Personal Information

Agency and Reseller Adherence to Key Privacy Principles Gao ID: GAO-06-421 April 4, 2006

Federal agencies collect and use personal information for various purposes, both directly from individuals and from other sources, including information resellers--companies that amass and sell data from many sources. In light of concerns raised by recent security breaches involving resellers, GAO was asked to determine how the Departments of Justice, Homeland Security, and State and the Social Security Administration use personal data from these sources. In addition, GAO reviewed the extent to which information resellers' policies and practices reflect the Fair Information Practices, a set of widely accepted principles for protecting the privacy and security of personal data. GAO also examined agencies' policies and practices for handling personal data from resellers to determine whether these reflect the Fair Information Practices.

In fiscal year 2005, the Departments of Justice, Homeland Security, and State and the Social Security Administration reported that they used personal information obtained from resellers for a variety of purposes. Components of the Department of Justice (the largest user of resellers) used such information in performing criminal investigations, locating witnesses and fugitives, researching assets held by individuals of interest, and detecting prescription drug fraud. The Department of Homeland Security used reseller information for immigration fraud detection and border screening programs. Uses by the Social Security Administration and the Department of State were to prevent and detect fraud, verify identity, and determine eligibility for benefits. The agencies spent approximately $30 million on contractual arrangements with resellers that enabled the acquisition and use of such information. About 91 percent of the planned fiscal year 2005 spending was for law enforcement (69 percent) or counterterrorism (22 percent). The major information resellers that do business with the federal agencies we reviewed have practices in place to protect privacy, but these measures are not fully consistent with the Fair Information Practices. For example, the principles that the collection and use of personal information should be limited and its intended use specified are largely at odds with the nature of the information reseller business, which presupposes that personal information can be made available to multiple customers and for multiple purposes. Resellers said they believe it is not appropriate for them to fully adhere to these principles because they do not obtain their information directly from individuals. Nonetheless, in many cases, resellers take steps that address aspects of the Fair Information Practices. For example, resellers reported that they have taken steps recently to improve their security safeguards, and they generally inform the public about key privacy principles and policies. However, resellers generally limit the extent to which individuals can gain access to personal information held about themselves, as well as the extent to which inaccurate information contained in their databases can be corrected or deleted. Agency practices for handling personal information acquired from information resellers did not always fully reflect the Fair Information Practices. That is, some of these principles were mirrored in agency practices, but for others, agency practices were uneven. For example, although agencies issued public notices on information collections, these did not always notify the public that information resellers were among the sources to be used. This practice is not consistent with the principle that individuals should be informed about privacy policies and the collection of information. Contributing to the uneven application of the Fair Information Practices are ambiguities in guidance from the Office of Management and Budget (OMB) regarding the applicability of privacy requirements to federal agency uses of reseller information. In addition, agencies generally lack policies that specifically address these uses.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-06-421, Personal Information: Agency and Reseller Adherence to Key Privacy Principles This is the accessible text file for GAO report number GAO-06-421 entitled 'Personal Information: Agency and Reseller Adherence to Key Privacy Principles' which was released on April 4, 2006. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Committees: April 2006: Personal Information: Agency and Reseller Adherence to Key Privacy Principles: GAO-06-421: GAO Highlights: Highlights of GAO-06-421, a report to congressional committees: Why GAO Did This Study: Federal agencies collect and use personal information for various purposes, both directly from individuals and from other sources, including information resellers”companies that amass and sell data from many sources. In light of concerns raised by recent security breaches involving resellers, GAO was asked to determine how the Departments of Justice, Homeland Security, and State and the Social Security Administration use personal data from these sources. In addition, GAO reviewed the extent to which information resellers‘ policies and practices reflect the Fair Information Practices, a set of widely accepted principles for protecting the privacy and security of personal data. GAO also examined agencies‘ policies and practices for handling personal data from resellers to determine whether these reflect the Fair Information Practices. What GAO Found: In fiscal year 2005, the Departments of Justice, Homeland Security, and State and the Social Security Administration reported that they used personal information obtained from resellers for a variety of purposes. Components of the Department of Justice (the largest user of resellers) used such information in performing criminal investigations, locating witnesses and fugitives, researching assets held by individuals of interest, and detecting prescription drug fraud. The Department of Homeland Security used reseller information for immigration fraud detection and border screening programs. Uses by the Social Security Administration and the Department of State were to prevent and detect fraud, verify identity, and determine eligibility for benefits. The agencies spent approximately $30 million on contractual arrangements with resellers that enabled the acquisition and use of such information. About 91 percent of the planned fiscal year 2005 spending was for law enforcement (69 percent) or counterterrorism (22 percent). The major information resellers that do business with the federal agencies we reviewed have practices in place to protect privacy, but these measures are not fully consistent with the Fair Information Practices. For example, the principles that the collection and use of personal information should be limited and its intended use specified are largely at odds with the nature of the information reseller business, which presupposes that personal information can be made available to multiple customers and for multiple purposes. Resellers said they believe it is not appropriate for them to fully adhere to these principles because they do not obtain their information directly from individuals. Nonetheless, in many cases, resellers take steps that address aspects of the Fair Information Practices. For example, resellers reported that they have taken steps recently to improve their security safeguards, and they generally inform the public about key privacy principles and policies. However, resellers generally limit the extent to which individuals can gain access to personal information held about themselves, as well as the extent to which inaccurate information contained in their databases can be corrected or deleted. Agency practices for handling personal information acquired from information resellers did not always fully reflect the Fair Information Practices. That is, some of these principles were mirrored in agency practices, but for others, agency practices were uneven. For example, although agencies issued public notices on information collections, these did not always notify the public that information resellers were among the sources to be used. This practice is not consistent with the principle that individuals should be informed about privacy policies and the collection of information. Contributing to the uneven application of the Fair Information Practices are ambiguities in guidance from the Office of Management and Budget (OMB) regarding the applicability of privacy requirements to federal agency uses of reseller information. In addition, agencies generally lack policies that specifically address these uses. What GAO Recommends: The Congress should consider the extent to which resellers should adhere to the Fair Information Practices. In addition, GAO is making recommendations to OMB and the four agencies to establish policy to address agency use of personal information from commercial sources. Agency officials generally agreed with the content of this report. Resellers questioned the applicability of the Fair Information Practices, especially with regard to public records. www.gao.gov/cgi-bin/getrpt?GAO-06-421. To view the full product, including the scope and methodology, click on the link above. For more information, contact Linda Koontz at (202) 512- 6240 or koontzl@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: Using Governmentwide Contracts, Federal Agencies Obtain Personal Information from Information Resellers for a Variety of Purposes: Resellers Take Steps to Protect Privacy, but These Measures Are Not Fully Consistent with the Fair Information Practices: Agencies Lack Policies on Use of Reseller Data, and Practices Do Not Consistently Reflect the Fair Information Practices: Conclusions: Matter for Congressional Consideration: Recommendations for Executive Action: Agency Comments and Our Evaluation: Comments from Information Resellers: Appendixes: Appendix I: Objectives, Scope, and Methodology: Appendix II: Federal Laws Affecting Information Resellers: Gramm-Leach-Bliley Act: Health Insurance Portability and Accountability Act: Fair Credit Reporting Act: Fair and Accurate Credit Transactions Act: Appendix III: Comments from the Department of Justice: Appendix IV: Comments from the Department of Homeland Security: Appendix V: Comments from the Social Security Administration: Appendix VI: Comments from the Department of State: Tables: Table 1: Federal Laws Addressing Private Sector Disclosure of Personal Information: Table 2: The OECD Fair Information Practices: Table 3: Reported Uses of Personal Information: Department of Justice Contracts with Information Resellers, Fiscal Year 2005: Table 4: Reported Uses of Personal Information: DHS Contracts with Information Resellers, Fiscal Year 2005: Table 5: Reported Uses of Personal Information: SSA Contracts with Information Resellers, Fiscal Year 2005: Table 6: Reported Uses of Personal Information: Department of State Contracts with Information Resellers, Fiscal Year 2005: Table 7: Information Resellers' Application of Principles of the Fair Information Practices: Table 8: Application of Fair Information Practices to the Reported Handling of Personal Information from Data Resellers at Four Agencies: Figures: Figure 1: Typical Information Flow through Resellers to Government Customers: Figure 2: Fiscal Year 2005 Contractual Vehicles Enabling the Use of Personal Information from Information Resellers, Categorized by Reported Use: Figure 3: Total Dollar Values, Categorized by Agency, of Fiscal Year 2005 Acquisition of Personal Information from Information Resellers: APEC: Asia-Pacific Economic Cooperation: ATF: Bureau of Alcohol, Tobacco, Firearms, and Explosives: CBP: Customs and Border Protection: DEA: Drug Enforcement Administration: DHS: Department of Homeland Security: FBI: Federal Bureau of Investigation: FEDLINK: Federal Library and Information Network: FEMA: Federal Emergency Management Agency: FISMA: Federal Information Security Management Act: FTTTF: Foreign Terrorist Tracking Task Force: GSA: General Services Administration: ICE: Immigration and Customs Enforcement: OECD: Organization for Economic Cooperation and Development: OIG: Office of the Inspector General: OMB: Office of Management and Budget: PIA: privacy impact assessment: SSA: Social Security Administration: TSA: Transportation Security Administration: USCIS: Citizenship and Immigration Services: Letter April 4, 2006: Congressional Committees: Recent security breaches at large information resellers, such as ChoicePoint and LexisNexis, have highlighted the extent to which such companies collect and disseminate personal information.[Footnote 1] Information resellers are companies that collect information, including personal information about consumers, from a wide variety of sources for the purpose of reselling such information to their customers, which include both private-sector businesses and government agencies. Before advanced computerized techniques made aggregating and disseminating such information relatively easy, much personal information was less accessible, being stored in paper-based public records at courthouses and other government offices or in the files of nonpublic businesses. However, information resellers have now amassed extensive amounts of personal information about large numbers of Americans, and federal agencies access this information for a variety of reasons. Federal agency use of such information is governed primarily by the Privacy Act of 1974,[Footnote 2] which requires that the use of personal information be limited to predefined purposes and involve only information germane to those purposes. The provisions of the Privacy Act are largely based on a set of principles for protecting the privacy and security of personal information, known as the Fair Information Practices, which were first proposed in 1973 by a U.S. government advisory committee.[Footnote 3] These principles, now widely accepted, include: * collection limitation, * data quality, * purpose specification, * use limitation, * security safeguards, * openness, * individual participation, and: * accountability.[Footnote 4] These principles, with some variation, are used by organizations to address privacy considerations in their business practices and are also the basis of privacy laws and related policies in many countries, including the United States, Germany, Sweden, Australia, New Zealand, and the European Union. Given recent events involving information resellers and federal agencies' use of information obtained from these resellers, you asked us to review how selected federal agencies use such information. Specifically, our objectives were to determine (1) how the Departments of Justice, Homeland Security (DHS), and State and the Social Security Administration (SSA) are making use of personal information obtained through contracts with information resellers; (2) the extent to which information resellers providing personal information to these agencies have policies and practices in place that reflect the Fair Information Practices; and (3) the extent to which these agencies have policies and practices in place for the handling of personal data from resellers that reflect the Fair Information Practices. To address our first objective, we analyzed fiscal year 2005 contracts and other vehicles for the acquisition of personal information from information resellers by DHS, Justice, State, and SSA to identify their purpose, scope, and value. We obtained additional information on these contracts and uses in discussions with agency officials to ensure that all relevant information had been provided to us. To address our second objective, we reviewed documentation from five major information resellers[Footnote 5] and conducted site visits at three of them[Footnote 6] to obtain information on privacy and security policies and procedures and compared these with the Fair Information Practices. In conducting our analysis, we identified the extent to which reseller practices were consistent with the key privacy principles of the Fair Information Practices. We also assessed the potential effect of any inconsistencies; however, we did not attempt to make determinations of whether or how information reseller practices should change. Such determinations are a matter of policy based on balancing the public's right to privacy with the value of services provided by resellers to customers such as government agencies. We determined that the five resellers we reviewed accounted for most of the contract value of personal information obtained from resellers in fiscal year 2005 by the four agencies we reviewed. We did not evaluate the effectiveness of resellers' information security programs. To address our third objective, we identified and evaluated agency guidelines and management policies and procedures governing the use of personal information obtained from information resellers and compared these to the Fair Information Practices. We also conducted interviews at the four agencies with senior agency officials designated for privacy issues as well as officials of the Office of Management and Budget (OMB) to obtain their views on the applicability of federal privacy laws and related guidance to agency use of information resellers. We performed our work from May 2005 to March 2006 in the Washington, D.C., metropolitan area; Little Rock, Arkansas; Alpharetta, Georgia; and Miamisburg, Ohio. Our work was performed in accordance with generally accepted government auditing standards. Our objectives, scope, and methodology are discussed in more detail in appendix I. Results in Brief: In fiscal year 2005, Justice, DHS, State, and SSA reported using personal information from information resellers for a variety of purposes, including law enforcement, counterterrorism, fraud prevention, and debt collection. Taken together, approximately 91 percent of planned spending on resellers reported by the agencies for fiscal year 2005 was for law enforcement (69 percent) or counterterrorism (22 percent). For example, components of the Department of Justice (the largest user of resellers) made use of such information for criminal investigations, location of witnesses and fugitives, research of assets held by individuals of interest, and detection of fraud in prescription drug transactions. Examples of uses by the DHS include immigration fraud detection and border screening programs. SSA and State acquire personal information from information resellers for fraud detection and investigation, identity verification, and benefit eligibility determination. The four agencies obtained personal information from resellers primarily through two general- purpose governmentwide contract vehicles--the Federal Supply Schedule of the General Services Administration (GSA) and the Library of Congress's Federal Library and Information Network. Collectively, the four agencies reported approximately $30 million[Footnote 7] in fiscal year 2005 in contractual arrangements with information resellers that enabled the acquisition and use of personal information. The major information resellers that do business with the federal agencies we reviewed have practices in place to protect privacy, but these measures are not fully consistent with the Fair Information Practices. For example, the nature of the information reseller business is largely at odds with the principles of collection limitation, data quality, purpose specification, and use limitation. These principles center on limiting the collection and use of personal information, and they link data quality (e.g., accuracy) requirements to these limitations. Resellers said they believe it may not be appropriate or practical for them to fully adhere to these principles because they do not obtain their information directly from individuals. In fact, the information reseller industry is based on multipurpose collection and use of personal and other information[Footnote 8] information from multiple sources. In many cases, resellers take steps that address aspects of the Fair Information Practices. For example, resellers reported that they have taken steps recently to improve their security safeguards, and they generally inform the public about key privacy principles and policies (relevant to the openness principle). However, resellers generally limit the extent to which individuals can gain access to personal information held about themselves as well as the extent to which inaccurate information contained in their databases can be corrected or deleted (relevant to the individual participation principle). Agency practices for handling personal information acquired from information resellers reflected the principles of the Fair Information Practices in four cases and in the other four did not. Specifically, regarding the collection limitation, data quality, use limitation, and security safeguards principles, agency practices generally reflected the Fair Information Practices. For example, regarding the data quality principle that data should be accurate, current, and complete, as needed for the defined purpose, law enforcement agencies (including the Federal Bureau of Investigation and the U.S. Secret Service) generally reported that they corroborate information obtained from resellers to ensure that it is accurate when it is used as part of an investigation. Regarding other principles, however, agency practices were uneven. Specifically, agencies did not always have practices in place to fully address the purpose specification, individual participation, openness, and accountability principles with regard to use of reseller information. For example, * although agencies notify the public through Federal Register notices and published privacy impact assessments that they collect personal information from various sources, they do not always indicate specifically that information resellers are among those sources, and: * some agencies lack robust audit mechanisms to ensure that use of personal information from information resellers is for permissible purposes, reflecting an uneven application of the accountability principle. Contributing to the uneven application of the Fair Information Practices are ambiguities in guidance from OMB regarding the applicability of privacy requirements to federal agency uses of reseller information. In addition, agencies generally lack policies that specifically address these uses. The Congress should consider the extent to which information resellers should adhere to the Fair Information Practices. We are also recommending that the Director, OMB, revise privacy guidance to clarify the applicability of requirements for public notices and privacy impact assessments to agency use of personal information from resellers and direct agencies to review their uses of such information to ensure it is explicitly referenced in privacy notices and assessments. Further, we are recommending that agencies develop specific policies for the use of personal information from resellers. We obtained written comments on a draft of this report from Justice, DHS, SSA, and State. We also received comments via E-mail from OMB. Comments from Justice, DHS, SSA, and State are reproduced in appendixes III to VI, respectively. Justice, DHS, SSA, and OMB all generally agreed with the report and described actions initiated to address our recommendations. In its comments, Justice recommended that prior to issuance of any new or revised policy, careful consideration be given to its impact on Justice. We believe the policy clarifications we are proposing are unlikely to result in an adverse impact on law enforcement activities at Justice. Justice and SSA also provided technical comments, which were incorporated in the final report as appropriate. State interpreted our draft report to "rest on the premise that records from 'information resellers' should be accorded special treatment when compared with sensitive information from other sources." State also indicated that it does not distinguish between types of information or sources of information in complying with privacy laws. However, our report does not suggest that data from resellers should receive special treatment. Instead, our report takes the widely accepted Fair Information Practices as a universal benchmark of privacy protections and assesses agency practices in comparison with them. We also obtained comments on excerpts of our draft report from the five information resellers we reviewed. Several resellers raised concerns regarding the version of the Fair Information Practices we used to assess their practices, stating their view that it was more appropriate for organizations that collection information directly from consumers and that they were not legally bound to adhere to the Fair Information Practices. As discussed in our report, the version of the Fair Information Practices we used has been widely adopted and cited within the federal government as well as internationally. Further, we use it as an analytical framework for identifying potential privacy issues for further consideration by Congress--not as criteria for strict compliance. Resellers also stated that the draft did not take into account that public record information is open to all for any use not prohibited by state or federal law. However, we believe it is not clear that individuals give up all privacy rights to personal information contained in public records, and we believe it is important to assess the status of privacy protections for all personal information being offered commercially to the government so that informed policy decision can be made about the appropriate balance between resellers' services and the public's right to privacy. Resellers also offered technical comments, which were incorporated in the final report as appropriate. Background: Before advanced computerized techniques for aggregating, analyzing, and disseminating data came into widespread use, personal information contained in paper-based public records at courthouses or other government offices was relatively difficult to obtain, usually requiring a personal visit to inspect the records. Nonpublic information, such as personal information contained in product registrations, insurance applications, and other business records, was also generally inaccessible. In recent years, however, advances in technology have spawned information reseller businesses that systematically collect extensive amounts of personal information from a wide variety of sources and make it available electronically over the Internet and by other means to customers in both government and the private sector. This automation of the collection and aggregation of multiple-source data, combined with the ease and speed of its retrieval, have dramatically reduced the time and effort needed to obtain information of this type. Among the primary customers of information resellers are financial institutions (including insurance companies), retailers, law offices, telecommunications and technology companies, and marketing firms. We use the term "information resellers" to refer to businesses that vary in many ways but have in common the fact that they collect and aggregate personal information from multiple sources and make it available to their customers. These businesses do not all focus exclusively on aggregating and reselling personal information. For example, Dun & Bradstreet primarily provides information on commercial enterprises for the purpose of contributing to decision making regarding those enterprises. In doing so, it may supply personal information about individuals associated with those commercial enterprises. To a certain extent, the activities of information resellers may also overlap with the functions of consumer reporting agencies, also known as credit bureaus--entities that collect and sell information about individuals' creditworthiness, among other things. As is discussed further below, to the extent that information resellers perform the functions of consumer reporting agencies, they are subject to legislation specifically addressing that industry, particularly the Fair Credit Reporting Act. Information resellers obtain personal information from many different sources. Generally, three types of information are collected: public records, publicly available information, and nonpublic information. * Public records are a primary source of information about consumers, available to anyone, and can be obtained from governmental entities. What constitutes public records is dependent upon state and federal laws, but generally these include birth and death records, property records, tax lien records, motor vehicle registrations, voter registrations, licensing records, and court records (including criminal records, bankruptcy filings, civil case files, and legal judgments). * Publicly available information is information not found in public records but nevertheless publicly available through other sources. These sources include telephone directories, business directories, print publications such as classified ads or magazines, Internet sites, and other sources accessible by the general public. * Nonpublic information is derived from proprietary or nonpublic sources, such as credit header data,[Footnote 9] product warranty registrations, and other application information provided to private businesses directly by consumers. Private sector businesses rely on information resellers for information to support a variety of activities, such as: * conducting pre-employment background checks on prospective employees, * verifying individuals' identities by reviewing records of their personal information; * marketing commercial products to consumers matching specified demographic characteristics; and: * preventing financial fraud by examining insurance, asset, and other financial record information. Typically, while information resellers may collect and maintain personal information in a variety of databases, they provide their customers with a single, consolidated online source for a broad array of personal information. Figure 1 illustrates how information is collected from multiple sources and ultimately accessed by customers, including government agencies, through contractual agreements. Figure 1: Typical Information Flow through Resellers to Government Customers: [See PDF for image] [End of figure] In addition to providing consolidated access to personal information through Internet-based Web sites, information resellers offer a variety of products tailored to the specific needs of various lines of business. For example, an insurance company could obtain different products covering police and accident reports, insurance carrier information, vehicle owner verification or claims history, or online public records. Typically, services offered to law enforcement officers include more information--including sensitive information, such as full Social Security numbers and driver's license numbers--than is offered to other customers. Federal Laws and Guidance Govern Use of Personal Information in Federal Agencies: There is no single federal law that governs all use or disclosure of personal information. Instead, U.S. law includes a number of separate statutes that provide privacy protections for information used for specific purposes or maintained by specific types of entities. The major requirements for the protection of personal privacy by federal agencies come from two laws, the Privacy Act of 1974 and the privacy provisions of the E-Government Act of 2002. The Federal Information Security Management Act of 2002 (FISMA) also addresses the protection of personal information in the context of securing federal agency information and information systems. The Privacy Act places limitations on agencies' collection, disclosure, and use of personal information maintained in systems of records. The act describes a "record" as any item, collection, or grouping of information about an individual that is maintained by an agency and contains his or her name or another personal identifier. It also defines "system of records" as a group of records under the control of any agency from which information is retrieved by the name of the individual or by an individual identifier. The Privacy Act requires that when agencies establish or make changes to a system of records, they must notify the public by a notice in the Federal Register identifying, among other things, the type of data collected, the types of individuals about whom information is collected, the intended "routine" uses of data, and procedures that individuals can use to review and correct personal information.[Footnote 10] The act's requirements also apply to government contractors when agencies contract for the development and maintenance of a system of records to accomplish an agency function.[Footnote 11] The act limits its applicability to cases in which systems of records are maintained specifically on behalf of a government agency. Several provisions of the act require agencies to define and limit themselves to specific predefined purposes. For example, the act requires that to the greatest extent practicable, personal information should be collected directly from the subject individual when it may affect an individual's rights or benefits under a federal program. The act also requires that an agency inform individuals whom it asks to supply information of (1) the authority for soliciting the information and whether disclosure of such information is mandatory or voluntary; (2) the principal purposes for which the information is intended to be used; (3) the routine uses that may be made of the information; and (4) the effects on the individual, if any, of not providing the information. According to OMB, this requirement is based on the assumption that individuals should be provided with sufficient information about the request to make a decision about whether to respond. In handling collected information, the Privacy Act also requires agencies to, among other things, allow individuals to (1) review their records (meaning any information pertaining to them that is contained in the system of records), (2) request a copy of their record or information from the system of records, and (3) request corrections in their information. Such provisions can provide a strong incentive for agencies to correct any identified errors. Agencies are allowed to claim exemptions from some of the provisions of the Privacy Act if the records are used for certain purposes. For example, records compiled for criminal law enforcement purposes can be exempt from a number of provisions, including (1) the requirement to notify individuals of the purposes and uses of the information at the time of collection and (2) the requirement to ensure the accuracy, relevance, timeliness, and completeness of records. A broader category of investigative records compiled for criminal or civil law enforcement purposes can also be exempted from a somewhat smaller number of Privacy Act provisions, including the requirement to provide individuals with access to their records and to inform the public of the categories of sources of records. In general, the exemptions for law enforcement purposes are intended to prevent the disclosure of information collected as part of an ongoing investigation that could impair the investigation or allow those under investigation to change their behavior or take other actions to escape prosecution. The E-Government Act of 2002 strives to enhance protection for personal information in government information systems or information collections by requiring that agencies conduct privacy impact assessments (PIA). A PIA is an analysis of how personal information is collected, stored, shared, and managed in a federal system. More specifically, according to OMB guidance,[Footnote 12] a PIA is an analysis of how information is handled: (i) to ensure handling conforms to applicable legal, regulatory, and policy requirements regarding privacy; (ii) to determine the risks and effects of collecting, maintaining, and disseminating information in identifiable form in an electronic information system; and (iii) to examine and evaluate protections and alternative processes for handling information to mitigate potential privacy risks. Agencies must conduct PIAs (1) before developing or procuring information technology that collects, maintains, or disseminates information that is in a personally identifiable form or (2) before initiating any new data collections involving personal information that will be collected, maintained, or disseminated using information technology if the same questions are asked of 10 or more people. OMB guidance also requires agencies to conduct PIAs when a system change creates new privacy risks, for example, changing the way in which personal information is being used. The requirement does not apply to all systems. For example, no assessment is required when the information collected relates to internal government operations, the information has been previously assessed under an evaluation similar to a PIA, or when privacy issues are unchanged. FISMA also addresses the protection of personal information. FISMA defines federal requirements for securing information and information systems that support federal agency operations and assets; it requires agencies to develop agencywide information security programs that extend to contractors and other providers of federal data and systems.[Footnote 13] Under FISMA, information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction, including controls necessary to preserve authorized restrictions on access and disclosure to protect personal privacy, among other things. OMB is tasked with providing guidance to agencies on how to implement the provisions of the Privacy Act and the E-Government Act and has done so, beginning with guidance on the Privacy Act, issued in 1975.[Footnote 14] The guidance provides explanations for the various provisions of the law as well as detailed instructions for how to comply. OMB's guidance on implementing the privacy provisions of the E- Government Act of 2002 identifies circumstances under which agencies must conduct PIAs and explains how to conduct them. OMB has also issued guidance on implementing the provisions of FISMA. Additional Laws Provide Privacy Protections for Specific Types and Uses of Information: Although federal laws do not specifically regulate the information reseller industry as a whole, they provide safeguards for personal information under certain specific circumstances, such as when financial or health information is involved, or for such activities as pre-employment background checks. Specifically, the Fair Credit Reporting Act, the Gramm-Leach-Bliley Act, the Driver's Privacy Protection Act, and the Health Insurance Portability and Accountability Act all restrict the ways in which businesses, including information resellers, may use and disclose consumers' personal information (see app. II for more details about these laws). The Gramm-Leach-Bliley Act, for example, limits financial institutions' disclosure of nonpublic personal information to nonaffiliated third parties and requires companies to give consumers privacy notices that explain the institutions' information sharing practices. Consumers then have the right to limit some, but not all, sharing of their nonpublic personal information. As shown in table 1, these laws either restrict the circumstances under which entities such as information resellers are allowed to disclose personal information or restrict the parties with whom they are allowed to share information. Table 1: Federal Laws Addressing Private Sector Disclosure of Personal Information: Federal laws: Fair Credit Reporting Act; Provisions: Consumer reporting agencies are limited to providing data only to their customers that have a permissible purpose for using the data. With few exceptions, government agencies are treated like other parties and must have a permissible purpose in order to obtain a consumer report. Federal laws: Gramm-Leach-Bliley Act; Provisions: Sets limitations on financial institutions' disclosure of customer data to third parties, such as information resellers. Requires companies to give consumers privacy notices that explain the institutions' information-sharing practices. In turn, consumers have the right to limit some, but not all, sharing of their nonpublic personal information. Federal laws: Driver's Privacy Protection Act; Provisions: Restricts a third party's ability to obtain Social Security numbers and other driver's license information from state motor vehicle offices unless doing so for a permissible purpose under the law; restricts state motor vehicle offices' ability to disclose driver's license information. Federal laws: Health Insurance Portability and Accountability Act; Provisions: Health care organizations are restricted from disclosing a patient's health information without the patient's consent, except for permissible reasons, and are required to inform individuals of privacy practices. Federal laws: Fair and Accurate Credit Transactions Act; Provisions: Consumers may obtain one free annual consumer report from nationwide consumer reporting agencies. Source: GAO analysis. Note: Appendix II provides additional details on the requirements of these laws. [End of table] Information resellers are also affected by various state laws. For example, California state law requires businesses to notify consumers about security breaches that could directly affect them. Legal requirements, such as the California law, led ChoicePoint, a large information reseller, to notify its customers in mid-February 2005 of a security breach in which unauthorized persons gained access to personal information from its databases. Since the ChoicePoint notification, bills were introduced in at least 35 states and enacted in at least 22 states[Footnote 15] that require some form of notification upon a security breach. The Fair Information Practices Are Widely Agreed to Be Key Principles for Privacy Protection: The Fair Information Practices are a set of internationally recognized privacy protection principles. First proposed in 1973 by a U.S. government advisory committee, the Fair Information Practices were intended to address what the committee termed a poor level of protection afforded to privacy under contemporary law.[Footnote 16] A revised version of the Fair Information Practices, developed by the Organization for Economic Cooperation and Development (OECD)[Footnote 17] in 1980, has been widely adopted. The OECD principles are shown in table 2. Table 2: The OECD Fair Information Practices: Principle: Collection limitation; Description: The collection of personal information should be limited, should be obtained by lawful and fair means, and, where appropriate, with the knowledge or consent of the individual. Principle: Data quality; Description: Personal information should be relevant to the purpose for which it is collected, and should be accurate, complete, and current as needed for that purpose. Principle: Purpose specification; Description: The purposes for the collection of personal information should be disclosed before collection and upon any change to that purpose, and its use should be limited to those purposes and compatible purposes. Principle: Use limitation; Description: Personal information should not be disclosed or otherwise used for other than a specified purpose without consent of the individual or legal authority. Principle: Security safeguards; Description: Personal information should be protected with reasonable security safeguards against risks such as loss or unauthorized access, destruction, use, modification, or disclosure. Principle: Openness; Description: The public should be informed about privacy policies and practices, and individuals should have ready means of learning about the use of personal information. Principle: Individual participation; Description: Individuals should have the following rights: to know about the collection of personal information, to access that information, to request correction, and to challenge the denial of those rights. Principle: Accountability; Description: Individuals controlling the collection or use of personal information should be accountable for taking steps to ensure the implementation of these principles. Source: OECD. [End of table] The Fair Information Practices are, with some variation, the basis of privacy laws and related policies in many countries, including the United States, Germany, Sweden, Australia, New Zealand, and the European Union.[Footnote 18] They are also reflected in a variety of federal agency policy statements, beginning with an endorsement of the OECD principles by the Department of Commerce in 1981,[Footnote 19] and including policy statements of the DHS, Justice, Housing and Urban Development, and Health and Human Services.[Footnote 20] In 2004, the Chief Information Officers Council issued a coordinating draft of their Security and Privacy Profile for the Federal Enterprise Architecture[Footnote 21] that links privacy protection with a set of acceptable privacy principles corresponding to the OECD's version of the Fair Information Practices. The Fair Information Practices are not precise legal requirements. Rather, they provide a framework of principles for balancing the need for privacy with other public policy interests, such as national security, law enforcement, and administrative efficiency. Striking that balance varies among countries and among types of information (e.g., medication versus employment information). The Fair Information Practices also underlie the provisions of the Privacy Act of 1974. For example, the system of records notice required under the Privacy Act embodies the purpose specification, openness, and individual participation principles in that it provides a public accounting through the Federal Register of the purpose and uses for personal information, and procedures by which individuals may access and correct, if necessary, information about themselves. Further, the E- Government Act's requirement to conduct PIAs likewise reflects the Fair Information Practices. Under the act, agencies are to make these assessments publicly available, if practicable, through agency Web sites or by publication in the Federal Register, or other means. To the extent that such assessments are made publicly available, they also provide notice to the public about the purpose of planned information collections and the planned uses of the information being collected. Congressional Interest in the Information Reseller Industry Has Been Heightened: A number of congressional hearings were held and bills introduced in 2005 in the wake of widely publicized data security breaches at major information resellers such as ChoicePoint and LexisNexis as well as other firms. In March 2005, the House Subcommittee on Commerce, Trade, and Consumer Protection of the House Energy and Commerce Committee held a hearing entitled "Protecting Consumers' Data: Policy Issues Raised by ChoicePoint," which focused on potential remedies for security and privacy concerns regarding information resellers. Similar hearings were held by the House Energy and Commerce Committee and by the U.S. Senate Committee on Commerce, Science, and Transportation in spring 2005. The heightened interest in this subject led a number of Members of Congress to propose a variety of bills aimed at regulating companies that handle personal information, including information resellers. Several of these bills require companies such as information resellers to notify the public of security breaches, while a few also allow consumers to "freeze" their credit (i.e., prevent new credit accounts from being opened without special forms of authentication), or see and correct personal information contained in reseller data collections. Other proposed legislation includes (1) the Data Accountability and Trust Act,[Footnote 22] requiring security policies and procedures to protect computerized data containing personal information and nationwide notice in the event of a security breach, and (2) the Personal Data Privacy and Security Act of 2005,[Footnote 23] requiring data brokers to disclose personal electronic records pertaining to an individual and inform individuals on procedures for correcting inaccuracies. Using Governmentwide Contracts, Federal Agencies Obtain Personal Information from Information Resellers for a Variety of Purposes: Primarily through governmentwide contracts, Justice, DHS, State, and SSA reported using personal information obtained from resellers for a variety of purposes, including law enforcement, counterterrorism, fraud detection/prevention, and debt collection. Most uses by Justice were for law enforcement and counterterrorism, such as investigations of fugitives and obtaining information on witnesses and assets held by individuals of interest. DHS also used reseller information primarily for law enforcement and counterterrorism, such as screening vehicles entering the United States. State and SSA reported acquiring personal information from information resellers for fraud detection and investigation, identity verification, and benefit eligibility determination. The four agencies reported approximately $30 million in contractual arrangements with information resellers in fiscal year 2005.[Footnote 24] Justice accounted for most of the funding (about 63 percent). Approximately 91 percent of agency uses of reseller data were in the categories of law enforcement (69 percent) or counterterrorism (22 percent). Figure 2 details contract values categorized by their reported use. (Details on uses by each agency are given in the individual agency discussions.) Figure 2: Fiscal Year 2005 Contractual Vehicles Enabling the Use of Personal Information from Information Resellers, Categorized by Reported Use: [See PDF for image] [End of figure] Department of Justice Uses Information Resellers Primarily for Law Enforcement and Counterterrorism Purposes: According to Justice contract documentation, access to up-to-date and comprehensive public record information is a critical ongoing mission requirement, and the department relies on a wide variety of information resellers--including ChoicePoint, Dun & Bradstreet, LexisNexis, and West--to meet that need. Departmental use of information resellers was primarily for purposes related to law enforcement (75 percent) and counterterrorism (18 percent), including support for criminal investigations, location of witnesses and fugitives, information on assets held by individuals under investigation, and detection of fraud in prescription drug transactions. In fiscal year 2005, Justice and its components reported approximately $19 million in acquisitions from information resellers involving personal information. The department acquired these services primarily through use of GSA's Federal Supply Schedule[Footnote 25] offerings including a blanket purchase agreement[Footnote 26] with ChoicePoint valued at approximately $15 million.[Footnote 27] Several component agencies, such as the Federal Bureau of Investigation (FBI), the Drug Enforcement Administration (DEA), and the Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF) placed orders with information resellers based on the schedules. In addition, for fiscal year 2005, Justice established separate departmentwide contracts with LexisNexis and West valued at $4.5 million and $5.2 million, respectively.[Footnote 28] Tasked to protect and defend the United States against terrorist and foreign intelligence threats and to enforce criminal laws, the FBI is Justice's largest user of information resellers, with about $11 million in contracts in fiscal year 2005. The majority of FBI's use involves two major programs, the Public Source Information Program and the Foreign Terrorist Tracking Task Force (FTTTF). In support of the investigative and intelligence missions of the FBI, the Public Source Information Program provides all offices of the FBI with access via the Internet to public record, legal, and news media information available from various online commercial databases. These databases are used to assist with investigations by identifying the location of individuals and identifying alias names, Social Security numbers, relatives, dates of birth, telephone numbers, vehicles, business affiliations, other associations, and assets. Public Source Information Program officials reported that use of these commercial databases often results in new information regarding the subject of the investigation. Officials noted that commercial databases are used in preliminary investigations, and that subsequently, investigative personnel must verify the results of each search. The FBI's FTTTF also contracts with several information resellers (1) to assist in fulfilling its mission of assisting federal law enforcement and intelligence agencies in locating foreign terrorists and their supporters who are in or have visited the United States and (2) to provide information to other law enforcement and intelligence community agencies that can lead to their surveillance, prosecution, or removal. As we previously reported,[Footnote 29] FTTTF makes use of personal information from several commercial sources to analyze intelligence and detect terrorist activities in support of ongoing investigations by law enforcement agencies and the intelligence community. Information resellers provide FTTTF with names, addresses, telephone numbers, and other biographical and demographical information as well as legal briefs, vehicle and boat registrations, and business ownership records. Other Justice components reported using personal information from information resellers to support the conduct of investigations and other law enforcement-related activities. For example, the U.S. Marshals Service uses an information reseller to, among other things, locate fugitives by identifying a fugitive's relatives and their addresses.[Footnote 30] Through interviews with relatives, a U.S. Marshal may be able to ascertain the location of a fugitive and subsequently apprehend the individual. DEA, the second largest Justice user of information resellers in fiscal year 2005, obtains reseller data to detect fraud in prescription drug transactions.[Footnote 31] Through these data, DEA agents can detect irregular prescription patterns for specific drugs and trace this information to the pharmacy and prescribing doctor.[Footnote 32] DEA also uses an information reseller to locate individuals in asset forfeiture cases.[Footnote 33] Reseller data allows DEA to identify all possible addresses for an individual in order to meet the agency's obligation to make a reasonable effort to notify individuals of seized property and inform them of their rights to contest the seizures. Other uses reported by Justice components are not related to law enforcement. For example, uses by the U.S. Trustees, Antitrust, Civil, Tax, and Criminal Divisions include ascertaining the financial status of individuals for debt collection purposes or bankruptcy proceedings or for the location of individuals for court proceedings. The Executive Office for U.S. Attorneys uses information resellers to ascertain the financial status of those indebted to the United States in order to assess the debtor's ability to repay the debt. According to officials, information reseller databases may reveal assets that a debtor is attempting to conceal. Further, the U.S. Attorneys use information resellers to locate victims of federal crime in order to notify these individuals of relevant court proceedings pursuant to the Justice for All Act.[Footnote 34] Table 3 details in aggregate the vendors, fiscal year 2005 contract values, and reported uses for contracts with information resellers by major Justice components. Table 3: Reported Uses of Personal Information: Department of Justice Contracts with Information Resellers, Fiscal Year 2005: Major component: Federal Bureau of Investigation; Information resellers: ChoicePoint, LexisNexis, West, Credit Bureau Reports, Dun & Bradstreet, Seisint[A]; Aggregate contract value: $11,248,000; Uses involving personal information: Public Source Information Program. Find individuals and identify alias names, Social Security numbers, relatives, dates of birth, telephone numbers, vehicles, business affiliations, associations, and assets. The program provides FBI units with access to public record, legal, and news media information from various online commercial databases; Criminal Investigative Division. Same use. Foreign Terrorist Tracking Task Force. Obtain such information as names, addresses, telephone numbers, other biographical information, vehicle and boat registrations, and business ownership records. Major component: Drug Enforcement Administration; Information resellers: ChoicePoint, LexisNexis, Dun & Bradstreet; Aggregate contract value: $4,283,000; Uses involving personal information: Conduct investigations of drug diversions and improper drug transactions; For example, identifying cases in which physicians sell prescriptions to drug dealers or abusers, pharmacists falsely report legitimate drug sales and subsequently sell the drugs illegally, and employees steal from inventory and falsify orders to hide illicit sales. Support criminal investigations of specific individuals and companies; Locate an individual's address in asset removal cases. Major component: U.S. Marshals Service; Information resellers: ChoicePoint, LexisNexis, West; Aggregate contract value: $1,661,000; Uses involving personal information: Generate leads related to fugitive investigations (e.g., a fugitive's relatives and their contact information). Asset Forfeiture Office. Obtain information on preseized, seized, and forfeited property. The Marshals Service offers property for sale to the public that has been forfeited under laws enforced or administered by Justice and its investigative agencies. Office of General Counsel. Research assets to administer tort claims against the service. For example, if a claimant makes an assertion that the service is responsible for damaging property and does not provide supporting documentation, General Counsel personnel may use commercial data to verify tax assessment records, proof of ownership, etc. Major component: Executive Office for U.S. Attorneys; Information resellers: ChoicePoint, CBR Information Services; Aggregate contract value: $855,000; Uses involving personal information: Financial Litigation Units. Ascertain the financial status of individuals and uncover concealed assets for civil and criminal debt collection efforts; Locate and notify crime victims of relevant court proceedings pursuant to the Justice for All Act of 2004. Major component: Bureau of Alcohol, Tobacco, Firearms, and Explosives; Information resellers: ChoicePoint, Dun & Bradstreet, LexisNexis, West; Aggregate contract value: $791,000; Uses involving personal information: Support investigative activities such as locating and apprehending fugitives or obtaining data on businesses (such as in arson investigations), which may include personal information about business owners. Major component: Executive Office of the United States Trustees; Information resellers: ChoicePoint, Equifax,[B] Real Data Corp, MLS Hawaii; Aggregate contract value: $303,000; Uses involving personal information: Obtain information on assets (openly held or concealed) of individuals in bankruptcy proceedings (as part of office's mission to enforce bankruptcy laws and provide oversight of private trustees). Obtain credit reports on employees as part of a security clearance process. Major component: Office of the Inspector General; Information resellers: ChoicePoint, LexisNexis, West; Aggregate contract value: $43,000; Uses involving personal information: Investigations Division. Support investigations of alleged violations of fraud, abuse, and integrity laws that govern Justice employees, operations, grantees, and contractors. Major component: U.S. National Central Bureau; Information resellers: ChoicePoint; Aggregate contract value: $31,000; Uses involving personal information: Conduct business and address checks on individuals who may be potentially involved in fraud or fugitive cases. The bureau facilitates international law enforcement cooperation as the U.S. representative of the International Criminal Police Organization (INTERPOL). Major component: National Drug Intelligence Center; Information resellers: ChoicePoint; Aggregate contract value: $28,000; Uses involving personal information: Document Exploitation Division. Locate individuals, identify assets, and investigate fraud. The Document Exploitation Division specializes in analyzing information seized in major federal drug investigations. Major component: Office of Justice Programs; Information resellers: Dun & Bradstreet; Aggregate contract value: $22,000; Uses involving personal information: Office of Comptroller, Financial Management Division. Obtain credit reports to assess new grantees' (nongovernmental or nontribal) financial integrity. These credit reports may include personal information on company owners. This information is used to support the new grantee's ability to operate the grant programs of the Office of Justice Programs, to confirm the existence of the company, and to determine any outstanding liens or obligations that might influence the success of the grant program. Major component: Litigating Divisions (Civil, Criminal, Antitrust, and Tax); Information resellers: ChoicePoint, Credit Bureau Reports (division of CBC Companies); Aggregate contract value: $21,000; Uses involving personal information: Civil Division. Locate individuals and assets in connection with litigation for purposes such as obtaining depositions, debt collection, and identifying assets that a debtor may be concealing in bankruptcy proceedings. Criminal Division, Office of Special Investigations. Locate individuals who may have taken part in Nazi-sponsored acts of persecution abroad before and during World War II and who subsequently entered, or seek to enter, the United States illegally and/or fraudulently. Antitrust Division. Locate witnesses for trials. Tax Division. Obtain credit bureau reports for debt collection purposes. Source: Department of Justice. Notes: The table represents fiscal year 2005 contract values and may not reflect actual expenditures. We did not verify the accuracy or completeness of the dollar figures provided to us. Contract values were rounded to the nearest thousand. Several Justice components use departmentwide contracts with LexisNexis and West, which provide, among other things, access to public records information. Several components, including the litigating divisions (Civil, Criminal, Antitrust, and Tax), the Office of Justice Programs, and the Executive Office for U.S. Attorneys, reported that their use of these departmentwide contracts was primarily for legal research, and therefore we did not include these uses in the table. [A] Seisint is now owned by LexisNexis. [B] Equifax is an example of a consumer reporting agency. Consumer reporting agencies, also known as credit bureaus, are entities that collect and sell information about the creditworthiness, among other things, of individuals and are required by the Fair Credit Reporting Act to disclose such information only for permissible purposes. [End of table] DHS Uses Information Resellers Primarily for Law Enforcement and Counterterrorism: In fiscal year 2005, DHS and its components reported that they used information reseller data primarily for law enforcement purposes, such as for developing leads on subjects in criminal investigations and detecting fraud in immigration benefit applications (part of enforcing the immigration laws). Counterterrorism uses involved screening programs at the northern and southern borders as well as at the nation's airports. DHS reported planning to spend about $9 million acquiring personal information from resellers in fiscal year 2005. DHS acquired these services primarily for law enforcement (63 percent) and counterterrorism (35 percent) purposes through FEDLINK--a governmentwide contract vehicle provided by the Library of Congress-- and GSA's Federal Supply Schedule contracts as well as direct purchases by its components. DHS's primary vehicle for acquiring data from information resellers was the FEDLINK contract vehicle, which DHS used to acquire reseller services from Choicepoint ($4.1 million), Dun & Bradstreet ($640,000), LexisNexis ($2 million), and West ($1 million). U.S. Immigration and Customs Enforcement (ICE) is DHS's largest user of personal information from resellers, with acquisitions worth over $4.3 million. The largest investigative component of DHS, ICE has as its mission to prevent acts of terrorism by targeting the people, money, and materials that support terrorist and criminal activities. ICE uses information resellers to collect personal information for criminal investigative purposes and to perform background security checks. Data commonly obtained include address and vehicle information; according to officials, this information is either used to verify data already collected or is itself verified by investigators through other means. For example, ICE's Federal Protective Service has about 50 users who access an information reseller database to assist in properly identifying and locating potential criminal suspects. Investigators may verify an address obtained from the database by confirming billing information with a utility company or by conducting "drive-by" surveillance. The Federal Protective Service views information obtained from resellers as "raw" or "unverified" data, which may or may not be of use to investigators. Other DHS components likewise reported using personal information from resellers to support investigations and other law enforcement-related activities. For example, U.S. Customs and Border Protection (CBP)-- tasked with managing, controlling, and protecting the nation's borders at and between the official ports of entry--uses information resellers for law enforcement, intelligence gathering, and prosecution support. Using these databases, investigators conduct queries on people, businesses, property, and corresponding links via a secure Internet connection. According to officials, information obtained is corroborated with other previously obtained data, open-source information, and investigative leads. CBP also uses a specially developed information reseller product to assist law enforcement officials in vehicle identification at northern and southern land borders. CBP uses electronic readers to capture license plate data on vehicles entering or exiting U.S. borders, converts the data to an electronic format, and transmits the data to an information reseller, which returns U.S. motor vehicle registration information to CBP. The license plate data, merged with the associated motor vehicle registration data provided by the reseller, are then checked against government databases in order to help assess risk related to vehicles (i.e., a vehicle whose license plate is associated with a law enforcement record might be referred for secondary examination). The Federal Emergency Management Agency (FEMA), charged with building and supporting the nation's emergency management system, uses an information reseller to detect fraud in disaster assistance applications. FEMA uses this service to verify information that individuals present in their applications for disaster assistance via the Internet. At the time of application, an individual is required to pass an identity check that determines whether the presented identity exists, followed by an identity validation quiz to better ensure that the applicant corresponds to the identity presented. The information reseller is used to verify the applicant's name, address, and Social Security number. DHS is also using information resellers in its counterterrorism efforts. For example, the Transportation Security Administration (TSA), tasked with protecting the nation's transportation systems, used data obtained from information resellers as part of a test associated with the development of ts domestic passenger prescreening program, called "Secure Flight."[Footnote 35] TSA's plans for Secure Flight involve the submission of passenger information by an aircraft operator to TSA whenever a reservation is made for a flight in which the origin and destination are domestic airports. In the prescreening of airline passengers, this information would be compared with federal watch lists of individuals known or suspected of activities related to terrorism. TSA conducted a test designed to help determine the extent to which information resellers could be used to authenticate passenger identity information provided by air carriers. It plans to use the test results to determine whether commercial data can be used to improve the effectiveness of watch-list matching by identifying passengers who would not have been identified from passenger name records and government data alone. The test results also may be used to identify items of personally identifying information that should be required of passengers to improve aviation security. Table 4 provides detailed information about DHS uses of information resellers in fiscal year 2005, as reported by officials of the department's components. Table 4: Reported Uses of Personal Information: DHS Contracts with Information Resellers, Fiscal Year 2005: Major component: U.S. Immigration and Customs Enforcement; Information reseller: ChoicePoint, Dun & Bradstreet, LexisNexis, West; Aggregate contract value: $4,389,000; Uses involving personal information: Acquire data (generally, address and vehicle information) for criminal investigations and background security checks. According to officials, information is either used to verify data already collected or is itself verified by investigators through other means. Federal Protective Service. Identify and locate potential criminal suspects using address, vehicle, and other information. Office of Detention and Removal. Locate and remove illegal aliens from the United States using address, vehicle, and other information. Major component: U.S. Customs and Border Protection; Information reseller: ChoicePoint, LexisNexis, Dun & Bradstreet, and West; Aggregate contract value: $2,375,000; Uses involving personal information: Conduct queries on people, businesses, property, and corresponding links in support of law enforcement, intelligence gathering, and prosecution support. Border Patrol Del Rio Sector. Obtain information such as addresses, telephone numbers, and names of relatives in support of investigations involving registered owners of seized vehicles and property. National Targeting Center. Look up information associated with license plate data to assist in vehicle identification at northern and southern land borders. License plate readers capture data on vehicles and cross-check against information reseller and government databases. Data captured are used to help assess risk related to these vehicles (e.g., a car whose license plate is associated with a law enforcement record might be referred for secondary examination). Major component: U.S. Citizenship and Immigration Services; Information reseller: ChoicePoint, LexisNexis, West; Aggregate contract value: $960,000; Uses involving personal information: Offices of Fraud Detection and National Security and Asylum. Detect fraud in applications for immigrant benefits and obtain court records (including judgments and conviction documents) to support a broad range of evidentiary requirements for official adjudication proceedings. Major component: Transportation Security Administration; Information reseller: Acxiom, Insight America, Qsent[A]; Aggregate contract value: $897,000; Uses involving personal information: Test the feasibility of using commercial data sources to authenticate identity information contained in passenger records to support passenger prescreening. As part of the Secure Flight Program, TSA conducted a test to determine whether commercial data could be used to improve the effectiveness of watch list matching by identifying passengers who would not have been identified from passenger name records and government data alone. TSA plans to use the results of the test to identify what personally identifying information should be required in passenger name records to maximize aviation security. Major component: U.S. Secret Service; Information reseller: ChoicePoint, Dallas Computer Services, Dun & Bradstreet, LocatePLUS, and APPRISS; Aggregate contract value: $471,000; Uses involving personal information: Provide investigative leads to field agents and other Secret Service personnel in conducting their investigations (e.g., to develop background information on persons, locations, or businesses). Acquire jail data that are used as a cross- check against state and federal databases on warrants, sex offenders, child support, probations, and paroles. Major component: Federal Emergency Management Agency; Information reseller: ChoicePoint; Aggregate contract value: $113,000; Uses involving personal information: Acquire information such as name, address, and Social Security number to help verify and validate the identities of individuals applying for disaster assistance via the Internet. Major component: Office of Inspector General; Information reseller: ChoicePoint, LexisNexis; Aggregate contract value: $39,000; Uses involving personal information: Generate leads in law enforcement investigations. Major component: U.S. Coast Guard; Information reseller: ChoicePoint; Aggregate contract value: $19,000; Uses involving personal information: Obtain up-to-date credit reports as needed to assist in the resolution of financial issues that are of a security concern in adjudications. Major component: Federal Law Enforcement Training Center--Special Investigations Division; Information reseller: ChoicePoint; Aggregate contract value: $7,900; Uses involving personal information: Verify addresses, conduct background checks, criminal and administrative investigations. Source: DHS. Notes: The table represents fiscal year 2005 contract values and may not reflect actual expenditures. We did not verify the accuracy or completeness of the dollar figures provided to us. Contract values were rounded to the nearest thousand. Several DHS components use the departmentwide contracts with LexisNexis and West. Components such as the Science and Technology and Management Directorates reported that their use of these departmentwide contracts did not involve the use of personal information (e.g., reported uses were for legal or scientific research); accordingly, we did not include these values in the table. To the extent possible, we excluded uses that did not involve personal information; however, since DHS officials responsible for administering departmentwide FEDLINK contracts were unable to provide a breakdown of component billings by information reseller, the values reflected in the table may include uses that do not involve personal information. For example, U.S. Citizenship and Immigration Services' fiscal year 2005 use of departmentwide FEDLINK contracts totaled approximately $960,000, but contract officials could not provide specific amounts for this organization's use of ChoicePoint, LexisNexis, and West. Although U.S. Citizenship and Immigration Services described use of West as primarily for legal research, we could not separate costs associated with use of personal information. [A] Acxiom, Insight America (now owned by Acxiom), and Qsent were subcontractors on the EagleForce Associates contract to conduct a commercial data test for the Secure Flight Program. Although EagleForce is not an information reseller, we included the contract value because the commercial data test involved the acquisition of personal information from resellers. [End of table] SSA Uses Information Resellers Primarily for Fraud Prevention and Identity Verification: In an effort to ensure the accuracy of Social Security benefit payments, SSA and its components reported using approximately $1.3 million in contracts in fiscal year 2005 with information resellers for a variety of purposes relating to fraud prevention (66 percent), such as skiptracing,[Footnote 36] confirming suspected fraud related to workers compensation payments, obtaining information on criminal suspects for follow-up investigations (18 percent), and collecting debts (16 percent). SSA and its components acquired these services through the use of the GSA and FEDLINK governmentwide contracts and their own contracts. In fiscal year 2005, SSA contracted with ChoicePoint, LexisNexis, SourceCorp, and Equifax. The Office of the Inspector General (OIG), the largest user of information reseller data at SSA, supports the agency's efforts to prevent fraud, waste, and abuse. The OIG uses several information resellers to assist investigative agents in detecting benefit abuse by Social Security claimants and to assist agents in locating claimants. For example, OIG agents access reseller data to verify the identity of subjects undergoing criminal investigations. Regional office agents may also use reseller data in investigating persons suspected of claiming disability fraudulently and draw upon assistance from OIG headquarters staff and state investigators from the state Attorney General's office in these investigations. For example, the Northeastern Program Service Center, located in the New York branch of SSA, obtains New York State Workers Compensation Board data from SourceCorp, the only company legally permitted to maintain the physical and electronic records for New York State Workers Compensation. Through the use of this information, SSA can identify persons collecting workers compensation benefits but not reporting those benefits, as required, to the SSA. Table 5 details in aggregate the vendors, fiscal year 2005 contract values, and uses of contracts with information resellers reported by major SSA components. Table 5: Reported Uses of Personal Information: SSA Contracts with Information Resellers, Fiscal Year 2005: User: Agencywide; Information reseller: LexisNexis; Contract value: $848,000[A]; Uses involving personal information: Field Office Staff. Obtain resource information (i.e., real property ownership, values, real property transfers, and information concerning the ownership of automobiles and boats) to verify the validity of Supplemental Security Income applicants and recipients. Office of Inspector General. Access public records information to assist with investigations of fraud and abuse within the SSA programs. Office of Hearings and Appeals. Access public records information to locate the addresses of individuals. User: Office of the Inspector General; Information reseller: ChoicePoint; Contract value: $240,000; Uses involving personal information: Acquire information on subjects of criminal investigations (e.g., locations, assets, relatives) and help corroborate fraud allegations that are submitted to the Office of the Inspector General by SSA or the general public.[B]. User: Agencywide[C]; Information reseller: Equifax; Contract value: $204,000; Uses involving personal information: Obtain address verification reports for the most current address of delinquent debtors for undeliverable overpayment-related notices and follow up billing and teleprinter profile reports (standard credit reports) that show the credit history of the debtor referred to Justice for enforced collection via civil suit. User: Northeastern Program Service Center; Information reseller: SourceCorp; Contract value: $14,000; Uses involving personal information: Access New York State Worker Compensation Board payment data to ensure that persons claiming Social Security benefits are correctly reporting workers compensation benefits on their forms. User: Office of the Inspector General New Jersey Cooperative Disability Investigation Unit[D]; Information reseller: ChoicePoint; Contract value: $4,000; Uses involving personal information: Access information on disability claimants and their physicians to determine if the claimants may be hiding assets and other sources of income that may make them ineligible for disability benefits. Source: SSA. Notes: The table represents fiscal year 2005 contract values and may not reflect actual expenditures. We did not verify the accuracy or completeness of the dollar figures provided to us. Contract values were rounded to the nearest thousand. [A] This figure may include uses that do not involve personal information since LexisNexis provides news and legal research in addition to public records. SSA was unable to separate the dollar values associated with use of personal information from uses for other purposes. [B] In addition to initiating its own investigations, the Office of the Inspector General receives notices from the general public about suspected fraud. According to one agency official, a large portion of these fraud allegations are either incomplete or unfounded and must be supported by substantial evidence. Before moving ahead with an investigation, officials obtain data from an information reseller to verify the legitimacy of the fraud allegations, fill in any missing information on the submitted forms and develop leads that would further the development of the allegation and any subsequent investigation if warranted. [C] The Equifax data are accessible by the Northeastern Program Service Center, Mid-Atlantic Program Service Center, Southeastern Program Service Center, Great Lakes Program Service Center, Western Program Service Center, Mid-America Program Service Center, Office of Central Operations, and Office of Financial Policy and Operations. [D] This is an SSA-funded joint investigation between SSA and the New Jersey State Attorney General's Office. [End of table] The Department of State Uses Information Resellers Primarily for Passport Fraud Detection and Investigation: The Department of State and its components reported approximately $569,000 in contracts in fiscal year 2005 with information resellers, primarily for assistance in fraud related activities through criminal investigations (51 percent), fraud detection (26 percent), and other uses (23 percent) such as background screening. State acquired information reseller services through the GSA schedule and a Justice blanket-purchase agreement. In fiscal year 2005, the majority of State contracts were with ChoicePoint; the agency also had contracts with LexisNexis, Equifax and Metronet. State's components reported use of these contracts mainly for passport- related activities. For example, several components of State accessed personal information to validate information submitted on immigrant and nonimmigrant visa petitions, such as marital or familial relationships, birth and identity information, and address validation. A major use of reseller data at State is by investigators acquiring information on suspects in passport and visa fraud cases. According to State, information reseller data are increasingly important to its operations, because the number of passport and visa fraud cases has increased, and successful investigations of passport and visa fraud are critical to combating terrorism. In addition to these uses, State acquires personal information through Equifax to support the financial background screening of its job applicants. Table 6 details the vendors, fiscal year 2005 contract values, and uses of contracts with information resellers reported by major State components. Table 6: Reported Uses of Personal Information: Department of State Contracts with Information Resellers, Fiscal Year 2005: Component: Diplomatic Security; Information reseller: ChoicePoint; Contract value: $288,000; Uses involving personal information: Criminal Investigations Division. Obtain leads on addresses, locations, identity, etc., used in the conduct of criminal investigations of passport and visa fraud. Diplomatic Security Command Center and Diplomatic Security agents at 26 overseas posts. Same use. Component: Office of Personnel Security and Suitability; Information reseller: Equifax; Contract value: $132,000; Uses involving personal information: Obtain credit checks on applicants and new hires to support background screening processes. Component: Bureau of Consular Affairs; Information reseller: ChoicePoint, Metronet; Contract value: $89,000; Uses involving personal information: Check the validity of selected passport applications, particularly two categories of high-risk applications.[A]. Component: National Visa Center; Information reseller: ChoicePoint; Contract value: $40,000; Uses involving personal information: Verify information submitted on immigrant and nonimmigrant visa petitions. Component: Office of Consular Fraud Prevention Programs; Information reseller: LexisNexis; Contract value: $21,000; Uses involving personal information: Investigate claims of marital and familial relationships on immigrant visa applications and determine the bona fides of prospective employers for employment-based nonimmigrant visas. Source: Department of State. Note: The table represents fiscal year 2005 contract values and may not reflect actual expenditures. We did not verify the accuracy or completeness of the dollar figures provided to us. [A] The two categories of high-risk passport applications include those with birth certificates from Puerto Rico and those from applicants lacking acceptable primary identification documents, who include affidavits from family or associates attesting to their identity. [End of table] Agencies Contract with Information Resellers Primarily through Use of GSA's Federal Supply Schedules and the Library of Congress's FEDLINK Service: In fiscal year 2005, the four agencies acquired personal information primarily through governmentwide contracts, including GSA's Federal Supply Schedule (52 percent) contracts and the Library of Congress's FEDLINK contracts (28 percent). Components within these agencies also initiated separate contracts with resellers as well. The Department of Justice was the largest user, accounting for approximately $19 million of the $30 million total for all four agencies. Figure 3 shows the values of reseller data acquisition by agency for fiscal year 2005. Figure 3: Total Dollar Values, Categorized by Agency, of Fiscal Year 2005 Acquisition of Personal Information from Information Resellers: [See PDF for image] [End of figure] In fiscal year 2005, the most common vehicles used among all four agencies to acquire personal information from information resellers were the governmentwide contracts made available through GSA's Federal Supply Schedule. The GSA schedule provides agencies with simplified, streamlined contracting vehicles, allowing them to obtain access to information resellers' services either by issuing task or purchase orders or by establishing blanket purchase agreements based on the schedule contracts. The majority of Justice's acquisition of information reseller services was obtained through the GSA schedule, including a blanket purchase agreement with ChoicePoint that was also made available to non-Justice agencies (for example, the Departments of State and Health and Human Services). In addition, components of DHS such as the U.S. Secret Service and the SSA's Office of Inspector General made use of GSA schedule contracts with information resellers. The Federal Supply Schedule allows agencies to take advantage of prenegotiated contracts with a variety of vendors, including information resellers. GSA does not assess fees for the use of these contracts; rather it funds the operation of the schedules in part by obtaining administrative fees from vendors on a quarterly basis. According to GSA officials, use of the schedule contracts allows agencies to obtain the best price and reduce their procurement lead time. Since these contracts have been prenegotiated, agencies do not need to issue their own solicitation. Instead, agencies may simply place a task order directly with the vendor, citing the schedule number. GSA's role in administering these contracts is primarily to negotiate baseline contract requirements and pricing; it does not monitor which agencies are using its schedule contracts. GSA officials noted that the requirements contained in the schedule contracts are baseline, and agencies may add more stringent requirements to their individual task orders. Another contract vehicle commonly used to obtain personal information from information resellers was the Library of Congress's FEDLINK service (28 percent). This vehicle was used by both DHS and SSA.[Footnote 37] FEDLINK, an intragovernmental revolving fund,[Footnote 38] is a cooperative procurement, accounting, and training program designed to provide access to online databases, periodical subscriptions, books, and other library and information support services from commercial suppliers, including information resellers. At DHS, use of the FEDLINK service was the primary vehicle for contracting with information resellers. DHS also used GSA schedule buys, and some smaller purchases were made directly between DHS components and information resellers. The majority of SSA's fiscal year 2005 acquisitions from information resellers were through FEDLINK, with some use of the GSA schedule contracts. FEDLINK allows agencies to take advantage of prenegotiated contracts at volume discounts with a variety of vendors, including information resellers. As with the GSA schedule contracts, the requirements of the FEDLINK contracts serve as a baseline, and agencies may add more stringent requirements if they so choose. FEDLINK offers two different options for using its contracts: direct express and transfer pay. The direct express option is similar to the GSA schedule process, in which the agency issues a purchase order directly to the vendor and cites the underlying FEDLINK contract. Under direct express, the ordering agency is responsible for managing the delivery of products and services and paying invoices, and the vendor pays an administrative fee to the Library. Under the transfer pay option, ordering agencies must sign an interagency agreement and pay an administrative fee to the Library. In turn, the ordering agencies receive additional administrative services. DHS used both the direct express and transfer pay options in fiscal year 2005, while SSA used transfer pay exclusively. Resellers Take Steps to Protect Privacy, but These Measures Are Not Fully Consistent with the Fair Information Practices: Although the information resellers that do business with the federal agencies we reviewed[Footnote 39] have practices in place to protect privacy, these measures were not fully consistent with the Fair Information Practices. Most significantly, the first four principles, relating to collection limitation, data quality, purpose specification, and use limitation, are largely at odds with the nature of the information reseller business. These principles center on limiting the collection and use of personal information and require data accuracy based on that limited purpose and limited use of the information. However, the information reseller industry presupposes that the collection and use of personal information is not limited to specific purposes, but instead that information can be collected and made available to multiple customers for multiple purposes. Resellers make it their business to collect large amounts of personal information[Footnote 40] and to combine that information in new ways so that it serves purposes other than those for which it was originally collected. Further, they are limited in their ability to ensure the accuracy, currency, or relevance of their holdings, because these qualities may vary based on customers' varying uses. Information reseller policies and procedures were consistent with aspects of the remaining four Fair Information Practices. Large resellers reported implementing a variety of security safeguards, such as stringent customer credentialing, to improve protection of personal information. Resellers also generally provided public notice of key aspects of their privacy policies and practices, (relevant to the openness principle) and reported taking actions to ensure internal compliance with their own privacy policies (relevant to the accountability principle). However, resellers generally limited the extent to which individuals could gain access to personal information held about themselves, and because they obtain their information from other sources, most resellers also had limited provisions for correcting or deleting inaccurate information contained in their databases (relevant to the individual participation principle).[Footnote 41] Instead, they directed individuals wishing to make corrections to contact the original sources of the data. Table 7 provides an overview of information resellers' application of the Fair Information Practices. Table 7: Information Resellers' Application of Principles of the Fair Information Practices: Principle: Collection limitation. The collection of personal information should be limited, should be obtained by lawful and fair means, and, where appropriate, with the knowledge or consent of the individual; Resellers' application: Resellers do not limit collections to specific purposes but collect large amounts of personal information, within the bounds of the law. Further, in many cases, individuals do not know that their personal information is being collected by the reseller, even though they may have known of the original (source) collection. Principle: Data quality. Personal information should be relevant to the purpose for which it is collected, and should be accurate, complete, and current as needed for that purpose; Resellers' application: Although they often have measures in place for ensuring data accuracy in the aggregate, resellers do not ensure that the information they provide is accurate, complete, and current for a specific purpose. Instead, they monitor and rely on the quality controls of the original data source. Principle: Purpose specification. The purpose for the collection of personal information should be disclosed before collection and upon any change to that purpose, and its use should be limited to that purpose and compatible purposes; Resellers' application: Resellers disclose general categories of purposes for their data collection rather than specific purposes. They obtain information originally collected for specific purposes and generally offer it for a much wider range of purposes. Principle: Use limitation. Personal information should not be disclosed or otherwise used for other than a specified purpose without consent of the individual or legal authority; Resellers' application: Resellers generally limit the use of information as required by law rather than on the basis of the purposes originally specified when the information was collected. Resellers generally pass responsibility for legal use restrictions to customers through licensing and contract terms and agreements. Customers must contractually agree to appropriate uses of the data and must agree to comply with applicable laws. Principle: Security safeguards. Personal information should be protected with reasonable security safeguards against risks such as loss or unauthorized access, destruction, use, modification, or disclosure; Resellers' application: Resellers reported implementing a variety of security safeguards, such as stringent customer credentialing, to improve protection of personal information. Principle: Openness. The public should be informed about privacy policies and practices, and individuals should have ready means of learning about the use of personal information; Resellers' application: Resellers generally inform the public of key aspects of privacy policies through Web sites, brochures, and so on. Principle: Individual participation. Individuals should have the following rights: to know about the collection of personal information, to access that information, to request correction, and to challenge the denial of those rights; Resellers' application: Although information resellers allow individuals access to their personal information, this access is generally limited, as is the opportunity to make corrections. Generally, resellers only correct errors they may have introduced in the process of obtaining and aggregating data. Principle: Accountability. Individuals controlling the collection or use of personal information should be accountable for taking steps to ensure the implementation of these principles; Resellers' application: Resellers reported taking actions, such as designating a chief privacy officer or equivalent, to ensure compliance with their privacy policies. Annual privacy audits were conducted in one case. Source: GAO analysis of reseller information. Note: We did not evaluate the effectiveness of information reseller practices, only the extent to which resellers applied the Fair Information Practices. [End of table] Information Resellers Generally Did Not Report Limiting Their Data Collection to Specific Purposes or Notifying Individuals about Them: According to the collection limitation principle of the Fair Information Practices, the collection of personal information should be limited, information should be obtained by lawful and fair means, and, where appropriate, it should be collected with the knowledge and consent of the individual. The collection limitation principle also suggests that organizations could limit collection to the minimum amount of data necessary to process a transaction. In practice, resellers are limited in the personal information that they can obtain by laws that apply to specific kinds of information (for example, the Fair Credit Reporting Act and the Gramm-Leach-Bliley Act, which restrict the collection, use, and disclosure of certain consumer and financial data). One reseller reported that it also restricts collection of Social Security number information from public records, as well as collection of identifying information on children from public sources, such as telephone directories. Beyond specific legal restrictions, information resellers generally attempt to aggregate large amounts of personal information so as to provide useful information to a broad range of customers. For example, resellers collect personal information from a wide variety of sources, including state motor vehicle records; local government records on births, real property, and voter registrations; and various court records. Information resellers may also obtain information from telephone directories, Internet sites, and consumer applications for products or services. The widely varying sources and types of information demonstrate the broad nature of the collection of personal information. The amount and scope of information collected vary from company to company, and resellers use this information to offer a range of products tailored to different markets and uses.[Footnote 42] Regarding the principle that information should be obtained by lawful and fair means, resellers stated that they take steps to ensure that their collection of information is legal. For example, resellers told us that they obtain assurances from their data suppliers that information is legally collected from reputable sources. Further, they design their products and services to ensure they are in conformance with laws such as the Gramm-Leach-Bliley Act and the Fair Credit Reporting Act. Regarding the principle that, where appropriate, information should be collected with the knowledge and consent of the individual, resellers do not make provisions to notify the individuals involved when they obtain personal data from their many sources, including public records. Concomitantly, individuals are not afforded an opportunity to express or withhold their consent when the information is collected. Resellers said they believe it may not be appropriate or practical for them to provide notice or obtain consent from individuals because they do not collect information directly from them. One reseller noted that in many instances the company does not have a direct relationship with the data subject and is therefore not in a position to interact with the consumer for purposes such as providing notice. Further, this reseller stated its belief that requiring resellers to notify and obtain consent from each individual about whom they obtain information would result in consumers being overwhelmed with notices and negate the value of notice. Under certain conditions, some information resellers offer consumers an "opt-out" option--that is, individuals may request that information about themselves be suppressed from selected databases. However, resellers generally offer this option only with respect to certain types of information and only under limited circumstances. For example, one reseller allows consumers to opt out of its marketing products but not other products, such as background screening and fraud detection products. The privacy policy for another information reseller states that it will allow certain individuals to opt out of its nonpublic information databases containing sensitive information under specific conditions: if the individual is a state, local, or federal law enforcement officer or public official whose position exposes him or her to a threat of imminent harm; if the individual is a victim of identity theft; or if the individual is at risk of physical harm. In order to exercise this option, consumers generally must provide satisfactory documentation to support the basis for their request. In any event, the reseller retains the right to determine (1) whether to grant or deny any request, (2) to which databases the request for removal will apply, and (3) the duration of the removal. Two resellers stated their belief that under certain circumstances it may not be appropriate to provide consumers with opportunities for opting out, such as for information products designed to detect fraud or locate criminals. These resellers stated that if individuals were permitted to opt out of fraud prevention databases, some of those opting out could be criminals, which would undermine the effectiveness and utility of these databases. Information Resellers Do Not Ensure That Personal Information They Provide Is Accurate for Specific Purposes: According to the data quality principle, personal information should be relevant to the purpose for which it is collected, and should be accurate, complete, and current as needed for that purpose. Information resellers reported taking steps to ensure that they generally receive accurate data from their sources and that they do not introduce errors in the process of transcribing and aggregating information; however, they generally provide their customers with exactly the same data they obtain and do not claim or guarantee that the information is accurate for a specific purpose. Some resellers' privacy policies state that they expect their data to contain some errors. Further, resellers varied in their policies regarding correction of data determined to be inaccurate as obtained by them. One reseller stated that it would delete information in its databases that was found to be inaccurate. Another stated that even if an individual presents persuasive evidence that certain information is in error, the reseller generally does not make changes if the information comes directly from an official public source (unless instructed to do so by that source). Because they are not the original source of the personal information, information resellers generally direct individuals to the original sources to correct any errors. Several resellers stated that they would correct any identified errors introduced through their own processing and aggregation of data. While not providing specific assurance of the accuracy of the data they provide, information resellers reported that they take steps to ensure that their suppliers have data quality controls in place. For example, officials from one information reseller said they use a screening process to help determine whether they should use a particular supplier.[Footnote 43] As part of this process, the reseller assesses whether the supplier has internal controls in place that are in line with the reseller's policies. Information resellers also reported that they conduct annual audits of their suppliers aimed at assessing the integrity and quality of the information they receive. If these audits show that a supplier has failed to provide accurate, complete, and timely information, the reseller may discontinue using that supplier. Resellers also noted that data accuracy is contingent upon intended use. That is, data that may be perfectly adequate for one purpose may not be precise enough or appropriate for another purpose. While end users, such as federal agencies, may address data quality for their specific purposes, resellers--who maintain personal information for multiple purposes--are less able to achieve accuracy because they support multiple uses. Thus, resellers generally disclaim data accuracy and leave it to their customers to ensure that the data are accurate for their intended uses. One reseller stated that their customers understand the accuracy limitations of the data they obtain and take the potential for data inaccuracy into account when using the data. Information Resellers' Specification of the Purpose of Data Collection Consists of Broad Descriptions of Business Categories: According to the purpose specification principle, the purpose for the collection of personal information should be disclosed before collection and upon any change to that purpose, and its use should be limited to that purpose and compatible purposes. While information resellers specify purpose in a general way by describing the types of businesses that use their data, they generally do not designate specific intended uses for each of their data collections. Resellers generally obtain information that has already been collected for a specific purpose and make that information available to their customers, who in turn have a broader variety of purposes for using it. For example, personal information originally submitted by a customer to register a product warranty could be obtained by a reseller and subsequently made available to another business or government agency, which might use it for an unrelated purpose, such as identity verification, background checking, or marketing. In a general sense, information resellers specify their purpose by indicating (on company Web sites, for example) the business categories of the customers for whom they collect information. For example, reseller privacy policies generally state that resellers make personal information available for legitimate uses by business and government organizations. Examples of business categories may be provided, but resellers do not specify which types of information are to be used in which business categories. It is difficult for resellers to provide greater specificity because they make their data available to many customers for a wide range of legitimate purposes. As a result, the public is made aware only of the broad range of potential uses to which their personal information may be applied, rather than a specific use, as envisioned in the Fair Information Practices. Information Resellers Generally Limit the Use of Information as Required by Law, Rather Than on the Basis of Purposes Originally Specified When the Information Was Collected: Under the use limitation principle, personal information should not be disclosed or used for other than the originally specified purpose without consent of the individual or legal authority. However, because information reseller purposes are specified very broadly, it is difficult for resellers to ensure that use of the information in their databases is limited. As previously discussed, information reseller data may have many different uses, depending on the types of customers involved. Resellers do take steps to ensure that their customers' use of personal information is limited to legally sanctioned purposes. Information resellers pass this responsibility to their customers through licensing agreements and contract terms and agreements. According to two large information resellers, customers are generally contractually required to use data from resellers appropriately and must agree to comply with applicable laws, such as the Gramm-Leach- Bliley Act, the Fair Credit Reporting Act, and the Driver's Privacy Protection Act. For example, one information reseller uses a service agreement that includes provisions governing permissible use of information sought by the customer, the confidentiality of information provided, legal requirements under federal and state laws, and other customer obligations. The reseller reported that the company monitors its customers' compliance by conducting periodic audits and taking appropriate actions in response to any audit findings. In a standardized agreement form used by another reseller, federal agencies must certify that they will use information obtained from the reseller only as permissible under the Gramm-Leach-Bliley Act and the Driver's Privacy Protection Act. The service agreement identifies permissible purposes for information whose use is restricted by these laws and requires agencies to agree that they will use the information only in the performance or the furtherance of appropriate government activities. In conformance with the Gramm-Leach-Bliley Act permissible uses, the information reseller requires agencies to certify that they will use personal information "only as requested or authorized by the consumer." The information resellers used by the federal agencies we reviewed generally also reported taking steps to ensure that access to certain sensitive types of personally identifiable information is limited to certain customers and uses. For example, two resellers reported that they provide full Social Security numbers and driver's license numbers only to specific types of customers, including law enforcement agencies and insurance companies, and for purposes such as employment or tenant screening. While actions such as these are useful in protecting privacy and are consistent with the use limitation principle in that they narrow the range of potential uses for this type of information, they are not equivalent to limiting use only to a specific predefined purpose. Without limiting use to predefined purposes, resellers cannot provide individuals with assurance that their information will only be accessed and used for the purpose originally specified when the information was collected. Information Resellers Reported Taking Steps to Improve Security Safeguards: According to the security safeguards principle, personal information should be protected with reasonable safeguards against risks such as loss or unauthorized access, destruction, use, modification, or disclosure. While we did not evaluate the effectiveness of resellers' information security programs, resellers we spoke with said they employ various safeguards to protect consumers' personal information. They implemented these safeguards in part for business reasons but also because federal laws require such protections. Resellers describe these safeguards in various policy statements, such as online and data privacy policies or privacy statements posted on Internet sites. Resellers also generally had information security plans describing, among other things, access controls for information and systems, document management practices, incident reporting, and premises security. Given recent incidents, large information resellers reported having recently taken steps to improve their safeguards against unauthorized access. In a well-publicized incident, in February 2005, ChoicePoint disclosed that unauthorized individuals had gained access to personal information by posing as a firm of private investigators. In the following month, LexisNexis disclosed that unauthorized individuals had gained access to personal information through the misappropriation of user IDs and passwords from legitimate customers. These disclosures were required by state law, as previously discussed. In January 2006, ChoicePoint reached a settlement with the Federal Trade Commission[Footnote 44] over charges that the company did not have reasonable procedures to verify the identity of prospective new users. The company agreed to implement new procedures to ensure that it provides consumer reports only to legitimate business for lawful purposes. In the mean time, both information resellers reported that they had taken steps to improve their procedures for authorizing customers to have access to sensitive information, such as Social Security numbers. For example, one reseller established a credentialing task force with the goal of centralizing its customer credentialing process. In order for customers of this reseller to obtain products and services containing sensitive personal information, they must now undergo a credentialing process involving a site visit by the information reseller to verify the accuracy of information reported about the business. Applicants are then scored against a credentialing checklist to determine whether they will be granted access to sensitive information. In addition, both resellers reported efforts to strengthen user ID and password protections and restrict access to sensitive personal information (including full driver's license numbers and Social Security numbers) to a limited number of customers, such as law enforcement agencies (others would be able to view masked information). Although we did not test the effectiveness of these measures, if implemented correctly, they could help provide assurance that sensitive information is protected appropriately. In addition to enhancing safeguards on customer access authorizations, resellers have instituted a variety of other security controls. For example, three large information resellers have implemented physical safeguards at their data centers, such as continuous monitoring of employees entering and exiting facilities, monitoring of activity on customer accounts, and strong authentication of users entering and exiting secure areas within the data centers. Officials at one reseller told us that security profiles were established for each employee that restrict access to various sections of the center based upon employee job functions. Computer rooms were further protected with a combined system of biometric hand readers and security codes. Security cameras were placed throughout the facility for continuous recording of activity and review by security staff. Information resellers also had contingency plans in place to continue or resume operations in the event of an emergency. Information resellers reported that on an annual basis, or more frequently if needed, they conduct security risk assessments as well as internal and external security audits. These assessments address such topics as vulnerabilities to internal or external security threats, reporting and responding to security incidents, controls for network and physical facilities, and business continuity management. The assessments also addressed strategies for mitigating potential or identified risks. If properly implemented, security measures such as those reported by information resellers could contribute to effective implementation of the security safeguards principle. Information Resellers Generally Informed the Public about Their Privacy Policies and Practices: According to the openness principle, the public should be informed about an organization's privacy policies and practices, and individuals should have ready means of learning about the organization's use of personal information. To address openness, information resellers took steps to inform the public about key aspects of their privacy policies. They used means such as company Web sites and brochures to inform the public of specific policies and practices regarding the collection and use of personal information. Reseller Web sites also generally provided information about the types of information products the resellers offered--including product samples--as well as general descriptions about the types of customers served. Several Web sites also provided advice to consumers on protecting personal information and discussed what to do if individuals suspect they are victims of identity theft. Providing public notice of privacy policies informs individuals of what steps an organization takes to protect the privacy of the personal information it collects and helps to ensure the organization's accountability for its stated policies. Information Reseller Policies Generally Allow Individuals Limited Ability to Access and Correct Their Personal Information: According to the individual participation principle, individuals should have the right to know about the collection of personal information, to access that information, to request correction, and to challenge the denial of those rights. Information resellers generally allow individuals access to their personal information. However, this access is limited, as is the opportunity to make corrections. Resellers may provide an individual a report containing certain types of information- -such as compilations of public records information--however, the report may not include all information maintained by the resellers about that individual. For example, one information reseller stated that it offers a free report, under certain circumstances, on an individual's claims history, employment history, or tenant history. Resellers may offer basic reports to individuals at no cost, but they generally charge for reports on additional information. A free consumer report, such as an employment history report, for example, typically excludes information such as driver's license data, family information, and credit header data that a reseller may possess in other databases. Although individuals can access information about themselves, if they find inaccuracies, they generally cannot have these corrected by the resellers.[Footnote 45] Information resellers direct individuals to take their cases to the original data sources--such as courthouses or other local government agencies--and attempt to have the inaccuracy corrected there. Several resellers stated that they would correct any identified errors introduced through their own processing and aggregation of data. As discussed above, resellers, as a matter of policy, do not make corrections to data obtained from other sources, even if the consumer provides evidence that the data are wrong. According to resellers, making corrections to their own databases is extremely difficult, for several reasons. First, the services these resellers provide concentrate on providing references to a particular individual from many sources, rather than distilling only the most accurate or current reference. For example, a reseller might have many instances in its databases of a particular individual's current address. Although most might be the same, there could be errors as well. Resellers generally would report the information as they have it rather than attempting to determine which entry is correct. This information is important to customers such as law enforcement agencies. Further, resellers stated that making corrections to their databases could be ineffective because the data are continually refreshed with updated data from the source, and thus any correction is likely to be changed back to its original state the next time the data are updated. In addition, as discussed in the collection limitation section, resellers stated their belief that it would not be appropriate to allow the public to access and correct information held for certain purposes, such as fraud detection and locating criminals, since providing such rights could undermine the effectiveness of these uses (e.g., by allowing criminals to access and change their information). However, as a result of these practices, individuals cannot know the full extent of personal information maintained by resellers or ensure its accuracy. Information Resellers Report Measures to Ensure Accountability for the Collection and Use of Personal Information: According to the accountability principle, individuals controlling the collection or use of personal information should be accountable for taking steps to ensure the implementation of the Fair Information Practices. Although information resellers' overall application of the Fair Information Practices varied, each reseller we spoke with reported actions to ensure compliance with its own privacy policies. For example, resellers reported designating chief privacy officers to monitor compliance with internal privacy policies and applicable laws (e.g., the Gramm-Leach-Bliley Act and the Driver's Privacy Protection Act). Information resellers reported that these officials had a range of responsibilities aimed at ensuring accountability for privacy policies, such as establishing consumer access and customer credentialing procedures, monitoring compliance with federal and state laws, and evaluating new sources of data (e.g., cell phone records). Auditing of an organization's practices is one way of ensuring accountability for adhering to privacy policies and procedures. Although there are no industrywide standards requiring resellers to conduct periodic audits of their compliance with privacy policies, one information reseller reported using a third party to conduct privacy audits on an annual basis. Using a third party to audit compliance with privacy policies further helps to ensure that an information reseller is accountable for the implementation of its privacy practices. Establishing accountability is critical to the protection of privacy. Actions taken by data resellers should help ensure that their privacy policies are appropriately implemented. Agencies Lack Policies on Use of Reseller Data, and Practices Do Not Consistently Reflect the Fair Information Practices: Agency practices for handling personal information acquired from information resellers did not always fully reflect the Fair Information Practices. Further, agencies generally lacked policies that specifically address their use of personal information from commercial sources, although DHS Privacy Office officials reported that they were drafting such a policy. As shown in table 8, four of the Fair Information Practices--the collection limitation, data quality, use limitation, and security safeguards principles--were generally reflected in agency practices. For example, several agency components (specifically, law enforcement agencies such as the FBI and the U.S. Secret Service) reported that in practice, they generally corroborate information obtained from resellers when it is used as part of an investigation. This practice is consistent with the data quality principle that data should be accurate, current, and complete. Agency policies and practices with regard to the other four principles, however, were uneven. Specifically, agencies did not always have policies or practices in place to address the purpose specification, openness, and individual participation principles with respect to reseller data. The inconsistencies in application of these principles as well as the lack of specific agency policies can be attributed in part to ambiguities in OMB guidance regarding the applicability of the Privacy Act to information obtained from resellers. Further, privacy impact assessments, which often are not conducted, are a valuable tool that could address important aspects of the Fair Information Practices. Finally, components within each of the four agencies did not consistently hold staff accountable by monitoring usage of personal information from information resellers and ensuring that it was appropriate; thus, their application of the accountability principle was uneven. Table 8: Application of Fair Information Practices to the Reported Handling of Personal Information from Data Resellers at Four Agencies: Principle: Collection limitation. The collection of personal information should be limited, should be obtained by lawful and fair means, and, where appropriate, with the knowledge or consent of the individual; Agency application of principle: General; Agency practices: Agencies limited personal data collection to individuals under investigation or their associates. Principle: Data quality. Personal information should be relevant to the purpose for which it is collected, and should be accurate, complete, and current as needed for that purpose; Agency application of principle: General; Agency practices: Agencies corroborated information from resellers and did not take actions based exclusively on such information. Principle: Purpose specification. The purpose for the collection of personal information should be disclosed before collection and upon any change to that purpose, and its use should be limited to that purpose and compatible purposes; Agency application of principle: Uneven; Agency practices: Agency system of records notices did not generally reveal that agency systems could incorporate information from data resellers. Agencies also generally did not conduct privacy impact assessments for their systems or programs that involve use of reseller data. Principle: Use limitation. Personal information should not be disclosed or otherwise used for other than a specified purpose without consent of the individual or legal authority; Agency application of principle: General; Agency practices: Agencies generally limited their use of personal information to specific investigations (including law enforcement, counterterrorism, fraud detection, and debt collection). Principle: Security safeguards. Personal information should be protected with reasonable security safeguards against risks such as loss or unauthorized access, destruction, use, modification, or disclosure; Agency application of principle: General; Agency practices: Agencies had security safeguards such as requiring passwords to access databases, basing access rights on need to know, and logging search activities (including "cloaked logging," which prevents the vendor from monitoring search content). Principle: Openness. The public should be informed about privacy policies and practices, and individuals should have ready means of learning about the use of personal information; Agency application of principle: Uneven; Agency practices: See Purpose specification above. Agencies did not have established policies specifically addressing the use of personal information obtained from resellers. Principle: Individual participation. Individuals should have the following rights: to know about the collection of personal information, to access that information, to request correction, and to challenge the denial of those rights; Agency application of principle: Uneven; Agency practices: See Purpose specification above. Because agencies generally did not disclose their collections of personal information from resellers, individuals were often unable to exercise these rights. Principle: Accountability. Individuals controlling the collection or use of personal information should be accountable for taking steps to ensure the implementation of these principles; Agency application of principle: Uneven; Agency practices: Agencies do not generally monitor usage of personal information from information resellers to hold users accountable for appropriate use; instead, they rely on users to be responsible for their behavior. For example, agencies may instruct users in their responsibilities to use personal information appropriately, have them sign statements of responsibility, and have them indicate what permissible purpose a given search fulfills. Legend: General = policies or procedures to address all major aspects of a particular principle. Uneven = policies or procedures addressed some but not all aspects of a particular principle or some but not all agencies and components had policies or practices in place addressing the principle. Source: GAO analysis of agency-supplied data. Note: We did not independently assess the effectiveness of agency information security programs. Our assessment of overall agency application of the Fair Information Practices was based on the policies and management practices described by the Department State and SSA as a whole and by major components of Justice and DHS (footnote 2 in app. I lists these components). We did not obtain information on smaller components of Justice and DHS. [End of table] Agency Procedures Reflect the Collection Limitation, Data Quality, Use Limitation, and Security Safeguards Principles: The collection limitation principle establishes, among other things, that organizations should obtain only the minimum amount of personal data necessary to process a transaction. This principle also underlies the Privacy Act requirement that agencies maintain in their records "only such information about an individual as is relevant and necessary to accomplish a purpose of the agency."[Footnote 46] Regarding most law- enforcement and counterterrorism purposes, which accounted for 90 percent of usage in fiscal year 2005, agencies generally limited their personal data collection in that they reported obtaining information only on specific individuals under investigation or associates of those individuals.[Footnote 47] Having initiated investigations on specific individuals, however, agencies generally reported that they obtained as much personal information as possible about the individuals being investigated, because law enforcement investigations require pursuing as many investigative leads as possible. The data quality principle states that, among other things, personal information should be relevant to the purpose for which it is collected and be accurate. This principle is mirrored in the Privacy Act's requirement for agencies to maintain all records used to make determinations about an individual with sufficient accuracy, relevance, timeliness, and completeness as is reasonably necessary to ensure fairness.[Footnote 48] Agencies reported taking steps to mitigate the risk of inaccurate information reseller data by corroborating information obtained from resellers. Agency officials described the practice of corroborating information as a standard element of conducting investigations. Officials from several law enforcement component agencies, including ATF and DEA, said corroboration was necessary to build legally sound cases from investigations. For example, U.S. Secret Service officials reported that they instruct agents that the information obtained from resellers should be independently corroborated, and that none of it should be used as probable cause for obtaining warrants. Further, FBI officials from FTTTF noted that obtaining data from information resellers helps to improve the overall quality and accuracy of the data in investigative files. Officials stated that the variety of private companies providing personal information enhances the value, quality, and diversity of the information used by the FBI, noting that a decision to put an individual under arrest is based on "probable cause," which is determined by a preponderance of evidence, rather than any single source of information, such as information in a reseller's data base. Likewise, for non law-enforcement use, such as debt collection and fraud detection and prevention, agency components reported procedures for mitigating potential problems with the accuracy of data provided by resellers by obtaining additional information from other sources when necessary. For example, the Executive Office for U.S. Attorneys uses information resellers to obtain information on assets possessed by an individual indebted to the United States. According to officials, should information contained in the information reseller databases conflict with information provided by an individual, further investigation takes place before any action to collect debts would be taken. Likewise, officials from the U.S. Citizenship and Immigration Services (USCIS) component of DHS and the Office of Consular Affairs within the Department of State reported similar practices. While these practices do not eliminate inaccuracies in data coming into the agency, they help ensure the quality of the information that is the basis for agency actions. The use limitation principle provides that personal information should not be disclosed or used for other than a specified purpose without consent of the individual or legal authority. This principle underlies the Privacy Act requirement that prevents agencies from disclosing records on individuals except with consent of the individual, unless disclosure of the record would be, for example, to another agency for civil or criminal law enforcement activity or for a purpose that is compatible with the purpose for which the information was collected.[Footnote 49] Although agencies rely on resellers' multipurpose collection of information as a source, agency officials said their use of reseller information was limited to distinct purposes, which were generally related to law enforcement or counterterrorism. For example, the Department of Justice reported uses specific to the conduct of criminal investigations on individuals, terrorism investigations, and the location of assets and witnesses. Other Justice and DHS components, such as the Federal Protective Service, U.S. Secret Service, FBI, and ATF, also reported that they used information reseller data for investigations. For uses not related to law enforcement, such as those reported by State and SSA, use of reseller information was also described as supporting a specific purpose (e.g., fraud detection or debt collection). The use limitation principle also precludes agencies from sharing personal information they collect for purposes unrelated to the original intended use of the information. Officials of certain law enforcement components of these agencies reported that in certain cases they share information with other law enforcement agencies, a use consistent with the purposes originally specified by the agency. For example, the FBI's FTTTF supports ongoing investigations in other law enforcement agencies and the intelligence community by sharing information obtained from resellers (among other information) in response to requests about foreign terrorists from FBI agents or officials from partner agencies.[Footnote 50] The security safeguards principle requires that personal information be reasonably protected against unauthorized access, use, or disclosure. This principle also underlies the Privacy Act requirement that agencies establish appropriate administrative, technical, and physical safeguards to ensure the security and confidentiality of records on individuals.[Footnote 51] This principle is further mirrored in the FISMA requirement to protect information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction, including through controls for confidentiality. While we did not assess the effectiveness of information security or the implementation of FISMA at any of these agencies, we found that all four had measures in place intended to safeguard the security of personal information obtained from resellers.[Footnote 52] For example, all four agencies cited the use of passwords to prevent unauthorized access to information reseller databases. Further, agency components such as ATF, DEA, CBP, and USCIS, reported that they limit access to sensitive personal information (e.g., full Social Security number, driver's license number) to those with a specific need for this information. Several agency components also reported that resellers were promptly notified to deactivate accounts for employees separated from government service to protect against unauthorized use. As another security measure, several components, including DEA and the FBI, reported that resellers notified them when accounts were accessed from Internet addresses at unexpected locations, such as outside the United States. Another measure to prevent unauthorized disclosure reported by law enforcement agencies, such as the FBI, ICE, and Secret Service, is the use of "cloaked logging," which prevents vendor personnel from monitoring the queries being made by law enforcement agents. Officials in FBI's FTTTF reported that, in order to maintain the integrity of investigations, resellers are contractually prohibited from tracking or monitoring the exact persons or other entities being searched by FTTTF personnel. Law enforcement officials stated that the ability to mask searches from vendors is important so that those outside law enforcement have no knowledge of who is being investigated and so that subjects of an investigation are not "tipped off." Agency adherence to the collection limitation, data quality, use limitation, and security safeguards principles was based on general business procedures--including law-enforcement investigative practices-- that reflect security and civil liberties protections, rather than written policies specifically regarding the collection, accuracy, use, and security of personal information obtained from resellers. Implementation of these practices provides individuals with assurances that only a limited amount of their personal information is being collected, that it is used only for specific purposes, and that measures are in place to corroborate the accuracy of the information and safeguard it from improper disclosure. These controls help prevent potential harm to individuals and invasion of their privacy by limiting the exposure of their information and reducing the likelihood of inaccurate data being used to make decisions that could affect their welfare. Limitations in the Applicability of the Privacy Act and Ambiguities in OMB Guidance Contribute to an Uneven Adherence to the Purpose Specification, Openness, and Individual Participation Principles: The purpose specification, openness, and individual participation principles stipulate, among other things, that individuals should be made aware of the purpose and intended uses of the personal information being collected about them and have the ability to access and correct such information, if necessary. The Privacy Act reflects these principles in part by requiring agencies to publish in the Federal Register, "upon establishment or revision, a notice of the existence and character of a system of records." This notice is to include, among other things, the categories of records in the system as well as the categories of sources of records.[Footnote 53] In a number of cases, agencies did not adhere to the purpose specification or openness principles in regard to their use of reseller information in that they did not notify the public that they were using such information and did not specify the purpose for their data collections. Agency officials said that they generally did not prepare system-of-records notices that would address these principles because they were not required to do so by the Privacy Act. The act's vehicle for public notification--the system-of-records notice--becomes binding on an agency only when the agency collects, maintains, and retrieves personal data in the way defined by the act or when a contractor does the same thing explicitly on behalf of the government. Agencies generally did not issue system-of-records notices specifically for their use of information resellers largely because information reseller databases were not considered "systems of records operated by or on behalf of a government agency" and thus were not considered subject to the provisions of the Privacy Act.[Footnote 54] OMB guidance on implementing the Privacy Act does not specifically refer to the use of reseller data or how it should be treated. According to OMB and other agency officials, information resellers operate their databases for multiple customers, and federal agency use of these databases does not amount to the operation of a system of records on behalf of the government. Further, agency officials stated that merely querying information reseller databases did not amount to agency "maintenance" of the personal information being queried and thus also did not trigger the provisions of the Privacy Act. In many cases, agency officials considered their use of resellers to be of this type--essentially "ad hoc" querying or "pinging" of reseller databases for personal information about specific individuals, which they believed they were not doing in connection with a formal system of records. In other cases, however, agencies maintained information reseller data in systems for which system-of-records notices had been previously published. For example, law enforcement agency officials stated that, to the extent they retain the results of reseller data queries, this collection and use is covered by the system of records notices for their case file systems. However, in preparing such notices, agencies generally did not specify that they were obtaining information from resellers. Among system of records notices that were identified by agency officials as applying to the use of reseller data, only one-- TSA's system of records notice for the test phase of its Secure Flight program--specifically identified the use of information reseller data.[Footnote 55] Other programs that involve use of information reseller data include the fraud prevention and detection programs reported by SSA and State as well as law enforcement programs within ATF, the U.S. Marshals, and USCIS. For these programs, associated system of records notices identified by officials did not specify the use of information reseller data. In several of these cases, agency sources for personal information were described only in vague terms, such as "private organizations," "other public sources," or "public source material," when information was being obtained from information resellers.[Footnote 56] In one case, a notice indicated incorrectly that personal information was collected only from the individuals concerned. Specifically, USCIS prepared a system of records notice covering the Computer Linked Application Information Management System, which did not identify information resellers as a source. Instead, the notice stated only that "information contained in the system of records is obtained from individuals covered by the system."[Footnote 57] The inconsistency with which agencies specify resellers as a source of information in system-of-records notices is in part due to ambiguity in OMB guidance, which states that "for systems of records which contain information obtained from sources other than the individual to whom the records pertain, the notice should list the types of sources used." Although the guidance is unclear what would constitute adequate disclosure of "types of sources," OMB and DHS Privacy Office officials agreed that to the extent that reseller data are subject to the Privacy Act, agencies should specifically identify information resellers as a source and that merely citing public records information does not sufficiently describe the source. The individual participation principle gives individuals the right to access and correct information that is maintained about them. However, under the Privacy Act, agencies can claim exemptions from the requirement to provide individual access and the ability to make corrections if the systems are for law enforcement purposes.[Footnote 58] In most cases where officials identified system-of-record notices associated with reseller data collection for law enforcement purposes, agencies claimed this exemption. Like the ability to mask database searches from vendors, this provision is important so that the subjects of law enforcement investigations are not tipped off. Aside from the law enforcement exemptions to the Privacy Act, adherence to the purpose specification and openness principles is critical to preserving a measure of individual control over the use of personal information. Without clear guidance from OMB or specific policies in place, agencies have not consistently reflected these principles in their collection and use of reseller information. As a result, without being notified of the existence of an agency's information collection activities, individuals have no ability to know that their personal information could be obtained from commercial sources and potentially used as a basis, or partial basis, for taking action that could have consequences for their welfare. Privacy Impact Assessments Could Address Openness, and Purpose Specification Principles but Are Often Not Conducted: The PIA is an important tool for agencies to address privacy early in the process of developing new information systems, and to the extent that PIAs are made publicly available,[Footnote 59] they provide explanations to the public about such things as the information that will be collected, why it is being collected, how it is to be used, and how the system and data will be maintained and protected. In doing so, they serve to address the openness and purpose specification principles. However, only three agency components reported developing PIAs for their systems or programs that make use of information reseller data.[Footnote 60] As with system-of-records notices, agencies often did not conduct PIAs because officials did not believe they were required. Current OMB guidance on conducting PIAs is not always clear about when they should be conducted. According to guidance from OMB, a PIA is required by the E-Government Act when agencies "systematically incorporate into existing information systems databases of information in identifiable form purchased or obtained from commercial or public sources."[Footnote 61] However, the same guidance also instructs agencies that "merely querying a database on an ad-hoc basis does not trigger the PIA requirement." Reported uses of reseller data were generally not described as a "systematic" incorporation of data into existing information systems; rather, most involved querying a database and in some cases retaining the results of these queries. OMB officials stated that agencies would need to make their own judgments on whether retaining the results of searches of information reseller databases constituted a "systematic incorporation" of information. DHS has recently developed guidance requiring PIAs to be conducted whenever reseller data are involved. The DHS Privacy Office[Footnote 62] guidance on conducting PIAs points out, for example, that a program decision to obtain information from a reseller would constitute a new source of information, requiring that a PIA be conducted. However, although the DHS guidance clearly states that PIAs are required when personally identifiable information is obtained from a commercial source, it also states that "merely querying such a source on an ad hoc basis using existing technology does not trigger the PIA requirement."[Footnote 63] Like OMB's guidance, the DHS guidance is not clear, because agency personnel are left to make individual determinations as to whether queries are "on an ad hoc basis." In one case, a DHS component prepared a PIA for a system that collects reseller data but had not identified in the assessment that resellers were being used. DHS's USCIS uses copies of court records obtained from an information reseller to support evidentiary requirements for official adjudication proceedings concerning fraud. Although this use was reported to be covered by the PIA for the office's Fraud Tracking System, the PIA identifies only "public records" as the source of its information and does not mention that the public records are obtained from information resellers.[Footnote 64] In contrast, the draft DHS guidance on PIAs instructs DHS component agencies to "list the individual, entity, or entities providing the specific information identified above. For example, is the information collected directly from the individual as part of an application for a benefit, or is it collected from another source such as a commercial data aggregator." At the time of our review, this draft guidance had not yet been disseminated to DHS components. Lacking such guidance, DHS components did not have policies in place regarding the conduct of PIAs with respect to reseller data, nor did other agencies we reviewed. Until PIAs are conducted more thoroughly and consistently, the public is likely to remain incompletely informed about agency purposes and uses for obtaining reseller information. Agencies Often Did Not Have Practices in Place to Ensure Accountability for Proper Handling of Information Reseller Data: According to the accountability principle (individuals controlling the collection or use of personal information should be accountable for taking steps to ensure the implementation of the Fair Information Practices), agencies should take steps to ensure that employee uses of personal information from information resellers are appropriate. While agencies described activities to oversee the use of information resellers, such activities were largely based on trust of the user to use the information appropriately. For example, in describing controls placed on the use of commercial data, officials from component agencies identified measures such as instructing users that reseller data are for official use only and requiring users to sign statements of responsibility attesting to a need to access the information reseller databases and that their use will be limited to official business. Additionally, agency officials reported that in accessing reseller databases, users are required to select from a list of vendor-defined "permissible purposes" (e.g., law enforcement, transactions authorized by the consumer) before conducting a search. While these practices appear consistent with the accountability principle, they are focused on individual user responsibility rather than management oversight. For example, agencies did not have practices in place to obtain reports from resellers that would allow them to monitor usage of reseller databases at a detailed level. Although agencies generally receive usage reports from the information resellers, these reports are designed primarily for monitoring costs. Further, these reports generally contained only high-level statistics on the number of searches and databases accessed, not the contents of what was actually searched, thus limiting their utility in monitoring usage. For example, one information reseller reported that it does not provide reports to agencies on the "permissible purpose" that a user selects before conducting a search. Not all component agencies lacked robust user monitoring. Specifically, according to FBI officials from the FTTTF, their network records and monitors searches conducted by the user account, including who is searched against what public source database. The system also tracks the date and time of the query as well as what the analyst does with the data. FBI officials stated that the vendor reports as well as the network monitoring provide FBI with the ability to detect unusual usage of the public source providers. To the extent that federal agencies do not implement methods such as user monitoring or auditing of usage records, they provide limited accountability for their usage of information reseller data and have limited assurance that the information is being used appropriately. Conclusions: Services provided by information resellers serve as important tools that can enhance federal agency functions, such as law enforcement and fraud protection and identification. Resellers have practices in place to protect privacy, but these practices are not fully consistent with the Fair Information Practices. Among other things, resellers collect large amounts of information about individuals without their knowledge or consent, do not ensure that the data they make available are accurate for a given purpose, and generally do not make corrections to the data when errors are identified by individuals. Information resellers believe that application of the relevant principles of the Fair Information Practices is inappropriate or impractical in these situations. Given that reseller data may be used for a variety of purposes, determining the appropriate degree of control or influence individuals should have over the way in which their personal information is obtained and used--as envisioned in the Fair Information Practices--is critical. To more fully embrace these principles could require resellers to change the way they conduct business, and currently resellers are not legally required to follow them. As Congress weighs various legislative options, adherence to the Fair Information Practices will be an important consideration in determining the appropriate balance between the services provided by information resellers to customers such as government agencies and the public's right to privacy. Agencies take steps to adhere to Fair Information Practices such as the collection limitation, data quality, use limitation, and security safeguards principles. However, they have not taken all the steps they could to reflect others--or to comply with specific Privacy Act and e- Government Act requirements--in their handling of reseller data. Specifically, agencies did not always have policies or practices in place to address the purpose specification, individual participation, openness, and accountability principles with respect to reseller data. An important factor contributing to this is that OMB privacy guidance does not clearly address information reseller data, which has become such a valuable and useful tool for agencies. As a result, agencies are left largely on their own to determine how to satisfy legal requirements and protect privacy when acquiring and using reseller data. Without current and specific guidance, the government risks continued uneven adherence to important, well-established privacy principles and lacks assurance that the privacy rights of individuals are adequately protected. Matter for Congressional Consideration: In considering legislation to address privacy concerns related to the information reseller industry, Congress should consider the extent to which the industry should adhere to the Fair Information Practices. Recommendations for Executive Action: To improve accountability, ensure adequate public notice of agencies' use of personal information from commercial sources, and allay potential privacy concerns arising from agency use of information from such sources, we are making three recommendations to the Director of OMB and the heads of the four agencies. Specifically, we recommend that: * the Director of OMB revise guidance on system of records notices and privacy impact assessments to clarify the applicability of the governing laws (the Privacy Act and the E-Government Act) to the use of personal information from resellers. These clarifications should specify the circumstances under which agencies should make disclosures about their uses of reseller data so that agencies can properly notify the public (for example, what constitutes a "systematic" incorporation of reseller data into a federal system). The guidance should include practical scenarios based on uses agencies are making of personal information from information resellers (for example, visa, criminal, and fraud investigations). * the Director of OMB direct agencies to review their uses of personal information from information resellers, as well as any associated system of records notices and privacy impact assessments, to ensure that such notices and assessments explicitly reference agency use of information resellers. * the Attorney General, the Secretary of Homeland Security, the Secretary of State, and the Commissioner of SSA develop specific policies for the collection, maintenance, and use of personal information obtained from resellers that reflect the Fair Information Practices, including oversight mechanisms such as the maintenance and review of audit logs detailing queries of information reseller databases--to improve accountability for agency use of such information. Agency Comments and Our Evaluation: We received written comments on a draft of this report from the Justice's Assistant Attorney General for Administration (reproduced in appendix III), from the Director of the DHS Departmental GAO/OIG Liaison Office (reproduced in appendix IV), from the Commissioner of SSA (reproduced in appendix V), and from State's Assistant Secretary and Chief Financial Officer (reproduced in appendix VI). We also received comments via E -mail from staff of OMB's Office of Information and Regulatory Affairs. Justice, DHS, SSA, and OMB all generally agreed with the report and described actions initiated to address our recommendations. Justice and SSA also provided technical comments, which has been incorporated in the final report as appropriate. In its comments, Justice agreed that revised or additional guidance and policy could be created to address unique issues presented by use of personal information obtained from resellers. However, noting that the Privacy Act allows law enforcement agencies to exempt certain records from provisions of the law that reflect aspects of the Fair Information Practices, Justice recommended that prior to issuance of any new or revised policy, careful consideration be given to the balance struck in the Privacy Act on applying the Fair Information Practices to law enforcement data. We recognize that law enforcement purposes are afforded the opportunity for exemptions from some of the provisions of the Privacy Act. The report acknowledges this fact. We also agree and acknowledge in the report that the Fair Information Practices serve as a framework of principles for balancing the need for privacy with other public policy interests, such as national security and law enforcement. DHS also agreed on the importance of guidance to federal agencies on the use of reseller information and stated that it is working diligently on finalizing a DHS policy for such use. The agency commented that its Privacy Office has been reviewing the use and appropriate privacy protections for reseller data, including conducting a 2-day public workshop on the subject in September 2005. DHS also noted that it had just issued departmentwide guidance on the conduct of privacy impact assessments in March 2006, which include directions relevant to the collection and use of commercial data. We have made changes to the final report to reflect the recent issuance of the DHS guidance. SSA noted in its comments that it had established internal controls, including audit trails of systems usage, to ensure that information is not improperly disclosed. SSA also stated that it would amend relevant system-of-record notices to reflect use of information resellers and would explore options for enhancing its policies and internal controls over information obtained from resellers. State interpreted our draft report to "rest on the premise that records from 'information resellers' should be accorded special treatment when compared with sensitive information from other sources." State indicated that it does not distinguish between types of information or sources of information in complying with privacy laws. However, our report does not suggest that data from resellers should receive special treatment. Instead, our report takes the widely accepted Fair Information Practices as a universal benchmark of privacy protections and assesses agency practices in comparison with them. State also interpreted our draft report to state that fraud detection, as a purpose for collecting personal information, is not related to law enforcement. However, the draft does not make such a claim. We have categorized agency uses of personal information based on descriptions provided by agencies and have categorized fraud detection uses separately from law enforcement to provide insight into different types of uses. We do not claim the two uses are unrelated. Finally, the department stated that in its view, it would be bad policy to require specification of sources such as data resellers in agency system of records notices. In contrast, we believe that adding clarity and specificity about sources is in the spirit of the purpose specification practice and note that DHS has recently issued guidance on privacy impact assessments that is consistent with this view. OMB stated that, based on a staff-level meeting of agency privacy experts, it believes agencies recognize that when personal data are brought into their systems, this fact must be reflected in their privacy impact assessments and system-of-record notices. We do not find this observation inconsistent with our findings. We found, however, that inconsistencies occurred in agencies' determinations of when or whether reseller information was actually brought into their systems, as opposed to being merely "accessed" on an ad-hoc basis. We believe clarification of this issue is important. OMB further stated that agencies have procedures in place to verify commercial data before they are used in decisions involving the granting or recoupment of benefits or entitlements. Again, this is not inconsistent with the results of our review. Finally OMB stated that it would discuss its guidance with agency senior officials for privacy to determine whether additional guidance concerning reseller data is needed. Comments from Information Resellers: We also obtained comments on excerpts of our draft report from the five information resellers we reviewed. General comments made by resellers and our evaluation are summarized below: * Several resellers raised concerns about our reliance on the OECD version of the Fair Information Practices as a framework for assessing their privacy policies and business practices. They suggested that it would be unreasonable to require them to comply with aspects of the Fair Information Practices that they believe were intended for other types of users of personal information, such as organizations that collect information directly from consumers. Further, they commented that our draft summary appeared to treat strict adherence to all of the Fair Information Practices as if it were a legally binding requirement. In several cases, they suggested that it would be more appropriate for us to use the privacy framework developed by the Asia-Pacific Economic Cooperation (APEC) organization in 2004, because the APEC framework is more recent and because it explicitly states that it has limited applicability to publicly available information. * As discussed in our report, the OECD version of the Fair Information Practices is widely used and cited within the federal government as well as internationally. In addition, the APEC privacy framework, which was developed as a tool for encouraging the development of privacy protection in the Asia Pacific region, acknowledges that the OECD guidelines are still relevant and "in many ways represent the international consensus on what constitutes honest and trustworthy treatment of personal information."[Footnote 65] Further, our use of the OECD guidelines is as an analytical framework for identifying potential privacy issues for further consideration by Congress--not as legalistic compliance criteria. The report states that the Fair Information Practices are not precise legal requirements; rather they provide a framework of principles for balancing the needs for privacy against other public policy interests, such as national security, law enforcement, and administrative efficiency. In conducting our analysis, we noted that the nature of the reseller business is largely at odds with the principles of collection limitation, data quality, purpose specification, and use limitation. We also noted that resellers are not currently required to follow the Fair Information Practices and that for resellers to more fully embrace them could require that they change the way they do business. We recognize that it is important to achieve an appropriate balance between the benefits of resellers' services and the public's right to privacy and point out that, as Congress weighs various legislative options, it will be critical to determine an appropriate balance. We have made changes in this report to clarify that we did not attempt to make determinations of whether or how information reseller practices should change and that such determinations are a matter of policy based on balancing the public's right to privacy with the value of reseller services. * Several information resellers stated that the draft did not take into account that public record information is freely available. For example, one reseller stated that public records should be understood by consumers to be open to all for any use not prohibited by state or federal law. Another stated that information resellers merely effectuate the determination made by governmental entities that public records should be open to all. However, the views expressed by the resellers do not take into account several important factors. First, resellers collect information for their products from a variety of sources, including information provided by consumers to businesses. Resellers products are not based exclusively on public records. Thus a consideration of protections for public record information does not take the place of a full assessment of the information reseller business. Second, resellers do not merely pass on public record information as they find it; they aggregate information from many different sources to create new information products, and they make the information much more readily available than it would be if it remained only in paper records on deposit in government facilities. The aggregation and increased accessibility provided by resellers raises privacy concerns that may not apply to the original paper-based public records. Finally, it is not clear that individuals give up all privacy rights to personal information contained in public records. The Supreme Court has expressed the opinion in the past that individuals retain a privacy interest in publicly released personal information. We therefore believe it is important to assess the status of privacy protections for all personal information being offered commercially to the government so that informed policy decisions may be made about the appropriate balance between resellers' services and the public's right to privacy. * Several resellers also noted that the draft report did not address the complexity of the reseller business--the extent to which resellers' businesses vary among themselves and overlap with consumer reporting agencies. We have added text addressing this in the final report. The resellers also provided technical comments, which were incorporated in the final report as appropriate. We are sending copies of this report to the Attorney General, the Secretary of Homeland Security, the Secretary of State, the Commissioner of the Social Security Administration, the Director of the Office of Management and Budget, and other interested congressional committees. Copies will be made available to others on request. In addition, this report will be available at no charge on our Web site at [Hyperlink, http://www.gao.gov]. If you have any questions concerning this report, please call me at (202) 512-6240 or send E-mail to [Hyperlink, koontzl@gao.gov]. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Major contributors to this report are John de Ferrari, Assistant Director; Mathew Bader; Barbara Collier; Pamlutricia Greenleaf; David Plocher; and Jamie Pressman. Signed by: Linda D. Koontz: Director, Information Management Issues: List of Requesters: The Honorable F. James Sensenbrenner, Jr.: Chairman: The Honorable John Conyers, Jr.: Ranking Minority Member: Committee on the Judiciary: House of Representatives: The Honorable Steve Chabot: Chairman: The Honorable Jerrold Nadler: Ranking Minority Member: Subcommittee on the Constitution: Committee on the Judiciary: House of Representatives: The Honorable Bill Nelson: Ranking Minority Member: Subcommittee on International Operations and Terrorism, Committee on Foreign Relations: United States Senate: The Honorable Bennie G. Thompson: Ranking Minority Member: Committee on Homeland Security: House of Representatives: The Honorable Zoe Lofgren: Ranking Minority Member: Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment: Committee on Homeland Security: House of Representatives: The Honorable Loretta Sanchez: Ranking Minority Member: Subcommittee on Economic Security, Infrastructure Protection, and Cybersecurity: Committee on Homeland Security: House of Representatives: [End of section] Appendixes: Appendix I: Objectives, Scope, and Methodology: Our objectives were to determine the following: * how the Departments of Justice, Homeland Security, and State and the Social Security Administration are making use of personal information obtained through contracts with information resellers; * the extent to which the information resellers providing personal information to these agencies have policies and practices in place that reflect widely accepted principles for protecting the privacy and security of personal information; and: * the extent to which these agencies have policies and practices in place for handling information reseller data that reflect widely accepted principles for protecting the privacy and security of personal information. To address our objectives, we identified and reviewed applicable laws such as the Privacy Act of 1974 and the E-Government Act, agency policies and practices, and the widely accepted privacy principles embodied in the Organization for Economic Cooperation and Development (OECD) version of the Fair Information Practices. Working with liaisons at the four federal agencies we were requested to review, we identified officials responsible for the acquisition and use of personal information from information resellers. Through these officials, we obtained applicable contractual documentation such as statements of work, task orders, blanket purchase agreements, purchase orders, interagency agreements, and contract terms and conditions. To address our first objective, we obtained and reviewed contract vehicles covering federal agency use of information reseller services for fiscal year 2005. We also reviewed applicable General Services Administration (GSA) schedule and Library of Congress FEDLINK contracts with information resellers that agencies made use of by various means, including through issuance of blanket purchase agreements, task orders, purchase orders, or interagency agreements. We analyzed the contractual documentation provided to determine the nature, scope, and dollar amounts associated with these uses, as well as mechanisms for acquiring personal information. In an effort to identify all relevant instances of agency use of information resellers and related contractual documents, we developed a list of structured questions to address available contract documents, uses of personal information, and applicable agency guidance. We provided these questions to agency officials and held discussions with them to help ensure that they provided all relevant information on uses of personal information from information resellers. To further ensure that relevant contract vehicles were identified, we asked major information resellers about their business with the four agencies. We also interviewed officials from GSA and the Library of Congress to discuss the mechanisms available to federal agencies for acquiring personal information and to identify any additional uses of these mechanisms by the four agencies. To further address our first objective, we categorized agency use of information resellers into five categories: counterterrorism, debt collection, fraud detection/prevention, law enforcement, and other. These categorizations were based on the component and applicable program's mission, as well as the specific reported use of the contract. In identifying relevant uses of information resellers, we were unable to identify small purchases (e.g., purchases below $2,500), as agencies do not track this information centrally. In addition, to the extent practicable, we excluded uses that generally did not involve the use of personal information. For example, officials from several component agencies reported that their use of the LexisNexis and West services was primarily for legal research rather than for public records information. In other cases, reported amounts may reflect uses that do not involve personal information because agencies were unable to separate such uses from uses involving personal information. To address our second objective, we obtained and reviewed relevant private sector laws and guidance, such as the Gramm-Leach-Bliley Act, the Fair Credit Reporting Act, and the Fair Information Practices. We also identified major information resellers in agency contractual agreements for personal information and held interviews with officials from these companies, including Acxiom, ChoicePoint, Dun & Bradstreet,[Footnote 66] LexisNexis, and West, to discuss security, quality controls, and privacy policies. In addition, we conducted site visits at Acxiom, ChoicePoint, and LexisNexis, and obtained written responses to related questions from West. These five resellers accounted for approximately 95 percent of the dollar value of all reported contracts with resellers. To determine the extent that they reflect widely accepted Fair Information Practices, we reviewed and compared information reseller's privacy policies and procedures with these principles. In conducting our analysis, we identified the extent to which reseller practices were consistent with the key privacy principles of the Fair Information Practices. We also assessed the effect of any inconsistencies; however, we did not attempt to make determinations of whether or how information reseller practices should change. Such determinations are a matter of policy based on balancing the public's right to privacy with the value of services provided by resellers to customers such as government agencies. To address our third objective, we identified applicable guidelines and management controls regarding the acquisition, maintenance, and use of personal information from information resellers at each of the four agencies. We also interviewed agency officials, including acquisition and program staff, to further identify relevant policies and procedures. Our assessment of overall agency application of the Fair Information Practices was based on the policies and procedures of major components at each of the four agencies.[Footnote 67] We also conducted interviews at the four agencies with senior agency officials designated for privacy as well as officials of the Office of Management and Budget (OMB) to obtain their views on the applicability of federal privacy laws (including the Privacy Act of 1974 and the E-Government Act of 2002) and related guidance on agency use of information resellers. In addition, we compared relevant policies and management practices with the Fair Information Practices. We assessed the overall application of the principles of the Fair Information Practices by agencies according to the following categories: 1. General. We assessed the application as general if the agency had policies or procedures to address all major aspects of a particular principle. 2. Uneven. We assessed the application as uneven if the agency had policies or procedures that addressed some but not all aspects of a particular principle or if some but not all components and agencies had policies or practices in place addressing the principle. We performed our work at the Departments of Homeland Security, Justice, and State in Washington, D.C; at the Social Security Administration in Baltimore, Maryland; Acxiom Corporation in Little Rock, Arkansas; ChoicePoint in Alpharetta, Georgia; Dun & Bradstreet in Washington, D.C; and LexisNexis in Washington, D.C., and Miamisburg, Ohio. Our work was conducted from May 2005 to March 2006 in accordance with generally accepted government auditing standards. [End of section] Appendix II: Federal Laws Affecting Information Resellers: Major laws that affect information resellers include the Gramm-Leach- Bliley Act, the Drivers Privacy Protection Act, the Health Insurance Portability and Accountability Act, the Fair Credit Reporting Act, and the Fair and Accurate Credit Transactions Act. Their major privacy related provisions are briefly summarized below. Gramm-Leach-Bliley Act: The Gramm-Leach-Bliley Act requires financial institutions (e.g., banks, insurance, and investment companies) to give consumers privacy notices that explain the institutions' information-sharing practices (P.L. 106-102 (1999), Title V, 15 U.S.C. 6801). In turn, consumers have the right to limit some, but not all, sharing of their nonpublic personal information. Financial institutions are permitted to disclose consumers' nonpublic personal information without offering them an opt- out right in a number of circumstances including the following: * to effect a transaction requested by the consumer in connection with a financial product or service requested by the consumer; maintaining or servicing the consumer's account with the financial institution or another entity as part of a private label credit card program or other extension of credit; or a securitization, secondary market sale, or similar transaction; * with the consent or at the direction of the consumer; * to protect the confidentiality or security of the consumer's records; to prevent fraud; for required institutional risk control or for resolving customer disputes or inquiries; to persons holding a legal or beneficial interest relating to the consumer; or to the consumer's fiduciary; * to provide information to insurance rate advisory organizations, guaranty funds or agencies, rating agencies, industry standards agencies, and the institution's attorneys, accountants, and auditors; * to the extent specifically permitted or required under other provisions of law and in accordance with the Right to Financial Privacy Act of 1978, to law enforcement agencies, self-regulatory organizations, or for an investigation on a matter related to public safety; * to a consumer reporting agency in accordance with the Fair Credit Reporting Act or from a consumer report reported by a consumer reporting agency; * in connection with a proposed or actual sale, merger, transfer, or exchange of all or a portion of a business if the disclosure concerns solely consumers of such business; and: * to comply with federal, state, or local laws; an investigation or subpoena; or to respond to judicial process or government regulatory authorities. Driver's Privacy Protection Act: The Driver's Privacy Protection Act generally prohibits the disclosure of personal information by state departments of motor vehicles. (P.L. 103-322 (1994), 18 U.S.C. § 2721-2725). It also specifies a list of exceptions when personal information contained in a state motor vehicle record may be disclosed. These permissible uses include the following: * for use by any government agency in carrying out its functions; * for use in connection with matters of motor vehicle or driver safety and theft; motor vehicle emissions; motor vehicle product alterations, recalls, or advisories; motor vehicle market research activities; * for use in the normal course of business by a legitimate business, but only to verify the accuracy of personal information submitted by the individual to the business and, if such information is not correct, to obtain the correct information but only for purposes of preventing fraud by pursuing legal remedies against, or recovering on a debt or security interest against, the individual; * for use in connection with any civil, criminal, administrative, or arbitral proceeding in any federal, state, or local court or agency; * for use in research activities; * for use by any insurer or insurance support organization in connection with claims investigation activities; * for use in providing notice to the owners of towed or impounded vehicles; * for use by a licensed private investigative agency for any purpose permitted under the act; * for use by an employer or its agent or insurer to obtain information relating to the holder of a commercial driver's license; * for use in connection with the operation of private toll transportation facilities; * for any other use, if the state has obtained the express consent of the person to whom a request for personal information pertains; * for bulk distribution of surveys, marketing, or solicitations, if the state has obtained the express consent of the person to whom such personal information pertains; * for use by any requester, if the requester demonstrates that it has obtained the written consent of the individual to whom the information pertains; and: * for any other use specifically authorized under a state law, if such use is related to the operation of a motor vehicle or public safety. Health Insurance Portability and Accountability Act: The Health Insurance Portability and Accountability Act of 1996 (P.L. 104-191) made a number of changes to laws relating to health insurance. It also directed the Department of Health and Human Services to issue regulations to protect the privacy and security of personally identifiable health information. The resulting privacy rule (45 C.F.R. Part 164) defines certain rights and obligations for covered entities (e.g., health plans and health care providers) and individuals, including the following: * giving individuals the right to be notified of privacy practices and to inspect, copy, request correction, and have an accounting of disclosures of health records, except for specified exceptions; * setting limits on the use of health information apart from treatment, payment, and health care operations (e.g., for marketing) without the individual's authorization; * permitting disclosure of health information without the individual's authorization for purposes of public health protection; health oversight; law enforcement; judicial and administrative proceedings; approved research activities; coroners, medical examiners, and funeral directors; workers' compensation programs, government abuse, neglect, and domestic violence authorities; organ transplant organizations; government agencies with specified functions, e.g., national security activities; and as required by law; * requiring that authorization forms contain specific types of information, such as a description of the health information to be used or disclosed, the purpose of the use or disclosure, and the identity of the recipient of the information; and: * requiring covered entities to take steps to limit the use or disclosure of health information to the minimum necessary to accomplish the intended purpose, unless authorized or under certain circumstances. Fair Credit Reporting Act: The Fair Credit Reporting Act (P.L. 91-508, 1970, 15 U.S.C. § 1681) governs the use of personal information by consumer reporting agencies, which are individuals or entities that regularly assemble or evaluate information about individuals for the purpose of furnishing consumer reports to third parties. The act defines a consumer report as any communication by a consumer reporting agency about an individual's credit worthiness, character, reputation, characteristics, or mode of living and permits its use only in the following situations: * as ordered by a court or federal grand jury subpoena; * as instructed by the consumer in writing; * for the extension of credit as a result of an application from a consumer or the review or collection of a consumer's account; * for employment purposes, including hiring and promotion decisions, where the consumer has given written permission; * for the underwriting of insurance as a result of an application from a consumer; * when there is a legitimate business need, in connection with a business transaction that is initiated by the consumer; * to review a consumer's account to determine whether the consumer continues to meet the terms of the account; * to determine a consumer's eligibility for a license or other benefit granted by a governmental instrumentality required by law to consider an applicant's financial responsibility or status; * for use by a potential investor or servicer or current insurer in a valuation or assessment of the credit or prepayment risks associated with an existing credit obligation; and: * for use by state and local officials in connection with the determination of child support payments, or modifications of enforcement thereof. The act generally limits the amount of time negative information can be included in a consumer report to no more than 7 years, or 10 years in the case of bankruptcies. Under the act, individuals have a right to access all information in their consumer reports; a right to know who obtained their report during the previous year or two, depending on the circumstances; and a right to dispute the accuracy of any information about them. Fair and Accurate Credit Transactions Act: The Fair and Accurate Credit Transactions Act (P.L. 108-159, 2003) amended the Fair Credit Reporting Act, extending provisions to improve the accuracy of personal information assembled by consumer reporting agencies and better provide for the fair use of and consumer access to personal information. The act's provisions include the following: * consumers may request a free annual credit report from nationwide consumer reporting agencies, to be made available no later than 15 days after the date on which the request is received; * persons furnishing information about individuals to consumer reporting agencies, and resellers of consumer reports, must have polices and procedures for investigating and correcting inaccurate information, * consumers are given the right to prohibit business affiliates of consumer reporting agencies from using information about them for certain marketing purposes; and: * consumer reporting agencies cannot include medical information in reports that will be used for employment, credit transactions, or insurance transactions unless the consumer consents to such disclosures. [End of section] Appendix III: Comments from the Department of Justice: U.S. Department of Justice: Washington, D.C. 20530: MAR 17 2006: Linda Koontz: Director, Information Management Issues: U.S. Government Accountability Office: 441 G Street, NW: Washington, DC 20548: Dear Ms. Koontz: Thank you for the opportunity to review the final draft of the Government Accountability Office (GAO) report entitled Privacy: Opportunities Exist for Agencies and Information Resellers to More Fully Adhere to Key Principles (GAO-06-421/310228). The draft was reviewed by 16 components of the Department of Justice (DOJ) who had participated in this review. Earlier today, the DOJ provided you technical comments to be incorporated in the report as appropriate. This letter constitutes the formal comments of the DOJ, and I request that it be included in the final report. The DOJ is committed to protecting the privacy rights of individuals in the course of its counterterrorism and law enforcement mission. To spearhead this effort, the DOJ has recently appointed a Chief Privacy and Civil Liberties Officer (CPCLO) to oversee and administer the DOD's privacy functions. The DOJ is also establishing a departmental Privacy and Civil Liberties Board to assist the CPCLO in ensuring that the DOD's activities are carried out in a way that continues to fully protect the privacy and civil liberties of all Americans. As the GAO report points out, the recent security breaches involving information resellers have highlighted the public's concerns regarding personal data maintained by such resellers and led to the GAO's review of the use of personal information from information resellers by the DOJ, as well as the DOD's policies and practices for handling such information. The DOJ recognizes the unique issues presented by reseller information and agrees that additional measures could be taken regarding its use, in the form of revised or additional guidance and policy. At the same time, the DOJ also recognizes the need to consider agency resources, competing mission priorities, and the privacy protections that are already in place as a result of the DOD's compliance with the Privacy Act of 1974, 5 U.S.C. §552a. In recognition of the variety of government operations (such as law enforcement and intelligence), the Privacy Act incorporated some, but not all, of the Fair Information Practices. [NOTE 1] Law enforcement may use the regulatory process to exempt certain records from some of the requirements of the Privacy Act. For example, pursuant to regulations, criminal law enforcement records may be exempted from the Privacy Act's requirement that an agency make reasonable efforts to assure that a record is accurate, complete, timely, and relevant for agency purposes, prior to disseminating that record to someone other than an agency or pursuant to FOIA. Instead of focusing on satisfying the Fair Information Practices, the more appropriate metric should be whether an agency has met the requirements of the Privacy Act. Thus, the DOJ recommends that prior to the issuance of any new guidance or policy, a careful analysis and assessment of the degree of need for any new guidance should be conducted. That assessment should be used to ensure that the guidance is tailored in such a way as to avoid any negative impact on the DOD's resources and competing mission priorities. Further, any new guidance or policy should be crafted in such a way as to avoid any increase in litigation risk, and to fully recognize and take into account the balance that Congress has already struck in the Privacy Act in applying Fair Information Practices to law enforcement data. The DOJ stands willing to assist in the development of any new guidance or policy considered as a result of this effort. We look forward to working with OMB and other agencies toward a solution that strikes the proper balance between the furtherance of the DOD's mission and the protection of individuals' privacy. Again, we appreciate the opportunity to comment on this report. If you have any questions regarding our comments, please contact Richard Theis, Assistant Director, Audit Liaison Group, Management and Planning Staff. If you would like to discuss or receive a briefing, please contact me at (202) 514-3101. Sincerely, Signed by: Paul R. Corts: Assistant Attorney General for Administration: NOTE: [1] First proposed in 1973 by a U.S. governmental advisory committee and widely accepted as including: collection limitation, data quality, purpose specification, use limitation, security safeguards, openness, individual participation, and accountability. [End of section] Appendix IV: Comments from the Department of Homeland Security: U.S. Department of Homeland Security: Washington, DC 20528: March 17, 2006: Ms. Linda Koontz: Director, Information Management: Government Accountability Office: Washington, DC 20548: Dear Ms. Koontz: Re: Draft Report GAO-06-421, Privacy: Opportunities Exist for Agencies and Information Resellers to More Fully Adhere to Key Principles. Thank you for the opportunity to review the draft report. The Department of Homeland Security (DHS) and the Privacy Office commend the GAO for undertaking this important and informative review. Certainly guidance on the collection and use of commercial: data is important for federal agencies, such as DHS. Early on in the establishment of the DHS Privacy Office, the Department determined that one of the top three issues that needed to be addressed was the use of private sector information for homeland security purposes. It is an increasingly important issue, as the report notes. To that end, the Privacy Office at DHS began its review of commercial data use and appropriate privacy safeguards through internal DHS study and by doing outreach publicly and in cooperation with DHS offices and other federal and private sector partners. The Privacy Office hosted a two-day public workshop, September 8-9, 2005, on Privacy and Technology: Government Use of Commercial Data for Homeland Security. The agenda and full transcripts of the conference, including a review of the application of the Privacy Act and Fair Information Practice Principles, is posted at our website at www.dhs.gov/privacy and is available to the public and government agencies for review. Mention of this in the final GAO report could assist the dialogue and enable decision makers to review information and suggestions raised for appropriate use of commercial data and challenges experienced by federal agencies. The Department appreciates the thoughtful work of GAO in addressing current use and practices at DHS. We would like to report that in early March 2006, and since the last contact with GAO, updated Privacy Impact Assessment Guidance, which includes directions relevant to the collection and use of commercial data, has been published by the Privacy Office and distributed throughout the Department. It also is posted on both the Department's internal and external websites. Please see Privacy Impact Assessments, Official Guidance 2006, Privacy Office, U.S. Department of Homeland Security. We respectfully suggest the GAO report could be updated to reflect this. Prior to this, the Department did have guidance on Privacy Impact Assessments that had been distributed in draft form in July 2005, both internally in DHS and externally with all of our federal partners. The Department of Justice advised DHS of their intention to adopt the DHS published guidance of March 2006. The Department believes that our guidance, which includes questions that address the use of commercial data, is unique in the government in this regard. As a result, we believe the DHS Privacy Office should be given recognition in the GAO report for its efforts to encourage transparency regarding the use of commercial data. The Department continues to work diligently on finalizing a policy for DHS use of commercial data and expects to have that policy in circulation shortly. The Department will continue to address the need for transparency about the use of commercial data as part of the overall effort to reorganize and review legacy Privacy Act systems. We thank you again for the opportunity to review this most important report and provide comments. Sincerely, Signed by: Steven J. Pecinovsky: Director: Departmental GAO/OIG Liaison Office: [End of section] Appendix V: Comments from the Social Security Administration: SOCIAL SECURITY: The Commissioner: March 17,2006: Ms. Linda Koontz: Director, Information Management Issues: U.S. Government Accountability Office: Room 4-T-21: 441 G Street, NW: Washington, D.C. 20548: Dear Ms. Koontz: Thank you for the opportunity to review the draft report, "Privacy: Opportunities Exist For Agencies and Information Resellers to More Fully Adhere to Key Principles" (GAO-06-421). Our comments are enclosed. If you have any questions, please have your staff contact Candace Skurnik, Director, Audit Management and Liaison Staff, at (410) 965- 0374. Sincerely, Signed by: Jo Anne B. Barnhart: Enclosure: COMMENTS OF THE SOCIAL SECURITY ADMINISTRATION (SSA) ON THE GOVERNMENT ACCOUNTABILITY OFFICE'S (GAO) DRAFT REPORT, "PRIVACY: OPPORTUNITIES EXIST FOR AGENCIES AND INFORMATION RESELLERS TO MORE FULLY ADHERE TO KEY PRINCIPLES" (GAO-06-421): General Comments: Thank you for the opportunity to review and provide comments on this GAO draft report. We share GAO's concerns about the potential for security breaches involving information resellers and support GAO's suggestion for congressional consideration and recommendations for Executive Branch action in support of ensuring adherence to applicable laws and the Fair Information Practices relating to privacy protection. SSA is committed to protecting privacy with regard to information the Agency maintains, including information obtained from information resellers. We have established internal controls, including audit trails of any systems usage, to ensure that any information disclosed is for proper use. In order to identify any internal control weaknesses and potential problems that could result in waste, fraud and abuse, and to ensure compliance with the Federal Managers Financial Integrity Act of 1982, SSA components regularly perform Management Control Systems Reviews mandated by SSA and the Office of Management and Budget. GAO Recommendation: We recommend that the Attorney General, the Secretary of Homeland Security, the Secretary of State, and the Commissioner of SSA develop specific policies for the collection, maintenance, and use of personal information obtained from resellers that reflect the Fair Information Practices, including oversight mechanisms such as the maintenance and review of audit logs detailing queries of information reseller databases, to improve accountability for agency use of such information. SSA Comment: We agree. To better address the Fair Information Practices concerning information SSA obtains from information resellers, we will amend our relevant Privacy Act systems of records notices to reflect the use of information resellers/commercial data sources. We will also explore options for enhancing our policies and internal controls over information SSA obtains from information resellers, including options for improved audit trail maintenance and review. [End of section] Appendix VI: Comments from the Department of State: United States Department of State: Assistant Secretary and Chief Financial Officer: Washington, D.C. 20520: MAR 20 2006: Ms. Jacquelyn Williams-Bridgers: Managing Director: International Affairs and Trade: Government Accountability Office: 441 G Street, N.W. Washington, D.C. 20548-0001: Dear Ms. Williams-Bridgers: We appreciate the opportunity to review your draft report, "PRIVACY: Opportunities Exist For Agencies and Information Resellers to More Fully Adhere to Key Principles," GAO Job Code 310732. The enclosed Department of State comments are provided for incorporation with this letter as an appendix to the final report. If you have any questions concerning this response, please contact Brian Egan, Legal Adviser, Bureau of Legal Affairs, at (202) 647-2227. Sincerely, Signed by: Bradford R. Higgins: cc: GAO - Jamie Pressman: CA & DS: State/OIG - Mark Duda: Department of State Comments on GAO Draft Report PRIVACY: Opportunities Exist For Agencies and Information Resellers to More Fully Adhere to Key Principles (GAO-06-421 GAO Code 310732): Thank you for giving us the opportunity to comment on GAO's draft report "Privacy: Opportunities Exist For Agencies and Information Resellers to More Fully Adhere to Key Principles." In general, GAO's report seems to rest on the premise that records from "information resellers" should be accorded special treatment when compared with sensitive information from other sources. We do not believe that this premise is inherently sound. The Department receives sensitive information from a variety of sources in order to ensure that visas and passports are issued only to those who are entitled to them, to conduct investigations as part of its diplomatic security mission, and in other contexts. The Department does not distinguish between types of information or sources of information in deciding whether to comply with privacy laws. All Department information is treated in accordance with applicable privacy laws, regardless of the source or type of information at issue. We also have a few specific technical comments. We request that GAO revise those sections of the report (e.g., at 58 and 62) which suggest that "fraud protection" in the passport and visa context is "not related to law enforcement." The Department is charged with investigating, making arrests, and working with other appropriate law enforcement agencies to detect and prosecute potential cases of visa and passport fraud. In the passport context, GAO recently stated that "[m]aintaining the integrity of the U.S. passport is essential to the State Department's effort to protect U.S. citizens from terrorists, criminals, and others," and that "Passport fraud is often intended to facilitate such crimes as illegal immigration, drug trafficking, and alien smuggling." See GAO, Improvements Needed to Strengthen U.S. Passport Fraud Detection Efforts (June 29, 2005) at 2. Fraud detection in the passport and visa context is clearly related to law enforcement, as well as to the vital task of providing homeland security. On a related note, we disagree with GAO's criticism (at 62-63) of the use of terms such as "public source material" to identify categories of sources of records in Privacy Act systems of records notices. To the extent that an agency's system of record notices properly identify "categories" of records, the notices are in compliance with the Privacy Act. See 5 U.S.C. § 552a(e)(4)(I). In our view, it would be bad policy to require separate and specific mention of information from individual sources such as data resellers, as this would imply that such information could not be considered when it was not specifically mentioned. Such a policy could result in critical information not being considered in a given case (in the case of the Department, for example, in adjudicating a visa or passport application), with consequent harmful effects on the United States national interest. The proliferation of such requirements for "specific mention" in systems of records notices would likely compound this problem, with the result that USG judgments would be less, not more, well-founded. [End of section] (310732): FOOTNOTES [1] For purposes of this report, the term personal information encompasses all information associated with an individual, including both identifying and nonidentifying information. Personally identifying information, which can be used to locate or identify an individual, includes such things as names, aliases, and agency-assigned case numbers. Nonidentifying personal information includes such things as age, education, finances, criminal history, physical attributes, and gender. [2] The Privacy Act of 1974, Pub. L. No. 93-579, 88 Stat. 1896 (codified as amended at 5 U.S.C. § 552a) provides safeguards against an invasion of privacy through the misuse of records by federal agencies and allows citizens to learn how their personal information is collected, maintained, used, and disseminated by the federal government. [3] Congress used the committee's final report as a basis for crafting the Privacy Act of 1974. See Records, Computers and the Rights of Citizens: Report of the Secretary's Advisory Committee on Automated Personal Data Systems (Washington, D.C.: U.S. Department of Health, Education, and Welfare, July 1973). [4] Descriptions of these principles are shown in table 2. [5] The five information resellers we reviewed were ChoicePoint, LexisNexis, Acxiom, Dun & Bradstreet, and West. While these resellers were all reported by federal agencies to be sources of personal information, their businesses vary. A discussion of this variance in business practices appears in the background section of this report. Our results may not apply to other resellers who do very little or no business with these federal agencies. [6] ChoicePoint, LexisNexis, and Acxiom. [7] This figure may include uses that do not involve personal information. Except for instances where the reported use was primarily for legal research, agency officials were unable to separate the dollar values associated with use of personal information from uses for other purposes (e.g., LexisNexis and West provide news and legal research in addition to public records). [8] In certain circumstances, laws restrict the collection and use of specific kinds of personal information. For example, the Fair Credit Reporting Act regulates access to and use of consumer information under certain circumstances. [9] Credit header data are the nonfinancial identifying information located at the top of a credit report, such as name, current and prior addresses, telephone number, and Social Security number. [10] Under the Privacy Act of 1974, the term "routine use" means (with respect to the disclosure of a record) the use of such a record for a purpose that is compatible with the purpose for which it was collected. 5 U.S.C. § 552a (a(7)). [11] 5 U.S.C. § 552a(m). [12] OMB, OMB Guidance for Implementing the Privacy Provisions of the E- Government Act of 2002, M-03-22 (Sept. 26, 2003). [13] FISMA, Title III, E-Government Act of 2002, Pub. L. No. 107-347 (Dec. 17, 2002). [14] OMB, "Privacy Act Implementation: Guidelines and Responsibilities," Federal Register, Volume 40, Number 132, Part III, pages 28948-28978 (Washington, D.C.: July 9, 1975). Since the initial Privacy Act guidance of 1975, OMB periodically has published additional guidance. Further information regarding OMB Privacy Act guidance can be found on the OMB Web site at http://www.whitehouse.gov/omb/inforeg/infopoltech.html. [15] States that enacted breach of information legislation in 2005 include Arkansas, Connecticut, Delaware, Florida, Georgia, Illinois, Indiana (applies to state agencies only), Louisiana, Maine, Minnesota, Montana, Nevada, New Jersey, New York, North Carolina, North Dakota, Ohio, Pennsylvania, Rhode Island, Tennessee, Texas, and Washington. [16] Records, Computers and the Rights of Citizens: Report of the Secretary's Advisory Committee on Automated Personal Data Systems, (Washington, D.C.: U.S. Department of Health, Education, and Welfare, July 1973). [17] OECD, Guidelines on the Protection of Privacy and Transborder Flow of Personal Data (Sept. 23, 1980). The OECD plays a prominent role in fostering good governance in the public service and in corporate activity among its 30 member countries. It produces internationally agreed-upon instruments, decisions, and recommendations to promote rules in areas where multilateral agreement is necessary for individual countries to make progress in the global economy. [18] European Union Data Protection Directive ("Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data") (1995). [19] "Report on OECD Guidelines Program," Memorandum from Bernard Wunder, Jr., Assistant Secretary for Communications and Information, Department of Commerce (Oct. 30, 1981). [20] Privacy Office Mission Statement, U.S. Department of Homeland Security; "Privacy Policy Development Guide," Global Information Sharing Initiative, U.S. Department of Justice, www.it.ojp.gov/global (Sept. 2005); "Homeless Management Information Systems, U.S. Department of Housing and Urban Development (Federal Register, July 30, 2004); and "Options for Promoting Privacy on the National Information Infrastructure," Health and Human Services Privacy Committee, Office of the Assistant Secretary for Planning and Evaluation, Department of Health and Human Services (April 1997). [21] The Federal Enterprise Architecture is intended to provide a common frame of reference or taxonomy for agencies' individual enterprise architecture efforts and their planned and ongoing information technology investment activities. An enterprise architecture is a blueprint, defined largely by interrelated models, that describes (in both business and technology terms) an entity's "as is" or current environment, its "to be" or future environment, and its investment plan for transitioning from the current to the future environment. [22] H.R. 4127; introduced by Representative Clifford B. Stearns on October 25, 2005. [23] S. 1789; introduced by Senator Arlen Specter on September 29, 2005, and reported from the Senate Judiciary Committee on November 17, 2005. [24] This figure comprises contracts and task orders with information resellers that included the acquisition and use of personal information. However, some of these funds may have been spent on uses that do not involve personal information; we could not omit all such uses because agency officials were not always able to separate the amounts associated with use of personal information from those for other uses (e.g., LexisNexis and West provide news and legal research in addition to public records). In some instances, where the reported use was primarily for legal research, we omitted these funds from the total. [25] GSA's Federal Supply Schedule allows agencies to take advantage of prenegotiated contracts with a variety of vendors, including information resellers. [26] A GSA schedule blanket purchase agreement simplifies the filling of recurring needs for supplies or services, while leveraging a customer's buying power by taking advantage of quantity discounts, saving administrative time, and reducing paperwork. [27] The ChoicePoint blanket purchase agreement is also available to non-Justice agencies, whose use accounted for approximately $2.8 million in fiscal year 2005. [28] The total value of ChoicePoint, LexisNexis, and West contracts-- $24.7 million--exceeds the value of $19 million reported above because this figure omits the $2.8 million used by non-Justice agencies (see footnote 27) as well as uses that were reported not to involve personal information. Justice officials responsible for administering the departmentwide contracts with LexisNexis and West reported that these agreements are used by multiple components whose business needs vary and may not require use of databases that include public records about individuals. In cases where Justice officials were able to separate these costs, we omitted these costs from the total. [29] GAO, Data Mining: Agencies Have Taken Key Steps to Protect Privacy in Selected Efforts, but Significant Compliance Issues Remain, GAO-05- 866 (Washington, D.C.: Aug. 15, 2005). [30] The U.S. Marshals Service is the federal government's primary agency for conducting investigations involving escaped federal prisoners; probation, parole, and bond violators; and fugitives named in warrants generated during drug investigations. [31] DEA's mission involves enforcing laws pertaining to the manufacture, distribution, and dispensing of legally produced controlled substances. [32] The personal information contained in this information reseller database is limited to the prescribing doctor and does not contain personal patient information. [33] To ensure that criminals do not benefit financially from their illegal acts, federal law provides that profits from drug-related crimes, as well as property used to facilitate certain crimes, are subject to forfeiture to the government. [34] Justice for All Act of 2004, Pub. L. No. 108-405 (Oct. 30, 2004). Section 102 of the act establishes rights for crime victims including the right to "reasonable, accurate, and timely notice of any public court proceeding, or any parole proceeding, involving the crime of or any release or escape of the accused." [35] For an assessment of privacy issues associated with the Secure Flight commercial data test, see GAO, Aviation Security: Transportation Security Administration Did Not Fully Disclose Uses of Personal Information during Secure Flight Program Testing in Initial Privacy Notices, but Has Recently Taken Steps to More Fully Inform the Public, GAO-05-864R (Washington, D.C.: July 22, 2005). [36] Skiptracing is the process of locating people who have fled in order to avoid paying debts. [37] Although the Library of Congress indicated that the Department of State also used FEDLINK contracts with Dun & Bradstreet and LexisNexis, State officials reported that their use of these contracts did not involve access to personal information. [38] Section 103 of Pub. L. 106-481 (2 U.S.C. 182c) establishes FEDLINK as a revolving fund. The law authorizes the FEDLINK revolving fund to provide "the procurement of commercial information services, publications in any format, and library support services, related accounting services, related education, information and support services" to federal offices and to other organizations entitled to use federal sources of supply. [39] We reviewed the practices of five major information resellers: ChoicePoint, LexisNexis, Acxiom, Dun & Bradstreet, and West. While these resellers were all reported by federal agencies to be sources of personal information, their businesses vary. A discussion of this variance in business practices appears in the background section of this report. [40] Resellers are constrained from collecting certain types of information and aggregating it with other personal information. For example, the Fair Credit Reporting Act and the Gramm-Leach-Bliley Act constrain the collection and use of personal information, such as financial information. [41] Several information resellers reported that if the inaccuracy was a result of their error (e.g., transposing numbers or letters or incorrectly aggregating information), they would correct the data in their databases. [42] One reseller reported that it maintains discrete databases developed and tailored toward its specific product offerings in marketing, fraud prevention, and directory services. These product offerings are geared toward specific clients. For example, the reseller's fraud prevention product makes use of public record and publicly available information as well as credit header information. The fraud prevention product provides identity verification and investigative tools primarily to the financial and insurance industries and to law enforcement agencies involved in fraud or criminal investigations. Within the four agencies, use of this reseller was reported only as part of TSA's Secure Flight commercial data test. [43] While a significant amount of reseller information comes from public records, resellers also use private companies, including other companies that aggregate information, as suppliers. For example, a reseller may contract with another private firm to obtain telephone book information. Further, resellers may contract with other private firms to collect information from public records sources. [44] In its settlement with ChoicePoint, the Federal Trade Commission alleged violations of the Fair Credit Reporting Act and section 5 of the Federal Trade Commission Act. Section 5 of the act prohibits "unfair or deceptive acts or practices in or affecting commerce." The Federal Trade Commission can issue orders, obtain injunctions, impose civil penalties, and undertake civil actions to enforce the act. 5 U.S.C. § 45. [45] One reseller reported that, for certain products, it will delete information that has been identified as inaccurate. For example, if the reseller is able to verify that data contained within its directory or fraud products are inaccurate, it will delete the inaccurate data and keep a record of this in a maintenance file so the erroneous data are not reentered at a future date. [46] 5 U.S.C. § 552a (e)(1). The Privacy Act (at § 552a (j) & (k)) allows agencies to claim an exemption from this provision if the records are used for certain purposes. For example, records compiled for criminal law enforcement purposes or for a broader category of investigative records compiled for criminal or civil law enforcement purposes can be exempted from this requirement. [47] In two cases, agency components used reseller data to conduct broader searches for previously unidentified criminal behavior. These two cases were an application at DEA used to identify potential prescription drug fraud and efforts by Citizenship and Immigration Services to detect large patterns of potential fraud through address searches and other queries. [48] 5 U.S.C. § 552a(e)(5). The Privacy Act allows agencies to claim an exemption from this provision of the act for certain designated purposes. For example, records compiled for criminal law enforcement purposes can be exempt from this provision. A broader category of investigative records compiled for criminal or civil law enforcement purposes cannot be exempt from this provision. [49] Such uses are referred to as "routine uses" in the Privacy Act, 5 U.S.C. § 552a (a(7)) and (b). [50] The task force's partner agencies include ICE, the Department of Defense Counterintelligence Field Activity Office, the Office of Personnel Management, and members of the intelligence community. [51] 5 U.S.C. § 552a(e)(10). [52] Although we did not assess the effectiveness of information security or compliance with FISMA at any agency as part of this review, we have previously reported on weaknesses in almost all areas of information security controls at 24 major agencies, including Justice, DHS, State, and SSA. For additional information see GAO, Information Security: Weaknesses Persist at Federal Agencies Despite Progress Made in Implementing Related Statutory Requirements, GAO-05-552 (Washington, D.C.: July 15, 2005) and Information Security: Department of Homeland Security Needs to Fully Implement Its Security Program, GAO-05-700 (Washington, D.C.: June 17, 2005). [53] 5 U.S.C. § 552a(e)(4)(C) & (I). The Privacy Act allows agencies to claim an exemption from identifying the categories of sources of records for records compiled for criminal law enforcement purposes, as well as for a broader category of investigative records compiled for criminal or civil law enforcement purposes. [54] The act provides for its requirements to apply to government contractors when agencies contract for the operation by or on behalf of the agency, a system of records to accomplish an agency function. 5 U.S.C. § 552a(m). [55] As we previously reported, this notice did not fully disclose the scope of the use of reseller data during the test phase. See GAO-05- 864R. [56] The Privacy Act allows agencies to claim an exemption from identifying the categories of sources of records for records compiled for criminal law enforcement purposes as well as for a broader category of investigative records compiled for criminal or civil law enforcement purposes. 5 U.S.C. § 552a (j) and (k). One system of records notice for the Treasury Enforcement Communications System (the system identified by ATF as covering their investigative case files) claimed such an exemption. The Department of State identifies categories of sources in the system of records notices it identified but does not specifically identify use of reseller data. The State system of records notices also claim an exemption from identifying categories of sources but invoke that exemption only under certain circumstances (e.g., to the extent that a specific investigation would be compromised). [57] The notice was last updated in October 2002, before the service and benefit functions of the U.S. Immigration and Naturalization Service transitioned into DHS as U.S. Citizenship and Immigration Services. [58] The Privacy Act allows agencies to claim exemptions if the records are used for certain purposes. 5 U.S.C. § 552a (j) and (k). For example, records compiled for criminal law enforcement purposes can be exempt from the access and correction provisions. In general, the exemptions for law enforcement purposes are intended to prevent the disclosure of information collected as part of an ongoing investigation that could impair the investigation or allow those under investigation to change their behavior or take other actions to escape prosecution. [59] The E-Government Act requires agencies, if practicable, to make privacy impact assessments publicly available through agency Web sites, publication in the Federal Register, or by other means. Pub. L. No. 107- 347, § 208 (b)(1)(B)(iii). [60] The agency components that identified preparation of PIAs for systems or programs making use of information reseller data included USCIS for its Fraud Tracking System, TSA for its Secure Flight commercial data test, and FBI's FTTTF, which reported that it was in the process of finalizing a PIA. Only the PIA for TSA's test specifically identified the use of commercial data. We were unable to determine if FTTTF's PIA identified the use of commercial data since it was not yet final. [61] OMB, Guidance for Implementing the Privacy Provisions of the E- Government Act of 2002, Memorandum M-03-22 (Washington, D.C.: Sept. 26, 2003). [62] The DHS Privacy Officer position was created by the Homeland Security Act of 2002, Pub. L. No 107-296, § 222, 116 Stat. 2155. The Privacy Officer is responsible for, among other things, "assuring that the use of technologies sustain[s], and do[es] not erode privacy protections relating to the use, collection, and disclosure of personal information, and assuring that personal information contained in Privacy Act systems of records is handled in full compliance with Fair Information Practices as set out in the Privacy Act of 1974." [63] Department of Homeland Security Privacy Office, Privacy Impact Assessments: Official Guidance (March 2006), p. 34. [64] USCIS officials stated that the PIA for the Fraud Tracking System, now called the Fraud Detection and National Security System, would be updated on an incremental basis and that a future update would identify information resellers as a data source. [65] Asia-Pacific Economic Cooperation, APEC Privacy Framework, Version 4 (Santiago, Chile: Nov. 17-18, 2004), p. 4. [66] Dun & Bradstreet specializes in business information, which may contain personal information on business owners. [67] We obtained information on policies and practices from the following major components of Justice and DHS. For Justice: Bureau of Alcohol Tobacco, Firearms, and Explosives, Drug Enforcement Administration, Executive Office for U.S. Attorneys, Executive Office of the U.S. Trustees, Federal Bureau of Investigation, and the U.S. Marshals Service. For DHS: U.S. Citizenship and Immigration Services, U.S. Immigration and Customs Enforcement, Transportation Security Administration, U.S. Secret Service, U.S. Customs and Border Protection, and the Federal Emergency Management Agency. We did not obtain information on policies and management practices for smaller components. GAO's Mission: The Government Accountability Office, the investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through the Internet. GAO's Web site ( www.gao.gov ) contains abstracts and full-text files of current reports and testimony and an expanding archive of older products. The Web site features a search engine to help you locate documents using key words and phrases. You can print these documents in their entirety, including charts and other graphics. Each day, GAO issues a list of newly released reports, testimony, and correspondence. GAO posts this list, known as "Today's Reports," on its Web site daily. The list contains links to the full-text document files. To have GAO e-mail this list to you every afternoon, go to www.gao.gov and select "Subscribe to e-mail alerts" under the "Order GAO Products" heading. Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Public Affairs: Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.