TSA exempts systems from Privacy Act

Transportation Security Administration officials are changing the Code of Federal Regulations to shield eight information systems from Privacy Act provisions.

Published in the Federal Register last week, the move allows TSA officials to withhold records about active investigations.

"As a government agency, TSA has

the responsibility

to make available public information," said Andrea Fuentes, spokeswoman for the Homeland Security Department, which includes TSA. The agency "also has a responsibility to protect sensitive security information that, if released, would put

the public in jeopardy or compromise

investigations."

Although the Electronic Privacy Information Center (EPIC) doesn't view the rule change as a clear violation of the Privacy Act, privacy advocates consider it part of a trend by DHS officials to claim more latitude in classifying information.

TSA officials cited eight systems for exemption, including ones that detail inspection systems for all transportation modes governed by TSA. But other systems — such as the General Legal Records System, which has data on many matters filed in the Office of the Chief Counsel — seem to imply a broader exemption.

System accuracy may also be at stake, according to EPIC general counsel David Sobel, who argued that people whose information is contained in the system won't be able to confirm that they are on the list or correct

inaccuracies.

In many ways this re-creates the conditions that led to the Privacy Act, said Peter Swire, who was the Clinton administration's chief counselor for privacy in the Office of Management and Budget.

The Privacy Act was created in 1974 to stop the collection of secret files about U.S. citizens by J. Edgar Hoover and the FBI. "The risk is that we're slipping back into the old patterns because of our renewed fears about domestic threats," said Swire, who teaches law at Ohio State University.

TSA's move follows a recent ruling by the U.S. District Court for the Northern District of California that TSA and FBI officials inappropriately withheld information to protect sensitive information regarding a no-fly list and other transportation watch lists.

Swire said that the Bush administration has changed course on the Freedom of Information Act by issuing guidance to agencies that favors more secrecy than the Justice Department supported during the tenure of former attorney general Janet Reno.

***

Privacy pass

The following are records systems at the Transportation Security Administration to be exempted from the Privacy Act:

Internal investigations.

Correspondence and matters tracking.

Freedom of Information Act and Privacy Act records.

Federal flight deck officer.

Transportation workers employment investigations.

Transportation security enforcement.

Personnel background investigation files.

General legal records.

Source: Transportation Security Administration

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group