Download:
pdf |
pdfSave
Privacy Impact Assessment Form
v 1.47.4
Status Draft
Form Number
F-35072
Form Date
Question
Answer
1
OPDIV:
CDC
2
PIA Unique Identifier:
P-7335903-725077
2a Name:
11/8/2021 12:16:14 PM
National Violent Death Reporting System Web Enablement
(NVDRS Web)
General Support System (GSS)
Major Application
3
Minor Application (stand-alone)
The subject of this PIA is which of the following?
Minor Application (child)
Electronic Information Collection
Unknown
3a
Identify the Enterprise Performance Lifecycle Phase
of the system.
Operations and Maintenance
Yes
3b Is this a FISMA-Reportable system?
4
Does the system include a Website or online
application available to and for the use of the general
public?
5
Identify the operator.
6
Point of Contact (POC):
7
Is this a new or existing system?
8
Does the system have Security Authorization (SA)?
8b Planned Date of Security Authorization
No
Yes
No
Agency
Contractor
POC Title
Deputy Branch Chief
POC Name
Leroy Frazier
POC Organization NCIPC/DVP/Surveillance Branch
POC Email
[email protected]
POC Phone
770.488.1507
New
Existing
Yes
No
December 24, 2021
Not Applicable
Page 1 of 8
Save
11 Describe the purpose of the system.
The National Violent Death Reporting System (NVDRS) is an
incident-based system designed to capture data on violent
deaths (suicides, homicides, deaths of undetermined intent,
and unintentional firearm deaths) in a relational database. This
system allows data from law enforcement reports, death
certificates, and coroner/medical examiner reports to be
combined into one cohesive data base allowing a variety of
public health professionals and decision-makers to analyze
and understand the nature of and trends of violence in the
United States. NVDRS is the only state-based surveillance
(reporting) system that pools data on violent deaths from
multiple sources into a usable, anonymous database.
The National Violent Death Reporting System (NVDRS) is an
incident-based system designed to capture data on violent
deaths (suicides, homicides, deaths of undetermined intent,
and unintentional firearm deaths) in a relational database. This
system will be based on a centralized, web-based architecture,
where a centralized database is hosted and maintained at the
Center for Disease Control and Prevention (CDC) and accessed
by funded states and their contracted partners (e.g., vital
statistics, coroner/medical examiners, law enforcement) via an
Internet browser. Information on deaths are collected by
statelevel partner agencies (typically state health
departments), and information is transmitted to the CDC after
being stripped of all personally identifiable information. Each
state’s own Violent Death Reporting System establishes the
details of that state’s cases from primary and secondary data
sources.
Primary data sources are: Death Certificates (DC), Coroner/
Medical Examiner (CME) reports, Law Enforcement Reports
(LE). Secondary or optional data sources are: Child Fatality
Describe the type of information the system will
Review (CFR) data, Intimate Partner Violence (IPV) data,
collect, maintain (store), or share. (Subsequent
Toxicology Reports and Hospital Discharge ICD9/10 Codes
12
questions will identify if this information is PII and ask data. Patients’ complete medical records are not available in
about the specific data elements.)
this system. Every record within NVDRS Web has an associated
unique identifier. The combination of the following three field
values make up a record identified to allow a match to an
incident such as the Incident year, incident state, and incident
number.
The combination of two or more of the following field values
make a probabilistic or an exact match to an incident such as
the year of incident, state of incident, incident number,
incident type, case status, flag for follow-up, victim’s age,
Victim’s sex, first initial of victim’s last name, date of death, zip
code of injury, zip code of residence, victim’s birth day of
month (1-31), last four digits of victim’s coroner/medical
examiner record number, last four digits of victim’s death
certificate record number, and abstractor-assigned manner of
death. Social Security Numbers (SSN), in full or in part, are not
captured. Users authenticate via Secure Access Management
Services (SAMS) and Active Directory (AD) using their email
addresses as their userid and a password. This information is
stored permanently or until contract ends. SAMS and AD are
separate systems covered by separate PIAs.
Page 2 of 8
Save
Provide an overview of the system and describe the
13 information it will collect, maintain (store), or share,
either permanently or temporarily.
14 Does the system collect, maintain, use or share PII?
NVDRS is an incident-based system designed to capture data
on violent deaths (suicides, homicides, deaths of
undetermined intent, and unintentional firearm deaths) in a
relational database. Information on deaths is collected by
state-level partner agencies (typically state health
departments), and information is transmitted to the CDC after
being stripped of all personally identifiable information.
NVDRS collects facts from four major sources about the same
incident, and pools information into a usable, anonymous
database. An incident can include one victim or multiple
victims. The four major data sources are death certificates,
coroner/medical examiner reports, law enforcement reports,
and crime laboratories.
The facts collected are about violent deaths which includes
circumstances related to suicide such as depression and major
life stresses like relationship or financial problems, relationship
between the perpetrator and the victim – for example, if they
know each other, other crimes, such as robbery, committed
along with homicide, and multiple homicides, or homicide
followed by suicide.
As data become available through the NVDRS on line database,
state and local violence prevention practitioners use it to guide
prevention programs, policies, and practices by identifying
common circumstances associated with violent deaths of a
specific type (e.g., committed during a crime such as robbery,
gang violence, or intimate partner violence) or a specific area
(e.g., a cluster of suicides); assisting groups in selecting and
targeting violence prevention efforts; supporting evaluations
of violence prevention activities; and improving the public's
access to in-depth information on violent deaths.
Complete medical records are not available in this system.
SAMS and AD are the authentication mechanism for access to
NVDRS Web Application hosted in the CSAMS environment
and both have their own PIA. Access is extended via invitation
only. Non-identifiable demographic, circumstance, and
narrative (case description) data related to violent deaths is
collected. This information is stored permanently or until
contract ends.
Yes
No
Page 3 of 8
Save
Indicate the type of PII that the system will collect or
15
maintain.
Social Security Number
Date of Birth
Name
Photographic Identifiers
Driver's License Number
Biometric Identifiers
Mother's Maiden Name
Vehicle Identifiers
E-Mail Address
Mailing Address
Phone Numbers
Medical Records Number
Medical Notes
Financial Account Info
Certificates
Legal Documents
Education Records
Device Identifiers
Military Status
Employment Status
Foreign Activities
Passport Number
Taxpayer ID
Sex
Age
Zipcode
Last 4 digits of victim's medical examiner record
Last 4 digits of death certificate
Manner of death
Employees
Public Citizens
16
Business Partners/Contacts (Federal, state, local agencies)
Indicate the categories of individuals about whom PII
is collected, maintained or shared.
Vendors/Suppliers/Contractors
Patients
Other
17 How many individuals' PII is in the system?
18 For what primary purpose is the PII used?
19
Describe the secondary uses for which the PII will be
used (e.g. testing, training or research)
500-4,999
For identity Proofing on SAMS, contact and follow-up
Used by local practitioners to improve prevention programs,
policies, and practices.
20 Describe the function of the SSN.
NA
20a Cite the legal authority to use the SSN.
NA
21
Identify legal authorities governing information use Public Health Service Act, Section 301, "Research and
and disclosure specific to the system and program.
Investigation" (42 U.S.C. 241).
22
Are records on the system retrieved by one or more
PII data elements?
Yes
No
Page 4 of 8
Save
Directly from an individual about whom the
information pertains
In-Person
Hard Copy: Mail/Fax
Email
Online
Other
Government Sources
23
Within the OPDIV
Other HHS OPDIV
State/Local/Tribal
Foreign
Other Federal Entities
Other
Identify the sources of PII in the system.
Non-Government Sources
Members of the Public
Commercial Data Broker
Public Media/Internet
Private Sector
Other
23a
Identify the OMB information collection approval
number and expiration date.
24 Is the PII shared with other organizations?
Describe the process in place to notify individuals
25 that their personal information will be collected. If
no prior notice is given, explain the reason.
26
Is the submission of PII by individuals voluntary or
mandatory?
OMB Approval Number 0920-0607 Expiration Date 07/31/2023
Yes
No
There is no process in place because the only item being
collected are email addresses.
Voluntary
Mandatory
Describe the method for individuals to opt-out of the
collection or use of their PII. If there is no option to
27
object to the information collection, provide a
reason.
If the external organization/individual wants access to
NVDRSWeb, then there is no method for individuals to opt-out
of the collection of PII because the only item being collected
are email addresses which are needed for authentication. The
individual can opt-out by not requesting access to the Website.
Describe the process to notify and obtain consent
from the individuals whose PII is in the system when
major changes occur to the system (e.g., disclosure
28 and/or data uses have changed since the notice at
the time of original collection). Alternatively, describe
why they cannot be notified or have their consent
obtained.
An application is set up to use SAMS by external partners who
would like access to NVDRSWeb. An email notification is sent
to external partners and then they are granted access to the
application. Once external partners invitations have expired,
they must reapply via the Informatics Service Desk to get
assistance to access the system.
Describe the process in place to resolve an
individual's concerns when they believe their PII has
29 been inappropriately obtained, used, or disclosed, or
that the PII is inaccurate. If no process exists, explain
why not.
To resolve an individual's concerns when he or she believes his
or her PII has been inappropriately obtained, used, or
disclosed, or that the PII is inaccurate, individuals should
contact [email protected] and [email protected].
Page 5 of 8
Save
Describe the process in place for periodic reviews of
PII contained in the system to ensure the data's
30
integrity, availability, accuracy and relevancy. If no
processes are in place, explain why not.
System and Security Stewards review PII contained in the
system annually (every 365 days), concurrent with
resubmission of the system PIA and review of the BSI. Integrity
and availability are checked by the system steward on an
ongoing basis, in the course of initiating and terminating user
accounts. Relevancy of the PII in the system (which is limited
to names and email addresses of the system users) defines
user groups and access levels. NVDRS undergoes at least one
enhancement effort each 365 days, during which the
availability and relevancy of the entire data dictionary are
assessed and updated according to program needs.
Users
Administrators
31
Identify who will have access to the PII in the system
and the reason why they require access.
Administrators need access to
administer and to provide systems
support.
Developers
Contractors
Others
Describe the procedures in place to determine which The CDC uses the concept of role-based access control (RBAC)
32 system users (administrators, developers,
to give the appropriate permissions associated with each user
contractors, etc.) may access PII.
role. RBAC uses the security principle of least privilege.
Describe the methods in place to allow those with
33 access to PII to only access the minimum amount of
information necessary to perform their job.
he least privilege model will be used to allow those with
access to PII to be able to access the minimum amount of PII
needed to perform their job. Users must request access to
specific files needed and that is the only access they are
permitted. No one will be granted more access than is
necessary to perform their job.
Identify training and awareness provided to
personnel (system owners, managers, operators,
contractors and/or program managers) using the
34
system to make them aware of their responsibilities
for protecting the information being collected and
maintained.
All CDC users are required to take Privacy and IT Security
Awareness training upon hire and annually thereafter.
Describe training system users receive (above and
35 beyond general security and privacy awareness
training).
All users are also required to complete annual training
requirements that consist of Ethics and Compliance training.
Do contracts include Federal Acquisition Regulation
36 and other appropriate clauses ensuring adherence to
privacy provisions and practices?
Yes
No
Page 6 of 8
Save
Describe the process and guidelines in place with
37 regard to the retention and destruction of PII. Cite
specific records retention schedules.
Describe, briefly but with specificity, how the PII will
38 be secured in the system using administrative,
technical, and physical controls.
Records are retained and disposed of in accordance with the
CDC Records Control Schedule (N1-442-09-1) and in
accordance with contractual agreement. Record copy of study
reports are maintained in the agency from two to three years
in accordance with retention schedules. Source documents for
computer are disposed of when they are no longer needed by
program officials. Personal identifiers may be deleted from
records when no longer needed in the study as determined by
the system manager, and as provided in the signed consent
form, as appropriate. Disposal methods include erasing
computer tapes, burning or shredding paper materials or
transferring records to the Federal Records Center when no
longer needed for evaluation and analysis. Records are
retained for 20 years; for longer periods if further study is
needed
Administrative controls include a system security plan,
contingency plan, regular back up of files and storage of
backups off site, role-based security awareness training, least
privilege access enforced through Active Directory groups,
separate user and privileged accounts for administrators,
policies and procedures in place for retention and destruction
of PII, and a corporate incident response team and incident
response plans.
Technical controls include identification and authentication
using unique user IDs, passwords, and smart cards, use of
firewalls and intrusion detection/prevention systems, virus
scanning software on all computers, and a security information
and event management (SIEM) solution.
Physical controls include security guards, identification
badges, locked doors, key cards, and closed circuit TV
39 Identify the publicly-available URL:
40 Does the website have a posted privacy notice?
http://www.cdc.gov/violenceprevention/nvdrs/
Yes
No
40a
Is the privacy policy available in a machine-readable
format?
Yes
41
Does the website use web measurement and
customization technology?
Yes
No
No
Page 7 of 8
Save
Technologies
Yes
Web beacons
No
Yes
Web bugs
Select the type of website measurement and
41a customization technologies is in use and if it is used
to collect PII. (Select all that apply)
Collects PII?
No
Session Cookies
Persistent Cookies
Yes
No
Yes
No
Yes
Other...
No
42
Does the website have any information or pages
directed at children under the age of thirteen?
Yes
43
Does the website contain links to non- federal
government websites external to HHS?
Yes
Is a disclaimer notice provided to users that follow
43a external links to websites not owned or operated by
HHS?
Yes
No
No
No
General Comments
OPDIV Senior Official
for Privacy Signature
signed by Jarell
Jarell Oshodi Digitally
Oshodi -S
Date: 2021.12.20 11:04:52
-S
-05'00'
Page 8 of 8
File Type | application/pdf |
File Modified | 2021-12-20 |
File Created | 2016-03-30 |