U.S. Department Of The Interior PRIVACY IMPACT ASSESSMENT

3y ago
66 Views
2 Downloads
477.53 KB
24 Pages
Last View : 10d ago
Last Download : 3m ago
Upload by : Francisco Tran
Transcription

U.S. Department of the InteriorPRIVACY IMPACT ASSESSMENTIntroductionThe Department of the Interior requires PIAs to be conducted and maintained on all IT systemswhether already in existence, in development or undergoing modification in order to adequatelyevaluate privacy risks, ensure the protection of privacy information, and consider privacyimplications throughout the information system development life cycle. This PIA form may notbe modified and must be completed electronically; hand-written submissions will not beaccepted. See the DOI PIA Guide for additional guidance on conducting a PIA or meeting therequirements of the E-Government Act of 2002. See Section 6.0 of the DOI PIA Guide forspecific guidance on answering the questions in this form.NOTE: See Section 7.0 of the DOI PIA Guide for guidance on using the DOI Adapted PIAtemplate to assess third-party websites or applications.Name of Project: Digital Evidence Management System (DEMS)Bureau/Office: Department of the InteriorDepartment wide PIA for digital evidence management support law enforcement use of bodyworn camera, closed circuit television, and other digital evidence.Date: March 12, 2021Point of Contact:Name: Felix UribeTitle: NPS Associate Privacy OfficerEmail: nps privacy@nps.govPhone: 202-354-6925Address: 12201 Sunrise Valley Drive, Reston VA 20192Section 1. General System InformationA. Is a full PIA required? Yes, No:information is collected from or maintained on Members of the general public Federal personnel and/or Federal contractors Volunteers AllInformation is NOT collected, maintained, or used that is identifiable to theindividual in this system. Only sections 1 and 5 of this form are required to becompleted.

Digital Evidence Management System (DEMS)Privacy Impact AssessmentB. What is the purpose of the system?The Digital Evidence Management System (DEMS) is an enterprise,commercial-off-the-shelf,end-to-end law enforcement camera and digitalevidence management system. Body worn cameras, dash-mounted vehiclecameras, handheld cameras, and closed circuit television are camera systemscurrently used by law enforcement officers in the performance of their duties.Still images and other digital evidence are also obtained and collected from thepublic as evidence during an investigation. Digital evidence can come from anumber of sources and is not limited to body worn cameras. The DEMS willprovide an integrated system of cameras, compatible software and mobileapplications to enable law enforcement officers to download, catalogue, tag,manage, and store the digital evidence in a FedRAMP approved, cloud-storagesystem.The system includes: Collecting and uploading content in any file format, from any device; Transferring the data by automatically uploading content frombody worn cameradevices and hard drives; Managing - Keep information organized and tag it with the correct metadata; Retrieving - Find evidence quickly with search features; Sharing - Grant access to authorized persons, like prosecutors, or sharecontent with a secure link; Scalable - Increase storage space as needed; Effortlessly tag video with correct metadata; Integrating with bureau computer-aided dispatch and the DOI IncidentManagement,Analysis and Reporting System (IMARS) recordsmanagement system through automation of the process of taggingvideos with complete, correct metadata; Ensure evidence receives the appropriate automatic retention period; and Redact data in response to Freedom of Information Act requests for information.DEMS may use mobile applications designed to upload video, photo, and audiorecordings captured on the users’ mobile devices (smartphone and tablets)directly into a secure cloud- based metadata storage system. They also allow anagency to register, assign, and reassign DEMS devices and allow a user towirelessly interact with a camera to view recorded videos, preview live videocapture, and apply metadata to video files. Bureaus using the DEMS may or maynot make use of the mobile applications as part of the law enforcement activities.DEMS Mobile application should only be installed and utilized on DOIgovernment issued mobile devices used for law enforcement purposes. Thesedevices meet DOI requirements for IT security protection.2

Digital Evidence Management System (DEMS)Privacy Impact AssessmentC. What is the legal authority?DOI authorities: Uniform Federal Crime Reporting Act, 28 U.S.C. 534; IntelligenceReformand Terrorism Prevention Act of 2004 (Pub. L. 108–458); Homeland SecurityAct of 2002 (Pub. L. 107–296); USA PATRIOT ACT of 2001 (Pub. L. 107–56); USAPATRIOT Improvement Act of 2005 (Pub. L. 109–177); Homeland Security PresidentialDirective 7—Critical Infrastructure Identification, Prioritization, and Protection;Homeland Security Presidential Directive 12—Policy for a Common IdentificationStandard for Federal Employeesand Contractors; Criminal Intelligence SystemsOperating Policies, 28 CFR part 23.National Park Service U.S. Park Rangers, U.S. Park Police: 54 U.S.C. 100101, 54 U.S.Code § 102701; Federal Register 44876 (October 13, 1976)); Act of August 5, 1882 (22 Stat.243); Act of March 17, 1948 (62 Stat. 81) (Also codified as D.C. Code § 5-201 et seq).Bureau of Land Management: 43 USC 1733 – Enforcement Authority – Federal Land Policy&Management Act of 1976 (a); The Wild Free-Roaming Horse and Burro Act (16 U.S.C1331-1340) may be enforced only by special agents and must be done in cooperation withtheBureau of Land Management.Fish and Wildlife Service: Lacey Act and Lacey Act Amendments of 1981 (18 U.S.C. 42, 16U.S.C. 3371-3378); Migratory Bird Treaty Act (16 U.S.C. 703-711); Upper MississippiRiver Wildlife and Fish Refuge Act (16 U.S.C. 721-731); Bear River Migratory Bird RefugeAct (16 U.S.C. 690-690i); Migratory Bird Hunting and Conservation Stamp Act (16 U.S.C.718-718h and 718j); Bald and Golden Eagle Protection Act (16 U.S.C. 668-668d); Fish andWildlife Actof 1956 (16 U.S.C. 742a-742d and 742e-j-2) (includes airborne huntingprohibitions); Fish and Wildlife Improvement Act of 1978 (16 U.S.C. 712); Fish andWildlife Recreation Act (16 U.S.C. 460k-460k-3); National Wildlife Refuge SystemAdministration Act (16 U.S.C. 668dd-668ee); Endangered Species Act (16 U.S.C. 15311544); Marine Mammal Protection Act (16 U.S.C. 1361-1384, 1401-1407); AntarcticConservation Act of 1978 (16 U.S.C. 2401; 2412); Archaeological Resources Protection Act(16 U.S.C. 470aa-11); African Elephant Conservation Act (16 U.S.C. 201-4244); Wild BirdConservation Act (16 U.S.C. 4901-4916);Rhinoceros and Tiger Conservation Act (16U.S.C. 5301-5306).Bureau of Indian Affairs: 25 U.S. Code § 2803 - Law enforcement authority;Tribal Law and Order Act of 2010 (Pub. L. 111-211).D. Why is this PIA being completed or modified? New Information SystemNew Electronic CollectionExisting Information System under Periodic Review3

Digital Evidence Management System (DEMS)Privacy Impact Assessment Merging of SystemsSignificantly Modified Information SystemConversion from Paper to Electronic RecordsRetiring or Decommissioning a SystemOther:E. Is this information system registered in CSAM? Yes: Enter the UII Code and the System Security Plan (SSP) Name(UII): 010-000002392 00-24-01-02-02-00Digital Evidence Management System (BWC-DEMS) Security Plan NoF. List all minor applications or subsystems that are hosted on this system and coveredunder this privacy impact assessment.SubsystemNamePurposeContains PII(Yes/No)AxonViewAxon View is a mobile application formobiledevices (smartphones and tablets)that allows an agency user to wirelesslyinteract with a camera to view recordedvideos, preview livevideo capture, andapply metadata to video files. Itwirelessly connects with a camera toprovide instant playback of unfoldingevents in the field. The user of theapplication sees what the camera sees.YesThe Axon View application falls withinthe DEMS security boundary. A separatePrivacyThreshold Analysis (PTA) hasbeen conducted for this application.The Axon View mobile application shouldonly be uploaded and utilized ongovernmentissued mobile devices. Thesedevices meet DOI requirements for ITsecurity protection.4DescribeIf Yes, provide adescription.Axon View does notretain PII or video fileson the mobile device,but only views videostored on a pairedcamera. It cannottransfer, delete or alteroriginal video files thatare stored on a camera.Physical access to thecamera is required toinitiate pairing withAxon View andrequires persistent closeproximity to a camerato providefunctionality.

Digital Evidence Management System (DEMS)Privacy Impact AssessmentSubsystemNamePurposeContains PII(Yes/No)AxonCaptureAxon Capture is a mobile application formobile devices (smartphones) that allowsan agency user to upload video, photo,and audiorecordings captured on theusers’ smartphone directly toEvidence.com, the secure cloud- basedmetadata storage system. Rather thanutilizing a separate recording device, suchas abody-worn camera or in-vehiclecamera, Axon Capture uses the recordingcapabilitiesof the smartphone.YesThe user must be signed into an agencyprior to uploading the digital data to theirEvidence.com tenant. The evidence willbe stored in the Axon Capture applicationbeforebeing uploaded to Evidence.com.Once the user has the feature enabled intheir Axon Capture settings, the user canimport video, photo, and audio data fromtheir smartphone digital library or thedefault repository on their device toAxon Capture, where it can then beuploaded into the user’s Evidence.comtenant. The Capture application allowsthe user to add tags, titles, or GPScoordinates to any recording prior touploading the data directly intoEvidence.com.The Axon View application falls withinthe DEMS security boundary. A separatePrivacyThreshold Analysis (PTA) hasbeen conducted for this application.The Axon Capture mobile applicationshouldonly be uploaded and utilized ongovernmentissued smartphones. Thesedevices meet DOIrequirements for ITsecurity protection.5DescribeIf Yes, provide adescription.The Axon Captureapplication allows theuser to capture, store,process, and uploadvideo/audio data,which may containPII, from the user’sgovernment issuedmobile device. Ratherthan use a separatecamera device, such asa body worn cameraor in- vehicle camera,to capturedigital data,the user’s governmentissued mobiledevice isthe camera.

Digital Evidence Management System (DEMS)Privacy Impact AssessmentSubsystemNamePurposeContains PII(Yes/No)AxonDeviceManagerAxon Device Manager (ADM) is amobile application for mobile devices(smartphones and tablets) that allows anagency user to register, assign, andreassign Axon devices. In order to usethe ADM application, the role of the userin Evidence.com must have a DeviceAdministration permission, or ConductedElectrical Weapons (CEW)Administration permission, or bothpermissions set to ‘Allowed’ to use theADM application. Though ADM is thepreferred method for registering,assigning, and reassigning Axon devices,devices can also be registered, assigned,and reassigned directly inEvidence.com.NoThe Axon View application falls withinthe DEMS security boundary. A separatePrivacyThreshold Analysis (PTA) hasbeen conducted for this application.DescribeIf Yes, provide adescription.ADM does not create,collect, use, process,maintain ordisseminate PII orspecific informationabout individuals. TheADM application isused to register,assign, or reassignAxon devices whichdo collect, use,process, maintain, anddisseminate PII, butdoesnot itself collect,process,store, orinterface withany of this collecteddata.The Axon Device Manager mobileapplicationshould only be uploaded andutilized on government issued mobiledevices. These devices meet DOIrequirements for IT security protection.G. Does this information system or electronic collection require a published Privacy ActSystem of Records Notice (SORN)? Yes: List Privacy Act SORN Identifier(s)DOI-10, Incident Management, Analysis and Reporting System (IMARS), 79 FR 31974, June 3,2014. No6

Digital Evidence Management System (DEMS)Privacy Impact AssessmentH. Does this information system or electronic collection require an OMB ControlNumber? Yes: NoDescribeSection 2. Summary of System DataA. What PII will be collected? Indicate all that apply. Name Citizenship Gender Birth Date Group Affiliation Marital Status Biometrics Other Names Used Truncated SSN Legal Status Place of Birth Religious Preference Security Clearance Spouse Information Financial Information Medical Information Disability Information Credit Card Number Law Enforcement Education Information Emergency Contact Driver’s License Other: Social Security Number (SSN) Personal Cell Telephone Number Tribal or Other ID Number Personal Email Address Mother’s Maiden Name Home Telephone Number Child or Dependent Information Employment Information Military Status/Service Mailing/Home Address Race/EthnicityDigital evidence includes audio, video, still images, or other media that has beencaptured in the normal course of law enforcement duties. PII is captured on law enforcementcamera systems when the recording device is activated during law enforcement citizeninteractions. Data recorded is directly related to law enforcement activities and emergencyresponse, and may include video images of people, driver licenses, personal informationverbally requested for the purposes of violation notices and/or arrests during a lawfulcontact, and criminal history information provided over the radio by the dispatchcommunications center. Information may also be obtained from publicly available sites,witnesses, concerned citizens, and the general public’s personally owned devices. Digitalevidence may be associated with PII collected by lawenforcement officials while takingstatements or during the course of an investigation and may include the followinginformation: Social Security numbers (SSNs), driver’s license numbers, vehicleidentification numbers, license plate numbers, names, home addresses, work addresses,telephone numbers, email addresses and other contact information, emergency contactinformation, ethnicity and race, tribal identification numbers or other tribal enrollment data,work history, educational history, affiliations, and other related data, dates of birth, places ofbirth, passport numbers, gender, fingerprints, hair and eye color, and any other physical ordistinguishing attributes of an individual. Victim, juvenile, witness, criminal, and informantinformation may be captured. The system contains images and videos collected fromaudio/visual recording devices such as surveillance cameras, closed circuit televisionlocated at DOI facilities for security and/or law enforcement operations, a mobile video7

Digital Evidence Management System (DEMS)Privacy Impact Assessmentrecorder installed on a patrol vehicle and a wearable video recorder (i.e., body-worncameras) or a DEMS mobile application authorized for law enforcement operations.B. What is the source for the PII collected? Indicate all that apply. Individual Federal agency Tribal agency Local agency DOI records Third party source State agency Other: PII is captured on law enforcement camera systems when the recording deviceisactivated during law enforcement citizen interactions. Data recorded is directly related tolaw enforcement activities and emergency response, and may include video images ofpeople, driver licenses, personal information verbally requested for the purposes of violationnotices and/or arrests during a lawful contact, and criminal history information provided overthe radio by the dispatch communications center. Information may also be obtained frompublicly available websites, witnesses, concerned citizens, and the general public providingimages and recordingsfrom their personally owned devices.C. How will the information be collected? Indicate all that apply. Paper Format Email Face-to-Face Contact Web site Fax Telephone Interview Information Shared Between Systems Other: Digital audio/video format dependent onthe device.Data feeds will be established using application programming interface (API) toexchange data between computer aided dispatch systems and department recordsmanagement system (IMARS).D. What is the intended use of the PII collected?PII is used for official law enforcement purposes. The system provides lawenforcement employees mobile video recording capability (body cameras, in-carcameras, CCTV) to document officer-citizen encounters while engaged in patrolfunctions. Digital evidence is used in law enforcement activities on lands/areasgoverned by the DOI as well as tribal lands. It is used to support the investigationand prosecution of criminal activity and violation of laws on DOI lands and/or8

Digital Evidence Management System (DEMS)Privacy Impact Assessmentagainst DOI personnel.E. With whom will the PII be shared, both within DOI and outside DOI? Indicate all thatapply. Within the Bureau/Office:Describe the bureau/office and how the data will be used.PII is shared within Bureaus for investigation, apprehension, recordkeeping, and possiblearrestand/or conviction of crimes committed on DOI properties. Other Bureaus/Offices:Describe the bureau/office and how the data will be used.PII is shared within DOI Office of Law Enforcement and Security (OLES) and other DOIBureaus for investigation, apprehension, recordkeeping, and possible arrest and/orconviction ofcrimes committed on DOI properties. Other Federal Agencies:Describe the federal agency and how the data will be used.PII is shared with other Law Enforcement agencies for investigation, apprehension,recordkeeping, and possible arrest and/or conviction of crimes committed on DOIproperties. Information may also be shared between DOI Law Enforcement and otherFederal agencies as authorized and described in the routine uses published in the DOI-10IMARS system of recordsnotice, which may be viewed at:https://www.doi.gov/privacy/sorn. Tribal, State or Local Agencies: Describe the Tribal, state or local agencies and how thedata will be used.PII is shared with Tribes for investigation, apprehension, recordkeeping, and possible arrestand/orconviction of crimes committed on DOI properties which might include Tribal lands.Informationmay be shared with Local agencies for law enforcement purposes. For examplesome National Parks use CCTV and may share data with local law enforcement depending onthe nature of the event and who has jurisdiction. Contractor: Describe the contractor and how the data will be used.PII is shared with DOI contractors to facilitate system operation. Other ThirdParty Sources: Describe the third party source and how the data will be used.PII is shared with attorneys or court staff for judicial reasons. Information may also beshared with other third parties as authorized and described in the routine uses published inthe DOI-10IMARS system of records notice, which may be viewed at:https://www.doi.gov/privacy/sorn.F. Do individuals have the opportunity to decline to provide information or to consent tothe specific uses of their PII? Yes:Describe the method by which individuals can decline to provide information orhow individuals consent to specific uses.9

Digital Evidence Management System (DEMS)Privacy Impact Assessment No:State the reason why individuals cannot object or why individuals cannot give orwithhold their consent.Due to the purpose and nature of the system, to support law enforcement operations andinvestigations, individuals generally will not have the opportunity to consent to thecollection or use of the recording of their images or activities. For use of audio and visualrecordings, individuals who enter on Federal properties and public areas do not have areasonable expectation of privacy. Some DOI controlled areas may have signs posted thatinform individuals of surveillance activities, but in many cases notice may not be pro

U.S. Department of the Interior PRIVACY IMPACT ASSESSMENT Introduction The Department of the Interior requires PIAs to be conducted and maintained on all IT systems whether already in existence, in development or undergoing modification in order to adequately evaluate privacy risks, ensure the protection of privacy information, and consider privacy

Related Documents:

May 02, 2018 · D. Program Evaluation ͟The organization has provided a description of the framework for how each program will be evaluated. The framework should include all the elements below: ͟The evaluation methods are cost-effective for the organization ͟Quantitative and qualitative data is being collected (at Basics tier, data collection must have begun)

Silat is a combative art of self-defense and survival rooted from Matay archipelago. It was traced at thé early of Langkasuka Kingdom (2nd century CE) till thé reign of Melaka (Malaysia) Sultanate era (13th century). Silat has now evolved to become part of social culture and tradition with thé appearance of a fine physical and spiritual .

On an exceptional basis, Member States may request UNESCO to provide thé candidates with access to thé platform so they can complète thé form by themselves. Thèse requests must be addressed to esd rize unesco. or by 15 A ril 2021 UNESCO will provide thé nomineewith accessto thé platform via their émail address.

̶The leading indicator of employee engagement is based on the quality of the relationship between employee and supervisor Empower your managers! ̶Help them understand the impact on the organization ̶Share important changes, plan options, tasks, and deadlines ̶Provide key messages and talking points ̶Prepare them to answer employee questions

Dr. Sunita Bharatwal** Dr. Pawan Garga*** Abstract Customer satisfaction is derived from thè functionalities and values, a product or Service can provide. The current study aims to segregate thè dimensions of ordine Service quality and gather insights on its impact on web shopping. The trends of purchases have

Chính Văn.- Còn đức Thế tôn thì tuệ giác cực kỳ trong sạch 8: hiện hành bất nhị 9, đạt đến vô tướng 10, đứng vào chỗ đứng của các đức Thế tôn 11, thể hiện tính bình đẳng của các Ngài, đến chỗ không còn chướng ngại 12, giáo pháp không thể khuynh đảo, tâm thức không bị cản trở, cái được

Le genou de Lucy. Odile Jacob. 1999. Coppens Y. Pré-textes. L’homme préhistorique en morceaux. Eds Odile Jacob. 2011. Costentin J., Delaveau P. Café, thé, chocolat, les bons effets sur le cerveau et pour le corps. Editions Odile Jacob. 2010. Crawford M., Marsh D. The driving force : food in human evolution and the future.

Le genou de Lucy. Odile Jacob. 1999. Coppens Y. Pré-textes. L’homme préhistorique en morceaux. Eds Odile Jacob. 2011. Costentin J., Delaveau P. Café, thé, chocolat, les bons effets sur le cerveau et pour le corps. Editions Odile Jacob. 2010. 3 Crawford M., Marsh D. The driving force : food in human evolution and the future.