SCOPE
This policy is applicable to MCC employees, personal service contractors and all other contractors handling privacy information, and to all federal information systems, as defined by the Federal Information Security Modernization Act (FISMA).
OVERVIEW
This document groups security policies into several high-level roles and defines the mandatory requirements for MCC employees and contractors to understand their obligations as set out in this policy. These policies are driven by Public Laws, Executive Orders, regulatory requirements, and OMB directives. This document contains the following policy sections:
- Enterprise Policies
- Policies for Custodians
- Policies for System of Record Owners
- Policies for the Director of Web Services
- Policies for the Chief Privacy Officer
- Policies for the Chief Executive Officer
- Issue-Specific Policies
AUTHORITIES
The primary statutory authorities include:
- The Privacy Act of 1974 (5 USC § 552a) as amended
- E-Government Act of 2002 Section 208 (44 USC § 3601, et seq.), Dec.17, 2002
- Federal Information Security Modernization Act (FISMA) of 2014 (44 USC § 3554)
- Paperwork Reduction Act of 1995 (44 USC § 3501 et seq.) May 22, 1995
- Government Paperwork Elimination Act (44 USC § 3504) as amended, October 21, 1998
- Consolidated Appropriations Act 2005, Div. H, Title V, Sec. 522 (Pub. L. 108-447), December 8, 2004
The regulatory authorities include:
- OMB Circular A-130, Managing Information as a Strategic Resource, Appendix II: Responsibilities for Managing Personally Identifiable Information
- OMB Memorandum M-03-22, OMB Guidance for Implementing the Privacy Provisions of the E- Government Act of 2002, September 23, 2003
- OMB Memorandum 05-04, Policies for Federal Agency Public Websites, December 17, 2004
- OMB Memorandum 05-15, Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management, June 13, 2005
- OMB Memorandum 06-16, Protection of Sensitive Agency Information, June 23, 2006
- OMB Memorandum 06-20, FY2006 Reporting Instructions for Federal Information Security Management Act and Agency Privacy Management
- OMB FY 2007 Instructions for Preparing Federal Information Security Management Act Report and Privacy Management Report
- OMB Memorandum 10-22, Guidance for Online Use of Web Measurement and Customization Technologies
- OMB Memorandum 10-23, Guidance for Agency Use of Third-Party Websites and Applications
- OMB Memorandum 17-05, Fiscal Year 2016 – 2017 Guidance On Federal Information Security and Privacy Management Requirements
- OMB Memorandum 17-12, Preparing for and Responding to a Breach of Personally Identifiable Information
- NIST SP 800-144, Guidelines on Security and Privacy in Public Cloud Computing
- NIST SP 800-53, Rev. 4, Security and Privacy Controls for Federal Information Systems and Organizations
ROLES AND RESPONSIBILITIES
The Privacy Act and subsequent statutory and regulatory guidance establish privacy-specific roles and responsibilities, which are described below.
- The Chief Executive Officer (CEO) is responsible for establishing a compliant Privacy Program that aligns with Federal law and Office of Management and Budget (OMB) guidance.
- The Chief Privacy Officer (CPO) is responsible for developing and implementing the MCC Privacy Program and for day-to-day privacy program operations and the creation of privacy plans and procedures. The CPO will exercise MCC’s breach response defined in Appendix A on an annual basis. In addition, the CPO will review the quarterly reports provided by the CISO to ascertain improvements or changes to Appendix A, Breach Response.
- The Chief Information Security Officer (CISO) is responsible for privacy incident response and incident reporting. The CISO will deliver a quarterly brief to the CPO on all Privacy related incidents.
- The Director of Web Services is responsible for providing assistance, as required by the Chief Privacy Officer, in the review of the privacy policies and procedures with respect to public Web sites.
- The Office of the General Counsel (OGC) provides assistance, as required by the Chief Privacy Officer (CPO), in review of reports, Privacy Impact Assessments, systems of records notices, proposed rules, response to breach incidents and other related matters that are submitted to Congress, OMB, laws enforcement, and other parties.
- The Director of Contract Grants and Management (CGM) provides acquisition solutions and procures goods and services in support of MCC’s mission.
DEFINITIONS
Breach – The loss of control, compromise, unauthorized disclosure, unauthorized acquisition, or any similar occurrence where (1) a person other than an authorized user accesses or potentially accesses personally identifiable information (PII); or (2) an authorized user accesses or potentially accesses PII for an other than authorized purpose. Breaches are not limited to electronic media and may include physical documents or equipment.
Custodian – Any MCC employee or contractor who handles privacy information in the routine execution of his or her daily work responsibilities.
Disclosure – Dissemination or communication of any information that has been retrieved from a record which contains Personally Identifiable Information (PII) or is otherwise protected by any means of communication (written, oral, electronic, or mechanical) with or without written request by or consent of the individual to whom the record pertains.
Encryption– The act of transforming information into an unintelligible form, specifically to obscure its meaning or content.
Fair Information Practice Principles (FIPPs) – Principles that guide and enhance the federal agency’s approach to universally and consistently apply trusted identities in online transactions.
Incident – An occurrence that (1) actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system; or (2) constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies.
Individual – For purposes of the Privacy Act, a citizen of the United States or an alien lawfully admitted for permanent residence.
Information Collection – Obtaining, soliciting, or requiring the disclosure from third parties or the public, of facts or opinions by or for an agency, regardless of form or format. Such collections include requesting responses from ten or more people other than Federal employees or agencies, which are to be used for general statistical purposes. This usage does not include collection of information in connection with a criminal investigation or prosecution.
Information in Identifiable Form – Information in an IT system or online collection: 1) that directly identifies an individual (e.g., name, address, social security number, or other identifying number or code, telephone number, e-mail address, etc.) or 2) by which an agency intends to identify specific individuals in conjunction with other data elements, i.e., indirect identification. (These data elements may include a combination of gender, race, birth date, geographic indicator, and other descriptors).
Information System (IS) – The entire infrastructure, organization, personnel, and components for the collection, processing, storage, transmission, display, dissemination, and disposition of information. This term includes both automated and manual information systems {Source: a variation of a term from NSTISSI 4009}.
Major Incident – Is any incident that is likely to result in demonstrable impact, significant impact, or poses an imminent threat to the national security interests, foreign relations, or economy of the United States or to the public confidence, civil liberties, or public health and safety of the American people.
Personal Identifier– A name, number, or symbol that is unique to an individual. Examples are the individual’s name and Social Security number and may also include fingerprints or voiceprints or any other form of biometric data.
Personally Identifiable Information (PII) – Any information that permits the identity of an individual to be directly or indirectly inferred, including any information which is linked or linkable to that individual regardless of whether the individual is a U.S. citizen, lawful permanent resident, visitor to the U.S., or employee or contractor to MCC. Not all PII is sensitive. For example, information on a business card or in a public phone directory of agency employees is PII, but in most cases not Sensitive PII, because it is usually widely available public information.
Sensitive PII (SPII) - Personally identifiable information, which if lost, compromised, or disclosed without authorization, could result in substantial harm, embarrassment, inconvenience, or unfairness to an individual. Some categories of PII are sensitive as stand-alone data elements. Examples of such Sensitive PII include: Social Security number (SSN), passport number, or biometric identifier. Other data elements such as driver's license number, financial account number, citizenship or immigration status, or medical information, in conjunction with the identity of an individual (directly or indirectly inferred), are also Sensitive PII. In addition, the context of the PII may determine whether the PII is sensitive, such as a list of employee names with poor performance ratings.
Privacy Act Record – Any item, collection, or grouping of information about an individual that is maintained by an agency, including, but not limited to, the individual's education, financial transactions, medical history, and criminal or employment history and that contains the name, or identifying number, symbol, or other identifying particular that is assigned to the individual, such as a fingerprint, voiceprint or a photograph.
Privacy Act Request – A request from an individual, or his or her legal guardian, for notification as to the existence of, access to, or amendment of records about that individual. These records must be maintained in a system of records.
Privacy Act Statement – A statement appearing on a website or information collection form that notifies users of the authority for collecting requested information. It also states the purpose and use of the collected information. The public or users must be notified if providing such information is voluntary or mandatory, and the effects, if any, of not providing all or any portion of the requested information.
Privacy Impact Assessment (PIA) – Analysis of how information is handled: 1) to ensure handling conforms to applicable legal, regulatory, and policy requirements regarding privacy, 2) to determine the risks and effects of collecting, maintaining, and disseminating information in identifiable form in electronic information systems, and 3) to examine and evaluate protections and alternative processes for handling information to mitigate potential privacy risks.
Record – For purposes of the Privacy Act, any item, collection, or grouping of information about an individual that is maintained by an agency, including, but not limited to the individual’s education, financial transactions, medical, criminal or employment history and that contains the person’s name, or the identifying number, symbol, or other identifying particular that is assigned to the individual, such as a fingerprint, voiceprint or a photograph.
Routine Use – Regarding disclosure of a record - usage of a record for a purpose which is compatible with the purpose for which it was collected. Routine uses shall be listed in each System of Records Notice.
System Owner– The executive sponsor of an MCC system of records and the individual responsible for managing financial and resource allocation.
System of Records – A group of any records under the control of MCC from which information is retrieved by name, Social Security number, or other identifying symbol assigned to an individual.
System of Records Notice (SORN) – A legal document used to promote transparency and provide notice to the public regarding rights and procedures for accessing and correcting the record maintained by an agency on an individual in a System of Records. For further details on elements of a SORN, see Section 12.4 of this policy.
User– Any MCC employee or contractor who has access to MCC information systems
Web Measurement and Customization Technology – Technology used to remember a user’s online interactions with a website or online application in order to conduct measurement and analysis or usage or to customize a user’s (site visitor’s) experience.
PENALTIES AND DISCIPLINARY ACTIONS
Users who either intentionally or negligently misuse privacy information entrusted to them or do not comply with the policies in this document or with the plans, procedures and rules of behavior derived from them, are subject to the full range of administrative disciplinary actions consistent with MCC policy. These sanctions may range from counseling to removal.
It should be noted, that any officer or employee of MCC, who by virtue of his/her employment or official position, has possession of, or access to, MCC records which contain individually identifiable information, the disclosure of which is prohibited by the Privacy Act, or the rules and regulations promulgated thereunder, who knowingly and willfully discloses the material to any person or agency not entitled to receive it or who willfully maintains a system of records without publishing a SORN, may be guilty of a misdemeanor and subject to a fine of up to $5000. When there is a reason to believe a user‘s actions appear to be criminal in nature, the matter must be referred to the Office of Inspector General (OIG) and the OGC.
In addition to the actions listed above, the CPO may suspend an individual’s access to the privacy information.
ENTERPRISE POLICIES
Protection of Privacy Information
All MCC employees and contractors must protect privacy information in accordance with this and related policies.
Sensitive PII can include, but is not limited to, Social Security Numbers; health records or medical records; employment history; financial data; biometric data (fingerprint, iris scan, or DNA); criminal history; name and mother's maiden name; driver's license number; or date and place of birth.
Awareness and Training
General Privacy Awareness training is incorporated into MCC’s Cybersecurity annual training and is required for all users with access to MCC’s information systems so that users understand their roles and responsibilities relating to privacy information and understand MCC’s Privacy Policy. Additionally, privacy training enlists the support of the entire organization in the protection of privacy information entrusted to MCC. Users must receive the General Privacy Awareness training within 10 days of being granted access to MCC information systems. Annual privacy awareness training is required for all users on the anniversary of completing the initial training.
Privacy custodians require an additional role-based training that must be completed within 30-days if assigned the specific role, or before access is granted to restricted information. Annual role-based training is required, thereafter, for continued access to the restricted information.
In addition to the General Privacy Awareness training, MCC shall provide and administer an annual Privacy Breach and Response training that exercises the Breach Response Team on an annual basis. This training shall cover the elements defined in Appendix A of this policy.
Privacy Breaches
A privacy breach occurs if there is unauthorized access to or collection, use, disclosure or disposal of SPII. The most common privacy breaches occur when PII of customers, clients or employees is lost, stolen or mistakenly disclosed. This includes lost or stolen laptops containing personally identifiable information or mistakenly sending an e-mail containing PII to the wrong person.
All MCC employees and contractors must report suspected privacy breaches to the MCC IT Service Desk mcc-desk@mcc.gov (202-521-3900) immediately and follow the procedures defined in the Privacy Information - MCC Breach Response and Notification Procedures (see Appendix A). This notification will ensure immediate actions are taken to minimize the consequences and notify the CPO.
Incident Response
MCC management is committed to protecting the privacy information entrusted to the agency from unauthorized access, modification, loss, breach, or other misuse. The MCC security controls reduce the risk of these activities occurring. All MCC employees and contractors must report any potential loss or breach of privacy information immediately to the CPO. The CPO will report confirmed breaches of privacy information to the CISO for incident response. In the event of an incident or an investigation into a possible incident, the MCC CISO, or a designate, is authorized to confiscate or disconnect equipment from the MCC Network.
Chief Privacy Officer Authority
The CPO can revoke access to privacy information if users do not attend training or upon a user’s misuse of or negligence regarding privacy information. The CPO is authorized to require corrective actions for web sites determined to be non-compliant and may shutdown sites until System of Record Owners correct deficiencies.
Conditions of Disclosure
MCC may disclose privacy information only in accordance with the routine uses described in the applicable System of Records Notice or as otherwise specifically permitted by the Privacy Act, 5 USC 552a(b). Section 552a(b) provides that, no agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains, unless disclosure of the record would be—
- to those officers and employees of the agency which maintains the record who have a need for the record in the performance of their duties;
- required under the Freedom of Information Act, 5 USC 552;
- for a routine use as defined and described by 5 USC 552a(a)(7) and (e)(4)(D);
- to the Bureau of the Census for purposes of planning or carrying out a census or survey or related activity pursuant to law;
- to a recipient who has provided the agency with advance adequate written assurance that the record will be used solely as a statistical research or reporting record, and the record is to be transferred in a form that is not individually identifiable;
- to the National Archives and Records Administration as a record which has sufficient historical or other value to warrant its continued preservation by the United States Government, or for evaluation by the Archivist of the United States or the designee of the Archivist to determine whether the record has such value;
- to another agency or to an instrumentality of any governmental jurisdiction within or under the control of the United States for a civil or criminal law enforcement activity if the activity is authorized by law, and if the head of the agency or instrumentality has made a written request to the agency which maintains the record specifying the particular portion desired and the law enforcement activity for which the record is sought;
- to a person pursuant to a showing of compelling circumstances affecting the health or safety of an individual if upon such disclosure notification is transmitted to the last known address of such individual;
- to either House of Congress, or, to the extent of matter within its jurisdiction, any committee or subcommittee thereof, any joint committee of Congress or subcommittee of any such joint committee;
- to the Comptroller General, or any of his authorized representatives, in the course of the performance of the duties of the Government Accountability Office;
- pursuant to the order of a court of competent jurisdiction; or
- to a consumer reporting agency in accordance with 31 U.S.C. Sec. 3711.
POLICIES FOR CUSTODIANS
Privacy Awareness and Training
- Custodians must:
- Participate in annual privacy awareness training as provided by the CPO prior to being granted access to any system containing privacy information; and
- Participate in annual role-based training for employees who are designated custodians who have greater responsibilities for privacy information and handle or process privacy information in the routine performance of their jobs.
Incident Reporting
- Custodians must:
- Report privacy breaches or suspected privacy breaches to the CISO and the CPO.
Access Agreements
- Custodians must:
- Read, agree to, and sign all access agreements prior to being granted access to a system containing privacy information.
Disclosure
- Custodians must not disclose any record contained in a system of records by any means of communication to any person, except by written request or prior written consent of the individual to whom the record pertains (or his/her legal guardian) unless one of the 12 conditions for disclosure exists.
- Authority to grant access to privacy information is limited to OGC
Transmission and Transfer of Privacy Information
- Unless one of the 12 conditions for disclosure applies, custodians must:
- Encrypt privacy information transmitted electronically outside of MCC’s Information System using FIPS-compliant cryptographic algorithms; and
- Send hard copies containing privacy information via an approved means, such as:
- US Postal Service;
- Army Post Office;
- Commercial messenger; or
- Unclassified registered pouch
Remote Access to Privacy Information
- Custodians must:
- Access privacy information remotely only if authorized to do so by the System Owner; and
- Only use approved MCC two-factor remote access capabilities.
- Custodians must not:
- Download privacy information accessed via remote access to any non-MCC device.
Storage of Privacy Information
- Custodians must:
- Where allowable by statute or regulation (e.g. general records schedules issued by the National Archives and Records Administration), protect privacy information under their control during non-duty hours by storing it in a locked office or suite or by securing it in a locked container, such as a file cabinet, or if in electronic form, ensuring that removable media (e.g., CDs, DVDs, and USB drives) is properly encrypted, password-protected and accessible only to employees with an official need to access it.
Destruction of Privacy Information
- Custodians must:
- Destroy documents containing privacy information by shredding or burning; and
- Sanitize electronic media containing privacy information by following the MCC CISO Media Sanitization Procedures.
POLICIES FOR SYSTEM OWNERS
Privacy Awareness and Training
- System Owners must, when the system contains privacy records:
- Ensure that custodians of their system participate in annual role-based privacy training as provided by the CPO; and
- Ensure custodians are aware of their responsibility to safeguard privacy information within their control.
Privacy Impact Assessments
- System Owners must:
- Conduct Privacy Impacts Assessments of the systems every three years or when a major change occurs;
- Have all Privacy Impact Assessments approved by the CPO; and
- Revalidate Privacy Impact Assessments annually.
Paperwork Reduction Act
The Paperwork Reduction Act (PRA) and subsequent regulatory guidance establish requirements for information collection requests (ICRs). Surveys, questionnaires, registration forms, web sites, and databases may represent information collection requests, and may be subject to the PRA. However, many internal documents requesting this type of information and directed to employees, agencies or instrumentalities of the U.S. government are exempted from PRA.
- System Owners must:
- Determine if the system contains surveys, questionnaires, registration forms, web sites, or databases that represent Information Collection Requests that include privacy information; and
- Submit ICRs to the CPO for review to determine if they require a privacy impact assessment.
System of Record Notices
- System Owners must, when the system contains privacy records:
- Provide documentation in support of System of Record Notice (SORN) publishing to the CPO;
- Provide documentation in support of SORN publishing to the CPO, if Information Collection Requests contain privacy information;
- Update SORNs every three years or when a significant change occurs to the information system;
- Maintain records with accuracy, relevance, timeliness, and completeness to assure fairness to the individual of record;
- Not permit information collected about an individual for one purpose to be used for another purpose without giving notice or getting the consent of the subject of the record unless the record is being used as a routine use (e.g., those published for the subject SOR), and not permit information about an individual to be released except when pursuant to a written request by, or with written consent from, the individual to whom the information pertains (unless disclosure of this information would be for the purpose specified in United States Code (USC) - 5 USC § 552a).
- Contact the CPO when planning to modify the System of Record and provide documentation in support of any proposed changes; and
- Support to CPO with completing an updated SORN.
- Privacy Act Routing Use: The CPO must ensure that all Privacy Act SORNs include routine uses for the disclosure of information necessary to respond to a breach of PII. The language in updated SORNs must be modeled on the language set forth in the OMB Memorandum 17-12 and must be as follows:
To facilitate the agency's response to a suspected or confirmed breach of its own records: “To appropriate agencies, entities, and persons when (1) MCC suspects or has confirmed that there has been a breach of the system of records; (2) MCC has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, MCC (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with MCC’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm.”
To disclose records in their systems of records that may reasonably be needed by another agency in responding to a suspected or confirmed breach: “To another Federal agency or Federal entity, when MCC determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach.”
Information Security Controls
- System Owners must:
- Abide by the MCC Information System Security Policy to ensure appropriate security controls are in place to protect privacy information.
Collection of Privacy Information
- System Owners must:
- Have a defined and documented business purpose for the collection of privacy data elements;
- Limit the collection of privacy data elements to the minimum required;
- Maintain only privacy information considered relevant and necessary for the legally valid purpose for which it is obtained; and
- Where practicable, collect information directly from the individual.
Notification of Legal Process
- System Owners must:
- Make reasonable effort to notify an individual when any record of that individual is made available to any person under compulsory legal process when this process becomes a matter of public record.
Disclosure
- System Owners must, when the system contains privacy records:
- Maintain an accounting of disclosures of privacy records under their control, except for routine intra-agency or FOIA disclosures, that must include:
- Date, nature, and purpose of each disclosure of a record to any person or agency
- Name and address of the person or agency to whom the disclosure was made
- Retain privacy information disclosure records for a minimum of five years, or the life of the record, whichever is longer;
- Account for disclosure information to individuals named in the record at his or her request (except for disclosures made as a part of law enforcement activity); and
- Inform any person or the other agency about any correction or notation of dispute made by MCC of any record that has been disclosed to an individual or agency, if an accounting of that disclosure is made.
- Maintain an accounting of disclosures of privacy records under their control, except for routine intra-agency or FOIA disclosures, that must include:
Remote Access to Privacy Information
- System Owners must:
- Specifically authorize remote access to privacy information.
Rules of Behavior
- System Owners must:
- Establish rules of behavior for custodians and for persons involved in the design, development, operation, or maintenance of any system of records under their responsibility; and
- Maintain copies of signed rules of behavior for each custodian where they acknowledge their understanding of their responsibilities for protecting privacy information and the penalties for non-compliance.
Privacy Breaches
- System Owners must:
- Establish procedures for reviewing reported suspected privacy breaches and confirming a breach occurred;
- Establish procedures for tracking privacy breaches; and
- Report confirmed privacy breaches to the CISO for incident reporting to US-Computer Emergency Response Team (US CERT) and incident response support.
System of Record Certification and Accreditation
- System Owners must, when the system contains privacy records:
- Conduct a Certification and Accreditation of any system storing, processing, or transmitting PII to validate that appropriate security controls are applied and operate as intended as defined in MCC’s Information System Security Policy.
Data Quality
- System Owners must:
- Exercise due care in assuring that records containing privacy information are accurate, complete, timely, and relevant to MCC purposes.
Additional Controls Required for PII
- System Owners must, when the system contains PII:
- Implement additional security controls to protect SPII from unauthorized access, disclosure, or modification that include at a minimum:
- Encryption of data in transit using FIPS-compliant encryption
- Implement additional security controls to protect SPII from unauthorized access, disclosure, or modification that include at a minimum:
POLICIES FOR THE DIRECTOR OF WEB SERVICES
Compliance Activities
- The Director of Web Services must:
- Report annually to the CPO on compliance with Section 208 of the E-Government Act of 2002 to include the following:
- List all systems or information collections for which a PIA was made publicly available (posted on MCC Privacy page, Federal Register, or other site);
- Report on the progress of implementing machine readability technology associated with public web sites; and
- Verify that MCC privacy policy pages on publicly-accessible web sites contain code that enables accessibility devices to automatically read the policy.
- Report annually to the CPO on compliance with Section 208 of the E-Government Act of 2002 to include the following:
Web Measurement and Customization Technologies
- The Director of Web Services must:
- Detail in the agency Public Website Privacy Policy, if using web measurement and customization technology:
- the purpose of the web measurement/technology;
- the usage tier, session type, and technology used;
- the nature, purpose and use of information collected;
- whether and to whom the information will be disclosed;
- privacy safeguards applied to this information;
- data retention policy for this information;
- whether the measurement/technology is enabled by default or not and why;
- how to opt-out of the web measurement/customization technology;
- a statement to site visitors that opting-out still permits users to access comparable information and/or services, and;
- identification of all third-party vendors involvement in any web measurement and/or customization technology process
- Detail in the agency Public Website Privacy Policy, if using web measurement and customization technology:
Third Party Websites
- The Director of Web Services must:
- Examine the third-party’s privacy policy with the MCC CPO to evaluate the risks and determine whether the website or application is appropriate for use by the agency before using a third-party website; in addition, the Director of Web Services should then periodically (annually, at a minimum) review the third-party’s web site privacy policy for changes that may be made and reassess risks of use.
- Ensure alerts are provided to visitors, when links are posted leading visitors of the official government domain (www.mcc.gov) to another location, explaining that visitors are being directed to a nongovernment website that may have different policies from those of the MCC’s website.
- If embedding or incorporating a third-party application on the MCC website or other official agency domain, disclose the third-party’s involvement with the agency and describe these activities in the Web Privacy Policy.
POLICIES FOR THE CHIEF PRIVACY OFFICER
Privacy Program Development and Oversight
- The CPO must:
- Develop and maintain oversight of the Privacy Program in compliance with all applicable statutory and regulatory guidance;
- Maintain overall custody of protected records and data; and
- Maintain a list of principle MCC privacy contacts’ names and titles for annual reporting.
Privacy Awareness Training
- The CPO must:
- Establish and provide annual privacy awareness training to all employees; and
- Provide targeted, role-based training to employees who are designated Custodians who have greater responsibilities for privacy information and handle or process PII in the routine performance of their jobs.
Privacy Impact Assessments
- The CPO must:
- Assist System Owners with conducting PIAs
- Review and approve all Privacy Impact Assessments; and
- Publish all approved Privacy Impact Assessments on the MCC public website.
System of Record Notices
- The CPO must:
- Publish System of Records Notices in the Federal Register.
- A SORN shall be published in the Federal Register upon establishment or revision of a system of records. The SORN shall include: the name and location of the system; the categories of individuals on whom records are maintained in the system; the categories of records maintained in the system; each routine use of the records contained in the system, including the categories of users and the purpose of such use; MCC’s policies and practices regarding storage, retrievability, access controls, retention, and disposal of the records; the title and business address of the MCC official who is responsible for the system of records; MCC procedures whereby an individual can be notified at his/her request if the system of records contains a record pertaining to him/her; MCC procedures whereby an individual can be notified at his/her request of how to gain access to any record pertaining to him/her contained in the system of records and how to contest its content; and the categories of sources of records in the system.
- Publish System of Records Notices in the Federal Register.
Public Web Site Monitoring
- The CPO must:
- Monitor public web sites to ensure compliance with privacy requirements.
Privacy Requests and Appeals
- The CPO must:
- Coordinate with OGC to Process Privacy Act inquiries and requests;
- Establish and implement procedures to track and report privacy requests;
- Establish and implement procedures to support the amendment of records by individuals for records pertaining to them maintained by MCC; and
- Establish and implement an appeals process, in coordination with the Offices of General Counsel.
Privacy Breaches
- The CPO must:
- Establish and implement a breach notification plan and procedures where the procedures address:
- Whether breach notification is required;
- Timeliness of the notification;
- Source of the notification;
- Contents of the notification;
- Means of providing the notification;
- Who receives the notification: public outreach in response to a breach, and;
- Remedial steps.
- Review reports of potential breaches and, if confirmed, report the breach to the MCC CISO.
- Establish and implement a breach notification plan and procedures where the procedures address:
Information Collection Requests
- The CPO must:
- Review all Information Collection Requests (ICRs) to determine if a privacy impact assessment is required.
POLICIES FOR THE CHIEF EXECUTIVE OFFICER
Chief Privacy Officer Designation
- The CEO must:
- Designate a Chief Privacy Officer (CPO) who reports to the CEO for Privacy Program matters, and has delegated authority to oversee the program.
Breach Response Team
- The CEO must:
- Establish a Breach Response Team that includes, at a minimum, the CIO, CPO, and OGC.
Authorization to Create a MCC Web Presence outside of the .gov domain
- The CEO must:
- Approve any official participation in hosting MCC content on third-party websites or use of third-party applications.
ISSUE-SPECIFIC POLICIES
Public Websites
- Web privacy policies must comply with OMB privacy-related memoranda and include notice about the nature, purpose, use, and sharing of information on Federal web sites.
- All public web sites must prominently display a Privacy Act statement that informs visitors:
- Of the purpose and use of the collected information, if providing the information is voluntary or mandatory, and the effects, if any, of not providing all or any portion of the requested information;
- How they grant consent for the use of information they provide on the web site;
- Of their rights under the Privacy Act or other privacy laws;
- If collected information is maintained or retrieved by a personal identifier in a system of records; and
- What information is gathered automatically (e.g., visitor IP address, location, time or visit), and for what purpose the information is gathered (e.g., site management, security).
- Use clear language to describe MCC practices of protecting information and safeguards used to identify and prevent attacks on the site’s information and systems.
- Any web site that provides content to children under the age of 13 and collects privacy information from these visitors must incorporate requirements of the “Children’s Online Privacy Protection Act” (COPPA) in its privacy policy.
- MCC public web sites must be configured to alert visitors when they are leaving the MCC website for an external, non-.gov website.
- Any non-MCC website using the MCC logo, such as an MCA website, must clearly indicate that the website is not managed by MCC and not bound by U.S. Government regulations regarding visitor privacy.
Contracts
- All contracts that collect or maintain information, or operate federal information systems on behalf of MCC, or use or operate information systems on behalf of MCC shall have contract terms included to allow MCC to respond to breaches in accordance with this policy. Contract provisions should be uniformly consistent and applied in MCC contracts. Contracts with entities that collect, maintain, use, or operate Federal information or information systems on behalf of MCC must include the following requirements:
- The contractor must cooperate with and exchange information with MCC officials, as deemed necessary by MCC’s Breach Response Team, to report and manage a suspected or confirmed breach.
- All contractors and subcontractors must properly encrypt PII in accordance with OMB Circular A-130 and other applicable policies, including with MCC-specific policies for protecting PII.
- All contractors and subcontractors must participate in regular training on how to identify and report a breach.
- All contractors and subcontractors must report a suspected or confirmed breach in any medium as soon as possible and without unreasonable delay, consistent with applicable MCC IT acquisitions guidance, MCC incident management policy, and United States Computer Emergency Readiness Team (US-CERT) notification guidelines.
- All contractors and subcontractors must be able to determine what Federal information was or could have been accessed and by whom, construct a timeline of user activity, determine methods and techniques used to access Federal information, and identify the initial attack vector.
- All contractors and subcontractors must allow for an inspection, investigation, forensic analysis, and any other action necessary to ensure compliance with this Policy and the MCC Breach Response Plan, and to assist with responding to a breach.
- Cloud service providers must use guidance provided in the FedRAMP Incident Communications Procedures when deciding when to report directly to US-CERT first or notify MCC first.
- The contract must identify roles and responsibilities, in accordance with this Policy and the MCC Breach Response Plan; and,
- The contract must acknowledge that MCC will not interpret report of a breach, by itself, as conclusive evidence that the contractor or its subcontractor failed to provide adequate safeguards for PII.
- The Director of CGM in coordination with the CPO, must ensure that contract provisions to assist with the response to a breach are uniform and consistently included in MCC contracts. In addition, the CPO CIO must ensure that the MCC Breach Response Plan and system security authorization documentation clearly define the roles and responsibilities of contractors that operate Federal information systems that create, collect, use, process, store, maintain, disseminate, disclose, or dispose of PII on behalf of MCC.
RELATED MCC PRIVACY PROCEDURES
- MCC Procedures for Implementing the Privacy Act and the Privacy Provisions of the E- Government Act of 2002.
Privacy Information - MCC Breach Response and Notification Procedures (see Appendix A).
Appendix A
Privacy Information - MCC Breach Response and Notification Procedures
PURPOSE
Following the guidance outlined in the Office of Management and Budget (OMB) memorandum M-17-12, the Millennium Challenge Corporation (MCC) has developed these Privacy Information Breach Response Procedures to minimize the risk to MCC employees and others and to ensure prompt and appropriate action is taken should a breach of personally identifiable information (Breach) occur. In addition to establishing an agency response team, the OMB memorandum recommends that MCC develop a comprehensive Breach notification policy that addresses the following six elements:
- Whether Breach notification is required;
- Timeliness of the notification;
- Source of the notification;
- Contents of the notification;
- Means of providing the notification; and
- Who receives the notification (public outreach in response to a Breach).
This procedure supports current requirements for reporting and handling incidents pursuant to the Federal Information Security Management Act of 2002, the Privacy Act of 1974, the National Institute of Standards and Technology Computer Security Handling Incident Guide, and the concept of operations for the United States Computer Emergency Readiness Team.
DEFINITIONS
- Personally Identifiable Information (PII) – Any information that permits the identity of an individual to be directly or indirectly inferred, including any information which is linked or linkable to that individual regardless of whether the individual is a U.S. citizen, lawful permanent resident, visitor to the U.S., or employee or contractor to MCC. Not all PII is sensitive. For example, information on a business card or in a public phone directory of agency employees is PII, but in most cases not Sensitive PII, because it is usually widely available public information.
- Sensitive PII (SPII) - Personally identifiable information, which if lost, compromised, or disclosed without authorization, could result in substantial harm, embarrassment, inconvenience, or unfairness to an individual. Some categories of PII are sensitive as stand-alone data elements. Examples of such Sensitive PII include: Social Security number (SSN), passport number, or biometric identifier. Other data elements such as driver's license number, financial account number, citizenship or immigration status, or medical information, in conjunction with the identity of an individual (directly or indirectly inferred), are also Sensitive PII. In addition, the context of the PII may determine whether the PII is sensitive, such as a list of employee names with poor performance ratings.
- Breach means loss of control; compromise; unauthorized disclosure, unauthorized acquisition, or unauthorized access; or any similar term referring to situations in which persons (other than authorized users and for other than authorized purposes) gains access or potential access to PII, whether physically, verbal, or electronically.
- Incident is an event in which a loss of data occurred that may or may not include PII.
- Major Incident is a breach that involves the exfiltration, modification, deletion, or otherwise compromise of PII likely to result in demonstrable harm to the national security interests, foreign relations, or economy of the United States, or to the public confidence, civil liberties, or public health and safety of the American people. An unauthorized modification, deletion, exfiltration, or unauthorized access to 100,000 or more individuals' PII constitutes a major incident as defined in OMB M-17-05, Fiscal Year 2016 – 2017, Guidance on Federal Information Security and Privacy Management Requirements.
MCC RESPONSE TEAMS
MCC has created two Breach Notification Response Teams. The MCC response teams’ mission is to provide advance planning, guidance, in-depth analysis, and recommendations as to a course of action in response to a Breach. MCC response teams’ responsibilities include determining how to respond to a Breach and effective communication to notify affected individuals. The nature and possible impact of the Breach will determine if MCC’s Initial Agency Response Team or MCC’s Full Agency Response Team needs to be involved.
Initial Agency Response Team
The initial group that determines if a Breach occurred includes:
- The manager of the program experiencing the Breach (or responsible for the Breach if it affects more than one program or office);
- Chief Information Security Officer;
- A member of the Chief Privacy Officer’s team; and
- A member of the Office of General Counsel.
The Initial Agency Response Team will examine the scope of the information breached, the possible impact breached information will have on individuals and MCC, and whether the Full Agency Response Team needs to be convened.
Full Agency Response Team
Core members include MCC’s:
- Chief Information Officer (Chair);
- Chief Privacy Officer (Co-Chair);
- Chief Information Security Officer;
- A member of the Office of General Counsel;
- The Chief Investment and Risk Officer, or a designee thereof;
- Vice President, Department of Congressional and Public Affairs; and
- Vice president of the department experiencing or responsible for the Breach.
Responsibilities of the Response Teams
- The Chief Information Officer (CIO) serves as the chair of the Full Agency Response Team, presides over meetings, and initiates responses to incidents as appropriate.
- The Chief Privacy Officer (CPO) serves as co-chair of the Full Agency Response Team. If the CPO and CIO are the same person then the Chief Information Security Officer (CISO) will service as the co-chair of the Full Agency Response Team. The CPO, or a member of the CPO team, provides subject-matter expertise and operation support in analyzing and responding to a suspected or actual Breach.
- The Chief Information Security Officer (CISO) serves as chair of the Initial Agency Response Team, provides subject matter expertise, and, for example, may provide information on the detection and forensic examination results relating to the incident. The CISO is responsible for participating in all phases of the MCC’s planning, preparation, investigation, and response to Breaches involving PII. The CISO is responsible for declaring computer security and privacy incidents to the US-CERT. The CISO is responsible for formal tracking procedures for breaches and incidents.
- The Office of General Counsel (OGC) is responsible for providing legal support and guidance in responding to a suspected or actual Breach. The OGC member will provide advice as to whether referral of a Breach to other authorities is warranted pursuant to applicable law, regulations, and MCC policies.
- The Chief Investment and Risk Officer (IRM Representative) provides overall guidance as to agency concerns and risk management issues.
- The Vice President for Congressional and Public Affairs (VP-CPA) develops and communicates appropriate information about the Breach, MCC’s response to the public, and addresses media inquiries.
- The Vice President of the department experiencing or responsible for the breach provides the response teams with information and other assistance to address and respond to the Breach.
- If MCC suspects the Breach was intentional or willful, the matter will be referred to the Office of he Inspector General (OIG) for investigation. The OIG has authority to initiate an investigation of any suspected PII breach no matter how the OIG becomes aware of the suspected Breach.
PROCEDURES
Initial Notification of Breach
- In the event of a suspected or known Breach, an employee or contractor will promptly notify MCC’s Service Desk.
- Upon notification of the incident, the Service Desk will immediately contact the CISO.
Convening the Response Teams
The CPO will lead the breach response team, and
- Convene the Team when appropriate, or at least once per year;
- Advise senior leadership of the financial resources required resulting from the breach;
- Coordinate with CPA the report of a major incident to the appropriate Congressional Committees within seven (7) days after the date on which there is a reasonable basis to conclude that a breach has occurred. At the time of submission, such a s report, and any supplemental reports, must include:
- A summary of information available about the breach, including how the breach occurred;
- The sensitivity or the security classification of the information breached;
- An estimate of the number of individuals affected by the breach, including an assessment of the risk of harm to affected individuals;
- A description of any circumstances necessitating a delay in providing notice to affected individuals;
- Recommend guidance to agency personnel affected by the breach, if any; and
- An estimate of whether and when the agency will provide notice to affected individuals.
- In addition, the CPO will coordinate with CPA and OGC to ensure supplementary information is provided to the requisite Congressional Committees within a reasonable time after the information is uncovered, but not later than 30 days after the initial report of the major breach. The supplement must include:
- Threats and threat actors, vulnerabilities, and impacts related to the incident;
- The risk assessments conducted of the affected information systems prior to the incident;
- The status of compliance of the respective information system(s) with security requirements in place at the time of the major incident; and
- The detection, response, and remediation actions.
- All incidents involving PII will be reported within one hour of discovering the incident, which may involve PII that is in either electronic or physical form; and
- Notify members of MCC’s Initial Agency Response Team. The Initial Agency Response Team will, as appropriate, convene a meeting of the Full Agency Response Team, or specific members, as needed.
In the event of a Breach, the CISO will:
Initial Assessment
The Initial Agency Response Team will evaluate available information to determine whether data have been compromised or potentially compromised and how to respond. As part of the initial assessment, the Initial Agency Response Team will address the following information:
- Date and time of the incident;
- Date and time the incident was reported;
- Person who discovered the incident;
- Person who reported the incident;
- Nature or circumstances of the incident and means by which the Breach occurred;
- Description and nature of the data lost or compromised;
- Storage medium from which data was lost or compromised (e.g., laptop, computer, smartphone, printed paper);
- Counter measures enabled when the breach occurred (e.g., full encryption on a computer or laptop, file encryption on certain files on a computer or laptop);
- Potential remedial steps that can be taken to ameliorate the effects of the Breach and to prevent further Breaches, including the cost and benefit of those steps;
- Appropriate notice required to affected individuals and other stakeholders; and
- Number of individuals potentially affected.
The initial assessment will also determine whether the Full Agency Response Team needs to be convened. The Full Agency Response Team will be convened if more than 50 individuals are potentially affected by the Breach; if there is a high risk of harm to affected individuals; if the Breach is likely to require congressional or media communications; or if the costs of MCC’s remedial efforts are significant.
Investigation Responsibilities
Investigation responsibility refers to determining and documenting root causes for the Breach, including:
- If the MCC response teams determine the Breach involved unintentional loss of control or disclosure of PII, the response teams will have primary responsibility for overseeing the investigation.
- If an incident appears to involve intentional disclosure of PII, the matter should be immediately referred to the OIG for investigation.
Risk of Harm Analysis
Consistent with the Privacy Act and OMB Memorandum M-17-12 to determine whether notification of a breach is required, MCC response teams will assess the likely risk of harm caused by the Breach, including harm to reputation or potential for harassment or prejudice, particularly when health or financial information is involved. MCC response teams shall consider the following factors:
- Nature of the data elements breached and context of the data;
- Number of individuals affected;
- Likelihood that the information is accessible and usable;
- Likelihood that the Breach may lead to harm; and
- Ability of MCC to mitigate risk of harm.
Notifications
- Notification to Affected Individuals. If MCC response teams determine that there is a risk of harm, they will notify affected individuals of the Breach and address the following elements in the notification process:
- Timing of Notification. Notification of a Breach will be provided to affected individuals without unreasonable delay. MCC response teams may decide to delay notification if immediate notification would increase the risk of harm to any affected individual. In such cases, notification may be delayed until appropriate safeguards are put into place.
- Source of the Notice. The source of the notice will be clearly described as originating from MCC; the CPO, in consultation with OGC and the CISO, will originate the notice.
- Content of the Notice. The content of the notice to affected individuals will include the following:
- A brief description of what happened;
- To the extent possible, a description of the type of data involved in the Breach (e.g., full name, social security number, date of birth, home address, account number) and a statement of whether the information was encrypted or protected by other means;
- Steps individuals should take to protect themselves from identity theft or other potential harm; and
- Steps MCC has taken to investigate the Breach, to mitigate losses, and to protect against further Breaches.
- Procedures for contacting officials at MCC; including, office, email, and phone number.
- Without affecting the security of MCC systems, if applicable, provide information to individuals regarding the security state of the data breached. For example, if the information remained encrypted or protected by other means.
- Method of Notification. The appropriate method of notification will depend on the number of affected individuals and the urgency with which notification is required. Possible methods include telephone, first class mail, and e-mail.
- Notification to Third Parties. MCC response teams will carefully coordinate third party notification with notification to affected individuals, including timing, order, and content of the notice. This coordination will ensure that any ongoing investigations are not compromised, the risk of harm to affected individuals is minimized, and the information provided is consistent and accurate. Based on the nature of the Breach, third party notification may be considered to the following:
- Media and the Public. The VP-CPA, in coordination with MCC response teams, is responsible for directing discussions with the news media and the public, including issuing press releases and posting materials to MCC’s website.
- Financial Institutions. If a Breach involves government-authorized credit cards or individuals’ bank account numbers, MCC response teams will promptly notify the bank that handles that particular transaction.
- Appropriate Members of Congress. The VP-CPA, in coordination with MCC response teams, is responsible for coordinating all communications and meetings with members of Congress and their staff, as necessary.
- Identifying Applicable Privacy Compliance Documentation. The CPO is responsible for identifying applicable Privacy Act SORNs, privacy impact assessments (PIAs), and privacy notices that may apply to the potentially compromised information.
- Sharing of information. The CPO will coordinate with other federal agencies and non-federal agencies, as necessary, to eliminate duplicate information, to identify affected individuals, or to obtain and notify affected individuals.
- Notification to Congressional Committees, Office of Inspector General and Law Enforcement
- Office of Inspector General. The CPO and OGC will coordinate notification to MCC’s Office of Inspector General (OIG); the CISO will coordinate with OIG for forensic assistance, if needed.
- Law Enforcement. The CPO, OGC, and CPA will coordinate notification to Law Enforcement, as necessary. Not all breaches require law enforcement notification.
- Congressional Reporting. The CPA will report major incidents to the appropriate Congressional Committees. Timeline for reporting is as follows:
- Within seven days of declaring a major incident; and
- Supplemental reports within 30 days of declaring a major incident.
- Notification Methods. The CPO shall select the method of notification.
- For individuals that have MCC email accounts, or other government email account, the primary method of notification will be their official government email account (.gov or .mil).
- For individuals that do not have an official government email accounts, use US Postal Service, First Class Mail to their last known address.
- Special notifications using MCC’s public web page may be considered under special circumstances; for example, a high profile breach that affects many individuals.
Tracking Breaches
- The CISO shall develop formal tracking procedures of breaches and incidents.
DOCUMENTATION
MCC response teams will document each incident, response plans, and actions taken. This information will be used to track the management and disposition of specific Breaches. The CPO will ensure maintaining adequate and appropriate records to document responses to Breaches. In accordance with the Privacy Act of 1974, MCC response teams will generate, compile, and maintain records to safeguard the financial, legal, or other rights of individuals potentially affected by the Breach.