throbber
Justice Management Division
`
`
`Privacy Impact Assessment
`for the
`Personal Identity Verification (PIV) Card System
`
`Issued by:
`Stuart Frisch, Senior Component Official for Privacy
`
`
`
`
`
`Reviewed by: Vance E. Hitch, Chief Information Officer, Department of Justice
`
`Approved by: Nancy C. Libin, Chief Privacy and Civil Liberties Officer,
`Department of Justice
`
`Date originally approved:
`Date revision approved:
`
`
`
`
`
`September 19, 2007
`March 24, 2011
`
`
`
`CARDWARE EXHIBIT 2032
`SAMSUNG V. CARDWARE
`PGR2023-00013
` Page 1 of 18
`
`

`

`Introduction
`
`Program Overview
`
`Homeland Security Presidential Directive 12 (HSPD-12), issued on August 27,
`2004, required the establishment of a standard for identification of Federal Government
`employees and contractors. HSPD-12 directs the use of a common identification
`credential for both logical and physical access to federally controlled facilities and
`information systems. This policy is intended to enhance security, increase efficiency,
`reduce identity fraud, and protect personal privacy.
`
`HSPD-12 requires that the Federal credential be secure and reliable. The National
`Institute of Standards and Technology (NIST) published a standard for secure and
`reliable forms of identification, Federal Information Processing Standard Publication 201
`(FIPS 201), Personal Identity Verification (PIV) of Federal Employees and Contractors.
`The credential is for physical and logical access.
`
`FIPS 201 has two parts: PIV I and PIV II. The requirements in PIV I support the control
`objectives and security requirements described in FIPS 201, including the standard
`background investigation required for all Federal employees and long-term contractors.
`The standards in PIV II support the technical interoperability requirements described in
`HSPD-12. PIV II specifies standards for implementing identity credentials on integrated
`circuit cards (i.e., smart cards) for use in a Federal system. Simply stated, FIPS 201
`requires agencies to:
`• Establish roles to facilitate identity proofing, information capture and storage,
`and card issuance and maintenance.
`• Develop and implement a physical security and information security
`infrastructure to support these new credentials.
`• Establish processes to support the implementation of a PIV program.
`
`DOJ Implementation
`
`In response to HSPD-12 and to meet the requirements summarized above, the
`General Services Administration (GSA) established the HSPD-12 Managed Service
`Office (MSO) to provide common, shared infrastructure and services to assist federal
`agencies in the implementation of HSPD-12. DOJ has signed up to use the GSA MSO’s
`shared infrastructure and services. Approximately 25 other federal agencies are also
`using the GSA managed service. The scope of the GSA managed services consists of
`enrollment stations, system infrastructure through a centralized PIV Identity Management
`System (IDMS), card production facility, and card activation, finalization, and issuance.
`DOJ will use GSA enrollment and issuance stations hosted in DOJ space and staffed by
`DOJ personnel, which link to the GSA MSO IDMS, card production facility, and other
`services. DOJ Justice Management Division, Security and Emergency Planning Staff,
`and Enterprise Solutions Staff are jointly responsible for the identity management and all
`aspects of the DOJ HSPD-12 implementation including serving as the main internal and
`
`CARDWARE EXHIBIT 2032
`SAMSUNG V. CARDWARE
`PGR2023-00013
` Page 2 of 18
`
`

`

`external point of contact with respect to program planning, operations, business
`management, communications and technical strategy.
`
`The revision to the September 2007 PIA adds language to describe a tool being used to
`assist DOJ components to structure data in the correct format as they import data from
`existing personnel data sources to GSA’s USAccess HSPD-12 card system. Use of this
`tool is temporary and will be phased out when it is no longer needed.
`
`Section 1.0 The System and the Information Collected and Stored
`within the System.
`
`The following questions are intended to define the scope of the information in the
`system, specifically the nature of the information and the sources from which it is
`obtained.
`
`1.1 What information is to be collected?
`
`The biographic and biometric information collected includes: full name, Social
`Security number, Applicant ID number, date of birth, current address, digital color
`photograph, fingerprints (10), biometric template (two fingerprints), organization,
`employee affiliation, work e-mail address, work telephone number, office address, copies
`of identity source document, employee status, military status, foreign national status,
`federal emergency response official status, law enforcement official status, results of
`background check, Government agency code, and PIV card issuance location.
`Additionally, the PIV Identity Management System (IDMS) and PIV cards contain other
`data not collected from the PIV Applicant that are either (i) electronically stored on the
`card; (ii) electronically stored in the IDMS; and/or (iii) physically displayed on the card.
`This information and the purpose of its use is described in Figure 1.
`
`Figure 1: Other PIV Information Stored, Collected or Used
`
`IDMS
`(Electronically
`Stored)
`X
`
`PIV Card
`(Physically
`Displayed)
`X
`
`PIV Card
`(Electronically
`Stored)
`X
`
`Card expiration date
`
`Personal Identification Number
`(PIN)
`
`Agency card serial number
`
`X
`
`Issuer identification number
`Contact Integrated Circuit Chip
`(ICC)
`
`X
`
`X
`
`X
`
`X
`
`Purpose
`
`To verify card is valid and allow access to
`facilities and computer systems
`For optional/ selected use either for
`physical access to highly secured
`buildings/ space or to log-on to sensitive
`computer systems (“level 3”) that require
`multi-factor authentication, beyond the
`typical user ID/ password.
`For identifying
`and maintaining agency
`cards
`Verify issuers authority
`Used to authenticate a PIV cardholder’s
`identity with card readers that require card
`to be inserted into the reader. Can be
`used for physical access to
`
`CARDWARE EXHIBIT 2032
`SAMSUNG V. CARDWARE
`PGR2023-00013
` Page 3 of 18
`
`

`

`IDMS
`(Electronically
`Stored)
`
`PIV Card
`(Physically
`Displayed)
`
`PIV Card
`(Electronically
`Stored)
`
`Contactless ICC
`
`PIV authentication key
`
`Cardholder Unique Identifier
`[Federal Agency Smart Card
`Credential Number (FASC-N)
`
`PIV Registrar
`signature)
`
`Approval (digital
`
`X
`
`X
`
`X
`
`X
`
`Purpose
`
`buildings/office space and logical access
`to computer systems.
`Used to authenticate a PIV cardholder’s
`identity with low-frequency radio signal
`“proximity loop” card readers that allow
`card to pass by the card reader. Primary
`use is for physical access to buildings and
`office space.
`Used to authenticate the PIV card to the
`host computer system in relation to
`validating a PIV cardholder’s identity.
`Used to authenticate the cardholder to the
`host computer system and is comprised of
`the agency code plus a sequential number
`for the employee, creating a unique
`number for all Federal employees. This
`allows interoperability of the PIV card
`throughout the Federal Government.
`Used to verify the authenticity of the
`individual sending the message, and
`verifies the content has not been altered.
`
`1.2 From whom is the information collected?
`
`The information is collected from PIV Applicants, the individuals to whom a PIV
`card is issued. The PIV Applicant may be a current or prospective Federal employee, or
`a contractor. Some information is pre-populated in the IDMS based on DOJ human
`resources data by the applicant’s Sponsor.
`
`Section 2.0 The Purpose of the System and the Information Collected
`and Stored within the System.
`
`The following questions are intended to delineate clearly the purpose for which
`information is collected in the system.
`
`2.1 Why is the information being collected?
`
`As required by FIPS 201, DOJ will collect biographic and biometric information
`from the PIV Applicant in order to: (i) conduct the background investigation or other
`national security investigation for federal employees and contractors; (ii) complete the
`identity proofing and registration process; (iii) create a data record in the PIV Identity
`Management System (IDMS); and (iv) issue a PIV card, as mandated by HSPD-12. The
`PIV card issuance process, including background check requirements, and physical and
`electronic contents of the PIV card are defined by FIPS 201.
`
`CARDWARE EXHIBIT 2032
`SAMSUNG V. CARDWARE
`PGR2023-00013
` Page 4 of 18
`
`

`

`2.2 What specific legal authorities, arrangements, and/or
`agreements authorize the collection of information?
`
`The information is required to meet the requirements of HSPD-12 and FIPS 201.
`
`2.3 Privacy Impact Analysis: Given the amount and type of information
`collected, as well as the purpose, discuss what privacy risks were
`identified and how they were mitigated.
`
`The privacy risks identified were compromise of privacy data at the GSA
`managed service core system, external to DOJ; compromise of privacy data at the DOJ
`operated enrollment stations; and compromise of data on an individual PIV card. Risks
`are from both internal (trusted personnel) and external actors.
`The risk of data compromise is mitigated by physical, administrative, and
`technical security measures. All access to data is restricted on a “need-to-know” basis.
`All access has role based restrictions. Role based access controls are enforced via the use
`of PIV cards. Individuals with access privileges have undergone vetting and suitability
`screening and are trained in their responsibilities to protect privacy data. Data is secured
`physically by locks on doors and locking storage containers. The hosting facility
`buildings have security guards and secured doors. All entrances are monitored through
`electronic surveillance equipment. Picture identification badges are required for access to
`the facility. All data is encrypted in transit between the GSA MSO and DOJ. Secure
`(encrypted) virtual private networks (VPN) are used from the enrollment stations at DOJ
`to the GSA servers. GSA maintains an audit trail and performs random periodic reviews
`to identify unauthorized access. DOJ receives periodic reports which detail card
`issuances, revocations, and other information on card statistics. These reports are
`reviewed by Security and Emergency Planning Staff.
`
`Section 3.0 Uses of the System and the Information.
`
`The following questions are intended to clearly delineate the intended uses of the
`information in the system.
`
`3.1 Describe all uses of the information.
`
` The information identified above is used in each step of the PIV process as described
`below:
`
`• Conduct a background investigation. The PIV background investigation as
`required by FIPS 201 is a condition of Federal employment (now extended to
`contractors) and matches PIV Applicants information against FBI databases to
`prevent the hiring of applicants with a criminal record or possible ties to
`terrorism. If persons decline providing this information, they cannot be hired as a
`permanent employee, nor work at the agency as a contractor long-term (over 6
`months). Two forms are used to initiate the background investigation,
`
`CARDWARE EXHIBIT 2032
`SAMSUNG V. CARDWARE
`PGR2023-00013
` Page 5 of 18
`
`

`

`Questionnaire for Non-Sensitive Positions Standard Form 85 (SF-85) or the
`Questionnaire for National Security Positions Standard Form 86 (SF-86). Note:
`The background information collected as part of this process and its results are
`kept in the background investigation files; however, not stored on the PIV card.
`• Complete the identity proofing and registration process. The biographic
`information collected as part of this process is used to establish the PIV
`applicant’s identity. Biometrics are used to ensure PIV Applicants have not been
`previously enrolled in the PIV system. As part of this process, FIPS 201 requires
`that Applicants provide two forms of identity source documents in original form.
`The identity source documents must come from the list of acceptable documents
`included in Form I-9, OMB No. 115-0316, Employment Eligibility Verification.1
`PIV Applicants will also participate in an electronic signature process conforming
`to the Electronic Signature (ESIGN) Act. This confirms presentation of and
`agreement with the privacy notice, confirms the intent to participate in the PIV
`process, and submit to a name-based threat background check as required
`depending on job requirements.
`• Create a data record in the PIV Identity Management System (IDMS). The
`IDMS is used during the registration process to create the PIV Applicant’s pre-
`enrollment and enrollment record, manage and maintain this information
`throughout the PIV card lifecycle, and, verify, authenticate and revoke PIV
`cardholder access to federal resources. A unique identifier is assigned during
`registration and used to represent the individual’s identity and associated
`attributes stored in the system.
`• Issue a PIV card. A PIV card is issued upon successful completion of the
`background investigation and identity proofing and registration process, and,
`successful completion of the enrollment process. Biometrics are used during PIV
`card issuance to verify PIV Applicant identity and complete activation of the card.
`This provides much stronger security assurances than typical card activation
`protections such as Personal Identification Numbers (PINs) or passwords. Once
`the individual has been issued a PIV Card, the IDMS is updated to reflect that the
`card has been issued. The issued PIV card cannot be used for access to DOJ
`facilities and networks until activated at the participating location, by the local
`facility operator or system owner.
`• Usage of PIV Card for physical and logical access: The biometrics collected
`can be used to verify that the rightful cardholder is presenting the card in relation
`to physical and logical access to federal facilities and information (i.e.,
`computers). The biographic and other information displayed on the PIV card is
`used by physical security guards for identity verification purposes.
`
`3.2 Does the system analyze data to assist users in identifying
`previously unknown areas of note, concern, or pattern? (Sometimes
`referred to as data mining.)
`
`
`1 Form I-9 can be downloaded at: http://uscis.gov/graphics/formsfee/forms/i-9.htm
`
`CARDWARE EXHIBIT 2032
`SAMSUNG V. CARDWARE
`PGR2023-00013
` Page 6 of 18
`
`

`

`No. Biometrics collected from PIV applicants are used to perform a check to
`
`ensure that a PIV card has not been previously issued to the same individual.
`
`3.3 How will the information collected from individuals or derived
`from the system, including the system itself be checked for
`accuracy?
`
`PIV card applicant data is checked against existing human resources and
`
`personnel security data by the sponsor of the applicant. Data is checked against I-9
`identity source documents during enrollment. Applicant data is also verified during the
`background investigation process. Upon submittal from the enrollment station, data is
`digitally signed to prevent tampering or modification.
`
`3.4 What is the retention period for the data in the system? Has the
`applicable retention schedule been approved by the National
`Archives and Records Administration (NARA)?
`
`Disposition of records will be according to NARA disposition authority N1-269-
`
`06-1 (pending).
`
`3.5 Privacy Impact Analysis: Describe any types of controls that may
`be in place to ensure that information is handled in accordance with
`the above described uses.
`
`Only authorized personnel with a “need-to-know” are allowed access to the
`information. These individuals are trained in their roles on the system to carry out the
`process described in FIPS 201. The personnel are trained in their responsibilities to
`protect privacy information. The system records transactions in audit logs which are
`reviewed for inappropriate activity. No data is stored on the DOJ enrollment
`workstations. Once an enrollment package is transmitted to the GSA core system, all
`applicant information is deleted from the enrollment workstations.
`
`Section 4.0 Internal Sharing and Disclosure of Information within the
`System.
`
`The following questions are intended to define the scope of sharing both within
`the Department of Justice and with other recipients.
`
`4.1 With which internal components of the Department is the
`information shared?
`
`The information is entered at enrollment stations staffed by DOJ
`
`personnel, and is only shared internally by those filling the roles in the GSA managed
`service, listed below. DOJ internally fills 1, 2, 6, and 7. During the up-front background
`
`CARDWARE EXHIBIT 2032
`SAMSUNG V. CARDWARE
`PGR2023-00013
` Page 7 of 18
`
`

`

`investigation process and identity proofing, relevant personal data will also be matched
`against databases at the Federal Bureau of Investigations (FBI) to prevent the hiring of
`applicants with a criminal record or possible ties to terrorism.
`
` The roles are described below.
`
`1. PIV Sponsor: The individual who substantiates the need for a PIV credential to
`be issued to the Applicant and provides sponsorship to the Applicant. The PIV
`Sponsor requests the issuance of a PIV credential to the Applicant. PIV Sponsors
`shall meet the following minimum standards: (i) is a Federal Government
`employee and be authorized in writing by DOJ to request a PIV credential; (ii)
`have valid justification for requesting a PIV credential for an Applicant; (iii) be in
`a position of responsibility for DOJ; and (iv) have already been issued a valid PIV
`credential.
`
`
`
`• Using the GSA managed service, the PIV Sponsor completes a PIV Request
`for an applicant and submits it to the PIV Registrar and the PIV Issuer
`• For the initial effort of sponsoring large numbers of existing employees and
`contractors for PIV cards, a file containing sponsorship information on
`multiple individuals can be uploaded to the GSA managed service by the
`Security Officer, as described below. The individuals’ information in the file
`must first be reviewed and approved by a DOJ Sponsor and Adjudicator
`before upload. This process is referred to as “bulk upload.” Bulk upload files
`are sent from DOJ to the GSA managed service system over an encrypted
`interface. The bulk upload process is temporary and will be phased out over
`time.
`
`2. PIV Registrar: This role may be filled by DOJ or GSA personnel. The entity
`responsible for identity proofing of the Applicant and ensuring the successful
`completion of the background checks. The PIV Registrar provides the final
`approval for the issuance of a PIV credential to the Applicant. PIV Registrars
`shall meet the following minimum standards: (i) is a Federal Government official
`and is designated in writing as a PIV Registrar; (ii) is capable of assessing the
`integrity of the Applicant’s identity source documents; i.e., is trained to detect any
`improprieties in the applicant’s identity-proofing documents; and (iv) is capable
`of evaluating whether a PIV application is satisfactory and apply organization-
`specific processes to an unsatisfactory PIV application. Thus, the PIV Registrar
`needs training on organization processes and procedures for evaluating an
`unsatisfactory PIV application.
`
`The PIV Registrar has access to the following information:
`• Applicant’s SF 85, or equivalent
`• Two forms of identity source documents
`
`The PIV Registrar logs into an enrollment station and:
`
`
`
`
`
`
`CARDWARE EXHIBIT 2032
`SAMSUNG V. CARDWARE
`PGR2023-00013
` Page 8 of 18
`
`

`

`• Compares the applicant’s PIV request information (name, date of birth,
`contact information) with the corresponding information provided by the
`sponsor.
`• Captures a facial image of applicant.
`• Fingerprints the applicant, obtaining all fingerprints.
`•
`Initiates a NACI, unless NACI has already been completed.
`• Notifies the sponsor and designated PIV Issuer that applicant had been
`approved or not.
`
`
`
`3. PIV Issuer (GSA Managed Service): This role is described in Section 5,
`External Sharing and Disclosure.
`
`
`4. PIV Digital Signatory (GSA Managed Service): This role is described in
`Section 5, External Sharing and Disclosure
`
`
`5. PIV Authentication Certification Authority (CA): This role is described in
`Section 5, External Sharing and Disclosure
`
`6. PIV Adjudicator (DOJ): The entity responsible for determining whether the
`Applicant is suitable to receive a credential, based on results obtained from the
`OPM background investigation. Adjudicator responsibilities include: (i)
`confirming fingerprint results from OPM/FBI; (ii) adjudicating NACI (or higher
`level OPM investigation) and resolving issues if necessary; (iii) providing final
`results to the PIV Registrar; and (iv) updating the Official Personnel File (OPF) or
`Contract file with “Certificate of Investigation.”
`
`7. Security Officer (DOJ): The security officer is a DOJ individual authorized to
`physically collect revoked cards, and is the daily contact for agency employees to
`report lost, missing, or stolen PIV cards. The security officer is responsible for
`revoking or suspending PIV cards, if required. The Security Officer can also
`perform bulk uploads. All information on DOJ personnel in the IDMS can be
`viewed by the security officer.
`
`
`4.2 For each recipient component or office, what information is shared
`and for what purpose?
`
`As described in the section above, each of the roles logs into the GSA Managed
`
`Service system to execute their portion of the FIPS 201 card issuance process. The
`information involved and the purpose of the role is described in the section above. A
`“least privilege” role-based access system restricts access to data on a need-to-know
`basis; access to the data is limited to those with an operational need to access the
`information.
`
`CARDWARE EXHIBIT 2032
`SAMSUNG V. CARDWARE
`PGR2023-00013
` Page 9 of 18
`
`

`

`4.3 How is the information transmitted or disclosed?
`
`The information is transmitted from the enrollment station to the GSA IDMS using an
`encrypted virtual private network. No information is stored on the enrollment stations.
`The resulting PIV cards are mailed to DOJ. DOJ Sponsors, Adjudicators, and Security
`Officers access the GSA system using a web browser and an encrypted web session.
`Sponsorship data for bulk uploads may be prepared using desktop office automation
`software, such as spreadsheets, or a custom software tool developed to format
`sponsorship data and produce a bulk upload file. The bulk upload file is sent to the GSA
`managed service by a Security Officer over an encrypted connection. DOJ Registrars
`collect fingerprints and a digital photograph of the applicant and transmit an enrollment
`package to the IDMS using the enrollment workstations.
`
`4.4 Privacy Impact Analysis: Given the internal sharing, discuss
`what privacy risks were identified and how they were mitigated.
`
`The privacy risk is that private information could be compromised by any of the
`
`roles filled by DOJ personnel. The risk is mitigated by having trained, vetted personnel
`fill these roles. All access for DOJ personnel to the GSA Managed Service system is role
`based, and requires a PIV card to log in. Personnel must be appointed and undergo
`training, including their responsibilities to protect privacy information. DOJ receives
`periodic reports which detail card issuances, revocations, and other information on card
`statistics. These reports are reviewed by Security and Emergency Planning Staff.
`
`Section 5.0 External Sharing and Disclosure
`
`The following questions are intended to define the content, scope, and authority
`for information sharing external to DOJ which includes foreign, Federal, state and local
`government, and the private sector.
`
`5.1 With which external (non-DOJ) recipient(s) is the information
`shared?
`
`The information is shared with GSA as the outsourced provider of PIV cards.
`
`Specifically, GSA will fill the following roles:
`PIV Issuer (GSA Managed Service): The entity that performs credential
`personalization operations and issues the identity credential to the Applicant after all
`background checks, identity proofing, and related approvals have been completed.
`The PIV Issuer is also responsible for maintaining records and controls for PIV
`credential stock to ensure that stock is only used to issue valid credentials.
`
`
`
`The PIV Sponsor completes a PIV request for an applicant and submits it to the
`PIV Registrar and PIV Issuer. The PIV Registrar makes available following
`information to the PIV Issuer using the enrollment workstation:
`• Facial image
`
`CARDWARE EXHIBIT 2032
`SAMSUNG V. CARDWARE
`PGR2023-00013
` Page 10 of 18
`
`

`

`• Copy of result of background investigation
`• Other data associated with applicant (e.g. employee affiliation)
`
`
`PIV Digital Signatory (GSA Managed Service): The entity that digitally signs the
`PIV biometrics and CHUID. This role applies for PIV-II. The PIV Registrar makes
`available to the PIV Digital Signatory:
`• Electronic biometric data for card personalization
`• Other data associated with the applicant that is required for generating signed
`objects for card personalization.
`
`PIV Authentication Certification Authority (CA): The CA that signs and issues
`the PIV Authentication Certificate. This role applies to PIV-II
`
`
`
`
`During the up-front background investigation process and identity proofing,
`relevant personal data will also be shared with the Office of Personnel Management
`(OPM), which is responsible for conducting the NACI and other higher-level
`investigations for DOJ.
`
`Additionally, information about individuals that is stored for purposes of issuing a PIV
`card may be given without individual’s consent as permitted by the Privacy Act of 1974
`(5 U.S.C. § 552a(b)), including to:
`• an appropriate government law enforcement entity if records show a violation or
`potential violation of law;
`• a court or other adjudicative body when the records are relevant and necessary to a
`law suit;
`• a federal, state, local, tribal, or foreign agency whose records could facilitate a
`decision whether to retain an employee, continue a security clearance, or agree to a
`contract;
`• a Member of Congress or to Congressional staff at a constituent’s written request; to
`the Office of Management and Budget to evaluate private relief legislation;
`• agency contractors, grantees, or volunteers, who need access to the records to do
`agency work and who have agreed to comply with the Privacy Act;
`the National Archives and Records Administration for records management
`inspections; and
`• other federal agencies to notify them when a PIV card is no longer valid.
`
`The full system of records notice with complete description of routine uses was published
`in the Federal Register: GSA GOVT-7, Federal Personal Identity Verification Identity
`Management System (PIV IDMS), 71 FR 56983 (September 28, 2006).
`
`
`5.2 What information is shared and for what purpose?
`
`•
`
`As described in 5.1 above.
`
`5.3 How is the information transmitted or disclosed?
`
`CARDWARE EXHIBIT 2032
`SAMSUNG V. CARDWARE
`PGR2023-00013
` Page 11 of 18
`
`

`

`The information is transmitted electronically over encrypted VPNs from the
`enrollment station to the IDMS. Sponsorship information is sent by DOJ Sponsors using
`an encrypted web session. Sponsorship data for bulk uploads may be prepared using
`desktop office automation software, such as spreadsheets, or a custom software tool
`developed to format sponsorship data and produce a bulk upload file. The sponsorship
`software tool helps ensure the data is in the correct format prior to sending it to the GSA
`managed service system, reducing the risk of sending erroneous data. The bulk upload
`file is sent to the GSA managed service by a Security Officer over an encrypted
`connection. The completed PIV cards are mailed to DOJ.
`
`5.4 Are there any agreements concerning the security and privacy
`of the data once it is shared?
`
`Yes, the DOJ and GSA have signed a Memorandum of Understanding for DOJ to obtain
`PIV card services from GSA. There is an Interconnection Security Agreement describing
`data security and the responsibilities of GSA and DOJ for protecting the data.
`
`5.5 What type of training is required for users from agencies outside
`DOJ prior to receiving access to the information?
`
`All outside personnel undergo background investigations and must complete
`training to ensure they are knowledgeable about how to protect personally identifiable
`information. The training is accomplished by self-paced, web based learning modules
`which include an audio track, video clips, and screen shots.
`
`5.6 Are there any provisions in place for auditing the
`recipients’ use of the information?
`
`Yes. GSA maintains an audit trail and performs random periodic reviews to
`detect unauthorized access or suspicious behavior. The periodic reports on card issuance
`activity are reviewed by DOJ. DOJ Sponsors and the Security Officer can view
`information on DOJ personnel in the GSA system.
`
`5.7 Privacy Impact Analysis: Given the external sharing, what privacy
`risks were identified and describe how they were mitigated.
`
`The risks to privacy data from sending DOJ data to an external agency were
`
`considered in the decision to outsource PIV card services to GSA. There is the risk that
`data could be compromised by either an internal or external actor. The risk is mitigated
`by multiple technical, physical, and administrative controls. The GSA system must meet
`all Federal Information Security Management Act requirements, as well as OMB and
`NIST policies and standards. DOJ will conduct a careful review of the certification and
`accreditation activities performed by GSA prior to using the system for any DOJ data.
`
`
`Access to data is restricted by agency. Only DOJ appointed roles have access to
`DOJ data, with the exception of GSA database administrators and system administrators
`
`CARDWARE EXHIBIT 2032
`SAMSUNG V. CARDWARE
`PGR2023-00013
` Page 12 of 18
`
`

`

`who have access to data from all agencies using the GSA managed service. All outside
`personnel undergo background investigations and must complete training to ensure they
`are knowledgeable about how to protect personally identifiable information. An
`Interagency Agreement and Interconnection Security Agreement define DOJ and GSA
`responsibilities to protect data.
`
`
`Section 6.0 Notice
`
`
`The following questions are directed at notice to the individual of the scope of
`information collected, the opportunity to consent to uses of said information, and the
`opportunity to decline to provide information.
`
`6.1 Was any form of notice provided to the individual prior to collection
`of information? If yes, please provide a copy of the notice as an
`appendix. (A notice may include a posted privacy policy, a Privacy Act
`notice on forms, or a system of records notice published in the Federal
`Register Notice.) If notice was not provided, why not?
`
`The System of Records Notice is attached as an appendix. The PIV Card Usage
`
`Privacy Act Notice is attached as an appendix.
`
`6.2 Do individuals have an opportunity and/or right to decline to
`provide information?
`
` While there is no legal requirement to use a PIV Card, employees who do not use a
`PIV Card will be treated as visitors when entering a federal building and will be barred
`from access to certain federal resources. If using a PIV card is a condition of the job,
`withholding requested information will affect job placement or employment prospects.
`
` 6.3 Do individuals have an opportunity to consent to particular uses of
`the information, and if so, what is the procedure by which an individual
`would provide such consent?
`
`PIV applicants using an electronic signature process conforming to the Electronic
`
`Signature (ESIGN) Act confirm presentation of and agreement with the Privacy Act
`statement, agree to participate in the PIV process and submit to a background check
`appropriate to job requirements.
`
`6.4 Privacy Impact Analysis: Given the notice provided to
`individuals above, describe what privacy risks were identified and
`how you mitigated them.
`
`CARDWARE EXHIBIT 2032
`SAMSUNG V. CARDWARE
`PGR2023

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket