MIME-Version: 1.0 Content-Location: file:///C:/68F38CB3/SORNACS.htm Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset="us-ascii" FR Doc E8-29801
[Federal Register: December 19, 2008 (Volume 73,=
 Number 245)]
[Notices] &nb=
sp;            =
 
[Page 77759-77764]
From the Federal Register O=
nline via GPO Access [wais.access.gpo.gov]
[DOCID:fr19de08-128]       &n=
bsp;            =
;     
 
---=
--------------------------------------------------------------------
<= pre> 
DEPARTMENT OF HOMELAND SECURITY
<=
o:p> 
Office of the Secretary
 
[Docket No. DHS-2008-0150]
 
<= pre>
Privacy Act of 1974; U.S. Customs and Border Protection--01=
5 
Automated Commercial System, System of Records
=
 
AGENCY: Privacy Office; DHS.
 
ACTION: Notice of Privacy Act system of records.
<=
o:p> 
------------------------------------------------=
-----------------------
 
SUMMARY: In a=
ccordance with the Privacy Act of 1974 and as part of the 
Depart=
ment of Homeland Security's ongoing effort to review and update 
=
legacy system of record notices, the Department of Homeland Security 
=
proposes to update and reissue the following legacy record system, 
Treasury/CS.278 Automated
 
[[P=
age 77760]]
 
Commercial System (Octobe=
r 18, 2001) as a Department of Homeland 
Security system of recor=
ds notice titled, U.S. Customs and Border 
Protection Automated C=
ommercial System. The Customs and Border 
Protection Automated Co=
mmercial System is a comprehensive system used 
by Department of =
Homeland Security, U.S. Customs and Border Protection 
to track, =
control, and process all commercial goods imported into the 
Unit=
ed States. This legacy system will now also collect additional data 
<= pre>via its Automated Broker Interface and Vessel Automated Manifest
=
System. Categories of individuals, categories of records, and the 
routine uses of this legacy system of records notice have been revie=
wed 
and updated to better reflect the U.S. Customs and Border Pr=
otection--
015 Automated Commercial System record system. This re=
issued system 
will be included in the Department of Homeland Sec=
urity's inventory of 
record systems.
 =
DATES: The established system of records will be effective Janua=
ry 20, 
2009. Written comments must be submitted on or before Jan=
uary 20, 2009.
 
ADDRESSES: You may sub=
mit comments, identified by DHS-2008-0150 by one 
of the followin=
g methods:
   <=
span style=3D'mso-spacerun:yes'>  Federal e-Rulemaking Portal: http://frwebg=
ate.access.gpo.gov/cgi-bin/leaving.cgi?from=3DleavingFR.html&log=3Dlink=
log&to=3Dhttp://www.regulations.gov. 
Follow the instruct=
ions for submitting comments.
&n=
bsp;    Fax: 1-866-466-5370.
<=
span style=3D'mso-spacerun:yes'>     Mail: Hugo Teufel III, Chief Privacy Officer, Privacy 
Office, =
Department of Homeland Security, Washington, DC 20528.
     Instruc=
tions: All submissions received must include the 
agency name and=
 docket number for this rulemaking. All comments 
received will b=
e posted without change to http://frwebg=
ate.access.gpo.gov/cgi-bin/leaving.cgi?from=3DleavingFR.html&log=3Dlink=
log&to=3Dhttp://www.regulations.gov, 
including any perso=
nal information provided.
 =
    Docket: For access to the docket to =
read background 
documents or comments received go to http://frwebg=
ate.access.gpo.gov/cgi-bin/leaving.cgi?from=3DleavingFR.html&log=3Dlink=
log&to=3Dhttp://www.regulations.gov.
 
FOR FURTHER INFORMATION CONTACT: For general questions please conta=
ct: 
Laurence E. Castelli (202-325-0280), Chief, Privacy Act Poli=
cy and 
Procedures Branch, U.S. Customs and Border Protection, Of=
fice of 
International Trade, Regulations & Rulings, Mint Ann=
ex, 799 Ninth 
Street, NW., Washington, DC 20001-4501. For privac=
y issues please 
contact: Hugo Teufel III (703-235-0780), Chief P=
rivacy Officer, Privacy 
Office, U.S. Department of Homeland Secu=
rity, Washington, DC 20528.
 
SUPPLEMEN=
TARY INFORMATION:
 
I. Background
=
 
 &nb=
sp;  The priority mission of U.S. Customs and Border Protection=
 (CBP) is 
to prevent terrorists and terrorist weapons from enter=
ing the country 
while facilitating legitimate travel and trade. =
The Automated 
Commercial System (ACS) is the comprehensive syste=
m used by U.S. 
Customs and Border Protection to track, control, =
and process all 
commercial goods imported into the United States=
. ACS is a 
sophisticated and integrated large-scale business-ori=
ented system which 
employs multiple modules to perform discrete =
aspects of its 
functionality, including receiving data transmiss=
ions from a variety of 
parties involved in international commerc=
ial transactions and providing 
CBP with the capability to track =
both the transport transactions and 
the financial transactions a=
ssociated with the movement of merchandise 
through international=
 commerce. Through the use of Electronic Data 
Interchange (EDI),=
 ACS facilitates merchandise processing, 
significantly cuts cost=
s, and reduces paperwork requirements for both 
Customs and the i=
mporting community.
  =
  ACS also provides the following:
 <=
/pre>
A. Cargo Selectivity
 
    CBP uses the ACS Cargo=
 Selectivity System to sort high risk cargo 
from low risk cargo =
and to determine the type of examination required. 
Cargo selecti=
vity accepts data transmitted through ABI and compares it 
agains=
t established criteria. CBP uses the Cargo Selectivity System, a 
module of ACS, to process manifests and National In-bond entries in
=
order to identify the CBP inspection and examination status of specifi=
c 
bills of lading for imported merchandise. Cargo Selectivity fa=
cilitates 
more efficient and effective cargo processing by ensur=
ing cargo that 
requires additional screening receives it and tha=
t which is lower risk 
does not.
 
B. Entry Summary Selectivity
 
    The Entry Summary =
Selectivity system of ACS screens the review of 
entry summary da=
ta. Using line item data transmitted through ABI, the 
system mat=
ches national and local selectivity criteria against entry 
summa=
ry data to assess risk by importer, tariff number, country of 
or=
igin, manufacturer, and value. The system captures paperless summary 
=
activity, discrepant summary findings, and line item team assignment <=
/pre>
data.
 
C. Border Cargo
=
 
 &nb=
sp;  The Border Cargo Selectivity system of ACS determines risk=
 
assessment and examination requirements for high volume borders=
 (i.e., 
ports of entry). The system uses the same screening proc=
ess as the 
Cargo Selectivity system. The Border Cargo Selectivit=
y system will soon 
be enhanced to allow ABI filers to transmit m=
anifest information.
 
D. Quota
 
  =
;  The ACS Quota system tracks quantity controls on imported 
merchandise. It also tracks visas from other countries. (Visas 
determine the amount of exports allowed for certain countries.) The=
 
Quota system checks the quantities against the visas and transm=
its this 
information to the country of origin. The ACS quota and=
 visa controls 
simplify reconciliation of imports and exports.
 
E. Paperless Entry
&nbs=
p;
    Paperless entry processing eliminates the need for ABI participants 
to file a Customs Form 3461, Entry/Immediate Delivery, if certain 
criteria are met and the merchandise does not require examination.=
 
Carriers who participate in AMS will receive electronic notific=
ations 
when merchandise is available for release.
 
F. Automated Invoice Interface (AII)
 
   =
 AII allows filers to send electronic invoice information to 
<= pre>Customs. This information is transmitted to Customs using either ABI
record formats or the EDIFACT CUSDEC (Customs declaration). When <=
/pre>
EDIFACT is used, the filer also transmits data that is normally o=
n the 
CF-3461 for cargo release, as well as the entry summary CF=
-7501, 
invoice data, and other government agency data.
 
G. Drawback
 
<= pre>    Filers can s= ubmit a drawback claim to Customs on a diskette or
through ABI. =
This ensures that the data is quickly and accurately 
recorded in=
 ACS and results in faster claim processing and issuance of 
the =
drawback payment. Immediate acceptance or rejection of data is 
a=
vailable.
 
H. Protest
&=
nbsp;
    <=
/span>The ABI electronic protest system allows ABI participants to file, 
amend, and query the following types of actions:
     Prot=
ests against decisions of the Customs Service under 19 
U.S. C. 1=
514.
     Petitions for refunds of Customs duties or corrections of=
 
errors requiring reliquidation pursuant to 19 U.S.C. 1520(c) an=
d (d).
     Interventions in an importer's protest by an exporter o=
r 
producer of merchandise from a country that is a party to the =
North 
American Free Trade
 
=
[[Page 77761]]
 
Agreement under Sectio=
n 181.115 of the Customs Regulations.
    Once filed, protests can be amended and add=
itional arguments 
submitted to:
     Apply for further r=
eview (when not requested at time of 
filing).
     Asser=
t additional claims or challenge an additional 
decision.
     <= /span>Submit alternative claims and additional grounds or
argume=
nts.
     Request review of denial of further review.
     =
Request denial of the protest be voided.
    The protest, petition, or intervention c=
an be transmitted remotely 
from any location. Customs views and =
processes the protest on-line. An 
automatic notification routine=
 keeps the filer informed of any change 
in status, including fin=
al disposition.
 
I. Remote Location Fi=
ling
 
    Remote Location Filing (RLF) is a pilot program =
which allows an 
approved participant to electronically file a fo=
rmal or informal entry 
of merchandise with Customs from a locati=
on within the United States 
other than the port of arrival (POA)=
 or the designated examination site 
(DES). Such merchandise, upo=
n clearance by CBP, may enter the commerce 
of the United States.=
 
J. National In-bond
&=
nbsp;
    <=
/span>The National In-bond system tracks cargo en route in the United 
States. Using departure, arrival, and closure data, the In-bond syste=
m 
tracks cargo from the point of unlading to the port of entry o=
r 
exportation. The In-bond system is incorporated within AMS. AM=
S retains 
control over all sea in-bond movements (both conventio=
nal and 
paperless) that are associated with automated bills of l=
ading.
 
K. Paperless Master In-bond
 
 =
   The Paperless M=
aster In-bond program controls the movement and 
disposition of m=
aster in-bond (MIB) shipments from the carrier's 
custody at the =
port of unlading to the same carrier's custody at the 
port of de=
stination. This program utilizes the data already available 
in A=
MS, eliminating the need for paper documentation.
    To help prevent terrorist weapo=
ns from being transported to the 
United States, vessel carriers =
bringing cargo to the United States are 
required to transmit cer=
tain information to Customs and Border 
Protection (CBP) about th=
e cargo they are transporting prior to lading 
that cargo at fore=
ign ports of entry. CBP is issuing an interim final 
rule that re=
quires both importers and carriers to submit additional 
informat=
ion pertaining to cargo to CBP before the cargo is brought into 
=
the United States by vessel. This information must be submitted to CBP 
by way of a CBP-approved electronic data interchange system. The 
required information is necessary to improve CBP's ability to ident=
ify 
high-risk shipments so as to prevent smuggling and ensure ca=
rgo safety 
and security, as required by section 203 of the Secur=
ity and 
Accountability for Every (SAFE) Port Act of 2006 and sec=
tion 343(a) of 
the Trade Act of 2002, as amended by the Maritime=
 Transportation 
Security Act of 2002.
    The proposed rule was known to t=
he trade as both the ``Importer 
Security Filing proposal'' and t=
he ``10 + 2 proposal.'' The name ``10 + 
2'' is shorthand for the=
 number of advance data elements CBP was 
proposing to collect. C=
arriers would be generally required to submit 
two additional dat=
a elements--a vessel stow plan and container status 
messages reg=
arding certain events relating to containers loaded on 
vessels d=
estined to the United States--to the elements they are already 
r=
equired to electronically transmit in advance (the ``2'' of ``10+2''); 
and importers, as defined in the proposed regulations, would be 
required to submit ten data elements--an Importer Security Filing 
containing ten data elements (the ``10'' of ``10+2'').
<=
span style=3D'mso-spacerun:yes'>    ACS has two princ=
ipal methods for electronic data interchange: The 
Automated Brok=
er Interface (ABI) and the Automated Manifest System 
(AMS). Unde=
r the ``10+2'' program, importers, who submit the Importer 
Secur=
ity Filing (ISF), will use either ABI or Vessel AMS to provide 
t=
heir information to CBP. ACS, upon receipt of the ISF, will transfer 
=
the data to the Automated Targeting System (ATS) for screening and 
targeting purposes. Once screened the ISF data will be returned wit=
h 
embedded targeting links to ACS to be maintained in accordance=
 with the 
ACS stated retention policy.
    Pursuant to the savings clause =
in the Homeland Security Act of 
2002, Public Law 107-296, Sectio=
n 1512, 116 Stat. 2310 (November 25, 
2002), the Department of Ho=
meland Security (DHS) and its components and 
offices have relied=
 on preexisting Privacy Act systems of records 
notices for the m=
aintenance of records that concern the tracking, 
controlling, an=
d processing of all commercial goods imported into the 
United St=
ates.
    =
This collection satisfies the requirements of Section 203 of the 
Security and Accountability for Every Port Act of 2006 (Pub. L. 109-
=
347, 120 Stat. 1884 (SAFE Port Act)).
    Consistent with DHS's information shar=
ing mission, information 
stored in the Automated Commercial Syst=
em may be shared with other DHS 
components, as well as appropria=
te Federal, State, local, tribal, 
foreign, or international gove=
rnment agencies. This sharing will only 
take place after DHS/CBP=
 determines that the receiving component or 
agency has a need to=
 know the information to carry out national 
security, law enforc=
ement, immigration, intelligence, or other 
functions consistent =
with the routine uses set forth in this system of 
records notice=
.
    To p=
rovide notice and transparency to the public, the Department of 
=
Homeland Security, U.S. Customs and Border Protection announces an 
amendment to an existing legacy Privacy Act system of records, the
Automated Commercial System, a comprehensive system used by U.S. 
Customs and Border Protection to track, control, and process all 
commercial goods imported into the United States. This legacy syste=
m 
will now also collect additional data via the Automated Broker=
 
Interface and Vessel Automated Manifest System.
    In accordance with th=
e Privacy Act of 1974 and as part of DHS's 
ongoing effort to rev=
iew and update legacy system of record notices, 
DHS proposes to =
update and reissue the following legacy record system, 
Treasury/=
CS.278 Automated Commercial System (66 FR 52984 October 18, 
2001=
), as a DHS/CBP system of records notice titled, U.S. Customs and 
Border Protection Automated Commercial System. Categories of
i=
ndividuals and categories of records have been reviewed, and the 
routine uses of this legacy system of records notice have been updated
to better reflect the DHS/CBP Automated Commercial System record 
system. This reissued system will be included in DHS's inventory o=
f 
record systems.
 
II. Priv=
acy Act
 
    The Privacy Act embodies fair information pri=
nciples in a statutory 
framework governing the means by which th=
e United States Government 
collects, maintains, uses, and dissem=
inates personally identifiable 
information. The Privacy Act appl=
ies to information that is maintained 
in a ``system of records.'=
' A ``system of records'' is a group of any 
records under the co=
ntrol of an agency for which information is 
retrieved by the nam=
e of an individual or by some identifying number, 
symbol, or oth=
er identifying particular assigned to the individual. In 
the Pri=
vacy Act, an individual is defined to encompass United States 
ci=
tizens and lawful permanent residents. As a matter
 
[[Page 77762]]
 
of polic=
y, DHS extends administrative Privacy Act protections to all 
ind=
ividuals where systems of records maintain information on U.S. 
c=
itizens, lawful permanent residents, and visitors. Individuals may 
request access to their own records that are maintained in a system of <= /pre>
records in the possession or under the control of DHS by complyin=
g with 
DHS Privacy Act regulations, 6 CFR part 5.
    The Privacy Act requ=
ires each agency to publish in the Federal 
Register a descriptio=
n denoting the type and character of each system 
of records that=
 the agency maintains, and the routine uses that are 
contained i=
n each system in order to make agency recordkeeping 
practices tr=
ansparent, to notify individuals regarding the uses to 
which per=
sonally identifiable information is put, and to assist 
individua=
ls to more easily find such files within the agency. Below is 
th=
e description of the Automated Commercial System system of records.
    In accordance= with 5 U.S.C. 552a(r), DHS has provided a report of
this update=
d system of records to the Office of Management and Budget 
and t=
o Congress.
System of Records
DHS/CBP--015
 
System name:
    U.S. Customs and Border Protection--015 Au=
tomated Commercial System
 
Security cl=
assification:
   =
 Unclassified.
 
System location=
:
    Reco=
rds are maintained at the CBP Headquarters in Washington, DC 
and=
 field offices.
 
Categories of individ=
uals covered by the system:
&nbs=
p;   Categories of individuals covered by this system incl=
ude: CBP 
employees and individuals involved in the import trade.=
 
Categories of records in the system:=
    Categ=
ories of records in this system include:
    =
 Individual's name;
    &n=
bsp;Social Security Number (SSN), if collected;
     Address=
;
     CBP employee names;
     CBP employee SSN;
     Importer of record number, which can be the IRS Employer
Ide=
ntification Number (EIN), SSN, or a Customs-assigned number;
     I=
mporter name and address;
 =
    Type of importation bond;
=
     Importation bond expiration date;
     Surety code;
     Violation statistics;
 &nb=
sp;   Protest information;
     Custo=
mhouse broker number;
 &nbs=
p;   Customhouse name;
   =
  Customho=
use address;
     Bond agent name;
     Bond agent SSN;
    &nb=
sp;Surety code (non-SSN);
    =
 Surety name;
     Cus=
toms bond information;
 &nb=
sp;   Liquidator identification (non-SSN);
    &n=
bsp;Foreign Manufacturer/Shipper identification code;
     F=
oreign Manufacturer/Shipper name;
     Foreign Manufacturer/Shipper=
 address;
     Carrier names;
     Carrier codes (non SSN) =
(Standard Carrier Agent Code (SCA) 
for vessel carriers, Internat=
ional Air Transport Association (IATA) for 
air carriers);
<= pre>     = Manufacturer (or supplier) name;
    <=
BULLET> Seller name;
     Buyer name;
     Ship to party name;
    =
; Container stu=
ffing location;
     Consolidator (stuffer);
   =
  Foreign =
trade zone applicant identification number;
     Consignee number(s=
);
     Country of origin;
     Commodity HTSUS number;
    &nb=
sp;Booking party;
 &=
nbsp;   Foreign port of unlading;
<=
span style=3D'mso-spacerun:yes'>     Place of delivery; and
 &=
nbsp;   Ship to party.
 <=
/o:p>
Authority for maintenance of the system:
    19 U.S.C. 66, 1431, 1448=
, 1481, 1484, 1505, 1514 and 1624, section 
203 of the Security a=
nd Accountability for Every (SAFE) Port Act of 
2006 and section =
343(a) of the Trade Act of 2002, as amended by the 
Maritime Tran=
sportation Security Act of 2002.
 
Purp=
ose(s):
    The purpose of this system is to track, control, and process all 
commercial goods imported into the United States, and to improve CBP's <= /pre>
ability to identify high-risk shipments so as to prevent smugglin=
g and 
ensure cargo safety and security. As part of CBP identifyi=
ng high risk 
shipments for border security and counterterrorism =
purposes, the system 
includes information relating to individual=
s and their relationship to 
the merchandise as documented in the=
 Importer Security Filing (ISF).
 
Rout=
ine uses of records maintained in the system, including categories 
of users and the purposes of such uses:
    In addition to those disclosures gener=
ally permitted under 5 U.S.C. 
552a(b) of the Privacy Act, all or=
 a portion of the records or 
information contained in this syste=
m may be disclosed outside DHS as a 
routine use pursuant to 5 U.=
S.C. 552a(b)(3) as follows:
&nbs=
p;   A. To the Department of Justice or other Federal agen=
cy conducting 
litigation or in proceedings before any court, adj=
udicative or 
administrative body, when:
    1. DHS or any component thereo=
f;
    2. =
any employee of DHS in his/her official capacity;
    3. any employee of DHS in his/h=
er individual capacity where DOJ or 
DHS has agreed to represent =
the employee; or
  &nb=
sp; 4. the United States or any agency thereof, is a party to the 
litigation or has an interest in such litigation, and DHS/CBP 
determines that the records are both relevant and necessary to the <=
/pre>
litigation and the use of such records is compatible with the pur=
pose 
for which DHS/CBP collected the records.
    B. To a congressional of=
fice from the record of an individual in 
response to an inquiry =
from that congressional office made at the 
request of the indivi=
dual to whom the record pertains.
    C. To the National Archives and Records Adminis=
tration or other 
Federal government agencies pursuant to records=
 management inspections 
being conducted under the authority of 4=
4 U.S.C. 2904 and 2906.
 &n=
bsp;  D. To an agency, organization, or individual for the purp=
ose of 
performing audit or oversight operations as authorized by=
 law, but only 
such information as is necessary and relevant to =
such audit or 
oversight function.
    E. To appropriate agencies, entities=
, and persons when:
  =
  1. DHS suspects or has confirmed that the security or 
<= pre>confidentiality of information in the system of records has been
=
compromised;
  &n=
bsp; 2. The Department has determined that as a result of the suspec=
ted 
or confirmed compromise there is a risk of harm to economic =
or property 
interests, identity theft or fraud, or harm to the s=
ecurity or 
integrity of this system or other systems or programs=
 (whether 
maintained by DHS or another agency or entity) that re=
ly upon the 
compromised information; and
    3. The disclosure made to s=
uch agencies, entities, and persons is 
reasonably necessary to a=
ssist in connection with DHS's efforts to 
respond to the suspect=
ed or confirmed compromise and prevent, minimize, 
or remedy such=
 harm.
    F. To contractors and their agents, grantees, experts, consultants, 
=
and others performing or working on a contract, service, grant, 
=
cooperative agreement, or other assignment for DHS,
&nb=
sp;
[[Page 77763]]
 
wh=
en necessary to accomplish an agency function related to this system 
=
of records. Individuals provided information under this routine use ar=
e 
subject to the same Privacy Act requirements and limitations o=
n 
disclosure as are applicable to DHS officers and employees.
    G. To a =
Federal, State, or local agency, or other appropriate 
entity or =
individual, or through established liaison channels to 
selected =
foreign governments, in order to provide intelligence, 
counterin=
telligence, or other information for the purposes of 
intelligenc=
e, counterintelligence, or antiterrorism activities 
authorized b=
y U.S. law, Executive Order, or other applicable national 
securi=
ty directive.
   =
 H. To an appropriate Federal, State, tribal, local, international, =
or foreign law enforcement agency or other appropriate authority=
 
charged with investigating or prosecuting a violation or enforc=
ing or 
implementing a law, rule, regulation, or order, where a r=
ecord, either 
on its face or in conjunction with other informati=
on, indicates a 
violation or potential violation of law, which i=
ncludes criminal, 
civil, or regulatory violations and such discl=
osure is proper and 
consistent with the official duties of the p=
erson making the 
disclosure.
    I. To the Bureau of the Census to provide=
 information on foreign 
trade data.
    J. To a Federal agency, pursuant t=
o the International Trade Data 
System Memorandum of Understandin=
g, consistent with the receiving 
agency's legal authority to col=
lect information pertaining to and/or 
regulate transactions in i=
nternational trade.
  =
  K. To appropriate Federal, State, local, tribal, or foreign <=
/pre>
governmental agencies or multilateral governmental organizations =
responsible for investigating or prosecuting the violations of, =
or for 
enforcing or implementing, a statute, rule, regulation, o=
rder, license, 
or treaty where DHS determines that the informati=
on would assist in the 
enforcement of civil or criminal laws.
    L. To a =
Federal, State, local, tribal, territorial, foreign, or 
internat=
ional agency, maintaining civil, criminal or other relevant 
enfo=
rcement information or other pertinent information, which has 
re=
quested information relevant to or necessary to the requesting 
a=
gency's or the bureau's hiring or retention of an individual, or 
issuance of a security clearance, license, contract, grant, or other
benefit;
   =
; M. To a court, magistrate, or administrative tribunal in the cours=
e 
of presenting evidence, including disclosures to opposing coun=
sel or 
witnesses in the course of civil discovery, litigation, o=
r settlement 
negotiations, in response to a subpoena, or in conn=
ection with criminal 
law proceedings;
    N. To third parties during the c=
ourse of an investigation to the 
extent necessary to obtain info=
rmation pertinent to the investigation;
    O. To the Department of Justice, the Unit=
ed States Attorney's 
Office, or a consumer reporting agency for =
further collection action on 
any delinquent debt when circumstan=
ces warrant;
    =
P. To appropriate Federal, State, local, tribal, or foreign 
governmental agencies or multilateral governmental organizations where <= /pre>
DHS is aware of a need to utilize relevant data for purposes of t=
esting 
new technology and systems designed to enhance national s=
ecurity or 
identify other violations of law;
    Q. To a former employee o=
f DHS, in accordance with applicable 
regulations, for purposes o=
f responding to an official inquiry by a 
Federal, State, or loca=
l government entity or professional licensing 
authority; or faci=
litating communications with a former employee that 
may be neces=
sary for personnel-related or other official purposes where 
the =
Department requires information or consultation assistance from the 
<= pre>former employee regarding a matter within that person's former area of =
responsibility;
 =
;   R. To an organization or individual in either the publ=
ic or private 
sector, either foreign or domestic, where there is=
 a reason to believe 
that the recipient is or could become the t=
arget of a particular 
terrorist activity or conspiracy, to the e=
xtent the of life or 
property; and
    S. To a consumer reporting agency r=
elated to owing the U.S. 
Government money in accordance with 15 =
U.S.C 1681 et seq.
 
Disclosure to cons=
umer reporting agencies:
 &=
nbsp;  Yes, in accordance with the provision of 15 U.S.C. 1681 =
et seq.
 
Policies and practices for st=
oring, retrieving, accessing, retaining, 
and disposing of record=
s in the system:
Storage:
    Records in this system are stored electronica=
lly or on paper in 
secure facilities in a locked drawer behind a=
 locked door. The records 
that are stored electronically are sto=
red on magnetic disc, tape, 
digital media, and CD-ROM.
 
Retrievability:
    Records may be retrieved by identifi=
cation codes and/or name.
 
Safeguards:=
    Recor=
ds in this system are safeguarded in accordance with 
applicable =
rules and policies, including all applicable DHS automated 
syste=
ms security and access policies. Strict controls have been imposed 
to minimize the risk of compromising the information that is being
stored. Access to the computer system containing the records in this =
system is limited to those individuals who have a need to know t=
he 
information for the performance of their official duties and =
who have 
appropriate clearances or permissions. The system maint=
ains a real-time 
auditing function of individuals who access the=
 system. Additional 
safeguards may vary by component and program=
.
 
Retention and disposal:
<=
span style=3D'mso-spacerun:yes'>    The Importer Secu=
rity Filing is retained for fifteen years from 
date of submissio=
n unless it becomes linked to active law enforcement 
lookout rec=
ords, CBP matches to enforcement activities, and/or 
investigatio=
ns or cases (i.e., specific and credible threats; 
individuals, a=
nd routes of concern; or other defined sets of 
circumstances) fo=
r which it will remain accessible for the life of the 
law enforc=
ement matter to support that activity and other enforcement 
acti=
vities that may become related. All other records are maintained 
for a period of six years from the date of entry.
 
System Manager and address:
    Director, Office of Automated Systems, =
CBP Headquarters, 1300 
Pennsylvania Avenue, NW., Washington, DC =
20229 is responsible for all 
data maintained in the files.
=
 
Notification procedure:
    Individuals seeking noti=
fication of and access to any record 
contained in this system of=
 records, or seeking to contest its content, 
may submit a reques=
t in writing to CBP's FOIA Officer, 1300 
Pennsylvania Avenue, NW=
., Washington, DC 20229. If an individual 
believes more than one=
 component maintains Privacy Act records 
concerning him or her t=
he individual may submit the request to the 
Chief Privacy Office=
r, Department of Homeland Security, 245 Murray 
Drive, SW., Build=
ing 410, STOP-0550, Washington, DC 20528.
    When seeking records about yourself fro=
m this system of records or 
any other Departmental system of rec=
ords your request must conform with 
the Privacy Act regulations =
set forth in 6 CFR part 5. You must first 
verify your identity, =
meaning that you must provide your full
 
[[Page 77764]]
 
name, current addre=
ss and date and place of birth. You must sign your 
request, and =
your signature must either be notarized or submitted under 
28 U.=
S.C. 1746, a law that permits statements to be made under penalty 
or perjury as a substitute for notarization. While no specific form is
required, you may obtain forms for this purpose from the Director,=
 
Disclosure and FOIA, http://frwebgate.acce=
ss.gpo.gov/cgi-bin/leaving.cgi?from=3DleavingFR.html&log=3Dlinklog&=
to=3Dhttp://www.dhs.gov or 1-866-431-0486. In addition 
you s=
hould provide the following:
&nb=
sp;    An explanation of why you believe=
 the Department would 
have information on you,
     Iden=
tify which component(s) of the Department you believe 
may have t=
he information about you,
  =
;   Specify when you believe the records=
 would have been 
created,
     Provide any other informa=
tion that will help the FOIA 
staff determine which DHS component=
 agency may have responsive records,
     If your request is seekin=
g records pertaining to another 
living individual, you must incl=
ude a statement from that individual 
certifying his/her agreemen=
t for you to access his/her records.
    Without this bulleted information the compon=
ent(s) will not be able 
to conduct an effective search, and your=
 request may be denied due to 
lack of specificity or lack of com=
pliance with applicable regulations.
 
=
Record access procedures:
 =
   See ``Notification procedure'' above.
&n=
bsp;
Contesting record procedures:
    See ``Notification procedure''=
 above.
 
Record source categories:
    Records a=
re obtained by authorized Customs forms or electronic 
formats fr=
om individuals and/or companies incidental to the conduct of 
for=
eign trade and required by CBP in administering the tariff laws and 
<= pre>regulations of the United States.
 
Exemptions claimed for the system:
    Information in the system may be shared with =
law enforcement and/or 
intelligence agencies pursuant to the abo=
ve routine uses. The Privacy 
Act requires DHS to maintain an acc=
ounting of the disclosures made 
pursuant to all routines uses. D=
isclosing the fact that a law 
enforcement or intelligence agenci=
es has sought particular records may 
affect ongoing law enforcem=
ent or intelligence activity. As such 
pursuant to 5 U.S.C. 552a(=
j)(2) and (k)(2), DHS will claim exemption 
from (c)(3), (e)(8), =
and (g) of the Privacy Act of 1974, as amended, as 
is necessary =
and appropriate to protect this information.
 
    Dated: D=
ecember 10, 2008.
Hugo Teufel III,
Chief Privacy Office=
r, Department of Homeland Security.
 [FR Doc. E8-29801 Filed 12-1=
8-08; 8:45 am]
 
BILLING CODE 4410-10-P=