







Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
The CA Management Information System (MIS) is a web-based reporting tool that tracks predefined productivity statistics of U.S. passport ...
Typology: Summaries
1 / 13
This page cannot be seen from the preview
Don't miss anything!
A/GIS Deputy Assistant Secretary Bureau of Administration Global Information Services
2. System Information (a) Name of system: Management Information System (b) Bureau: Consular Affairs (c) System acronym: MIS (d) iMatrix Asset ID Number: # 724 (e) Reason for performing PIA: Click here to enter text. ☐ New system ☐ Significant modification to an existing system ☒ To update existing PIA for a triennial security reauthorization (f) Explanation of modification (if applicable): Click here to enter text. 3. General Information (a) Does the system have a completed and submitted Security Categorization Form (SCF)? ☒Yes ☐No - Contact IRM/IA at IASolutionCenter@state.gov for assistance. (b) What is the security Assessment and Authorization (A&A) status of the system? The system received an Extension of Authorization to Operate (ATO) on May 8, 2017. The authorization is valid until rescinded or the expiry date of July 31, 2019. (c) Describe the purpose of the system: The CA Management Information System (MIS) is a web-based reporting tool that tracks predefined productivity statistics of U.S. passport agencies. The CA MIS provides passport system managers the ability to manage passport productivity operations by providing capabilities to query databases and generate a wide number of reports on passport information and statuses specific to any passport agency within the United States. This information includes weekly and monthly workloads on passport production, book inventory, agency hiring summaries, and statistics regarding agency staff.
The CA MIS streamlines the data entry required to produce the reports on management of passports. It is designed to connect to other CA databases to acquire data necessary for reporting on passports, including the ability to assign controlled access to view, run, and schedule reports. The CA MIS helps to manage report cycles through the implementation of a report approval hierarchy by alerting users of due dates, enforcing established submission deadlines, and enabling communication of important messages between Passport Agencies and Field Operations. It includes features and components for a variety of users with differing levels of system privileges to manage passports. Passport Agency administrators are able to access only their own passport agency’s reports. (d) Describe the personally identifiable information (PII) that the system collects, uses, maintains, or disseminates: Name Personal Phone Number(s) Personal Addresses Business Addresses Personal email addresses DoS Personnel Information: Employee name, title, business phone number, Passport Agency/Field Activity (e) What are the specific legal authorities and/or agreements that allow the information to be collected? 22 U.S.C 2651a (Organization of Department of State) Executive Order 11295, August 5, 1966, 31 FR 10603 (Authority of the Secretary of State in granting and issuing U.S. passports) 8 U.S.C. 1104 (Powers and Duties of the Secretary of State) 8 U.S.C. 1185 (Travel Documentation of Aliens and Citizens) 22 C.F.R. Subchapter F (Nationality and Passports) 26 U.S.C. 6039E (Information Concerning Resident Status) Executive Order 9397, November 22, 1943; Executive Order 13478, November 18, 2008 (f) Is the information searchable by a personal identifier (e.g., name or Social Security number)? ☒Yes, provide:
☐Yes ☒No Not applicable. The MIS does not collect SSNs.
(i) Do individuals have the opportunity to decline to provide the information or to consent to particular uses of the information? ☐Yes ☒No
(a) What is/are the intended use(s) for the information? The information is used to generate management reports on information specific to passport agencies and personnel within the United States depicting passport workload statistics and performance. This information includes weekly and monthly workloads, book inventory, agency hiring summaries, and statistics regarding agency staff processing of passports. (b) Is the use of the information relevant to the purpose for which the system was designed or for which it is being designed? Yes, the information assists in the operations and management of the passport application process. (c) Does the system analyze the information stored in it? ☐Yes ☒No If yes: (1) What types of methods are used to analyze the information?
Supervisors along with information system security officers (ISSOs) determine the access level depending on job function and level of clearance. Information is shared by secure transmission methods permitted by internal Department of State (DoS) policy for the handling and transmission of sensitive but unclassified (SBU) information. Access to electronic files is protected by inherited security controls from the DoS domain infrastructure. All accounts are under the supervision of system managers. Audit trails track and monitor usage and access. Defense in depth is deployed as well as roles assigned based on least privilege. Finally, regularly administered security and privacy training informs authorized users of proper handling procedures. (f) What privacy concerns were identified regarding the sharing of the information? How were these concerns addressed? Privacy concerns regarding the sharing of information focus on two primary sources of risk:
(a) What procedures allow individuals to gain access to their information? The system contains Privacy Act-covered records; therefore, notification and redress are the right of record subjects. Procedures for notification and redress are published in the following System of Records Notices (SORN):
SORN STATE-26: Requests for passport records issued from 1925 to the present should be submitted to the Department of State; Passport Services; Law Enforcement Liaison Division; Room 500; 1111 19th Street, NW., Washington, DC 20522- 1705 SORN STATE-05: Requests for Overseas Citizens Records and Other Overseas Records are to be submitted to the Director; Office of Information Programs and Services, A/GIS/IPS; SA-2, Department of State; 515 22nd Street NW., Washington, DC 20522- 8100. Individuals may also visit the Department of State public site and/or the Department of State Privacy Act/FOIA web site for the privacy policy which includes instructions on how to obtain access to records by contacting the listed offices by phone or by mail. (b) Are procedures in place to allow an individual to correct inaccurate or erroneous information? ☐Yes ☒No If yes, explain the procedures. If no, explain why not. The CA MIS does not collect information from individuals. Individuals must follow processes of the source systems used to apply for the specific service to request correction of information. Notice to correct personal information is provided at the source site where applicants apply for specific services. Individuals can also follow procedures outlined in the Passport Records SORNs, STATE- 26 and STATE- 05 as depicted in paragraph 7(a) above and procedures posted on the Department of State’s Privacy website at www.state.gov/privacy. (c) By what means are individuals notified of the procedures to correct their information? This is not applicable; the CA MIS does not collect information from individuals. However, notice to correct personal information is provided at the source site where applicants apply for specific services. Individuals who wish to have their records amended can also find instructions, submission requirements, and the address of the U.S. Department of State, Passport Services, Office of Legal Affairs, Law Enforcement Liaison Division (CA/PPT/S/L/LE) in the Passport Records SORN, STATE-26, posted on the Department of State’s Privacy website, www.state.gov/privacy.
Various technical controls are in place to deter, detect, and defend against the misuse of personally identifiable information. Monitoring occurs from the moment an authorized user attempts to authenticate to the Department of State network and respective applications. From that point on, any changes (authorized or not) that occur to data is recorded. In accordance with Department of State Security Configuration Guides, CA MIS auditing is also enabled to track the following events on the host operating systems, and back-end database servers: Multiple logon failures; Logons after-hours or at unusual times; Failed attempts to execute programs or access files; Addition, deletion, or modification of user or program access privileges; or Changes in file access restrictions. The purpose of the CA MIS audit trail is to document unintended modification or unauthorized access to the system and to dynamically audit retrieval access to designated critical data. If an issue were to arise, administrators of the system would review (audit) the logs that were collected from the time a user logged on until the time he/she signed off. This multilayered approach to security controls greatly reduces the risk that CA MIS PII will be misused. (d) Explain the privacy training provided to the authorized users of the system. In accordance with Department of State computer security policies, mandatory security (PS800 Cyber Security Awareness) and privacy (PA459 Protecting Personally Identifiable Information) training is required for all authorized users. In order to retain access, each user must annually complete the Cyber Security Awareness Training, which has a privacy component. The Department’s standard “Rules of Behavior” regarding the use of any computer system and the data it contains require that users sign that they agree to the rules and must protect PII through appropriate safeguards to ensure security, privacy and integrity. (e) Are any security controls, such as encryption, strong authentication procedures, or other controls, in place to make the information unusable to unauthorized users? ☒Yes ☐No If yes, please explain. Routine monitoring, testing, and evaluation of security controls are conducted to ensure the safeguards continue to function as desired. Many of the security controls implemented to make information unusable or inaccessible to unauthorized users include access enforcement, separation of duties, least privilege, audit review, analysis, and reporting, identification and
authentication of organizational users, information system monitoring and numerous media controls. The Information Integrity Branch (IIB) provides administrative life-cycle security protection for the Department of State's information technology systems and information resources. All systems must comply with all guidelines published by Systems Integrity Division, in addition to all Security Configuration Guides published by Diplomatic Security. Adherence to these guides is verified during the system’s Assessment and Authorization process. The CA MIS uses Transmission Control Protocol/Internet Protocol TCP/IP for data transport across the network. Data in transit is encrypted. The TCP/IP suite consists of multiple layers of protocols that help ensure the integrity of data transmission, including hand- shaking, header checks, and re-sending of data if necessary. (f) How were the security measures above influenced by the type of information collected? The information collected contains PII of U.S. citizens and legal permanent residents (LPRs). Due to the sensitivity of information collected, information is secured by effective procedures for access authorization, account housekeeping, monitoring, recording, and auditing. Organizations or individuals whose PII is breached or exposed to unauthorized users could face inconvenience, distress, damage to standing or reputation, threats to personal safety, and financial loss. Security measures are in place to minimize these risks, and to minimize the risk of harm to State Department programs or the public interest through an unauthorized release of sensitive information. The security measures listed above in paragraph 8 (e) are implemented to secure the data in the system in compliance with federal laws and policies, including Department policies.
(a) Who has access to data in the system? The following personnel have access to these systems: Approved CA MIS DoS Users (Department of State employees and contractors) working domestically and overseas in connection with processing passports; System Administrators and Database Administrators. (b) How is access to data in the system determined? An individual’s job function determines what data can be accessed as approved by the supervisor and the Information Systems Security Officer (ISSO). Access is role based and the user is granted only the role(s) required to perform officially assigned duties.
administrators have logon identifications associated with their name that allows for user auditing. (e) What controls are in place to prevent the misuse (e.g. unauthorized browsing) of data by users having access to the data? CA MIS information is protected by multiple layers of security controls including: