1 Information Sharing Environment (ISE) Privacy Guidelines Jane Horvath Chief Privacy and Civil Liberties Officer.

Slides:



Advertisements
Similar presentations
Thematic Discussion on Human Rights & Resolution 1373 Counter-Terrorism Committee Executive Directorate (CTED) United Nations New York, 7 October 2010.
Advertisements

USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Overview of the Privacy Act
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
Building a Medical Records Compliance Program for Your Office: Charles B. Brownlow, OD, FAAO December 17, 2012.
Service Provider Title VI Training Civil Rights Act of 1964 Presented By: Tennessee Department of Intellectual and Developmental Disabilities.
IS 700.a NIMS An Introduction. The NIMS Mandate HSPD-5 requires all Federal departments and agencies to: Adopt and use NIMS in incident management programs.
The Department of Defense Intelligence Oversight Program
2010 Region II Conference Corporate Compliance Panel June 3, 2010
Congress and Contractor Personal Conflicts of Interest May 21, 2008 Jon Etherton Etherton and Associates, Inc.
Recently Issued OHRP Documents: Guidance on Subject Withdrawal and Draft Revised FWA Secretary’s Advisory Committee on Human Research Protections October.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
E B a n k i n g Information Security Guidelines ABA’s Technology Risk Management – A Strategic Approach Telephone/Webcast Briefing June 17, 2002.
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
Supplier Ethics: Program Checklist
Guidelines for constructing a Compliance Program for Medicaid Managed Care Organizations and PrePaid Health Plans As provided by the Medicaid Alliance.
Complying With The Federal Information Security Act (FISMA)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
District Planning Council Program Overview. District Planning Concept Local Elected Officials Emergency Managers Emergency Responders Local Business Community.
National Governor’s Association September 29-30, 2003 Salt Lake City, Utah.
Federalwide Assurance Presentation for IRB Members.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
INFORMATION SECURITY REGULATION COMPLIANCE By Insert name dd/mm/yyyy senior leadership training on the primary regulatory requirements,
An Educational Computer Based Training Program CBTCBT.
Privacy: Understanding the Needs, Policy, and Approach Owen Greenspan Director Law and Policy Program.
HIPAA PRIVACY AND SECURITY AWARENESS.
FISMA Privacy Reporting Requirements United States Pacific Command (USPACOM) FOIA & Privacy Act Conference Presented by Samuel P. Jenkins, Director for.
Developing an Effective Ethics Program
U.S. Department of Education Privacy Initiatives Kathleen M. Styles Chief Privacy Officer U.S. Department of Education April 18, 2011.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Information Sharing Challenges, Trends and Opportunities
Moving Forward With the African Dialogue Cross-Border Principles By Mary Gurure Manager, Legal Services and Compliance COMESA Competition Commission Lilongwe,
STATE OF ARIZONA BOARD OF CHIROPRACTIC EXAMINERS Mission Statement The mission of the Board of Chiropractic Examiners is to protect the health, welfare,
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
NOAA Science Advisory Board …advises the Secretary of Commerce for Oceans and Atmosphere on long- and short- range strategies for research, education,
Roadmap For An Effective Compliance And Ethics Program The Top Ten Things the Board Must Know [Name of Presenter] [Title] [Date]
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
UMBC POLICY ON ESH MANAGEMENT & ENFORCEMENT UMBC Policy #VI
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Tad and Terry Legal Issues in ILP. 28 CFR Part 23 The federal rule that governs or provides guidance for these issues. § 23.3 Applicability: These policy.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
National Information Exchange Model (NIEM) Executive Introduction November 29, 2006 Thomas O’Reilly NIEM Program Management Office.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
1 PARCC Data Privacy & Security Policy December 2013.
National Public Health Performance Standards Local Assessment Instrument Essential Service:6 Enforce Laws and Regulations that Protect Health and Ensure.
RECOMMENDATIONS OF THE GOVERNOR ’ S TASK FORCE ON CONTRACTING AND PROCUREMENT REVIEW Report Overview PD Customer Forum September 2002.
The Department of Defense Intelligence Oversight Program
Privacy Act United States Army (Managerial Training)
Presented by Eliot Christian, USGS Accessibility, usability, and preservation of government information (Section 207 of the E-Government Act) April 28,
DON Code of Privacy Act Fair Information Principles DON has devised a list of principles to be applied when handling Protected Personal Information (PPI).
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Federal Information Security Management Act (F.I.S.M.A.) [ Justin Killian ]
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
1 Vereniging van Compliance Officers The Compliance Function in Banks Amsterdam, 10 June 2004 Marc Pickeur CBFA CBFA.
1 Auditing Your Fusion Center Privacy Policy. 22 Recommendations to the program resulting in improvements Updates to privacy documentation Informal discussions.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Nassau Association of School Technologists
Roadmap For An Effective Compliance And Ethics Program
Privacy principles Individual written policies
Refuah Community Health Collaborative (RCHC) PPS
Paul T. Smith, Esq. Partner, Davis Wright Tremaine LLP
Kenya Mann Faulkner Chief Ethics & Compliance Officer April 2019
An overview of Internal Controls Structure & Mechanism
Presentation transcript:

1 Information Sharing Environment (ISE) Privacy Guidelines Jane Horvath Chief Privacy and Civil Liberties Officer U.S. Department of Justice

2 Applicability The ISE Privacy Guidelines apply to information about U.S. citizens and lawful permanent residents that is subject to information privacy or other legal protections under the U.S. Constitution and federal laws of the United States For the intelligence community, protected information includes information about “United States persons” as defined in Executive Order Protected information may also include other information that the U.S. government expressly determines—by Executive Order, international agreement, or other similar instrument— should be covered by these Guidelines

3 Governance ISE Privacy Officials Each “federal” agency’s senior official with overall agency-wide responsibility for information privacy issues shall directly oversee the agency’s implementation of and compliance with these Guidelines ISE Privacy Guidelines Committee Established by the ISE Program Manager (PM-ISE) to provide ongoing guidance on the implementation of these Guidelines, so that agencies follow consistent interpretations of applicable legal requirements, avoid duplication of effort, share best practices, and have a forum for resolving issues on an interagency basis. Chaired jointly by Jane Horvath, DOJ, and Alex Joel, Office of the Director of National Intelligence (ODNI), with membership consisting of the ISE Privacy Officials

4 Governance (continued) Privacy and Civil Liberties Oversight Board (PCLOB) The PCLOB should be consulted for ongoing advice regarding the protection of privacy and civil liberties in agencies’ development and use of the ISE. The ISE Privacy Guidelines Committee serves as a mechanism for the PCLOB to obtain information from agencies and to provide advice and guidance consistent with the PCLOB’s statutory responsibilities. The ISE Privacy Guidelines Committee works in consultation with the PCLOB

5 Governance (continued) ISE Privacy Protection Policy Each agency shall develop and implement a written ISE privacy protection policy that sets forth the mechanisms, policies, and procedures its personnel will follow in implementing these Guidelines. Agencies should consult with the ISE Privacy Guidelines Committee as appropriate in the development and implementation of such policy

6 Guidance Ambassador Thomas E. McNamara, Program Manager-ISE Office of the PM-ISE, Office of the Director of National Intelligence ISE Privacy Guidelines Committee (Meets Monthly) Model Privacy Policy Implementation Process Working Group Training and Outreach Working Group State/Local/Tribal Working Group Legal Issues Ad Hoc Group

7 Nonfederal Entities Consistent with any standards and procedures that may be issued to govern participation in the ISE by state, local, and tribal governments and private sector entities, the agencies and the PM-ISE will work with nonfederal entities seeking to access protected information through the ISE to ensure that such nonfederal entities develop and implement appropriate policies and procedures that provide protections that are at least as comprehensive as those contained in these Guidelines

8 ISE Privacy Guidelines Compliance with laws General U.S. Constitution Executive Orders Applicable laws Rules assessment Ongoing process for identifying and assessing laws, Executive Orders, and policies and procedures applicable to ISE shared protected information Identify, document, and comply with legal restrictions Adopt internal policies and procedures requiring and agency to only seek or retain protected information that is legally permissible and ensure that the protected information shared through the ISE has been lawfully obtained and can be lawfully made available through the ISE

9 ISE Privacy Guidelines (continued) Purpose specification Protected information should be shared through the ISE only if it is Terrorism information Homeland security information Law enforcement information Adopt internal polices and procedures to ensure that the agency’s access to and use of protected information available through the ISE is consistent with the authorized purpose of the ISE

10 ISE Privacy Guidelines (continued) Identification of protected information Identification and prior review Each agency shall identify its data holdings that contain protected information to be shared through the ISE Each agency shall put in place such mechanisms as may be reasonably feasible to ensure that protected information has been reviewed pursuant to the ISE Privacy Guidelines before it is made available to the ISE Notice mechanisms Each agency shall put in place a mechanism for enabling ISE participants to determine the nature of the protected information that the agency is making available to the ISE, so that such participants can handle the information in accordance with applicable legal requirements

11 ISE Privacy Guidelines (continued) Data quality Accuracy Each agency shall adopt and implement procedures, as appropriate, to facilitate the prevention, identification, and correction of any errors in protected information with the objective of ensuring that such information is accurate and has not erroneously been shared through the ISE Notice of errors Each agency shall ensure that when it determines that protected information originating from another agency may be erroneous, the potential error or deficiency will be communicated in writing to the other agency’s ISE Privacy Official

12 ISE Privacy Guidelines (continued) Data quality (continued) Procedures Each agency shall adopt and implement policies and procedures with respect to the ISE requiring the agency to Take appropriate steps when merging protected information about an individual from two or more sources to ensure that the information is about the same individual Investigate in a timely manner alleged errors and deficiencies and correct, delete, or refrain from using protected information found to be erroneous or deficient Retain protected information only so long as it is relevant and timely for appropriate use by the agency and update, delete, or refrain from using protected information that is outdated or otherwise irrelevant for such use

13 ISE Privacy Guidelines (continued) Data security Each agency shall use appropriate physical, technical, and administrative measures to safeguard protected information shared through the ISE from unauthorized access, disclosure, modification, use, or destruction

14 ISE Privacy Guidelines (continued) Accountability, enforcement, and audit Each agency shall modify existing policies and procedures or adopt new ones, as appropriate, requiring the agency to Have and enforce policies for reporting, investigating, and responding to violations of agency policies Provide training to personnel authorized to share protected information through the ISE Cooperate with audits and reviews by officials with responsibility for providing oversight Designate each agency’s ISE Privacy Official to receive reports regarding alleged errors in protected information that originate from that agency

15 ISE Privacy Guidelines (continued) Accountability, enforcement, and audit (continued) Audit Each agency shall implement adequate review and audit mechanisms to enable the agency’s ISE Privacy Official and other authorized officials to verify that the agency and its personnel are complying with the ISE Privacy Guidelines Redress To the extent consistent with its legal authorities and mission requirements, each agency shall, with respect to its participation in the development and use of the ISE, put in place internal procedures to address complaints from persons regarding protected information about them that is under the agency’s control

16 ISE Privacy Guidelines (continued) Execution, training, and technology Execution—the ISE Privacy Official shall be responsible for ensuring that protections are implemented as appropriate through efforts such as training, business process changes, and system designs Training—each agency shall develop an ongoing training program in the implementation of these Guidelines and shall provide such training to agency personnel Technology—each agency shall consider and implement, as appropriate, privacy-enhancing technologies, including, but not limited to, permissioning systems, hashing, data anonymization, immutable audit logs, and authentication

17 ISE Privacy Guidelines (continued) Public Awareness Each agency shall take steps to facilitate appropriate public awareness of its policies and procedures for implementing these Guidelines

18 ISE Privacy Guidelines Web Site

19 ISE Privacy Guidelines Web Site Content ISE Privacy Guidelines Introduction ISE Privacy Guidelines Memorandum ISE Privacy Guidelines Guidelines to Ensure That the Information Privacy and Other Legal Rights of Americans Are Protected in the Development and Use of the Information Sharing Environment Press Room Global Privacy Policy Development Guide and Implementation Templates ISE Privacy Guidelines FAQ Contact information

20 Fusion Centers Fusion centers are anticipated to be the primary points of contact within states or regions for further disseminating terrorism information consistent with DOJ’s Fusion Center Guidelines and applicable state, local, and tribal laws and regulations Fusion centers are intended to collaborate with organizations such as the Joint Terrorism Task Forces (JTTFs), Field Intelligence Groups (FIGs), and the Information Sharing Analysis Centers (ISACs)

21 Next Steps Model Privacy Policy Development Process Conduct briefings with federal agencies Develop a training guide for agencies to follow when implementing the Guidelines Involve state, local, and tribal agencies through the use of Fusion Centers and existing groups such as IACP and the National Sheriffs Association

22 Questions?