (e)(4)(G) and (H) because this system of records is exempt from individual access pursuant to subsections (j) and (k) of the Privacy Act of 1974.
(H) From subsection (e)(4)(I) because the identity of specific sources must be withheld in order to protect the confidentiality of the sources of criminal and other law enforcement information. This exemption is further necessary to protect the privacy and physical safety of witnesses and informants.
(I) From subsection (e)(5) because in the collection of information for law enforcement purposes it is impossible to determine in advance what information is accurate, relevant, timely, and complete. With the passage of time, seemingly irrelevant or untimely information may acquire new significance as further investigation brings new details to light and the accuracy of such information can only be determined in a court of law. The restrictions of subsection (e)(5) would restrict the ability of trained investigators and intelligence analysts to exercise their judgment in reporting on investigations and impede the development of intelligence necessary for effective law enforcement.
(J) From subsection (e)(8) because the individual notice requirements of subsection (e)(8) could present a serious impediment to law enforcement as this could interfere with the ability to issue search authorizations and could reveal investigative techniques and procedures.
(K) From subsection (f) because this system of records has been exempted from the access provisions of subsection (d).
(L) From subsection (g) because this system of records is compiled for law enforcement purposes and has been exempted from the access provisions of subsections (d) and (f).
(8) System identifier and name: F071 JTF A, Computer Network Crime Case System.
(i) Exemption: (A) Parts of this system may be exempt pursuant to 5 U.S.C. 552a(j)(2) if the information is compiled and maintained by a component of the agency, which performs as its principle function any activity pertaining to the enforcement of criminal laws. Any portion of this system of records which falls within the provisions of 5 U.S.C. 552a(j)(2) may be exempt from the following subsections of 5 U.S.C. 552a(c)(3), (c)(4), (d), (e)(1), (e)(2), (e)(3), (e)(4)(G), (H), and (I), (e)(5), (e)(8), (f), and (g).
(B) Investigatory material compiled for law enforcement purposes, other than material within the scope of subsection 5 U.S.C. 552a(j)(2), may be exempt pursuant to 5 U.S.C. 552a(k)(2). However, if an individual is denied any right, privilege, or benefit for which he would otherwise be entitled by Federal law or for which he would otherwise be eligible, as a result of the maintenance of the information, the individual will be provided access to the information exempt to the extent that disclosure would reveal the identify of a confidential source.
Note: When claimed, this exemption allows limited protection of investigative reports maintained in a system of records used in personnel or administrative actions. Any portion of this system of records which falls within the provisions of 5 U.S.C. 552a(k)(2) may be exempt from the following subsections of 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (H) and (I), and (f).
(ii) Authority: 5 U.S.C. 552a(j)(2) and (k)(2).
(iii) Reasons: (A) From subsection (c)(3) because the release of accounting of disclosure would inform a subject that he or she is under investigation. This information would provide considerable advantage to the subject in providing him or her with knowledge concerning the nature of the investigation and the coordinated investigative efforts and techniques employed by the cooperating agencies. This would greatly impede criminal law enforcement.
(B) From subsection (c)(4) and (d), because notification would alert a subject to the fact that an open investigation on that individual is taking place, and might weaken the on-going investigation, reveal investigative techniques, and place confidential informants in jeopardy.
(C) From subsection (e)(1) because the nature of the criminal and/or civil investigative function creates unique problems in prescribing a specific parameter in a particular case with respect to what information is relevant or necessary. Also, information may be received which may relate to a case under the investigative jurisdiction of another agency. The maintenance of this information may be necessary to provide leads for appropriate law enforcement purposes and to establish patterns of activity that may relate to the jurisdiction of other cooperating agencies.
(D) From subsection (e)(2) because collecting information to the fullest extent possible directly from the subject individual may or may not be practical in a criminal and/or civil investigation.
(E) From subsection (e)(3) because supplying an individual with a form containing a Privacy Act Statement would tend to inhibit cooperation by many individuals involved in a criminal and/or civil investigation. The effect would be somewhat adverse to established investigative methods and techniques.
(F) From subsections (e)(4)(G), (H), and (I) because this system of records is exempt from the access provisions of subsection (d).
(G) From subsection (e)(5) because the requirement that records be maintained with attention to accuracy, relevance, timeliness, and completeness would unfairly hamper the investigative process. It is the nature of law enforcement for investigations to uncover the commission of illegal acts at diverse stages. It is frequently impossible to determine initially what information is accurate, relevant, timely, and least of all complete. With the passage of time, seemingly irrelevant or untimely information may acquire new significance as further investigation brings new details to light.
(H) From subsection (e)(8) because the notice requirements of this provision could present a serious impediment to law enforcement by revealing investigative techniques, procedures, and existence of confidential investigations.
(I) From subsection (f) because the agency's rules are inapplicable to those portions of the system that are exempt and would place the burden on the agency of either confirming or denying the existence of a record pertaining to a requesting individual might in itself provide an answer to that individual relating to an on-going investigation. The conduct of a successful investigation leading to the indictment of a criminal offender precludes the applicability of established agency rules relating to verification of record, disclosure of the record to that individual, and record amendment procedures for this record system.
(J) From subsection (g) because this system of records should be exempt to the extent that the civil remedies relate to provisions of 5 U.S.C. 552a from which this rule exempts the system.
(f) Specific Exemptions. The following systems of records are subject to the specific exemptions shown:
(1) System identifier and name: F036 USAFA K, Admissions Records.
(i) Exemption: Evaluation material used to determine potential for promotion in the Military Services may be exempt pursuant to 5 U.S.C. 552a(k)(7), but only to the extent that the disclosure of such material would reveal the identify of a confidential source. Therefore, portions of this system of records (Liaison Officer Evaluation and Selection Panel Candidate Evaluation) may be exempt pursuant to 5 U.S.C. 552a(k)(7) from the following subsections of 5 U.S.C. 552a(d), (e)(4)(H), and (f).
(ii) Authority: 5 U.S.C. 552a(k)(7).
(iii) Reasons: To ensure the frankness of information used to determine whether cadets are qualified for graduation and commissioning as officers in the Air Force.
(2) System identifier and name: F036 AFPC N, Air Force Personnel Test 851, Test Answer Sheets.
(i) Exemption: Testing or examination material used solely to determine individual qualifications for appointment or promotion in the federal or military service may be exempt pursuant to 5 U.S.C. 552a(k)(6), if the disclosure would compromise the objectivity or fairness of the test or examination process. Therefore, portions of this system of records may be exempt pursuant to 5 U.S.C. 552a(k)(6) from the following subsections of 5 U.S.C. 552a(c)(3); (d); (e)(4)(G), (H), and (I); and (f).
(ii) Authority: 5 U.S.C. 552a(k)(6).
(iii) Reasons: To protect the objectivity of the promotion testing system by keeping the test questions and answers in confidence.
(3) System identifier and name: F036 USAFA A, Cadet Personnel Management System.
(i) Exemption: Evaluation material used to determine potential for promotion in the Military Services may be exempt pursuant to 5 U.S.C. 552a(k)(7), but only to the extent that the disclosure of such material would reveal the identify of a confidential source. Therefore, portions of this system of records may be exempt pursuant to 5 U.S.C. 552a(k)(7) from the following subsections of 5 U.S.C. 552a(d), (e)(4)(H), and (f).
(ii) Authority: 5 U.S.C. 552a(k)(7).
(iii) Reasons: To maintain the candor and integrity of comments needed to evaluate an Air Force Academy cadet for commissioning in the Air Force.
(4) System identifier and name: F036 AETC I, Cadet Records.
(i) Exemption: Investigatory material compiled solely for the purpose of determining suitability, eligibility, or qualifications for federal civilian employment, military service, federal contracts, or access to classified information may be exempt pursuant to 5 U.S.C. 552a(k)(5), but only to the extent that such material would reveal the identity of a confidential source. Therefore, portions of this system of records may be exempt pursuant to 5 U.S.C. 552a(k)(5) (Detachment Professional Officer Course Selection Rating Sheets; Air Force Reserve Officer Training Corps Form 0-24--Disenrollment Review; Memoranda for Record and Staff Papers with Staff Advice, Opinions, or Suggestions) may be exempt from the following subsections of 5 U.S.C. 552a(c)(3), (d), (e)(4)(G) and (H), and (f).
(ii) Authority: 5 U.S.C. 552a(k)(5).
(iii) Reasons: To protect the identity of a confidential source who furnishes information necessary to make determinations about the qualifications, eligibility, and suitability of cadets for graduation and commissioning in the Air Force.
(5) System identifier and name: F044 AF SG Q, Family Advocacy Program Records.
(i) Exemption: (A) Investigative material compiled for law enforcement purposes, other than material within the scope of subsection 5 U.S.C. 552a(j)(2), may be exempt pursuant to 5 U.S.C. 552a(k)(2). However, if an individual is denied any right, privilege, or benefit for which he would otherwise be entitled by Federal law or for which he would otherwise be eligible, as a result of the maintenance of the information, the individual will be provided access to the information exempt to the extent that disclosure would reveal the identity of a confidential source.
Note: When claimed, this exemption allows limited protection of investigative reports maintained in a system of records used in personnel or administrative actions.
(B) Investigative material compiled solely for the purpose of determining suitability, eligibility, or qualifications for federal civilian employment, military service, federal contracts, or access to classified information may be exempt pursuant to 5 U.S.C. 552a(k)(5), but only to the extent that such material would reveal the identity of a confidential source.
(C) Therefore, portions of this system of records may be exempt pursuant to 5 U.S.C. 552a(k)(2) and (k)(5) from the following subsections of 5 U.S.C. 552a(c)(3) and (d).
(ii) Authority: 5 U.S.C. 552a(k)(2) and (k)(5).
(iii) Reasons: From subsections (c)(3) and (d) because the exemption is needed to encourage those who know of exceptional medical or educational conditions or family maltreatments to come forward by protecting their identities and to protect such sources from embarrassment or recriminations, as well as to protect their right to privacy. It is essential that the identities of all individuals who furnish information under an express promise of confidentiality be protected. Granting individuals access to information relating to criminal and civil law enforcement, as well as the release of certain disclosure accounting, could interfere with ongoing investigations and the orderly administration of justice, in that it could result in the concealment, alteration, destruction, or fabrication of information; could hamper the identification of offenders or alleged offenders and the disposition of charges; and could jeopardize the safety and well being of parents and their children. Exempted portions of this system also contain information considered relevant and necessary to make a determination as to qualifications, eligibility, or suitability for Federal employment and Federal contracts, and that was obtained by providing an express or implied promise to the source that his or her identity would not be revealed to the subject of the record.
(6) System identifier and name: F036 AF PC A, Effectiveness/Performance Reporting System.
(i) Exemption: Evaluation material used to determine potential for promotion in the Military Services (Brigadier General Selectee Effectiveness Reports and Colonel and Lieutenant Colonel Promotion Recommendations with close out dates on or before January 31, 1991) may be exempt pursuant to 5 U.S.C. 552a(k)(7), but only to the extent that the disclosure of such material would reveal the identity of a confidential source. Therefore, portions of this system of records may be exempt pursuant to 5 U.S.C. 552a(k)(7) from the following subsections of 5 U.S.C. 552a(c)(3), (d), (e)(4)(H), and (f).
(ii) Authority: 5 U.S.C. 552a(k)(7).
(iii) Reasons: (A) From subsection (c)(3) because making the disclosure accounting available to the individual may compromise express promises of confidentiality by revealing details about the report and identify other record sources, which may result in circumvention of the access exemption.
(B) From subsection (d) because individual disclosure compromises express promises of confidentiality conferred to protect the integrity of the promotion rating system.
(C) From subsection (e)(4)(H) because of and to the extent that portions of this record system are exempt from the individual access provisions of subsection (d).
(D) From subsection (f) because of and to the extent that portions of this record system are exempt from the individual access provisions of subsection (d).
(7) System identifier and name: F036 AFDP A, Files on General Officers and Colonels Assigned to General Officer Positions.
(i) Exemption: Evaluation material used to determine potential for promotion in the Military Services may be exempt pursuant to 5 U.S.C. 552a(k)(7), but only to the extent that the disclosure of such material would reveal the identity of a confidential source. Therefore, portions of this system of records may be exempt pursuant to 5 U.S.C. 552a(k)(7) from the following subsections of 5 U.S.C. 552a(c)(3), (d), (e)(4)(G), (H), and (I); and (f).
(ii) Authority: 5 U.S.C. 552a(k)(7).
(iii) Reasons: To protect the integrity of information used in the Reserve Initial Brigadier General Screening Board, the release of which would compromise the selection process.
(8) System identification and name: F036 AF PC O, General Officer Personnel Data System.
(i) Exemption: Evaluation material used to determine potential for promotion in the Military Services may be exempt pursuant to 5 U.S.C. 552a(k)(7), but only to the extent that the disclosure of such material would reveal the identity of a confidential source. Therefore, portions of this system of records (Air Force General Officer Promotion and Effectiveness Reports with close out dates on or before January 31, 1991) may be exempt pursuant to 5 U.S.C. 552a(k)(7) may be exempt from following subsections of 5 U.S.C. 552a(c)(3), (d), (e)(4)(H), and (f).
(ii) Authority: 5 U.S.C. 552a(k)(7).
(iii) Reason: (A) From subsection (c)(3) because making the disclosure accounting available to the individual may compromise express promises of confidentiality by revealing details about the report and identify other record sources, which may result in circumvention of the access exemption.
(B) From subsection (d) because individual disclosure compromises express promises of confidentiality conferred to protect the integrity of the promotion rating system.
(C) From subsection (e)(4)(H) because of and to the extent that portions of this record system are exempt from the individual access provisions of subsection (d).
(D) From subsection (f) because of and to the extent that portions of this record system are exempt from the individual access provisions of subsection (d).
(9) System identifier and name: F036 AFPC K, Historical Airman Promotion Master Test File.
(i) Exemption: Testing or examination material used solely to determine individual qualifications for appointment or promotion in the federal or military service, if the disclosure would compromise the objectivity or fairness of the test or examination process may be exempt pursuant to 5 U.S.C. 552a(k)(6), if the disclosure would compromise the objectivity or fairness of the test or examination process. Therefore, portions of this system of records may be exempt pursuant to 5 U.S.C. 552a(k)(6) from the following subsections of 5 U.S.C. 552a(c)(3), (d), (e)(4)(G), (H), and (I), and (f).
(ii) Authority: 5 U.S.C. 552a(k)(6).
(iii) Reasons: To protect the integrity, objectivity, and equity of the promotion testing system by keeping test questions and answers in confidence. Reserved.
(10) System identifier and name: F071 AF OSI F, Investigative Applicant Processing Records.
(i) Exemption: Investigatory material compiled solely for the purpose of determining suitability, eligibility, or qualifications for federal civilian employment, military service, federal contracts, or access to classified information may be exempt pursuant to 5 U.S.C. 552a(k)(5), but only to the extent that such material would reveal the identity of a confidential source. Therefore, portions of this system of records may be exempt pursuant to 5 U.S.C. 552a(k)(5) from the following subsections of 5 U.S.C. 552a(c)(3), (d), (e)(4)(G), (H), and (I), and (f).
(ii) Authority: 5 U.S.C. 552a(k)(5).
(iii) Reasons: To protect those who gave information in confidence during Air Force Office of Special Investigations applicant inquiries. Fear of harassment could cause sources not to make frank and open responses about applicant qualifications. This could compromise the integrity of the Air Force Office of Special Investigations personnel program that relies on selecting only qualified people.
(11) System identifier and name: F036 USAFA B, Master Cadet Personnel Record (Active/Historical).
(i) Exemptions: Evaluation material used to determine potential for promotion in the Military Services may be exempt pursuant to 5 U.S.C. 552a(k)(7), but only to the extent that the disclosure of such material would reveal the identify of a confidential source. Therefore, portions of this system of records may be exempt pursuant to 5 U.S.C. 552a(k)(7) from the following subsections of 5 U.S.C. 552a(d), (e)(4)(H), and (f).
(ii) Authority: 5 U.S.C. 552a(k)(7).
(iii) Reasons: To maintain the candor and integrity of comments needed to evaluate a cadet for commissioning in the Air Force.
(12) System identifier and name: F031 497IG A, Sensitive Compartmented Information Personnel Records.
(i) Exemption: (A) Investigatory material compiled for law enforcement purposes, other than material within the scope of subsection 5 U.S.C. 552a(j)(2), may be exempt pursuant to 5 U.S.C. 552a(k)(2). However, if an individual is denied any right, privilege, or benefit for which he would otherwise be entitled by Federal law or for which he would otherwise be eligible, as a result of the maintenance of the information, the individual will be provided access to the information exempt to the extent that disclosure would reveal the identify of a confidential source.
Note: When claimed, this exemption allows limited protection of investigative reports maintained in a system of records used in personnel or administrative actions.
(B) Investigatory material compiled solely for the purpose of determining suitability, eligibility, or qualifications for federal civilian employment, military service, federal contracts, or access to classified information may be exempt pursuant to 5 U.S.C. 552a(k)(5), but only to the extent that such material would reveal the identity of a confidential source.
(C) Therefore, portions of this system of records may be exempt pursuant to 5 U.S.C. 552a(k)(2) and (k)(5) from the following subsections of 5 U.S.C. 552a(c)(3), (d), (e)(4)(G), (H), and (I), and (f).
(ii) Authority: 5 U.S.C. 552a(k)(2) and (k)(5).
(iii) Reasons: To protect the identity of sources to which proper promises of confidentiality have been made during investigations. Without these promises, sources will often be unwilling to provide information essential in adjudicating access in a fair and impartial manner.
(13) System identifier and name: F071 AF OSI B, Security and Related Investigative Records.
(i) Exemption: Investigatory material compiled solely for the purpose of determining suitability, eligibility, or qualifications for federal civilian employment, military service, federal contracts, or access to classified information may be exempt pursuant to 5 U.S.C. 552a(k)(5), but only to the extent that such material would reveal the identity of a confidential source. Therefore, portions of this system of records may be exempt pursuant to 5 U.S.C. 552a(k)(5) from the following subsections of 5 U.S.C. 552a(c)(3), (d), (e)(4)(G), (H), and (I), and (f).
(ii) Authority: 5 U.S.C. 552a(k)(5).
(iii) Reasons: To protect the identity of those who give information in confidence for personnel security and related investigations. Fear of harassment could cause sources to refuse to give this information in the frank and open way needed to pinpoint those areas in an investigation that should be expanded to resolve charges of questionable conduct.
(14) System identifier and name: F031 497IG B, Special Security Case Files.
(i) Exemption: Investigatory material compiled solely for the purpose of determining suitability, eligibility, or qualifications for federal civilian employment, military service, federal contracts, or access to classified information may be exempt pursuant to 5 U.S.C. 552a(k)(5), but only to the extent that such material would reveal the identity of a confidential source. Therefore, portions of this system of records may be exempt pursuant to 5 U.S.C. 552a(k)(5) from the following subsections of 5 U.S.C. 552a(c)(3), (d), (e)(4)(G), (H), and (I), and (f).
(ii) Authority: 5 U.S.C. 552a(k)(5).
(iii) Reasons: To protect the identity of those who give information in confidence for personnel security and related investigations. Fear of harassment could cause sources to refuse to give this information in the frank and open way needed to pinpoint those areas in an investigation that should be expanded to resolve charges of questionable conduct.
(15) System identifier and name: F031 AF SP N, Special Security Files.
(i) Exemption: Investigatory material compiled solely for the purpose of determining suitability, eligibility, or qualifications for federal civilian employment, military service, federal contracts, or access to classified information may be exempt pursuant to 5 U.S.C. 552a(k)(5), but only to the extent that such material would reveal the identity of a confidential source. Therefore, portions of this system of records may be exempt pursuant to 5 U.S.C. 552a(k)(5) from the following subsections of 5 U.S.C. 552a(c)(3), (d), (e)(4)(G), (H), and (I), and (f).
(ii) Authority: 5 U.S.C. 552a(k)(5).
(iii) Reasons: To protect the identity of those who give information in confidence for personnel security and related investigations. Fear of harassment could cause them to refuse to give this information in the frank and open way needed to pinpoint areas in an investigation that should be expanded to resolve charges of questionable conduct.
(16) System identifier and name: F036 AF PC P, Applications for Appointment and Extended Active Duty Files.
(i) Exemption: Investigatory material compiled solely for the purpose of determining suitability, eligibility, or qualifications for federal civilian employment, military service, federal contracts, or access to classified information may be exempt pursuant to 5 U.S.C. 552a(k)(5), but only to the extent that such material would reveal the identity of a confidential source. Therefore, portions of this system of records may be exempt pursuant to 5 U.S.C. 552a(k)(5) from the following subsection of 5 U.S.C. 552a(d).
(ii) Authority: 5 U.S.C. 552a(k)(5).
(iii) Reasons: To protect the identity of confidential sources who furnish information necessary to make determinations about the qualifications, eligibility, and suitability of health care professionals who apply for Reserve of the Air Force appointment or interservice transfer to the Air Force.
(17) System identifier and name: F036 AF DPG, Military Equal Opportunity and Treatment.
(i) Exemption: Investigative material compiled for law enforcement purposes, other than material within the scope of subsection 5 U.S.C. 552a(j)(2), may be exempt pursuant to 5 U.S.C. 552a(k)(2). However, if an individual is denied any right, privilege, or benefit for which he would otherwise be entitled by Federal law or for which he would otherwise be eligible, as a result of the maintenance of the information, the individual will be provided access to the information exempt to the extent that disclosure would reveal the identity of a confidential source.
Note: When claimed, this exemption allows limited protection of investigative reports maintained in a system of records used in personnel or administrative actions. Therefore, portions of this system of records may be exempt pursuant to 5 U.S.C. 522a(k)(2) from the following subsections of 5 U.S.C. 552a(d), (e)(4)(H), and (f).
(ii) Authority: 5 U.S.C. 552a(k)(2).
(iii) Reasons: (A) From subsection (d) because access to the records contained in this system would inform the subject of an investigation of the existence of that investigation, provide the subject of the investigation with information that might enable him to avoid detection, and would present a serious impediment to law enforcement. In addition, granting individuals access to information collected while an Equal Opportunity and Treatment clarification/investigation is in progress conflicts with the just, thorough, and timely completion of the complaint, and could possibly enable individuals to interfere, obstruct, or mislead those clarifying/investigating the complaint.
(B) From subsection (e)(4)(H) because this system of records is exempt from individual access pursuant to subsection (k) of the Privacy Act of 1974.
(C) From subsection (f) because this system of records has been exempted from the access provisions of subsection (d).
(18) System identifier and name: F051 AF JA I, Commander Directed Inquiries.
(i) Exemption: Investigatory material compiled for law enforcement purposes, other than material within the scope of subsection 5 U.S.C. 552a(j)(2), may be exempt pursuant to 5 U.S.C. 552a(k)(2). However, if an individual is denied any right, privilege, or benefit for which he would otherwise be entitled by Federal law or for which he would otherwise be eligible, as a result of the maintenance of the information, the individual will be provided access to the information except to the extent that disclosure would reveal the identity of a confidential source.
Note: When claimed, this exemption allows limited protection of investigative reports maintained in a system of records used in personnel or administrative actions. Any portion of this system of records which falls within the provisions of 5 U.S.C. 552a(k)(2) may be exempt from the following subsections of 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (H), and (I), and (f).
(ii) Authority: 5 U.S.C. 552a(k)(2).
(iii) Reasons: (A) From subsection (c)(3) because to grant access to the accounting for each disclosure as required by the Privacy Act, including the date, nature, and purpose of each disclosure and the identity of the recipient, could alert the subject to the existence of the investigation. This could seriously compromise case preparation by prematurely revealing its existence and nature; compromise or interfere with witnesses or make witnesses reluctant to cooperate; and lead to suppression, alteration, or destruction of evidence.
(B) From subsections (d) and (f) because providing access to investigative records and the right to contest the contents of those records and force changes to be made to the information contained therein would seriously interfere with and thwart the orderly and unbiased conduct of the investigation and impede case preparation. Providing access rights normally afforded under the Privacy Act would provide the subject with valuable information that would allow interference with or compromise of witnesses or render witnesses reluctant to cooperate; lead to suppression, alteration, or destruction of evidence; enable individuals to conceal their wrongdoing or mislead the course of the investigation; and result in the secreting of or other disposition of assets that would make them difficult or impossible to reach in order to satisfy any Government claim growing out of the investigation or proceeding.
(C) From subsection (e)(1) because it is not always possible to detect the relevance or necessity of each piece of information in the early stages of an investigation. In some cases, it is only after the information is evaluated in light of other evidence that its relevance and necessity will be clear.
(D) From subsections (e)(4)(G) and (H) because this system of records is compiled for investigative purposes and is exempt from the access provisions of subsections (d) and (f).
(E) From subsection (e)(4)(I) because to the extent that this provision is construed to require more detailed disclosure than the broad, generic information currently published in the system notice, an exemption from this provision is necessary to protect the confidentiality of sources of information and to protect privacy and physical safety of witnesses and informants.
(19) [Reserved]
(20) System identifier and name: F033 AF A, Information Requests-Freedom of Information Act.
(i) Exemption: During the processing of a Freedom of Information Act request, exempt materials from `other' systems of records may in turn become part of the case record in this system. To the extent that copies of exempt records from those other systems of records are entered into this system, the Department of the Air Force hereby claims the same exemptions for the records from those `other' systems that are entered into this system, as claimed for the original primary system of which they are a part.
(ii) Authority: 5 U.S.C. 552a(j)(2), (k)(1), (k)(2), (k)(3), (k)(4), (k)(5), (k)(6), and (k)(7).
(iii) Reasons: Records are only exempt from pertinent provisions of 5 U.S.C. 552a to the extent such provisions have been identified and an exemption claimed for the original record, and the purposes underlying the exemption for the original record still pertain to the record which is now contained in this system of records. In general, the exemptions were claimed in order to protect properly classified information relating to national defense and foreign policy, to avoid interference during the conduct of criminal, civil, or administrative actions or investigations, to ensure protective services provided the President and others are not compromised, to protect the identity of confidential sources incident to Federal employment, military service, contract, and security clearance determinations, and to preserve the confidentiality and integrity of Federal evaluation materials. The exemption rule for the original records will identify the specific reasons why the records are exempt from specific provisions of 5 U.S.C. 552a.
(21) System identifier and name: F033 AF B, Privacy Act Request Files.
(i) Exemption: During the processing of a Privacy Act request, exempt materials from other systems of records may in turn become part of the case record in this system. To the extent that copies of exempt records from those `other' systems of records are entered into this system, the Department of the Air Force hereby claims the same exemptions for the records from those `other' systems that are entered into this system, as claimed for the original primary system of which they are a part.
(ii) Authority: 5 U.S.C. 552a(j)(2), (k)(1), (k)(2), (k)(3), (k)(4), (k)(5), (k)(6), and (k)(7).
(iii) Reason: Records are only exempt from pertinent provisions of 5 U.S.C. 552a to the extent such provisions have been identified and an exemption claimed for the original record, and the purposes underlying the exemption for the original record still pertain to the record which is now contained in this system of records. In general, the exemptions were claimed in order to protect properly classified information relating to national defense and foreign policy, to avoid interference during the conduct of criminal, civil, or administrative actions or investigations, to ensure protective services provided the President and others are not compromised, to protect the identity of confidential sources incident to Federal employment, military service, contract, and security clearance determinations, and to preserve the confidentiality and integrity of Federal evaluation materials. The exemption rule for the original records will identify the specific reasons why the records are exempt from specific provisions of 5 U.S.C. 552a.
(22) System identifier and name: F051 AFJA E, Judge Advocate General's Professional Conduct Files.
(i) Exemption: Investigatory material compiled for law enforcement purposes, other than material within the scope of subsection 5 U.S.C. 552a(j)(2), may be exempt pursuant to 5 U.S.C. 552a(k)(2). However, if an individual is denied any right, privilege, or benefit for which he would otherwise be entitled by Federal law, as a result of the maintenance of the information, the individual will be provided access to the information except to the extent that disclosure would reveal the identity of a confidential source. Note: When claimed, this exemption allows limited protection of investigative reports maintained in a system of records used in personnel or administrative actions. Any portion of this system of records which falls within the provisions of 5 U.S.C. 552a(k)(2) may be exempt from the following subsections of 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (H), and (I), and (f).
(ii) Authority: 5 U.S.C. 552a(k)(2).
(iii) Reasons: (A) From subsection (c)(3) because to grant access to the accounting for each disclosure as required by the Privacy Act, including the date, nature, and purpose of each disclosure and the identity of the recipient, could alert the subject to the existence of the investigation. This could seriously compromise case preparation by prematurely revealing its existence and nature; compromise or interfere with witnesses or make witnesses reluctant to cooperate; and lead to suppression, alteration, or destruction of evidence.
(B) From subsections (d) and (f) because providing access to investigative records and the right to contest the contents of those records and force changes to be made to the information contained therein would seriously interfere with and thwart the orderly and unbiased conduct of the investigation and impede case preparation. Providing access rights normally afforded under the Privacy Act would provide the subject with valuable information that would allow interference with or compromise of witnesses or render witnesses reluctant to cooperate; lead to suppression, alteration, or destruction of evidence; enable individuals to conceal their wrongdoing or mislead the course of the investigation; and result in the secreting of or other disposition of assets that would make them difficult or impossible to reach in order to satisfy any Government claim growing out of the investigation or proceeding.
(C) From subsection (e)(1) because it is not always possible to detect the relevance or necessity of each piece of information in the early stages of an investigation. In some cases, it is only after the information is evaluated in light of other evidence that its relevance and necessity will be clear.
(D) From subsections (e)(4)(G) and (H) because this system of records is compiled for investigative purposes and is exempt from the access provisions of subsections (d) and (f).
(E) From subsection (e)(4)(I) because to the extent that this provision is construed to require more detailed disclosure than the broad, generic information currently published in the system notice, an exemption from this provision is necessary to protect the confidentiality of sources of information and to protect privacy and physical safety of witnesses and informants.
(23) System identifier and name F033 USSC A, Information Technology and Control Records.
(i) Exemption: Investigatory material compiled for law enforcement purposes, other than material within the scope of subsection 5 U.S.C. 552a(j)(2), may be exempt pursuant to 5 U.S.C. 552a(k)(2). However, if an individual is denied any right, privilege, or benefit for which he would otherwise be entitled by Federal law, as a result of the maintenance of the information, the individual will be provided access to the information except to the extent that disclosure would reveal the identity of a confidential source.
Note: When claimed, this exemption allows limited protection of investigative reports maintained in a system of records used in personnel or administrative actions. Any portion of this system of records which falls within the provisions of 5 U.S.C. 552a(k)(2) may be exempt from the following subsections of 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (H), and (I), and (f).
(ii) Authority: 5 U.S.C. 552a(k)(2).
(iii) Reasons: (A) From subsection (c)(3) because to grant access to the accounting for each disclosure as required by the Privacy Act, including the date, nature, and purpose of each disclosure and the identity of the recipient, could alert the subject to the existence of the investigation. This could seriously compromise case preparation by prematurely revealing its existence and nature; compromise or interfere with witnesses or make witnesses reluctant to cooperate; and lead to suppression, alteration, or destruction of evidence.
(B) From subsections (d) and (f) because providing access to investigative records and the right to contest the contents of those records and force changes to be made to the information contained therein would seriously interfere with and thwart the orderly and unbiased conduct of the investigation and impede case preparation. Providing access rights normally afforded under the Privacy Act would provide the subject with valuable information that would allow interference with or compromise of witnesses or render witnesses reluctant to cooperate; lead to suppression, alteration, or destruction of evidence; enable individuals to conceal their wrongdoing or mislead the course of the investigation; and result in the secreting of or other disposition of assets that would make them difficult or impossible to reach in order to satisfy any Government claim growing out of the investigation or proceeding.
(C) From subsection (e)(1) because it is not always possible to detect the relevance or necessity of each piece of information in the early stages of an investigation. In some cases, it is only after the information is evaluated in light of other evidence that its relevance and necessity will be clear.
(D) From subsections (e)(4)(G) and (H) because this system of records is compiled for investigative purposes and is exempt from the access provisions of subsections (d) and (f).
(E) From subsection (e)(4)(I) because to the extent that this provision is construed to require more detailed disclosure than the broad, generic information currently published in the system notice, an exemption from this provision is necessary to protect the confidentiality of sources of information and to protect privacy and physical safety of witnesses and informants.
(24) System identifier and name: F036 AETC X, College Scholarship Program.
(i) Exemption: Investigatory material compiled solely for the purpose of determining suitability * * * the identity of a confidential source. Therefore, portions of this system may be exempt pursuant to 5 U.S.C. 552a(k)(5) from the following subsections of 5 U.S.C. 552a(c)(3), (d), and (e)(1).
(ii) Authority: 5 U.S.C. 552a(k)(5).
(iii) Reasons: (A) From subsection (c)(3) and (d) and when access to accounting disclosures and access to or amendment of records would cause the identity of a confidential sources to be revealed. Disclosure of the source's identity not only will result in the Department breaching the promise of confidentiality made to the source but it will impair the Department's future ability to compile investigatory material for the purpose of determining suitability, eligibility, or qualifications for Federal civilian employment, Federal contracts, or access to classified information. Unless sources can be assured that a promise of confidentiality will be honored, they will be less likely to provide information considered essential to the Department in making the required determinations.
(B) From (e)(1) because in the collection of information for investigatory purposes, it is not always possible to determine the relevance and necessity of particular information in the early stages of the investigation. In some cases, it is only after the information is evaluated in light of other information that its relevance and necessity becomes clear. Such information permits more informed decision-making by the Department when making required suitability, eligibility, and qualification determinations.
(25) System identifier and name: F032 AFCESA C, Civil Engineer System-Explosive Ordnance Records.
(i) Exemption: Records maintained in connection with providing protective services to the President and other individuals under 18 U.S.C. 3056, may be exempt pursuant to 5 U.S.C. 552a(k)(3) may be exempt from the following subsections of 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (H), and (I), and (f).
(ii) Authority: 5 U.S.C. 552a(k)(3).
(iii) Reasons: (A) From subsection (c)(3) because to grant access to the accounting for each disclosure as required by the Privacy Act, including the date, nature, and purpose of each disclosure and the identity of the recipient, could alert the subject to the existence of the investigation. This could seriously compromise case preparation by prematurely revealing its existence and nature; compromise or interfere with witnesses or make witnesses reluctant to cooperate; and lead to suppression, alteration, or destruction of evidence.
(B) From subsections (d) and (f) because providing access to investigative records and the right to contest the contents of those records and force changes to be made to the information contained therein would seriously interfere with and thwart the orderly and unbiased conduct of the investigation and impede case preparation. Providing access rights normally afforded under the Privacy Act would provide the subject with valuable information that would allow interference with or compromise of witnesses or render witnesses reluctant to cooperate; lead to suppression, alteration, or destruction of evidence; enable individuals to conceal their wrongdoing or mislead the course of the investigation; and result in the secreting of or other disposition of assets that would make them difficult or impossible to reach in order to satisfy any Government claim growing out of the investigation or proceeding.
(C) From subsection (e)(1) because it is not always possible to detect the relevance or necessity of each piece of information in the early stages of an investigation. In some cases, it is only after the information is evaluated in light of other evidence that its relevance and necessity will be clear.
(D) From subsections (e)(4)(G) and (H) because this system of records is compiled for investigative purposes and is exempt from the access provisions of subsections (d) and (f).
(E) From subsection (e)(4)(I) because to the extent that this provision is construed to require more detailed disclosure than the broad, generic information currently published in the system notice, an exemption from this provision is necessary to protect the confidentiality of sources of information and to protect privacy and physical safety of witnesses and informants.
(26) System identifier and name: F051 AF JAA, Freedom of Information Appeal Records.
(i) Exemption: During the processing of a Privacy Act request, exempt materials from other systems of records may in turn become part of the case record in this system. To the extent that copies of exempt records from those `other' systems of records are entered into this system, the Department of the Air Force hereby claims the same exemptions for the records from those `other' systems that are entered into this system, as claimed for the original primary system of which they are a part.
(ii) Authority: 5 U.S.C. 552a(j)(2), (k)(1), (k)(2), (k)(3), (k)(4), (k)(5), (k)(6), and (k)(7).
(iii) Reason: Records are only exempt from pertinent provisions of 5 U.S.C. 552a to the extent such provisions have been identified and an exemption claimed for the original record, and the purposes underlying the exemption for the original record still pertain to the record which is now contained in this system of records. In general, the exemptions were claimed in order to protect properly classified information relating to national defense and foreign policy, to avoid interference during the conduct of criminal, civil, or administrative actions or investigations, to ensure protective services provided the President and others are not compromised, to protect the identity of confidential sources incident to Federal employment, military service, contract, and security clearance determinations, and to preserve the confidentiality and integrity of Federal evaluation materials. The exemption rule for the original records will identify the specific reasons why the records are exempt from specific provisions of 5 U.S.C. 552a. [69 FR 954, Jan. 7, 2004, as amended at 69 FR 12540, Mar. 17, 2004; 70 FR 46405, Aug. 10, 2005; 74 FR 55785, 55786, 55787, 55788, Oct. 29, 2009; 74 FR 57415, Nov. 6, 2009]
Sec. Appendix E to Part 806b--Privacy Impact Assessment
Section A--Introduction and Overview
The Privacy Act Assessment. The Air Force recognizes the importance of protecting the privacy of individuals, to ensure sufficient protections for the privacy of personal information as we implement citizen-centered e-Government. Privacy issues must be addressed when systems are being developed, and privacy protections must be integrated into the development life cycle of these automated systems. The vehicle for addressing privacy issues in a system under development is the Privacy Impact Assessment. The Privacy Impact Assessment process also provides a means to assure compliance with applicable laws and regulations governing individual privacy.
(a) Purpose. The purpose of this document is to:
(1) Establish the requirements for addressing privacy during the systems development process.
(2) Describe the steps required to complete a Privacy Impact Assessment.
(3) Define the privacy issues you will address in the Privacy Impact Assessment.
(b) Background. The Air Force is responsible for ensuring the privacy, confidentiality, integrity, and availability of personal information. The Air Force recognizes that privacy protection is both a personal and fundamental right. Among the most basic of individuals' rights is an expectation that the Air Force will protect the confidentiality of personal, financial, and employment information. Individuals also have the right to expect that the Air Force will collect, maintain, use, and disseminate identifiable personal information and data only as authorized by law and as necessary to carry out agency responsibilities. Personal information is protected by the following:
(1) Title 5, U.S.C. 552a, The Privacy Act of 1974, as amended, which affords individuals the right to privacy in records maintained and used by Federal agencies.
Note: 5 U.S.C. 552a includes Public Law 100-503, The Computer Matching and Privacy Act of 1988. \13\---------------------------------------------------------------------------
\13\ http://www.defenselink.mil/privacy/1975OMB_PAGuide/jun1989.pdf.
(2) Public Law 100-235, The Computer Security Act of 1987, \14\ which establishes minimum security practices for Federal computer systems.---------------------------------------------------------------------------
\14\ http://csrc.nist.gov/secplcy/csa--87.txt.---------------------------------------------------------------------------
(3) OMB Circular A-130, Management of Federal Information Resources, \15\ which provides instructions to Federal agencies on how to comply with the fair information practices and security requirements for operating automated information systems.---------------------------------------------------------------------------
\15\ http://www.whitehouse.gov/omb/circulars/a130/a130trans4.html.---------------------------------------------------------------------------
(4) Public Law 107-347, Section 208, E-Gov Act of 2002, which aims to ensure privacy in the conduct of federal information activities.
(5) Title 5, U.S.C. 552, The Freedom of Information Act, as amended, which provides for the disclosure of information maintained by Federal agencies to the public while allowing limited protections for privacy.
(6) DoD Directive 5400.11, Department of Defense Privacy Program, \16\ December 13, 1999.---------------------------------------------------------------------------
\16\ http://www.dtic.mil/whs/directives/corres/html/540011.htm.---------------------------------------------------------------------------
(7) DoD 5400.11-R, Department of Defense Privacy Program, \17\ August 1983.---------------------------------------------------------------------------
\17\ http://www.dtic.mil/whs/directives/corres/html/540011r.htm.---------------------------------------------------------------------------
(8) Air Force Instruction 33-332, Air Force Privacy Act Program.
(c) The Air Force Privacy Office is in the Office of the Air Force Chief Information Officer, Directorate of Plans and Policy, and is responsible for overseeing Air Force implementation of the Privacy Act.
Section B--Privacy and Systems Development
System Privacy. Rapid advancements in computer technology make it possible to store and retrieve vast amounts of data of all kinds quickly and efficiently. These advancements have raised concerns about the impact of large computerized information systems on the privacy of data subjects. Public concerns about highly integrated information systems operated by the government make it imperative to commit to a positive and aggressive approach to protecting individual privacy. Air Force Chief Information Officer is requiring the use of this Privacy Impact Assessment in order to ensure that the systems the Air Force develops protect individuals' privacy. The Privacy Impact Assessment incorporates privacy into the development life cycle so that all system development initiatives can appropriately consider privacy issues from the earliest stages of design.
(a) What is a Privacy Impact Assessment? The Privacy Impact Assessment is a process used to evaluate privacy in information systems. The process is designed to guide system owners and developers in assessing privacy through the early stages of development. The process consists of privacy training, gathering data from a project on privacy issues, and identifying and resolving the privacy risks. The Privacy Impact Assessment process is described in detail in Section C, Completing a Privacy Impact Assessment.
(b) When is a Privacy Impact Assessment Done? The Privacy Impact Assessment is initiated in the early stages of the development of a system and completed as part of the required system life cycle reviews. Privacy must be considered when requirements are being analyzed and decisions are being made about data usage and system design. This applies to all of the development methodologies and system life cycles used in the Air Force.
(c) Who completes the Privacy Impact Assessment? Both the system owner and system developers must work together to complete the Privacy Impact Assessment. System owners must address what data is to be used, how the data is to be used, and who will use the data. The system developers must address whether the implementation of the owner's requirements presents any threats to privacy.
(d) What systems have to complete a Privacy Impact Assessment? Accomplish Privacy Impact Assessments when:
(1) Developing or procuring information technology that collects, maintains, or disseminates information in identifiable form from or about members of the public.
(2) Initiating a new collection of information, using information technology, that collects, maintains, or disseminates information in identifiable form for 10 or more persons excluding agencies, instrumentalities, or employees of the Federal Government.
(3) Systems as described above that are undergoing major modifications.
(e) The Air Force or Major Command Privacy Act Officer reserves the right to request that a Privacy Impact Assessment be completed on any system that may have privacy risks.
Section C--Completing a Privacy Impact Assessment
The Privacy Impact Assessment. This section describes the steps required to complete a Privacy Impact Assessment. These steps are summarized in Table A4.1, Outline of Steps for Completing a Privacy Impact Assessment.
Training. Training on the Privacy Impact Assessment will be available, on request, from the Major Command Privacy Act Officer. The training consists of describing the Privacy Impact Assessment process and provides detail about the privacy issues and privacy questions to be answered to complete the Privacy Impact Assessment. Major Command Privacy Act Officers may use appendix E, Sections A, B, D, and E for this purpose. The intended audience is the personnel responsible for writing the Privacy Impact Assessment document.
The Privacy Impact Assessment Document. Preparing the Privacy Impact Assessment document requires the system owner and developer to answer the privacy questions in Section E. A brief explanation should be written for each question. Issues that do not apply to a system should be noted as ``Not Applicable.'' During the development of the Privacy Impact Assessment document, the Major Command Privacy Act Officer will be available to answer questions related to the Privacy Impact Assessment process and other concerns that may arise with respect to privacy.
Review of the Privacy Impact Assessment Document. Submit the completed Privacy Impact Assessment document to the Major Command Privacy Act Office for review. The purpose of the review is to identify privacy risks in the system.
Approval of the Privacy Impact Assessment. The system life cycle review process (Command, Control, Communications, Computers, and Intelligence Support Plan) will be used to validate the incorporation of the design requirements to resolve the privacy risks. Major Command and Headquarters Air Force Functional CIOs will issue final approval of the Privacy Impact Assessment.
Table A4.1--Outline of Steps for Completing a Privacy Impact Assessment------------------------------------------------------------------------
Step Who Procedure------------------------------------------------------------------------1.......................... System Owner, and Request and complete
Developer. Privacy Impact
Assessment
Training.2.......................... System Owner, and Answer the questions
Developer. in Section E,
Privacy Questions.
For assistance
contact your Major
Command Privacy Act
Officer.3.......................... System Owner, and Submit the Privacy
Developer. Impact Assessment
document to the
Major Command
Privacy Act
Officer.4.......................... Major Command Privacy Review the Privacy
Act Officer. Impact Assessment
document to
identify privacy
risks from the
information
provided. The Major
Command Privacy Act
Officer will get
clarification from
the owner and
developer as
needed.5.......................... System Owner and The System Owner,
Developer, Major Developer and the
Command Privacy Act Major Command
Officer. Privacy Act Officer
should reach
agreement on design
requirements to
resolve all
identified risks.6.......................... System Owner, Participate in the
Developer, and Major required system
Command Privacy Act life cycle reviews
Officer. to ensure
satisfactory
resolution of
identified privacy
risks to obtain
formal approval
from the Major
Command or
Headquarters Air
Force Functional
CIO.7.......................... Major Command or Issue final approval
Headquarters Air of Privacy Impact
Force Functional CIO. Assessment, and
send a copy to Air
Force Chief
Information Officer/
P.8.......................... Air Force Chief When feasible,
Information Officer/ publish Privacy
P. Impact Assessment
on Freedom of
Information Act Web
page (http://
www.foia.af.mil).------------------------------------------------------------------------
Section D--Privacy Issues in Information Systems
Privacy Act of 1974, 5 U.S.C. 552a as Amended
Title 5, U.S.C., 552a, The Privacy Act of 1974, as amended, requires Federal Agencies to protect personally identifiable information. It states specifically:
Each agency that maintains a system of records shall:
Maintain in its records only such information about an individual as is relevant and necessary to accomplish a purpose of the agency required to be accomplished by statute or by executive order of the President;
Collect information to the greatest extent practicable directly from the subject individual when the information may result in adverse determinations about an individual's rights, benefits, and privileges under Federal programs;
Maintain all records used by the agency in making any determination about any individual with such accuracy, relevance, timeliness, and completeness as is reasonably necessary to assure fairness to the individual in the determination;
Establish appropriate administrative, technical and physical safeguards to ensure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or integrity which could result in substantial harm, embarrassment, inconvenience, or unfairness to any individual on whom information is maintained.
Definitions
Accuracy--within sufficient tolerance for error to assure the quality of the record in terms of its use in making a determination.
Completeness--all elements necessary for making a determination are present before such determination is made.
Determination--any decision affecting an individual which, in whole or in part, is based on information contained in the record and which is made by any person or agency.
Necessary--a threshold of need for an element of information greater than mere relevance and utility.
Record--any item, collection or grouping of information about an individual and identifiable to that individual that is maintained by an agency.
Relevance--limitation to only those elements of information that clearly bear on the determination(s) for which the records are intended.
Routine Use--with respect to the disclosure of a record, the use of such record outside DoD for a purpose that is compatible with the purpose for which it was collected.
System of Records--a group of any records under the control of any agency from which information is retrieved by the name of the individual or by some identifying number, symbol, or other identifying particular assigned to the individual.
Timeliness--sufficiently current to ensure that any determination based on the record will be accurate and fair.
Information and Privacy
To fulfill the commitment of the Air Force to protect personal information, several issues must be addressed with respect to privacy.
The use of information must be controlled.
Information may be used only for a necessary and lawful purpose.
Individuals must be informed in writing of the principal purpose and routine uses of the information being collected from them.
Information collected for a particular purpose should not be used for another purpose without the data subject's consent unless such other uses are specifically authorized or mandated by law.
Any information used must be sufficiently accurate, relevant, timely and complete to assure fair treatment of the individual.
Given the availability of vast amounts of stored information and the expanded capabilities of information systems to process the information, it is foreseeable that there will be increased requests to share that information. With the potential expanded uses of data in automated systems it is important to remember that information can only be used for the purpose for which it was collected unless other uses are specifically authorized or mandated by law. If the data is to be used for other purposes, then the public must be provided notice of those other uses. These procedures do not in themselves create any legal rights, but are intended to express the full and sincere commitment of the Air Force to protect individual privacy rights and which provide redress for violations of those rights.
Data in the System
The sources of the information in the system are an important privacy consideration if the data is gathered from other than Air Force records. Information collected from non-Air Force sources should be verified, to the extent practicable, for accuracy, that the information is current, and complete. This is especially important if the information will be used to make determinations about individuals.
Access to the Data
Who has access to the data in a system must be defined and documented. Users of the data can be individuals, other systems, and other agencies. Individuals who have access to the data can be system users, system administrators, system owners, managers, and developers. When individuals are granted access to a system, their access should be limited, where possible, to only that data needed to perform their assigned duties. If individuals are granted access to all of the data in a system, procedures need to be in place to deter and detect browsing and unauthorized access. Other systems are any programs or projects that interface with the system and have access to the data. Other agencies can be International, Federal, state, or local entities that have access to Air Force data.
Attributes of the Data
When requirements for the data to be used in the system are being determined, those requirements must include the privacy attributes of the data. The privacy attributes are derived from the legal requirements imposed by The Privacy Act of 1974. First, the data must be relevant and necessary to accomplish the purpose of the system. Second, the data must be complete, accurate, and timely. It is important to ensure the data has these privacy attributes in order to assure fairness to the individual in making decisions based on the data.
Maintenance of Administrative Controls
Automation of systems can lead to the consolidation of processes, data, and the controls in place to protect the data. When administrative controls are consolidated, they should be evaluated so that all necessary controls remain in place to the degree necessary to continue to control access to and use of the data. Document record retention and disposal procedures and coordinate them with the Major Command Records Manager.
Section E--Privacy Questions
Data in the System
1. Generally describe the information to be used in System the system.
2. What are the sources of the information in the system?
a. What Air Force files and databases are used?
b. What Federal Agencies are providing data for use in the system?
c. What State and local agencies are providing data for use in the system?
d. What other third party sources will data be collected from?
e. What information will be collected from the employee?
3. Is data accurate and complete?
a. How will data collected from sources other than Air Force records and the subject be verified for accuracy?
b. How will data be checked for completeness?
c. Is the data current? How do you know?
4. Are the data elements described in detail and documented? If yes, what is the name of the document?
Access to the Data
1. Who will have access to the data in the system Data (Users, Managers, System Administrators, Developers, Other)?
2. How is access to the data by a user determined? Are criteria, procedures, controls, and responsibilities regarding access documented?
3. Will users have access to all data on the system or will the user's access be restricted? Explain.
4. What controls are in place to prevent the misuse (e.g., browsing) of data by those having access?
5. Does the system share data with another system?
a. Do other systems share data or have access to data in this system? If yes, explain.
b. Who will be responsible for protecting the privacy rights of the employees affected by the interface?
6. Will other agencies have access to the data in the system?
a. Will other agencies share data or have access to data in this system (International, Federal, State, Local, Other)?
b. How will the data be used by the agency?
c. Who is responsible for assuring proper use of the data?
d. How will the system ensure that agencies only get the information they are entitled to under applicable laws?
Attributes of the Data
1. Is the use of the data both relevant and necessary Data to the purpose for which the system is being designed?
2. Will the system create new data about an individual?
a. Will the system derive new data or create previously unavailable data about an individual through aggregation from the information collected?
b. Will the new data be placed in the individual's record?
c. Can the system make determinations about the record subject that would not be possible without the new data?
d. How will the new data be verified for relevance and accuracy?
3. Is data being consolidated?
a. If data is being consolidated, what controls are in place to protect the data from unauthorized access or use?
b. If processes are being consolidated, are the proper controls remaining in place to protect the data and prevent unauthorized access? Explain.
4. How will the data be retrieved? Is it retrieved by a personal identifier? If yes, explain.
Maintenance of Administrative Controls
(1) a. Explain how the system and its use will ensure Administrative equitable treatment of record subjects.
b. If the system is operated at more than one location, how will consistent use of the system and data be maintained?
c. Explain any possibility of disparate treatment of individuals or groups.
(2) a. Coordinate proposed maintenance and disposition of the records with the Major Command Records Manager.
b. While the data is retained in the system, what are the requirements for determining if the data is still sufficiently accurate, relevant, timely, and complete to ensure fairness in making determinations?
(3) a. Is the system using technologies in ways that the Air Force has not previously employed?
b. How does the use of this technology affect personal privacy?
(4) a. Will this system provide the capability to identify, locate, and monitor individuals? If yes, explain.
b. Will this system provide the capability to identify, locate, and monitor groups of people? If yes, explain.
c. What controls will be used to prevent unauthorized monitoring?
(5) a. Under which Systems of Record notice does the system operate? Provide number and name.
b. If the system is being modified, will the system of record require amendment or revision? Explain.