IR Template
IR Template
IR Template
Version 2F
Date
Version
#
Description
1.
November 6, 2012
1F
Created document.
2.
1F
3.
2F
ii
TABLE OF CONTENTS
1. INTRODUCTION................................................................................................................... 1
1.1
1.2
1.3
PURPOSE ........................................................................................................................... 1
SCOPE................................................................................................................................ 1
BACKGROUND ................................................................................................................... 1
iii
1. INTRODUCTION
1.1 PURPOSE
This document provides the Privacy Program Breach Notification Policy.
1.2 SCOPE
This Policy applies to all employees and all bureaus, offices, and missions of the United
States Agency for International Development (USAID).
Although most incidents involve information technology, a privacy breach may also
involve physical security considerations (such as with paper documents, removable media,
mobile devices) that may cause the compromise of PII.
1.3 BACKGROUND
USAID must manage, in accordance with Federal laws and regulations, the information it
collects, uses, maintains, and disseminates in support of its mission and business functions.
Some information, such as PII, requires additional protection due to its sensitivity and the
risks of misuse associated with a potential unauthorized disclosure.
USAID is responsible for safeguarding the PII in its possession and for preventing the
breach of PII entrusted to the Agency. Any unauthorized use, disclosure, or loss of PII can
result in the loss of the public's trust and confidence in the Agencys ability to properly
protect such information. In addition to efforts to ensure proper PII safeguards, USAID
must have an appropriate PII breach notification policy to mitigate any potential harm
caused by any PII breaches.\
PII breaches may have far-reaching implications for the individuals whose PII is
compromised, including identity theft which might result in financial loss and/or personal
hardship to the individual. A PII breach may also require significant USAID staff, time,
assets, and financial resources to mitigate, which may prevent the Agency from allocating
those resources elsewhere. USAID is responsible for mitigating the risks associated with
the inadvertent loss, or unapproved use or disclosure of PII. Protecting PII in the
possession of USAID and preventing its breach are necessary to ensure that USAID retains
the trust of the American public.
In compliance with the May 22, 2007, OMB Memorandum M-07-16, entitled
Safeguarding Against and Responding to the Breach of Personally Identifiable
Information, USAID has established this Privacy Program Breach Notification Policy.
This Policy ensures that USAID responses to PII breaches are consistent, comprehensive,
complete, and delivered in an effective and timely manner, in order to minimize risk to
individuals and the Agency.
The Privacy Analyst will coordinate with CSIRT to report actual breaches to the United
States Computer Emergency Response Team (US-CERT).
The Privacy Analyst evaluates whether there is evidence of actual harm from a privacy
breach and estimates the level of risk of PII compromise (low, moderate, or high risk).
The Privacy Analyst then submits recommendations to the CPO regarding how the Agency
should response to a specific privacy breach and whether notification is appropriate.
involved in an incident. The CIO Service Desk also establishes and implements tools and
processes to ensure timely reporting of privacy incidents to CSIRT.
4. APPENDICES
4.1 APPENDIX A DEFINITIONS
This section describes selected terms used in this document.
Access means the ability or opportunity to gain knowledge of personally identifiable
information.
Breach is used to include the loss of control, compromise, unauthorized disclosure,
unauthorized acquisition, unauthorized access, or any similar term referring to situations
where persons other than authorized users and for an other than authorized purpose have
access or potential access to personally identifiable information, whether physical or
electronic.
Harm means damage, fiscal damage, or loss or misuse of information which adversely
affects one or more individuals or undermines the integrity of a system or program.
Incident means a violation or imminent threat of violation of security policies, acceptable
use policies, or standard security practices, involving the breach of personally identifiable
information, whether in electronic or paper format.
Individual means a citizen of the United States or an alien lawfully admitted for permanent
residence.
Personally Identifiable Information (PII) is information which can be used to distinguish
or trace an individual's identity, such as their name, social security number, biometric
records, etc. alone, or when combined with other personal or identifying information which
is linked or linkable to a specific individual, such as date and place of birth, mothers
November 19, 2013
maiden name, etc. The definition of PII is not anchored to any single category of
information or technology. Rather, it requires a case-by-case assessment of the specific
risk that an individual can be identified. In performing this assessment, it is important for
an agency to recognize that non-PII can become PII whenever additional information is
made publicly available in any medium and from any source that, when combined
with other available information, could be used to identify an individual.
Risk means the level of impact on organizational operations (including mission, functions,
image, or reputation), organizational assets, or individuals resulting from the operation of
an information system, given the potential impact of a threat and the likelihood of that
threat occurring.
Risk Assessment means the process of identifying risks to organizational operations
(including mission, functions, image, or reputation), organizational assets, or individuals
resulting from the operation of an information system. Part of risk management and
synonymous with risk analysis, risk assessment incorporates threat and vulnerability
analyses and considers mitigations provided by established or planned security controls.
OMB Policies
M-05-08, Designation of Senior Agency Officials for Privacy (Feb. 11, 2005)
M-06-15, Safeguarding Personally Identifiable Information (May 22, 2006)
M-06-16, Protection of Sensitive Agency Information (June 23, 2006)
M-06-19, Reporting Incidents Involving Personally Identifiable Information and
Incorporating the Cost for Security in Agency Information Technology Investments
(July 12, 2006)
OMB Memorandum, Recommendations for Identity Theft Related Data Breach
Notification (September 20, 2006)
M-07-16, Safeguarding Against and Responding to the Breach of Personally
Identifiable Information (May 22, 2007)
NIST Guidance
NIST SP 800-61, Rev. 2, Computer Security Incident Handling Guide (August 2012)
NIST SP 800-122, Guide to Protecting the Confidentiality of Personally Identifiable
Information (PII) (April 2010)
USAID Policies
ADS 508, USAID Privacy Policy
ADS 545, Information Systems Security
508mai_030714