[Federal Register Volume 75, Number 39 (Monday, March 1, 2010)]
[Notices]
[Pages 9233-9238]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2010-4102]


=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

Office of the Secretary

[Docket No. DHS-2009-0071]


Privacy Act of 1974; U.S. Immigration and Customs Enforcement-006 
Intelligence Records System of Records

AGENCY: Privacy Office, DHS.

ACTION: Notice of Privacy Act system of records.

-----------------------------------------------------------------------

SUMMARY: In accordance with the Privacy Act of 1974, U.S. Immigration 
and Customs Enforcement is modifying an existing system of records 
titled the Immigration and Customs Enforcement-006 Intelligence Records 
System (Dec. 9, 2008), to clarify the nature of the personally 
identifiable information that will be collected and maintained on 
individuals. In conjunction with its publication of the Privacy Impact 
Assessment for the ICEGangs system, Immigration and Customs Enforcement 
is modifying the DHS/ICE-006 Immigration and Customs Enforcement 
Intelligence Records system of records notice to more clearly explain 
the type of information it gathers on suspected and confirmed gang 
members and associates. This DHS/Immigration and Customs Enforcement-
006 Intelligence Records system of records notice updates categories of 
individuals; categories of records; purpose of the system; adding a 
routine use; and policies and practices for retaining and disposing of 
records in the system. Immigration and Customs Enforcement is 
soliciting comments on this SORN due to the clarifying changes that 
were made since the original publication. A Privacy Impact Assessment 
on ICEGangs that describes the system in detail is being published 
concurrently with this notice. In addition, this notice addresses one 
comment that was received in response to the original publication of 
the Immigration and Customs Enforcement Intelligence Records SORN on 
December 9, 2008. A final rule is being published concurrently with 
this notice in which the Department exempts portions of this system of 
records from one or more provisions of the Privacy Act because of 
criminal, civil, and administrative enforcement requirements.

DATES: This amended system of records will be effective March 31, 2010. 
Written comments must be submitted on or before March 31, 2010.

ADDRESSES: You may submit comments, identified by docket number DHS-

[[Page 9234]]

2009-0071 by one of the following methods:
     Federal e-Rulemaking Portal: http://www.regulations.gov. 
Follow the instructions for submitting comments.
     Fax: 703-483-2999.
     Mail: Mary Ellen Callahan, Chief Privacy Officer, Privacy 
Office, Department of Homeland Security, Washington, DC 20528.
     Instructions: All submissions received must include the 
agency name and docket number for this rulemaking. All comments 
received will be posted without change to http://www.regulations.gov, 
including any personal information provided.
     Docket: For access to the docket to read background 
documents or comments received go to http://www.regulations.gov.

FOR FURTHER INFORMATION CONTACT: For general questions please contact 
Lyn M. Rahilly (202-732-3300), Privacy Officer, U.S. Immigration and 
Customs Enforcement, 500 12th Street, SW., Washington, DC 20536. For 
privacy issues please contact Mary Ellen Callahan (703-235-0780), Chief 
Privacy Officer, Privacy Office, U.S. Department of Homeland Security, 
Washington, DC 20528.

SUPPLEMENTARY INFORMATION:

I. Background

    The Immigration and Customs Enforcement (ICE) Intelligence Records 
(IIRS) system of records was originally established on December 9, 2008 
(73 FR 74735), and public comments were solicited for the SORN and the 
associated Notice of Proposed Rulemaking (73 FR 74633, Dec. 9, 2008) 
which proposed to exempt this system from one or more provisions of the 
Privacy Act because of criminal, civil, and administrative enforcement 
requirements. Due to urgent homeland security and law enforcement 
mission needs, ICE was already maintaining these records when the 
original IIRS SORN was published. Recognizing that ICE published a 
system of records notice for an existing system, ICE committed to 
reviewing and considering public comments, apply appropriate revisions, 
and republish the IIRS system of records notice within 180 days of 
receipt of comments. A new routine use is also proposed to allow data 
sharing between ICE and other law enforcement agencies for the purpose 
of collaboration, coordination, and de-confliction of cases.
    In addition to the records described in the initial publication of 
IIRS, this notice also consists of information maintained by the ICE 
Office of Investigations concerning suspected or confirmed gang members 
and associates included in a database called ICEGangs. ICEGangs 
maintains personal information about individuals who qualify as 
suspected or confirmed gang members and associates under ICE criteria. 
ICEGangs stores the following data about each gang member and associate 
to the extent it is available: Biographic information (name, date of 
birth, etc.), immigration status, gang affiliation, physical 
description, government-issued identification numbers, photos of the 
individual, identities of gang associates, field interview notes, and 
criminal history information. ICEGangs also stores general comments 
entered by the ICE agent that created the gang member or associate 
record as well as a reference to the official evidentiary system of 
records where official case files are stored.
    ICEGangs has two main purposes. First, it supplements the existing 
ICE case management system by providing a consolidated repository of 
information on gang members and associates and gang-related activity. 
ICEGangs allows ICE agents and support personnel to search gang-
oriented information in a more efficient and effective manner than is 
possible in ICE's standard investigative case management system. For 
example, an ICE field agent can query ICEGangs for a list of members in 
a specific gang. It is not currently possible to perform the same sort 
of query using ICE's investigative case management system. As a matter 
of policy, ICE agents are required to create and/or update ICEGangs 
records for suspected and/or confirmed gang members and associates 
whenever they encounter gang members and associates in the field during 
their official law enforcement activities. ICEGangs records also 
contain references to the official evidentiary system of records, which 
allows ICE agents and support personnel to refer to official case 
records.
    Second, ICEGangs facilitates the sharing of gang information 
between ICE and other law enforcement agencies. In particular, ICE 
currently provides the California Department of Justice (CalDOJ) access 
to the data in ICEGangs. CalDOJ users access ICEGangs through their own 
CalGangs application which accesses the ICEGangs repository remotely. 
In the future, ICE anticipates that it will share information with 
other State and local law enforcement agencies that use the GangNET 
software. ICE will require access controls for State and local agencies 
as a prerequisite to gaining access to ICEGangs.

II. Public Comment

    One public comment was received, but as it did not pertain to the 
SORN or proposed rule, it is not addressed here. A final rule is 
published concurrently with this notice in this issue of the Federal 
Register.

III. Privacy Act

    The Privacy Act embodies fair information principles in a statutory 
framework governing the means by which the United States Government 
collects, maintains, uses, and disseminates personally identifiable 
information. The Privacy Act applies to information that is maintained 
in a ``system of records.'' A ``system of records'' is a group of any 
records under the control of an agency for which information is 
retrieved by the name of an individual or by some identifying number, 
symbol, or other identifying particular assigned to the individual. In 
the Privacy Act, an individual is defined to encompass United States 
citizens and legal permanent residents. As a matter of policy, DHS 
extends administrative Privacy Act protections to all individuals where 
systems of records maintain information on U.S. citizens, lawful 
permanent residents, and visitors. Individuals may request access to 
their own records that are maintained in a system of records in the 
possession or under the control of DHS by complying with DHS Privacy 
Act regulations, 6 CFR Part 5.
    The Privacy Act requires each agency to publish in the Federal 
Register a description denoting the type and character of each system 
of records that the agency maintains, and the routine uses that are 
contained in each system in order to make agency record keeping 
practices transparent, to notify individuals regarding the uses to 
which personally identifiable information is put, and to assist 
individuals to more easily find such files within the agency. Below is 
the description of the Immigration and Customs Enforcement-006 
Intelligence Records system of records.
    In accordance with 5 U.S.C. 552a(r), DHS has provided a report of 
this new system of records to the Office of Management and Budget and 
to Congress.

SYSTEM OF RECORDS
    DHS/ICE-006

SYSTEM NAME:
    ICE Intelligence Records System (IIRS).

SECURITY CLASSIFICATION:
    Sensitive But Unclassified, Classified.

[[Page 9235]]

SYSTEM LOCATION:
    Records are maintained at ICE Headquarters in Washington, DC, and 
field offices.

CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
    Categories of individuals covered by this system include the 
following: (1) Individuals (e.g., subjects, witnesses, associates) 
associated with immigration enforcement activities or law enforcement 
investigations/activities conducted by ICE, the former Immigration and 
Naturalization Service, or the former U.S. Customs Service; (2) 
individuals associated with law enforcement investigations or 
activities conducted by other Federal, State, Tribal, territorial, 
local or foreign agencies where there is a potential nexus to ICE's law 
enforcement and immigration enforcement responsibilities or homeland 
security in general; (3) individuals known or appropriately suspected 
to be or have been engaged in conduct constituting, in preparation for, 
in aid of, or related to terrorism; (4) individuals involved in, 
associated with, or who have reported suspicious activities, threats, 
or other incidents reported by domestic and foreign government 
agencies, multinational or non-governmental organizations, critical 
infrastructure owners and operators, private sector entities and 
organizations, and individuals; (5) individuals who are the subjects of 
or otherwise identified in classified or unclassified intelligence 
reporting received or reviewed by ICE; and (6) individuals who are 
known or suspected gang members or associates, including records 
maintained in the ICEGangs system.
    IIRS includes an information technology system known as the 
Intelligence Fusion System (IFS). In addition to the categories of 
individuals listed above, IFS also includes the following: (1) 
Individuals identified in law enforcement, intelligence, crime, and 
incident reports (including financial reports under the Bank Secrecy 
Act and law enforcement bulletins) produced by DHS and other government 
agencies; (2) individuals identified in U.S. visa, border, immigration 
and naturalization benefit data, including arrival and departure data; 
(3) individuals identified in DHS law enforcement and immigration 
records; (4) individuals not authorized to work in the United States; 
(5) individuals whose passports have been lost or stolen; and (6) 
individuals identified in public news reports.

CATEGORIES OF RECORDS IN THE SYSTEM:
    Categories of records in this system include: (1) Biographic 
information (name, date of birth, social security number, alien 
registration number, citizenship/immigration status, passport 
information, addresses, phone numbers, etc.); (2) Records of 
immigration enforcement activities or law enforcement investigations/
activities conducted by ICE, the former Immigration and Naturalization 
Service, or the former U.S. Customs Service; (3) Information (including 
documents and electronic data) collected by DHS from or about 
individuals during investigative activities and border searches; (4) 
Records of immigration enforcement activities and law enforcement 
investigations/activities that have a possible nexus to ICE's law 
enforcement and immigration enforcement responsibilities or homeland 
security in general; (5) Law enforcement, intelligence, crime, and 
incident reports (including financial reports under the Bank Secrecy 
Act and law enforcement bulletins) produced by DHS and other government 
agencies; (6) U.S. visa, border immigration and naturalization benefit 
data, including arrival and departure data; (7) Terrorist watchlist 
information and other terrorism related information regarding threats, 
activities, and incidents; (8) Lost and stolen passport data; (9) 
Records pertaining to known or suspected terrorists, terrorist 
incidents, activities, groups, and threats; (10) ICE-generated 
intelligence requirements, analysis, reporting, and briefings; (11) 
Third party intelligence reporting; (12) Articles, public-source data, 
and other published information on individuals and events of interest 
to ICE; (13) Records and information from government data systems or 
retrieved from commercial data providers in the course of intelligence 
research, analysis and reporting; (14) Reports of suspicious 
activities, threats, or other incidents generated by ICE and third 
parties; and (15) Additional information about known and suspected gang 
members and associates such as biographic information (name, date of 
birth, etc.), immigration status, gang affiliation, physical 
description, government-issued identification numbers, photos of the 
individual, identities of gang associates, field interview notes, and 
criminal history information.

AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
    5 U.S.C. 301; 8 U.S.C. 1103, 1105, 1225(d)(3), 1324(b)(3), 1357(a), 
and 1360(b); 19 U.S.C. 1 and 1509.

PURPOSE(S):
    The purpose of this system is:
    (a) To maintain records that reflect and generally support ICE's 
collection, analysis, reporting, and distribution of law enforcement, 
immigration administration, terrorism, intelligence, and homeland 
security information in support of ICE's law enforcement and 
immigration administration mission.
    (b) To produce law-enforcement intelligence reporting that provides 
actionable information to ICE's law enforcement and immigration 
administration personnel and to other appropriate government agencies.
    (c) To enhance the efficiency and effectiveness of the research and 
analysis process for DHS law enforcement, immigration, and intelligence 
personnel through information technology tools that provide for 
advanced search and analysis of various datasets.
    (d) To facilitate multi-jurisdictional informational exchange 
between ICE and other law enforcement agencies regarding known and 
suspected gang members and associates; and
    (e) To identify potential criminal activity, immigration 
violations, and threats to homeland security; to uphold and enforce the 
law; and to ensure public safety.

ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES 
OF USERS AND THE PURPOSES OF SUCH USES:
    In addition to those disclosures generally permitted under 5 U.S.C. 
552a(b) of the Privacy Act, all or a portion of the records or 
information contained in this system may be disclosed outside DHS as a 
routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:
    A. To the Department of Justice or other Federal agency conducting 
litigation or in proceedings before any court, adjudicative or 
administrative body, when (1) DHS or any component thereof; (2) any 
employee of DHS in his/her official capacity; (3) any employee of DHS 
in his/her individual capacity where DOJ or DHS has agreed to represent 
the employee; or (4) the United States or any agency thereof, is a 
party to the litigation or has an interest in such litigation; and DHS 
determines that the records are both relevant and necessary to the 
litigation and the use of such records is compatible with the purpose 
for which DHS collected the records.
    B. To the Department of Justice (DOJ), Civil Rights Division, for 
the purpose of responding to matters within the DOJ's jurisdiction to 
include allegations of fraud and/or nationality discrimination.

[[Page 9236]]

    C. To a congressional office from the record of an individual in 
response to an inquiry from that congressional office made at the 
request of the individual to whom the record pertains.
    D. To the National Archives and Records Administration or other 
Federal government agencies pursuant to records management inspections 
being conducted under the authority of 44 U.S.C. 2904 and 2906.
    E. To an agency, organization, or individual for the purpose of 
performing audit or oversight operations as authorized by law, but only 
such information as is necessary and relevant to such audit or 
oversight function.
    F. To appropriate agencies, entities, and persons when: (1) DHS 
suspects or has confirmed that the security or confidentiality of 
information in the system of records has been compromised; (2) the 
Department has determined that as a result of the suspected or 
confirmed compromise there is a risk of harm to economic or property 
interests, identity theft or fraud, or harm to the security or 
integrity of this system or other systems or programs (whether 
maintained by DHS or another agency or entity) that rely upon the 
compromised information, or harm to an individual; and (3) the 
disclosure made to such agencies, entities, and persons is reasonably 
necessary to assist in connection with DHS's efforts to respond to the 
suspected or confirmed compromise and prevent, minimize, or remedy such 
harm.
    G. To contractors and their agents, grantees, experts, consultants, 
and others performing or working on a contract, service, grant, 
cooperative agreement, or other assignment for DHS, when necessary to 
accomplish an agency function related to this system of records. 
Individuals provided information under this routine use are subject to 
the same Privacy Act requirements and limitations on disclosure as are 
applicable to DHS officers and employees.
    H. To a Federal, State, territorial, Tribal, local, international, 
or foreign government agency or entity for the purpose of consulting 
with that agency or entity: (1) To assist in making a determination 
regarding redress for an individual in connection with the operations 
of a DHS component or program; (2) for the purpose of verifying the 
identity of an individual seeking redress in connection with the 
operations of a DHS component or program; or (3) for the purpose of 
verifying the accuracy of information submitted by an individual who 
has requested such redress on behalf of another individual.
    I. To a former employee of DHS, in accordance with applicable 
regulations, for purposes of responding to an official inquiry by a 
Federal, State or local government entity or professional licensing 
authority; or facilitating communications with a former employee that 
may be necessary for personnel-related or other official purposes where 
the Department requires information or consultation assistance from the 
former employee regarding a matter within that person's former area of 
responsibility.
    J. To an appropriate Federal, State, local, Tribal, foreign, or 
international agency, if the information is relevant and necessary to 
the agency's decision concerning the hiring or retention of an 
individual or the issuance, grant, renewal, suspension or revocation of 
a security clearance, license, contract, grant, or other benefit; or if 
the information is relevant and necessary to a DHS decision concerning 
the hiring or retention of an employee, the issuance of a security 
clearance, the reporting of an investigation of an employee, the 
letting of a contract, or the issuance of a license, grant or other 
benefit and when disclosure is appropriate to the proper performance of 
the official duties of the person receiving the information.
    K. To appropriate Federal, State, local, Tribal, or foreign 
governmental agencies or multilateral governmental organizations for 
the purpose of protecting the vital interests of a data subject or 
other persons, including to assist such agencies or organizations in 
preventing exposure to or transmission of a communicable or 
quarantinable disease or to combat other significant public health 
threats; appropriate notice will be provided of any identified health 
risk.
    L. To a public or professional licensing organization when such 
information indicates, either by itself or in combination with other 
information, a violation or potential violation of professional 
standards, or reflects on the moral, educational, or professional 
qualifications of an individual who is licensed or who is seeking to 
become licensed.
    M. To a Federal, State, Tribal, local or foreign government agency 
or organization, or international organization, lawfully engaged in 
collecting law enforcement intelligence information, whether civil or 
criminal, or charged with investigating, prosecuting, enforcing or 
implementing civil or criminal laws, related rules, regulations or 
orders, to enable these entities to carry out their law enforcement 
responsibilities, including the collection of law enforcement 
intelligence.
    N. To appropriate Federal, State, local, Tribal, or foreign 
governmental agencies or multilateral governmental organizations 
responsible for investigating or prosecuting the violations of, or for 
enforcing or implementing, a statute, rule, regulation, order, license, 
or treaty where DHS determines that the information would assist in the 
enforcement of civil, criminal, or regulatory laws.
    O. To third parties during the course of an investigation by DHS, a 
proceeding within the purview of the immigration and nationality laws, 
or a matter under DHS's jurisdiction, to the extent necessary to obtain 
information pertinent to the investigation, provided disclosure is 
appropriate to the proper performance of the official duties of the 
officer making the disclosure.
    P. To a Federal, State, or local agency, or other appropriate 
entity or individual, or through established liaison channels to 
selected foreign governments, in order to provide intelligence, 
counterintelligence, or other information for the purposes of 
intelligence, counterintelligence, or antiterrorism activities 
authorized by U.S. law, Executive Order, or other applicable national 
security directive.
    Q. To Federal and foreign government intelligence or 
counterterrorism agencies when DHS reasonably believes there to be a 
threat or potential threat to national or international security for 
which the information may be useful in countering the threat or 
potential threat, when DHS reasonably believes such use is to assist in 
anti-terrorism efforts, and disclosure is appropriate to the proper 
performance of the official duties of the person making the disclosure.
    R. To an organization or individual in either the public or private 
sector, either foreign or domestic, where there is a reason to believe 
that the recipient is or could become the target of a particular 
terrorist activity or conspiracy, to the extent the information is 
relevant to the protection of life or property and disclosure is 
appropriate to the proper performance of the official duties of the 
person making the disclosure.
    S. To international and foreign governmental authorities in 
accordance with law and formal or informal international agreements.
    T. To the Department of State in the processing of petitions or 
applications for benefits under the Immigration and Nationality Act, 
and all other immigration and nationality laws

[[Page 9237]]

including treaties and reciprocal agreements.
    U. To appropriate Federal, State, local, Tribal, or foreign 
governmental agencies or multilateral governmental organizations where 
DHS is aware of a need to utilize relevant data for purposes of testing 
new technology and systems designed to enhance national security or 
identify other violations of law.
    V. To appropriate Federal, State, local, Tribal, or foreign 
government agencies or multinational government organizations where DHS 
desires to exchange relevant data for the purpose of developing new 
software or implementing new technologies for the purposes of data 
sharing to enhance homeland security, national security or law 
enforcement.
    W. To a criminal, civil, or regulatory law enforcement authority 
(whether Federal, State, local, territorial, Tribal, international or 
foreign) where the information is necessary for collaboration, 
coordination and de-confliction of investigative matters, to avoid 
duplicative or disruptive efforts and for the safety of law enforcement 
officers who may be working on related investigations.
    X. To the news media and the public, with the approval of the Chief 
Privacy Officer in consultation with counsel, when there exists a 
legitimate public interest in the disclosure of the information or when 
disclosure is necessary to preserve confidence in the integrity of DHS 
or is necessary to demonstrate the accountability of DHS's officers, 
employees, or individuals covered by the system, except to the extent 
it is determined that release of the specific information in the 
context of a particular case would constitute an unwarranted invasion 
of personal privacy.

DISCLOSURE TO CONSUMER REPORTING AGENCIES:
    None.

POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING, 
AND DISPOSING OF RECORDS IN THE SYSTEM:
STORAGE:
    Records in this system are stored electronically or on paper in 
secure facilities in a locked drawer behind a locked door. The records 
are stored on magnetic disc, tape, digital media, and CD-ROM.

RETRIEVABILITY:
    Records may be retrieved by personal identifiers such as but not 
limited to name, alien registration number, phone number, address, 
social security number, or passport number. Records may also be 
retrieved by non-personal information such as transaction date, entity/
institution name, description of goods, value of transactions, and 
other information.

SAFEGUARDS:
    Records in this system are safeguarded in accordance with 
applicable rules and policies, including all applicable DHS automated 
systems security and access policies. Strict controls have been imposed 
to minimize the risk of compromising the information that is being 
stored. Access to the computer system containing the records in this 
system is limited to those individuals who have a need to know the 
information for the performance of their official duties and who have 
appropriate clearances or permissions. The system maintains a real-time 
auditing function of individuals who access the system. Additional 
safeguards may vary by component and program.

RETENTION AND DISPOSAL:
    ICE is in the process of drafting a proposed record retention 
schedule for the information maintained in IIRS, including system 
information stored in IFS. ICE anticipates retaining the records from 
other databases in IFS for 20 years, records for which IFS is the 
repository of record for 75 years, and ICE-generated intelligence 
reports for 75 years. The original electronic data containing the 
inputs to IFS will be destroyed after upload and verification or 
returned to the source.
    ICE is in the process of drafting a proposed record retention 
schedule for the information maintained in ICEGangs. ICE anticipates 
retaining ICEGangs records for five years from the date the record was 
last accessed.

SYSTEM MANAGER AND ADDRESS:
    Director, ICE Office of Intelligence, 500 12th Street, SW., 
Washington, DC 20536.

NOTIFICATION PROCEDURE:
    The Secretary of Homeland Security has exempted this system from 
the notification, access, and amendment procedures of the Privacy Act 
because it is a law enforcement system. However, ICE will consider 
individual requests to determine whether or not information may be 
released. Thus, individuals seeking notification of and access to any 
record contained in this system of records, or seeking to contest its 
content, may submit a request in writing to the component's FOIA 
Officer, whose contact information can be found at http://www.dhs.gov/foia under ``contacts.'' If an individual believes more than one 
component maintains Privacy Act records concerning him or her the 
individual may submit the request to the Chief Privacy Officer, 
Department of Homeland Security, 245 Murray Drive, SW., Building 410, 
STOP-0550, Washington, DC 20528.
    When seeking records about yourself from this system of records or 
any other Departmental system of records your request must conform with 
the Privacy Act regulations set forth in 6 CFR Part 5. You must first 
verify your identity, meaning that you must provide your full name, 
current address and date and place of birth. You must sign your 
request, and your signature must either be notarized or submitted under 
28 U.S.C. 1746, a law that permits statements to be made under penalty 
or perjury as a substitute for notarization. While no specific form is 
required, you may obtain forms for this purpose form the Director, 
Disclosure and FOIA, http://www.dhs.gov or 1-866-431-0486. In addition 
you should provide the following:
     An explanation of why you believe the Department would 
have information on you,
     Identify which component(s) of the Department you believe 
may have the information about you,
     Specify when you believe the records would have been 
created,
     Provide any other information that will help the FOIA 
staff determine which DHS component agency may have responsive records,
     If your request is seeking records pertaining to another 
living individual, you must include a statement from that individual 
certifying his/her agreement for you to access his/her records.
    Without this bulleted information the component(s) will not be able 
to conduct an effective search, and your request may be denied due to 
lack of specificity or lack of compliance with applicable regulations.

RECORD ACCESS PROCEDURES:
    See ``Notification procedure'' above.

CONTESTING RECORD PROCEDURES:
    See ``Notification procedure'' above.

RECORD SOURCE CATEGORIES:
    Federal, State, local, territorial, Tribal or other domestic 
agencies, foreign agencies, multinational or non-governmental 
organizations, critical infrastructure owners and operators, private 
sector entities and organizations, individuals, commercial data 
providers, and public sources such as news media outlets and the 
Internet.

[[Page 9238]]

EXEMPTIONS CLAIMED FOR THE SYSTEM:
    Pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act, 
portions of this system are exempt from 5 U.S.C. 552a(c)(3) and (4); 
(d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(5) and (e)(8); 
(f); and (g). Pursuant to 5 U.S.C. 552a (k)(2), this system is exempt 
from the following provisions of the Privacy Act, subject to the 
limitations set forth in those subsections: 5 U.S.C. 552a(c)(3), (d), 
(e)(1), (e)(4)(G), (e)(4)(H), and (f).

    Dated: February 24, 2010.
Mary Ellen Callahan,
Chief Privacy Officer, Department of Homeland Security.
[FR Doc. 2010-4102 Filed 2-26-10; 8:45 am]
BILLING CODE 9111-28-P