Draft Privacy Impact Assessment

0710-0024_DraftPIA_9.24.2020.pdf

Wetland Determination Automated Data Sheets and Jurisdictional Determination Forms

Draft Privacy Impact Assessment

OMB: 0710-0024

Document [pdf]
Download: pdf | pdf
PRIVACY IMPACT ASSESSMENT (PIA)
PRESCRIBING AUTHORITY: DoD Instruction 5400.16, "DoD Privacy Impact Assessment (PIA) Guidance". Complete this form for Department of Defense
(DoD) information systems or electronic collections of information (referred to as an "electronic collection" for the purpose of this form) that collect, maintain, use,
and/or disseminate personally identifiable information (PII) about members of the public, Federal employees, contractors, or foreign nationals employed at U.S.
military facilities internationally. In the case where no PII is collected, the PIA will serve as a conclusive determination that privacy requirements do not apply to
system.
1. DOD INFORMATION SYSTEM/ELECTRONIC COLLECTION NAME:

CWBI - CIVIL WORKS BUSINESS INTELLIGENCE
3. PIA APPROVAL DATE:

2. DOD COMPONENT NAME:

United States Army
US Army Corps of Engineers
SECTION 1: PII DESCRIPTION SUMMARY (FOR PUBLIC RELEASE)
a. The PII is: (Check one. Note: foreign nationals are included in general public.)
From members of the general public

From Federal employees and/or Federal contractors

From both members of the general public and Federal employees and/or
Federal contractors

Not Collected (if checked proceed to Section 4)

b. The PII is in a: (Check one)
New DoD Information System

New Electronic Collection

Existing DoD Information System

Existing Electronic Collection

Significantly Modified DoD Information System
c. Describe the purpose of this DoD information system or electronic collection and describe the types of personal information about individuals
collected in the system.

CWBI directly supports the Corps of Engineers Civil Works in the area of performance measures for Water Resources by consolidating,
integrating, and displaying geospatial data in the business areas of Navigation, Environmental Stewardship, Safety, Recreation, Hydropower,
Flood Risk Management, and Regulatory and providing one-time, single point data entry for these systems. The system includes a data
warehouse that merges financial data with the business function output and inventory data to produce performance measures of efficiency
and effectiveness for the Operations and Maintenance community. Life-cycle phase is mixed operations and maintenance. CWBI databases
are located on servers at the two processing centers within the USACE Enterprise Infrastructure Services USACE network. CWBI data tables
are not directly linked to other USACE data tables for data sharing although data is uploaded to and/or extracted from other USACE data
tables; CWBI does not interconnect with any system outside the USACE production environment. System backup is provided using servers
located at the processing centers.
The Recreation module in the database includes the following primary personal information: individual’s name, height, weight, eye color,
date of birth, drivers license number, social security number, telephone number, and vehicle information: tag number, year, make, and color.
The source of this information is directly from the individual record subject.
The Regulatory database includes the following primary personal information: individual’s name, address, telephone number, fax number,
and email address. The source of this information is directly from the individual record subject, a member of the public.
d. Why is the PII collected and/or what is the intended use of the PII? (e.g., verification, identification, authentication, data matching, mission-related use,
administrative use)

Recreation: Park rangers use the recreation module to collect data about the citations they issue to the public for misuse of Corps recreation
areas.
Regulatory: The Mission of the Regulatory system is to assist in the processing of permit applications from individuals in order to allow
reasonable development while protecting the Nation’s waters and wetlands.
e. Do individuals have the opportunity to object to the collection of their PII?

Yes

No

(1) If "Yes," describe the method by which individuals can object to the collection of PII.
(2) If "No," state the reason why individuals cannot object to the collection of PII.

DD FORM 2930, JUN 2017

PREVIOUS EDITION IS OBSOLETE.

AEM Designer

Page 1 of 9

Recreation and Safety: Personal data is voluntarily given by the applicant and collected via manual forms.
Regulatory: Personal data is voluntarily given by the applicant and collected via electronic forms on the Internet Accessible segment of the
USACE network or manual forms submitted to the district USACE Regulatory office. The ePermit form contains an applicable privacy
statement.
f. Do individuals have the opportunity to consent to the specific uses of their PII?

Yes

No

(1) If "Yes," describe the method by which individuals can give or withhold their consent.
(2) If "No," state the reason why individuals cannot give or withhold their consent.

Recreation and Safety: Personal data is voluntarily given by the applicant and collected via manual forms.
Regulatory: Personal data is voluntarily given by the applicant and collected via electronic forms on the Internet Accessible segment of the
USACE network or manual forms submitted to the district USACE Regulatory office. The ePermit form contains an applicable privacy
statement.
g. When an individual is asked to provide PII, a Privacy Act Statement (PAS) and/or a Privacy Advisory must be provided. (Check as appropriate and
provide the actual wording.)
Privacy Act Statement

Privacy Advisory

Not Applicable

Recreation: Individual is presented with a citation, ENG 4381, that has the Privacy Act Statement on the reverse side. This is a Title 36
citation authority under Flood Act of 1970, Public Law 91-611.
Regulatory: Individual voluntarily fills out the ENG 4345 standard form that has the Privacy Act Statement on the face of the form. Form is
approved by OMB No. 0710-0003.
h. With whom will the PII be shared through data exchange, both within your DoD Component and outside your Component? (Check all that apply)

Within the DoD Component

Recreation data is shared with district USACE Regulatory
office to follow up on citations. Regulatory data is shared
Specify.
with the district USACE Regulatory office for processing
permits

Other DoD Components

Specify.

Other Federal Agencies

Specify.

State and Local Agencies

Specify.

Contractor (Name of contractor and describe the language in
the contract that safeguards PII. Include whether FAR privacy
clauses, i.e., 52.224-1, Privacy Act Notification, 52.224-2,
Privacy Act, and FAR 39.105 are included in the contract.)

Other (e.g., commercial providers, colleges).

Regulatory data will be shared among state regulatory
agencies to enable processing of joint federal and state
permit applications.
Recreation data will be shared with local law enforcement
agencies.

Regulatory data will be shared among state regulatory
agencies to enable processing of joint federal and state
permit applications.
Standard contract language should be contained in the
contracts; however, as contracts are renewed the new
standard statement per DoD memorandum “DoD
Specify.
Component Responsibility to Ensure Government Contract
Compliance with the Privacy Act” (28 JAN 2015) shall
replace current statements.
Specify.

i. Source of the PII collected is: (Check all that apply and list all information systems if applicable)
Individuals

Databases

Existing DoD Information Systems

Commercial Systems

Other Federal Information Systems

Both systems use the source of this information directly from the individual record subject.

DD FORM 2930, JUN 2017

PREVIOUS EDITION IS OBSOLETE.

AEM Designer

Page 2 of 9

j. How will the information be collected? (Check all that apply and list all Official Form Numbers if applicable)
E-mail

Official Form (Enter Form Number(s) in the box below)

Face-to-Face Contact

Paper

Fax

Telephone Interview

Information Sharing - System to System

Website/E-Form

Other (If Other, enter the information in the box below)

Recreation: personal information is provided by the individual record subject via personal interview.
Regulatory: provided by the individual record subject by telephone interview or completion of electronic form.
k. Does this DoD Information system or electronic collection require a Privacy Act System of Records Notice (SORN)?

A Privacy Act SORN is required if the information system or electronic collection contains information about U.S. citizens or lawful permanent U.S. residents that
is retrieved by name or other unique identifier. PIA and Privacy Act SORN information must be consistent.
Yes

No

If "Yes," enter SORN System Identifier

A1145b CE and A0015-2-2 CE (A1130-2-550b CE new number)

SORN Identifier, not the Federal Register (FR) Citation. Consult the DoD Component Privacy Office for additional information or http://dpcld.defense.gov/
Privacy/SORNs/
or
If a SORN has not yet been published in the Federal Register, enter date of submission for approval to Defense Privacy, Civil Liberties, and Transparency
Division (DPCLTD). Consult the DoD Component Privacy Office for this date
30 April 2015
If "No," explain why the SORN is not required in accordance with DoD Regulation 5400.11-R: Department of Defense Privacy Program.

l. What is the National Archives and Records Administration (NARA) approved, pending or general records schedule (GRS) disposition authority for
the system or for the records maintained in the system?
(1) NARA Job Number or General Records Schedule Authority.

(2) If pending, provide the date the SF-115 was submitted to NARA.

(3) Retention Instructions.

Dock permit files are destroyed 6 years after expiration of permits/applications and then until no longer needed for conducting business.
Dredging and dumping permit (standard permits field offices) records are destroyed seven years after revocation, expiration or removal of the
object to which the permit pertains. Harbor lines approval records are permanent. Non-action construction permits are destroyed after
expiration but not longer than 6 years. Standard permits are kept until no longer needed but not longer than 6 years. Rejected standard
permit applications are destroyed three years after denial. Violation of Refuse Act files destroyed when no longer needed for business but not
longer than 6 years. Official record copies used for litigation will be destroyed with those files.
(1) If this system has a Privacy Act SORN, the authorities in this PIA and the existing Privacy Act SORN should be similar.
(2) If a SORN does not apply, cite the authority for this DoD information system or electronic collection to collect, use, maintain and/or disseminate PII.
(If multiple authorities are cited, provide all that apply).
(a) Cite the specific provisions of the statute and/or EO that authorizes the operation of the system and the collection of PII.
(b) If direct statutory authority or an Executive Order does not exist, indirect statutory authority may be cited if the authority requires the
operation or administration of a program, the execution of which will require the collection and maintenance of a system of records.
(c) If direct or indirect authority does not exist, DoD Components can use their general statutory grants of authority (“internal housekeeping”) as
the primary authority. The requirement, directive, or instruction implementing the statute within the DoD Component must be identified.

Regulatory authority: Rivers and Harbors Acts of 1890 (superseded) and 1899 (33 U.S.C. 401, et seq.); Section 10 (33 U.S.C. 403).

Recreation authority:
Debt Collection Improvement Act of 1996, 31 U.S.C. 7701(c)
Title 36, Chapter III, CFR 327- Rules and Regulations Governing Public Use Of Water Resources Development Projects administered by the
Chief of Engineers Executive Order 9397
DD FORM 2930, JUN 2017

PREVIOUS EDITION IS OBSOLETE.

AEM Designer

Page 3 of 9

n. Does this DoD information system or electronic collection have an active and approved Office of Management and Budget (OMB) Control
Number?
Contact the Component Information Management Control Officer or DoD Clearance Officer for this information. This number indicates OMB approval to
collect data from 10 or more members of the public in a 12-month period regardless of form or format.
Yes

No

Pending

(1) If "Yes," list all applicable OMB Control Numbers, collection titles, and expiration dates.
(2) If "No," explain why OMB approval is not required in accordance with DoD Manual 8910.01, Volume 2, " DoD Information Collections Manual:
Procedures for DoD Public Information Collections.”
(3) If "Pending," provide the date for the 60 and/or 30 day notice and the Federal Register citation.

OMB No. 0710-0003

DD FORM 2930, JUN 2017

PREVIOUS EDITION IS OBSOLETE.

AEM Designer

Page 4 of 9

SECTION 2: PII RISK REVIEW
a. What PII will be collected (a data element alone or in combination that can uniquely identify an individual)? (Check all that apply)
Biometrics

Birth Date

Child Information

Citizenship

Disability Information

DoD ID Number

Driver's License

Education Information

Emergency Contact

Employment Information

Financial Information

Gender/Gender Identification

Home/Cell Phone

Law Enforcement Information

Legal Status

Mailing/Home Address

Marital Status

Medical Information

Military Records

Mother's Middle/Maiden Name

Name(s)

Official Duty Address

Official Duty Telephone Phone

Other ID Number

Passport Information

Personal E-mail Address

Photo

Place of Birth

Position/Title

Race/Ethnicity

Rank/Grade

Protected Health Information (PHI)1
Religious Preference

Records

Security Information

Work E-mail Address

If Other, enter the information in the box below

Social Security Number (SSN) (Full or in any
form)

The Recreation module in the database includes the following primary personal information: individual’s name, height, weight, eye color,
date of birth, drivers license number, social security number, telephone number, and vehicle information: tag number, year, make, and color.
The source of this information is directly from the individual record subject.
The Regulatory database includes the following primary personal information: individual’s name, address, telephone number, fax number,
and email address. The source of this information is directly from the individual record subject, a member of the public.
If the SSN is collected, complete the following questions.
(DoD Instruction 1000.30 states that all DoD personnel shall reduce or eliminate the use of SSNs wherever possible. SSNs shall not be used in spreadsheets,
hard copy lists, electronic reports, or collected in surveys unless they meet one or more of the acceptable use criteria.)
(1) Is there a current (dated within two (2) years) DPCLTD approved SSN Justification on Memo in place?
Yes

No

If "Yes," provide the signatory and date approval. If “No,” explain why there is no SSN Justification Memo.

The United States District Court Violation Notice is the document that collects the SSN.

(2) Describe the approved acceptable use in accordance with DoD Instruction 1000.30 “Reduction of Social Security Number (SSN) Use within DoD”.

(3) Describe the mitigation efforts to reduce the use including visibility and printing of SSN in accordance with DoD Instructoin 1000.30, “Reduction of
Social Security Number (SSN) Use within DoD”.

(4) Has a plan to eliminate the use of the SSN or mitigate its use and or visibility been identified in the approved SSN Justification request?
If "Yes," provide the unique identifier and when can it be eliminated?
If "No," explain.
Yes

No

Because the United States District Court Violation Notice is used and it requires the SSN.
b. What is the PII confidentiality impact level2?

DD FORM 2930, JUN 2017

Low

Moderate

High

PREVIOUS EDITION IS OBSOLETE.

AEM Designer

Page 5 of 9

(pending information regarding the CVB form)
1

The definition of PHI involves evaluating conditions listed in the HIPAA. Consult with General Counsel to make this determination.

2

Guidance on determining the PII confidentiality impact level, see Section 2.5 “Categorization of PII Using NIST SP 800-122.” Use the identified PII confidentiality impact level to apply the appropriate Privacy Overlay
low, moderate, or high. This activity may be conducted as part of the categorization exercise that occurs under the Risk Management Framework (RMF). Note that categorization under the RMF is typically
conducted using the information types described in NIST Special Publication (SP) 800-60, which are not as granular as the PII data elements listed in the PIA table. Determining the PII confidentiality impact level is
most effective when done in collaboration with the Information Owner, Information System Owner, Information System Security Manager, and representatives from the security and privacy organizations, such as the
Information System Security Officer (ISSO) and Senior Component Official for Privacy (SCOP) or designees.

c. How will the PII be secured?
(1) Physical Controls. (Check all that apply)
Cipher Locks

Closed Circuit TV (CCTV)

Combination Locks

Identification Badges

Key Cards

Safes

Security Guards

If Other, enter the information in the box below

Physical security consists of an access restricted area where the maintained server platforms are environmentally controlled and
uninterruptible power supply protected. CWBI data is Unclassified-Sensitive Two (US2).

(2) Administrative Controls. (Check all that apply)
Backups Secured Off-site
Encryption of Backups
Methods to Ensure Only Authorized Personnel Access to PII
Periodic Security Audits
Regular Monitoring of Users' Security Practices
If Other, enter the information in the box below

All systems are housed in the USACE data center and maintained by CIO/G6 administrative staff. The CWBI system is subject to annual
FISMA reviews.

(3) Technical Controls. (Check all that apply)
Biometrics

Command Access Card (CAC)

DoD Public Key Infrastructure Certificates

Encryption of Data at Rest

Encryption of Data in Transit

External Certificate Authority Certificates

Firewall

Intrusion Detection System (IDS)

Least Privilege Access

Role-Based Access Controls

Used Only for Privileged (Elevated Roles)

User Identification and Password

Virtual Private Network (VPN)

If Other, enter the information in the box below

d. What additional measures/safeguards have been put in place to address privacy risks for this information system or electronic collection?

All systems are housed in the USACE data center and maintained by CIO/G6 administrative staff. The CWBI system is subject to annual
FISMA reviews. The CWBI system is subject to annual FISMA reviews. Data is accessed via Common Access Card (CAC) and a userid
validated and maintained through the USACE UPASS system. Any CWBI user must also be granted permission and then authenticated
through the Oracle database. Passwords for both network access and database access must be changed every 60 days. All persons
accessing CWBI participate in a periodic security training and awareness program. Regular applied patches to Information Assurance
Vulnerability Alerts (IAVA’s) and Security Technical Implementation Guides (STIG’s) prevent any new opportunities to compromise
CWBI data. Partners are provided information through regularly scheduled file transfers accomplished via ftp or email across the RSN or
Non-classified but Sensitive Internet Protocol Router Network (NIPRNET). Files transferred across the Internet/NIPRNET are encrypted
using a Virtual Private Network (VPN) or Advanced Encryption Standard (AES) 256-bit encryption.
Physical security consists of an access restricted area where the maintained server platforms are environmentally controlled and
uninterruptible power supply protected. CWBI data is Unclassified-Sensitive Two (US2).

DD FORM 2930, JUN 2017

PREVIOUS EDITION IS OBSOLETE.

AEM Designer

Page 6 of 9


File Typeapplication/pdf
File TitleCWBI_PIA_20200917cee.pdf
Authors0cixcee
File Modified2020-09-24
File Created2020-09-21

© 2024 OMB.report | Privacy Policy