This is the accessible text file for GAO report number GAO-10-849 entitled 'Privacy: OPM Should Better Monitor Implementation of Privacy- Related Policies and Procedures for Background Investigations' which was released on October 7, 2010. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to the Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia, Committee on Homeland Security and Governmental Affairs, U.S. Senate: United States Government Accountability Office: GAO: September 2010: Privacy: OPM Should Better Monitor Implementation of Privacy-Related Policies and Procedures for Background Investigations: GAO-10-849: GAO Highlights: Highlights of GAO-10-849, a report to the Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia, Committee on Homeland Security and Governmental Affairs, U.S. Senate. Why GAO Did This Study: Approximately 90 percent of all federal background investigations are provided by the Office of Personnel Management’s (OPM) Federal Investigative Services (FIS) division. In fiscal year 2009, FIS conducted over 2 million investigations of varying types, making the organization a major steward of personal information on U.S. citizens. GAO was asked to (1) describe how OPM uses personally identifiable information (PII) in conducting background investigations and (2) assess the extent to which OPM’s privacy policies and procedures for protecting PII related to investigations meet statutory requirements and align with widely accepted privacy practices. To address these objectives, GAO compared OPM and FIS policies and procedures with key privacy laws and widely accepted practices. What GAO Found: FIS, a component of OPM, conducts background investigations using extensive amounts of PII. Specifically, FIS collects PII from the individual being investigated, government agencies holding relevant data on the subject, and contacts familiar with the subject of the investigation. It uses this information during the four phases of the investigation process: (1) Questionnaire Submission, when requesting agencies submit a questionnaire completed by the individual who will be investigated; (2) Scheduling and Initiation, during which goals and milestones are set, automated information requests occur, and an investigator is assigned; (3) Investigation, during which an investigator gathers information from the automated requests and from interviews and prepares a report; and (4) Review, during which a reviewer determines if a report is complete before allowing it to be sent to the requesting agency. FIS has taken steps to incorporate key privacy laws and widely accepted privacy practices into policies and procedures for conducting background investigations. For example, field investigators are directed to limit collection of PII to only information relevant to an investigation, and several procedures are in place to ensure that such information is recorded as accurately as possible in OPM’s systems. However, the agency has conducted limited oversight of FIS’s development of privacy impact assessments (PIA), investigators’ implementation of privacy protection guidance, and customer agencies’ adherence to privacy agreements. A PIA is an analysis of how personal information is collected, stored, shared, and managed in a federal system. It is required by the E-Government Act of 2002. Related Office of Management and Budget guidance emphasizes the need to identify and assess privacy risks in concert with developing a PIA. However, OPM’s guidance for PIAs does not require that privacy risks be analyzed or mitigation strategies be identified for those risks. Consequently, OPM cannot be sure that potential risks associated with the use of PII in its information systems have been adequately assessed and mitigated. Additionally, widely accepted privacy practices call for accountability to ensure privacy-protection policies are implemented to safeguard personal information from potential risks. Such accountability includes monitoring to ensure proper implementation of privacy protection measures. However, although FIS tracks PII that is provided to and received from field investigators, it had not monitored investigators’ adherence to its policies and procedures for protecting PII while investigations are underway. Further, while FIS has developed agreements with customer agencies related to the protection of PII contained in investigation case files, it does not monitor customer agencies’ implementation of these policies, even though its agreements state it is responsible for doing so. Without oversight processes for monitoring investigators’ and customer agencies’ adherence to its PII protection policies, OPM lacks assurance that its privacy protection measures are being properly implemented. What GAO Recommends: GAO is recommending that the Director of OPM (1) develop guidance for analyzing and mitigating privacy risks in privacy impact assessments, and (2) develop and implement oversight mechanisms for ensuring that investigators properly protect PII and that customer agencies adhere to agreed-upon privacy protection measures. OPM agreed with our recommendations. View [hyperlink, http://www.gao.gov/products/GAO-10-849] or key components. For more information, contact Gregory C. Wilshusen at (202) 512-6244 or wilshuseng@gao.gov. [End of section] Contents: Letter: Background: OPM's Background Investigation Process Involves Extensive Collection and Use of PII: FIS Has Taken Steps to Ensure Privacy Policies and Procedures Meet Statutory Requirements and Align with Fair Information Practices, but Oversight of Implementation is Limited: Conclusions: Recommendations for Executive Action: Agency Comments and Our Evaluation: Appendix I: Objectives, Scope, and Methodology: Appendix II: GAO Contact and Staff Acknowledgments: Table: Table 1: Fair Information Practices: Figures: Figure 1: Key Steps in FIS's Background Investigation Process: Figure 2: Questionnaire Submission Phase Detailed Steps: Figure 3: Scheduling and Initiation Phase Detailed Steps: Figure 4: Investigation Phase Detailed Steps: Figure 5: Review Phase Detailed Steps: Figure 6: Reported Incidents of Lost or Stolen Paper Files Associated with Background Investigations: Abbreviations: CIO: Chief Information Officer: DOD: Department of Defense: e-QIP: Electronic Questionnaires for Investigations Processing: FBI: Federal Bureau of Investigation: FIPC: Federal Investigations Processing Center: FIPS: Federal Information Processing Standard: FIS: Federal Investigative Services: MOU: memorandum of understanding: NAC: National Agency Check: NIST: National Institute of Standards and Technology: OECD: Organization for Economic Cooperation and Development: OIG: Office of the Inspector General: OMB: Office of Management and Budget: OPM: Office of Personnel Management: PIA: privacy impact assessment: PII: personally identifiable information: PIPS: Personnel Investigations Processing System: PIPS-R: Personnel Investigations Processing System - Reporting: SORN: System of Records Notice: [End of section] United States Government Accountability Office: Washington, DC 20548: September 7, 2010: The Honorable Daniel K. Akaka: Chairman: The Honorable George V. Voinovich: Ranking Member: Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia: Committee on Homeland Security and Governmental Affairs: United States Senate: The Federal Investigative Services (FIS) division of the Office of Personnel Management (OPM) is responsible for conducting approximately 90 percent of all federal background investigations. To conduct its work, FIS relies heavily on personally identifiable information (PII) provided by the individuals who are being considered for security clearances. Such information can be extensive and can include financial and medical information, as well as PII on family members and close contacts. In fiscal year 2009, FIS conducted over 2 million investigations of varying types, making the organization a major steward of personal information on U.S. citizens. Government agencies have a long-standing obligation under the Privacy Act of 1974 and the E-Government Act of 2002 to protect the privacy of individuals about whom they collect personal information. These laws prescribe specific activities that agencies must perform to protect privacy, such as ensuring that personal information is used only for an authorized purpose and that assessments are conducted of the privacy risks associated with the information technology used to process the personal information. You asked us to review the implementation of privacy protection provisions for information collected and maintained by FIS as it relates to the background investigation process. Specifically, as agreed with your office, our objectives were to: (1) describe how OPM uses PII in conducting background investigations and (2) determine the extent to which OPM's privacy policies and procedures for protecting PII related to investigations meet statutory requirements and align with widely accepted privacy practices. To address our first objective, we analyzed agency policies, procedures, and guidance to identify FIS's background investigation process. We interviewed FIS officials at their headquarters in Boyers, Pennsylvania, and at OPM headquarters in Washington, D.C., and conducted site visits of FIS headquarters to identify the current process for conducting background security clearance investigations. We analyzed this information to identify the overall process for conducting investigations and how PII is utilized throughout the process. To address our second objective, we reviewed pertinent information security and privacy policies, procedures, guidance, and practices in place at OPM. Additionally, we analyzed key privacy laws, standards, and widely accepted privacy practices and compared them with key elements of the FIS investigation processes. We interviewed officials at FIS headquarters and within the OPM Privacy Office to discuss recent efforts to oversee the implementation of privacy policies and procedures. We conducted this performance audit from October 2009 to September 2010 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Our objectives, scope, and methodology are discussed in more detail in appendix I. Background: OPM is the central human resources agency for the federal government, tasked with ensuring the government has an effective civilian workforce. To carry out this mission, OPM delivers human resources products and services, including personnel background investigations, to agencies on a reimbursable basis. These investigations are the responsibility of OPM's FIS division. Federal Investigative Services Conducts Background Investigations for the Federal Government: FIS conducts approximately 90 percent of all personnel background investigations for the federal government. FIS provides the results of the investigations to agencies for use in determining individuals' suitability or fitness for federal civilian, military, or federal contract employment as well as eligibility for access to classified national security information. FIS also has responsibility for developing and implementing uniform policies and procedures to ensure the proper completion of investigations. For example, FIS issued internal agency guidance, called the Investigator's Handbook, to direct its federal and contract investigators as they conduct investigations. In fiscal year 2009, FIS conducted over 2 million investigations of varying types. In addition to background investigations, FIS conducts other types of investigations and checks, including--among others--credit searches of all three major credit bureaus regarding financial responsibility and periodic reinvestigations (generally for moderate or high-risk positions).[Footnote 1] Many of these may be limited to contacting other federal agencies or private institutions for information and may not require an investigator to conduct traditional investigation activities such as interviewing individuals familiar with the subject. FIS's investigations staff consists of approximately 2,300 federal employees and 6,000 contractor staff. To conduct these investigations, FIS officials use information technology systems located at FIS headquarters, known as the Federal Investigations Processing Center (FIPC), to coordinate investigative activities and store all of the information generated by such investigations. At FIPC, officials store and maintain electronic, microfilm, and paper records of OPM-conducted background investigations. Officials at FIPC make security clearance information available to federal personnel offices through a Web portal. FIPC receives requests for investigations from federal agencies, processes the requests through an automated system, and fields questions about its process and ongoing investigations. Security Clearances and Background Investigations Vary in Breadth and Methods Used to Collect Information: Security clearances are required for access to national security information, which may be classified at one of three levels: confidential, secret, and top secret. The level of classification denotes the degree of protection required for information and the amount of damage that unauthorized disclosure could reasonably be expected to cause to national security. Unauthorized disclosure could reasonably be expected to cause (1) "damage," in the case of confidential information; (2) "serious damage," in the case of secret information; and (3) "exceptionally grave damage," in the case of top secret information.[Footnote 2] Background investigations allow federal agencies to make decisions both about suitability for employment, as well as access to national security information. The scope of information gathered in an investigation depends on the purpose of the investigation, such as whether it is being conducted for an employment suitability determination, an initial clearance, or a clearance renewal. For example, investigators collect information from agencies such as the Federal Bureau of Investigation (FBI) for all initial and renewal clearances. However, for initial top secret clearances investigators need, among other things, to also corroborate the subject's education and interview educational sources, as appropriate. For an investigation for a confidential or secret clearance, investigators gather much of the information electronically. For an investigation for a top secret clearance, investigators gather additional information through more time-consuming efforts such as conducting in-person interviews to corroborate information about a subject's employment and education. In 2009, OPM estimated that approximately 6-10 labor hours were needed for each investigation for a secret or confidential clearance, and 50-60 labor hours were needed for the investigation for an initial top secret clearance. Key Laws and Privacy Practices Govern the Protection of Personal Information: The primary laws that provide privacy protections for personal information accessed or held by the federal government are the Privacy Act of 1974 and E-Government Act of 2002. These laws describe, among other things, agency responsibilities with regard to protecting PII. [Footnote 3] The Privacy Act places limitations on agencies' collection, disclosure, and use of personal information maintained in systems of records. A system of records is a collection of information about individuals under control of an agency from which information is retrieved by the name of an individual or other identifier. The E- Government Act of 2002 requires agencies to assess the impact of federal information systems on individuals' privacy. Specifically, the E-Government Act strives to enhance the protection of personal information in government information systems and information collections by requiring agencies to conduct privacy impact assessments (PIA). A PIA is an analysis of how personal information is collected, stored, shared, and managed in a federal system. Specifically, according to Office of Management and Budget (OMB) guidance,[Footnote 4] the purpose of a PIA is (1) to ensure handling conforms to applicable legal, regulatory, and policy requirements regarding privacy; (2) to determine the risks and effects of collecting, maintaining, and disseminating information in identifiable form in an electronic information system; and (3) to examine and evaluate protections and alternative processes for handling information to mitigate potential privacy risks. The Privacy Act of 1974 is largely based on a set of internationally recognized principles for protecting the privacy and security of personal information known as the Fair Information Practices. A U.S. government advisory committee first proposed the practices in 1973 to address what it termed a poor level of protection afforded to privacy under contemporary law.[Footnote 5] The Organization for Economic Cooperation and Development (OECD)[Footnote 6] developed a revised version of the Fair Information Practices in 1980 that has, with some variation, formed the basis of privacy laws and related policies of many countries--including the United States, Australia, and New Zealand--and the European Union. These practices are now widely accepted as a standard benchmark for evaluating the adequacy of privacy protections. The eight principles of the Fair Information Practices are shown in table 1. Table 1: Fair Information Practices: Principle: 1. Collection limitation; Description: The collection of personal information should be limited, should be obtained by lawful and fair means, and, where appropriate, with the knowledge or consent of the individual. Principle: 2. Data quality; Description: Personal information should be relevant to the purpose for which it is collected, and should be accurate, complete, and current as needed for that purpose. Principle: 3. Purpose specification; Description: The purposes for the collection of personal information should be disclosed before collection and upon any change to that purpose, and its use should be limited to those purposes and compatible purposes. Principle: 4. Use limitation; Description: Personal information should not be disclosed or otherwise used for other than a specified purpose without consent of the individual or legal authority. Principle: 5. Security safeguards; Description: Personal information should be protected with reasonable security safeguards against risks such as loss or unauthorized access, destruction, use, modification, or disclosure. Principle: 6. Openness; Description: The public should be informed about privacy policies and practices, and individuals should have ready means of learning about the use of personal information. Principle: 7. Individual participation; Description: Individuals should have the following rights: to know about the collection of personal information, to access that information, to request correction, and to challenge the denial of those rights. Principle: 8. Accountability; Description: Individuals controlling the collection or use of personal information should be accountable for taking steps to ensure the implementation of these principles. Source: OECD. [End of table] The Fair Information Practices are not precise legal requirements. Rather, they provide a framework of principles for balancing the need for privacy with other public policy interests, such as national security, law enforcement, and administrative efficiency. Ways to strike that balance vary among countries and according to the type of information under consideration. OPM and FIS Have Implemented Privacy Protection Structures and Policies: The OPM Privacy Office is tasked with ensuring that the agency is in compliance with privacy laws by providing guidance on how to implement privacy provisions needed to protect personal information. To oversee its implementation of privacy protections, OPM has designated its Chief Information Officer (CIO) as its senior agency official for privacy.[Footnote 7] The CIO, in turn, uses the Privacy Program Manager to assist in providing oversight to ensure the agency is complying with privacy policies and guidance. Among other things, the Privacy Program Manager is responsible for developing policies and procedures for the development of PIAs as well as reviewing and recommending their approval. Within each OPM division, information system owners are responsible for implementing OPM's privacy policies and guidance. To assist division-level officials in assessing potential privacy risks and protecting personal information, OPM's Privacy Office established guidance for conducting PIAs. The guidance includes a template consisting of two parts: (1) an initial screening assessment tool to determine whether system owners are required to complete a PIA and (2) the PIA itself, which requires system owners to answer seven basic questions about the nature of their systems in addition to their intended uses and purposes for collecting personal information. Upon completion of the PIA template, system owners are required to submit PIAs to the Privacy Program Manager for evaluation and recommendation for approval to the CIO. According to OPM guidance, the CIO is responsible for reviewing and signing all OPM PIAs, which signify that a PIA is complete and can be posted to OPM's Web site for public viewing. Additionally, OPM has developed and issued an agency-wide information security and privacy policy for both its federal and contractor employees to follow in protecting information resources from loss, theft, misuse, and unauthorized access. To supplement guidance provided by the OPM Privacy Office, FIS also has developed a Policy on the Protection of Personally Identifiable Information (PII) to provide employees, including contractors, with a description of their responsibilities in protecting PII and reporting PII breaches. FIS also requires its investigators to adhere to its Investigator's Handbook for procedures and policies related to conducting personnel background investigations for the federal government. These two documents guide federal and contract investigators in the protection of PII during the course of their work.[Footnote 8] These documents specify procedures that align with the Fair Information Practices. For example, the documents direct investigators to protect PII they possess at their duty stations using a "two-barrier" approach, such as storing it within a locked desk that is located inside of a locked house, which aligns with the security safeguards principle. In addition to its policies and guidance, FIS promotes awareness of privacy protection requirements through PII training and agency newsletters. For example, to support the agency's initiative to reduce privacy breaches, employees participated in a "no breach" week initiative to help ensure that FIS policies and guidance were being followed. Previous Inspector General Review Recommended Improvements for the Protection of PII: In April 2009, the OPM Office of the Inspector General (OIG) completed an audit of the security of PII within the FIS division and made nine recommendations to improve the protection of these data.[Footnote 9] The OPM OIG reviewed FIS controls for the storage, security, and transmission of PII. The OIG's report identified, among other things, that (1) required security awareness and PII training had not been completed by all FIS employees and contractor staff; and (2) FIS did not have adequate controls for ensuring that PII incidents were reported by FIS employees and contractors in a timely manner. In response to the OIG's recommendations, FIS recently established a security and PII training program and required all employees and contractors to complete PII awareness training. Furthermore, to better ensure PII incidents are properly reported, FIS updated its incident response procedures to require supervisors to ensure that employees and contractors report incidents to the OPM Situation Room--the agency's central repository for PII incidents--within 30 minutes of identifying a breach or loss. OPM's Background Investigation Process Involves Extensive Collection and Use of PII: FIS conducts background investigations using extensive amounts of PII collected from a variety of sources. FIS uses a combination of automated and manual steps during the course of a background investigation. These steps can be categorized into four distinct phases: (1) Questionnaire Submission, (2) Scheduling and Initiation, (3) Investigation, and (4) Review. Figure 1 provides an overview of the background investigation process delineating these four phases. Figure 1: Key Steps in FIS's Background Investigation Process: [Refer to PDF for image: flow chart] 1. Questionnaire Submission: Electronic Questionnaires for Investigations Processing (e-QIP) system: Questionnaire submitted by agency[A]; Personnel Investigations Processing System (PIPS): Questionnaire reviewed[A]: Complete[A]? Yes: continue to #2; No: Return to agency. 2. Scheduling and Initiation: Investigation initiated[B]; National Agency Check (NAC)[B]: FBI[A]; DOD[A]; Other agency[A]. Automated inquiries[B]. Case assigned to investigator[B]. 3. Investigation: PIPS-Reporting (PIPS-R): Case investigated: Federal investigator[A] or Contractor investigator[A]. 4. Review: Reviewed for completeness[A]: Complete[A]? Yes: Agency makes employment/clearance determination (adjudication); No: Return case to investigation. Source: GAO analysis of OPM data. [A] Human interaction. [B] Automated process. [End of figure] The following sections outline detailed steps and how PII is used within each of the phases of FIS's background investigation process and the measures taken within each phase to protect PII. Phase 1: Questionnaire Submission: In order to initiate an investigation, a questionnaire must be submitted with the required information and accepted by FIS. Figure 2 shows detailed steps in the questionnaire submission phase. Figure 2: Questionnaire Submission Phase Detailed Steps: [Refer to PDF for image: flow chart] 1. Questionnaire Submission: Electronic Questionnaires for Investigations Processing (e-QIP) system: Security officer[A]; Applicant[A]; Questionnaire submitted by agency[A]. Personnel Investigations Processing System (PIPS): Case file created[A]; Physical case file created[A]; Questionnaire reviewed by contractor[A]; Complete[A]? Yes: Investigation initiated[B]; No: Able to correct[A]? Yes: Questionnaire reviewed by contractor[A]; No: Questionnaire returned to agency[A]. Source: GAO analysis of OPM data. [A] Human interaction. [B] Automated process. [End of figure] 1. A security officer at the requesting agency forwards to the subject--the individual who will be investigated--an investigative questionnaire, which seeks information on the subject's personal history and includes identifying information such as the subject's first and last name, Social Security number, and place and date of birth. In addition, subjects are asked to provide personal information on family members, friends, and other contacts. The questionnaire can be completed either electronically using OPM's Electronic Questionnaires for Investigations Processing (e-QIP) system or in paper form. Most questionnaires are currently completed electronically. 2. The completed questionnaire is reviewed by the originating agency's security office and then sent with supporting documentation, such as fingerprints, to FIS. If a questionnaire is submitted electronically using e-QIP, it is automatically uploaded into the Personnel Investigations Processing System (PIPS), a FIS system containing over 15 million background investigation records of federal employees, military personnel, and contractors used for the automated entry, scheduling, case control, and closing of background investigations. Should FIS receive a paper questionnaire, the information is manually entered into PIPS. 3. Once a questionnaire is received at FIPC, a physical case file is created that contains the questionnaire, a summary sheet,[Footnote 10] and any documentation provided as a supplement to the questionnaire. 4. Before the investigation is initiated, the questionnaire must pass a review by a FIS contractor for completeness and identification of any obvious errors. If there is missing or erroneous information, or required attachments that are missing, such as fingerprints, FIS contractors first attempt to correct this with the agency. If this is unsuccessful, the investigation request is returned to the agency. If the questionnaire is deemed complete, the contractor completes the on- line screening or data entry process in PIPS to initiate the investigation. Phase 2: Scheduling and Initiation: After a questionnaire is accepted by FIS, the associated investigation is scheduled and initiated. Figure 3 represents detailed steps in this phase. Figure 3: Scheduling and Initiation Phase Detailed Steps: [Refer to PDF for image: flow chart] 2. Scheduling and Initiation: Personnel Investigations Processing System (PIPS): Investigation initiated/Goals and milestones established: National Agency Check (NAC)[B]: FBI[A]; DOD[A]; Other agency[A]. Automated inquiries[B]. Case assigned to investigator[B]. Source: GAO analysis of OPM data. [A] Human interaction. [B] Automated process. [End of figure] Once online screening or data entry is completed, PIPS initiates a four-step scheduling process: 1. Goals and milestones are established for the initial security clearance investigation to comply with statutory requirements. Investigation timelines are based on provisions of the Intelligence Reform and Terrorism Prevention Act of 2004, which required adjudicative agencies to develop plans to ensure that, to the extent practical, determinations could be made on at least 90 percent of all applications for a security clearance within 60 days, with no longer than 40 days allotted for the investigation and 20 days allotted for the adjudication.[Footnote 11] 2. PIPS requests information through a National Agency Check (NAC): a set of queries sent to national record repositories, such as OPM, the FBI, and Department of Defense (DOD) investigation databases; and a fingerprint-based criminal history check through the FBI.[Footnote 12] Once the agencies have manually or electronically checked their databases for the information, the results are returned to FIS headquarters and stored in PIPS or in the physical case file after being scanned into PIPS. The results returned to FIS can include FBI fingerprint and investigation records, DOD investigations records, and the subject's credit history. 3. PIPS automatically readies inquiries in the form of scannable inquiries that are mailed to a variety of entities--including universities and local law enforcement--and individuals listed as contacts by the subject. The inquiries include questions concerning the subject's character and what association an entity or individual had with the subject. Once a recipient returns the completed scannable inquiries, FIS uses high-speed scanners to upload these data into PIPS. 4. PIPS automatically assigns the investigation to a field office based on the zip code for the activities to be covered. A supervisory agent in charge at the office assigns the items to be completed to a specific investigator. Often, work is assigned to multiple investigators who are responsible for conducting the investigation. Processes exist to reassign a case if there is a better located investigator. The investigators assigned to conduct the field work for the investigation may be contractors or federal employees. When the investigator receives the assignment, he or she is provided the case papers in hard copy or electronic form. The investigator may also receive a summary of the NAC items once they have been completed. Phase 3: Investigation: Once assigned to the case, an investigator receives the case information and conducts the investigation of the subject. The detailed steps for the Investigation phase are displayed in Figure 4. Figure 4: Investigation Phase Detailed Steps: [Refer to PDF for image: flow chart] 3. Investigation: PIPS-Reporting (PIPS-R): Case investigated: Interviews[A] with: Federal investigator[A] or Contractor investigator[A]. Investigation report sent for review[A]. Source: GAO analysis of OPM data. [A] Human interaction. [B] Automated process. [End of figure] 1. When an investigator has been assigned a case in PIPS, he or she can access the case information maintained in the system. The investigator can input the results of the interviews and record checks into templates in PIPS-Reporting (PIPS-R)--a computer application housed on the investigator's laptop computer, which is used to electronically document the investigation and transmit the investigation report electronically to FIPC. PIPS-R temporarily stores the report of investigation, while the physical case file is maintained at FIPC. 2. Investigators gather information on the subject including data about the subject received during interviews with the contacts listed in the questionnaire. Investigators share limited personal information on a subject with identified contacts during an interview. Information obtained from these interviews includes character descriptions and details of any criminal activities. The information is used to determine the accuracy of subject-provided information and generate further leads to complete an investigation. This part of the process may take several weeks, as investigators attempt to contact and interview multiple contacts. PIPS-R requires the investigators to enter information into templates that allow PIPS-R to compile the information into a report. 3. Upon completion of the investigation, the investigator closes the case in PIPS-R and electronically transfers the data into PIPS. The investigator then delivers the case notes to an assigned regional investigations office, where the notes are shredded 30 days after the case is closed. The report in PIPS-R is manually deleted by the investigator 30 days after the case is closed. Phase 4: Review: Upon the completion of the field work by the investigators, a case review is initiated to ensure the investigative report is complete. Figure 5 outlines detailed steps in the Review phase. Figure 5: Review Phase Detailed Steps: [Refer to PDF for image: flow chart] 4. Review: Personnel Investigations Processing System (PIPS): Case reviewer determines completeness[A]: Complete[A]? No: Case investigated[A]; Investigation report[A]; Returned to Case reviewer[A]. Complete[A]? Yes: Sent to Agency[A]: Complete[A]? Yes: Agency makes employment/clearance determination (adjudication); Complete[A]? No: Returned to Case reviewer[A]. Source: GAO analysis of OPM data. [A] Human interaction. [B] Automated process. [End of figure] 1. A case reviewer at FIPC determines the completeness of the investigation and identifies any inconsistencies, errors, and omissions in the investigator's report. For example, if the investigator did not corroborate the subject's education, the investigator may need to interview educational sources. 2. Should the reviewer identify any discrepancies or omissions, the case is returned to the investigator for correction, sometimes through additional field work. 3. If the reviewer determines that the case is completed, FIS closes the case and provides a summary report to the agency that requested the investigation for adjudication. Currently this is done by mailing a hard copy of the report to the agency or using electronic delivery with agencies that have signed up for electronic dissemination. 4. The agency may return an investigation to FIS for further work if it does not provide the information necessary to make an adjudication decision. 5. The investigation information is kept by FIS for varying time periods. The main case file within FIPC is scanned and saved as an electronic image within 30 days of a case closing. After 30 days, the physical case file, along with the investigator's notes, and PIPS-R records are destroyed. The scanned file is maintained either electronically or on microfilm, according to OPM's retention guidelines, for 16 or 25 years if potentially actionable issues exist or unless the record becomes part of a new investigation. FIS Has Taken Steps to Ensure Privacy Policies and Procedures Meet Statutory Requirements and Align with Fair Information Practices, but Oversight of Implementation is Limited: FIS has taken steps to incorporate key privacy principles into policies and procedures that guide and direct agency officials in performing background investigations. Specifically, FIS has complied with requirements of the Privacy Act and E-Government Act by publishing information on its use of PII and by conducting privacy impact assessments of its major information systems. However, it has not assessed the risks associated with the use of PII, an important element of conducting a privacy impact assessment. In addition, while FIS policies and practices for conducting investigations generally align with the Fair Information Practices, the agency has exercised only limited oversight of the use of PII by its field investigators and customer agencies. OPM Privacy Policies Meet Statutory Requirements, but the Agency does not Assess Privacy Risks of Handling PII: The major requirements for the protection of personal privacy by federal agencies come from two laws, the Privacy Act of 1974 and the privacy provisions of the E-Government Act of 2002. Under the Privacy Act, federal agencies must issue public notices, known as System of Records Notices (SORN), in the Federal Register identifying, among other things, the type of data collected, the types of individuals about whom information is collected, and procedures that individuals can use to review and correct personal information. To address Privacy Act requirements, OPM published two SORNs that apply to FIS's information systems, known as the Central 9 and Internal 16 notices. These notices include--among other things--a description of FIS's purpose for collecting and using personal information and how individuals can access and correct information maintained about them. For example, both SORNs state that individuals can request access to records by writing to FIPC. In addition to notice requirements established by the Privacy Act, federal agencies are tasked by the E-Government Act to conduct privacy impact assessments (PIA) to ensure the protection of PII. As described earlier, a PIA is an analysis of how personal information is collected, stored, shared, and managed in a federal system. In response to these requirements, OMB has developed guidance for agencies on conducting PIAs. Assessing privacy risks is an important element of a PIA intended to help program managers and system owners determine appropriate privacy protection policies and techniques to implement those policies. A privacy risk analysis should be performed to determine the nature of privacy risks and the resulting impact if corrective actions are not in place to mitigate those risks. For example, in ensuring that personal information is used only for specified purposes--the use limitation principle--system owners should identify potential ways in which unauthorized use could occur and implement privacy controls to prevent disclosure of personal data for such uses. OPM has developed assessments for a number of systems throughout the agency. For example, assessments for key FIS systems such as PIPS and e-QIP have been developed and approved by OPM's Chief Privacy Officer. These assessments were last revised in August 2007. Although OPM developed PIAs for each of the key FIS background investigation systems, it did not assess the risks associated with the handling of PII within the systems or identify mitigating controls to address risks. For example, the assessment prepared for PIPS provided general descriptions of system functions--such as that sources of information will be "directly from the person to whom the information pertains, from other people, other sources, such as databases, Web sites, etc."--but did not include analysis of privacy risks associated with this broad collection of personal information. Without analyzing privacy risks, agency officials may be forgoing opportunities to identify measures that could be taken to mitigate them and enhance privacy protections. Current OPM guidance on PIAs does not instruct divisions to conduct privacy risk analysis. Instead it directs officials to answer general questions for each system to aid OPM's Privacy Office in assessing potential privacy risks. While OPM guidance emphasizes the need for system owners to provide detailed information in response to questions, the guidance does not instruct system owners to assess privacy risks. Until the current guidance is revised to require risk analysis and new and existing PIAs are updated to include risk analyses, OPM will continue to have limited assurance that PII contained in its systems is being properly protected from potential privacy threats. FIS Has Taken Steps to Institute Protections that Align with the Fair Information Practices: FIS has taken steps to include privacy protections in its procedures for conducting background investigations. Privacy protections can be categorized in relation to the Fair Information Practices, which, as discussed earlier, form the basis for privacy laws such as the Privacy Act. In a number of cases, the protections instituted by FIS can be aligned with the Fair Information Practices. For example, the agency's publication of privacy notices addresses the openness and individual participation principles. The principles can be applied in varying degrees to all FIS activities that involve PII. The following are selected FIS procedures that illustrate specific ways in which the Fair Information Practices have been addressed. * Collection limitation. FIS investigators are directed to limit the PII they collect and include in their investigation reports to information directly relevant to the assigned investigation. Investigators do not report PII in the investigation reports unless they develop information that varies from the subject-provided information. If an investigator collects information that is not vital, he or she is to destroy the information at the end of the investigation. This information is included with the investigator's notes and returned to the supervisor's office when the investigator has completed his or her portion of the case. The information is then destroyed 30 days after the case is closed. This aligns with the principle that the collection of PII should be limited. * Data quality. When FIS receives a hard copy questionnaire, two personnel input the same PII data into PIPS. The system then confirms that both inputs match exactly before uploading the questionnaire data into PIPS, thus helping to ensure that the information provided in the hard copy questionnaire is correctly transferred to the electronic system. Additionally, FIS officials review the final investigation report prior to its delivery to the customer agency in order to ensure that the investigator took all of the steps necessary to conduct the investigation and that there are no errors or omissions in the report. Finally, in an effort to ensure completeness of an investigation, a customer agency can request additional investigative work be conducted by FIS if it identifies inaccuracies in the final investigation report or areas that require additional information prior to making an adjudication decision. This aligns with the principle that the collected information should be accurate and complete. * Purpose specification. Questionnaire forms used by FIS--such as the Standard Form 86--include disclaimer language that informs the subject that the information he or she provides will only be used for the purpose of the specific background investigation and lists the reasons the information may be disclosed. Further, automated inquiry forms sent out during the Scheduling and Initiation phase contain disclaimer language that specifies that information provided on the forms will be used solely for the related investigation. This aligns with the principle that the purposes of an information collection should be disclosed before collection. * Use limitation. FIS agreements with customer agencies limit how background investigation reports may be used by stating that information provided by FIS should be used only for the purpose of adjudication. Additionally, all attempts to access case files within PIPS (e.g., viewing or editing) are recorded in an automated log file. These logs are reviewed daily by FIS personnel to identify unauthorized access attempts that violate agency restrictions on use. This aligns with the principle that the information should not be disclosed or used for anything other than the specified purpose. * Security safeguards. FIS uses a collection of security safeguards to protect and control access to PII located physically at FIPC. Physical security controls and processes include (1) screening individuals with metal detectors and x-ray machines prior to entry to the facility; (2) using electronically coded cards and badges to grant access to the room containing hard copies of active case files; (3) checking manifests of case files mailed to other facilities to ensure that the contents of the files have not changed; and (4) ensuring the proper destruction of investigative materials with locked disposal bins and supervised shredding by a FIS official. FIS officials also reported that a number of information security measures are used to protect personal information maintained in FIS systems.[Footnote 13] For example, FIS policy requires that access to PIPS is to be limited to officials who are authorized by their respective agencies' security offices and have appropriate background investigations.[Footnote 14] The system is also to restrict agency user access to information from cases they have been specifically authorized to review. Furthermore, officials stated that annual security assessments are conducted on all FIS systems to ensure that they are compliant with governmentwide information security control standards, including National Institute of Standards and Technology (NIST) Special Publication 800-53[Footnote 15] and Federal Information Processing Standard (FIPS) 140-2.[Footnote 16] This aligns with the principle that information should be protected with security safeguards against risks such as unauthorized access, use, or modification. FIS Oversight of the Implementation of Privacy Protections is Limited: Although FIS has established a number of privacy protection measures for its investigations program that reflect the Fair Information Practices, it has taken limited steps to oversee its field investigators and customer agencies to ensure they are implementing the measures appropriately. Such oversight would align with the accountability principle, which states that individuals controlling the collection or use of PII should be accountable for ensuring the implementation of the Fair Information Practices. Without such oversight, it is unclear whether the agency's protection measures are being properly implemented. FIS Has Not Ensured that Investigators are Following PII Protection Policies and Procedures: In recent years, field investigators have been involved in over 80 percent of reported incidents of lost or stolen paper files in the FIS division (see figure 6). As previously discussed, the more than 7,000 field investigators who conduct background investigations for OPM collect and are responsible for safeguarding extensive amounts of PII. As a result, these field investigators are key to ensuring that PII is properly protected, especially when it is in paper form. Figure 6: Reported Incidents of Lost or Stolen Paper Files Associated with Background Investigations: [Refer to PDF for image: stacked vertical bar graph] Number of reported incidents: Fiscal year: 2008; Involving field investigators: 76; Not involving field investigators: 10; Total: 86. Fiscal year: 2009; Involving field investigators: 53; Not involving field investigators: 6; Total: 59. Fiscal year: 2010 (as of 5-21-10); Involving field investigators: 14; Not involving field investigators: 3; Total: 17. Sources: Federal Investigative Services division, OPM. [End of figure] Recently, FIS has taken steps to promote better accountability for the protection of personal information provided to and received from investigators. This includes providing training to all employees and holding a "No PII Loss Week," during which all staff were encouraged to focus on proper handling and storing of PII in their possession. Oversight of these investigators and FIS employees can ensure that appropriate protections are being implemented for the PII contained in investigative files. Recent recommendations by the OPM OIG highlight the importance of such oversight.[Footnote 17] In response to recommendations by the OIG to conduct oversight, FIS officials began conducting periodic checks of documents received from investigators once an investigation is closed to encourage a full and proper accounting of PII. However, FIS officials had not monitored whether investigators are following agency policies described in the Investigator's Handbook and the Policy On The Protection Of Personally Identifiable Information (PII) for handling PII while investigative activity is underway. Officials from the agency's oversight groups responsible for federal and contract investigators said they used other methods for determining investigators' adherence to PII protection requirements. For example, officials stated the investigators are required to report to their supervisors daily on the case information or other PII they have with them during the course of their work. This is to account for the information they have on hand if there is a loss or the investigator becomes incapacitated due to an accident or medical emergency. The tallies provided by the investigators are intended to allow their supervisors to account for all such information. In addition, officials from FIS oversight units recently began conducting physical audits of regional field offices to determine compliance with PII requirements. Although these recent efforts may increase assurance that investigators are adequately accounting for the investigative files in their possession, no process currently exists to monitor investigators' compliance with FIS privacy protection policies as they perform their field work. For example, FIS does not have procedures for examining how investigators protect information while traveling to conduct interviews or how they ensure that only appropriate information is being gathered. Without an oversight mechanism to ensure investigators' adherence to PII protection policies during investigations--such as through periodic, structured evaluations by supervisors--the agency lacks assurance that sensitive information is being handled appropriately during this critical phase of the background investigation process. FIS Has Not Monitored Customer Agencies' Implementation of Privacy Protections: We previously reported on the federal legal framework for privacy protection, including issues and challenges associated with ensuring compliance with privacy protections when PII is transferred among agencies.[Footnote 18] We highlighted the need for an effective oversight structure to monitor how PII is protected. For example, requiring agencies to establish agreements with external government entities before sharing PII is a practical method that enables an agency's privacy controls to be forwarded to its recipients, thus offering assurance that personal information is adequately protected from privacy risks following the data transfer. Designating entities within those agreements who are responsible for ensuring the proper implementation of privacy requirements is also consistent with the Fair Information Practice of accountability, which calls for those who control the collection or use of personal information to be held accountable for taking steps to ensure it is protected. FIS relies on memoranda of understanding (MOU) with its customer agencies to establish procedures and policies for protecting PII related to background investigation case files, and these agreements specifically designate OPM as being responsible for ensuring that customer agencies comply with the requirements of the Privacy Act when handling PII received from OPM. Within these agreements, FIS outlines, among other things, system security controls, appropriate uses of investigative information, and other provisions for adherence to the Privacy Act. For example, the agency's e-Delivery system--an information system used to electronically assemble and deliver closed case files from FIS to requesting agencies--includes a description of security and privacy expectations and responsibilities necessary for agencies to utilize the system. However, OPM has not taken any steps to carry out its responsibility for ensuring that personal information is protected at customer agencies. Specifically, it does not monitor customer agencies' adherence to the requirements agreed upon through the MOUs. FIS officials stated that they visit customer agencies on a recurring basis to review other aspects of the agreements but that reviews of customer agencies' privacy protection measures take place only if a potential compromise of PII has been identified. Although these frequent visits to customer agencies provide opportunities for OPM to ensure that customer agencies are protecting PII properly, without focusing on privacy protections outlined within the MOUs as a key element of its established process, OPM may not be meeting its responsibility to ensure that agencies comply with the requirements of the MOU. As a result, OPM may not have reasonable assurance that the personal information contained within background investigation files is being appropriately used and adequately protected by customer agencies. Conclusions: OPM and FIS have incorporated key privacy principles into their processes and documentation that guide agency officials in the performance of background investigations. Key agency activities include measures addressing the Fair Information Practices, and steps have been taken to meet requirements of the Privacy Act and the E- Government Act. However, limited oversight of the implementation of key processes reduces assurances that PII is properly protected. Current OPM guidance does not require assessments of the privacy impact of FIS systems to be accompanied by privacy risk analyses. Until the guidance requires privacy risk analyses with PIAs and existing PIAs are revised to include privacy risk analyses, OPM will continue to have limited assurance that PII contained in its systems is being properly protected. While FIS has policies and procedures to protect PII used by its field investigators, there is no process to assess the level of protection of PII provided by these investigators while investigative activity is underway. Without an oversight mechanism that directly assesses investigators' adherence to OPM PII protection policies, the agency lacks assurance that PII is being properly protected. Finally, OPM does not actively monitor customer agency adherence to requirements for protecting PII as established in MOUs it has with its customers. As a result, FIS may not have reasonable assurance that the personal information contained within background investigation files is being appropriately used and adequately protected by customer agencies. Recommendations for Executive Action: To ensure that appropriate privacy protections are in place during all stages of a background investigation, we recommend that the Director of the OPM take the following four actions: * develop guidance for privacy impact assessments that directs agency officials to perform an analysis of privacy risks and identify mitigating techniques for all FIS systems that access, use, or maintain PII; * ensure that all existing PIAs are revised to adhere to this guidance; * perform periodic, structured evaluations to ensure that field investigators handle and protect PII according to agency policies and procedures while conducting their investigations; and: * develop and implement procedures for monitoring customer agencies' adherence to the privacy provisions agreed to within memoranda of understanding. Agency Comments and Our Evaluation: In written comments on a draft of this report transmitted via e-mail by the GAO audit liaison, OPM agreed with our recommendations. However, OPM disagreed with the report's finding regarding protection of PII by field investigators, stating that it was written in a way that suggested that there is no oversight or monitoring. OPM noted that it recently implemented procedures for checking compliance by both federal and contract investigators to agency PII protection requirements. OPM requested that language in the report be modified to recognize these recent efforts. We adjusted language within our report to clarify the nature of OPM's oversight activities at the time of our review. In addition, the draft report highlighted such recent efforts by FIS to monitor investigator compliance, including daily checks by supervisors of investigator inventories of case information and the division's recently developed program for conducting physical audits of regional field offices to determine compliance with PII requirements. Nevertheless, these recent efforts by FIS have yet to demonstrate that investigators are monitored for compliance while conducting investigations. For example, FIS had yet to develop procedures for examining how investigators protect information while traveling to conduct interviews or how they ensure that only appropriate information is being gathered. In addition, OPM provided technical comments that were addressed as appropriate. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. We will then send copies of this report to interested congressional committees and the Director of the Office of Personnel Management. The report also is available at no charge on the GAO Web site at [hyperlink, http://www.gao.gov]. If you or your staff have any questions regarding this report, please contact me at (202) 512-6244 or at wilshuseng@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix II. Signed by: Gregory C. Wilshusen: Director, Information Security Issues: [End of section] Appendix I: Objectives, Scope, and Methodology: Our objectives were to determine: * how the Office of Personnel Management (OPM) uses personally identifiable information (PII)[Footnote 19] in conducting background investigations, and: * the extent to which OPM's privacy policies and procedures for protecting PII related to investigations meet statutory requirements and align with widely accepted privacy practices. To address our first objective, we identified key steps in the agency's background investigation process by analyzing OPM and Federal Investigative Services (FIS) division policies, procedures, and guidance; conducting site visits of FIS headquarters at the Federal Investigations Processing Center (FIPC) in Boyers, Pennsylvania; and interviewing FIS officials involved in overseeing and conducting key steps in the process located at FIPC and at OPM headquarters. We compiled a four-phase description of the investigation process and confirmed the accuracy of its contents with FIS officials in an iterative fashion. To address our second objective, we reviewed OPM and FIS privacy policies and procedures and analyzed agency actions to (1) comply with the Privacy Act of 1974 and the E-Government Act of 2002 and (2) align with the Fair Information Practices, a set of widely accepted privacy principles. We interviewed OPM's Chief Information Officer in order to obtain information on OPM policies and procedures on the protection of PII and how OPM monitors compliance with its privacy policies and procedures. We also interviewed key FIS officials, including those from the agency's Field Management Oversight Group, Contract Development and Oversight Group, and the Memorandum of Understanding/Liaisons Group, to discuss their practices and procedures for protecting personal information when performing their oversight responsibilities. Additionally, we reviewed previous GAO and OPM Office of the Inspector General reports pertinent to engagement objectives. We conducted this performance audit from October 2009 to September 2010 in the Washington, D.C., and Boyers, Pennsylvania, areas, in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. [End of section] Appendix II: GAO Contact and Staff Acknowledgments: GAO Contact: Gregory C. Wilshusen, (202) 512-6244 or wilshuseng@gao.gov: Staff Acknowledgments: In addition to the contact above, John de Ferrari, Assistant Director; Sher`rie Bacon; Neil Doherty; Matthew Grote; Nicholas Marinos; Lee McCracken; David Plocher; and Jeffrey Woodward made key contributions to this report. [End of section] Footnotes: [1] Moderate and high-risk positions refer to the potential for moderate or exceptionally serious impact to the integrity and efficiency of the service. [2] The White House, Exec. Order No. 12958, Classified National Security Information, § 1.3 (Apr. 17, 1995) (as amended), 5 C.F.R. §1312.4 (2008). [3] For purposes of this report, the terms personal information and personally identifiable information are used interchangeably to refer to any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual's identity, such as name, Social Security number, date and place of birth, mother's maiden name, or biometric records, and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information. [4] OMB, Guidance for Implementing the Privacy Provisions of the E- Government Act of 2002, Memorandum M-03-22 (Washington, D.C., Sept. 26, 2003). [5] U.S. Department of Health, Education, and Welfare, Records, Computers and the Rights of Citizens: Report of the Secretary's Advisory Committee on Automated Personal Data Systems (Washington, D.C., July 1973). [6] OECD, Guidelines on the Protection of Privacy and Transborder Flow of Personal Data (Sept. 23, 1980). OECD plays a prominent role in fostering good governance in the public service and in corporate activity among its 30 member countries. It produces internationally agreed-upon instruments, decisions, and recommendations to promote rules in areas where multilateral agreement is necessary for individual countries to make progress in the global economy. [7] As directed by OMB Memorandum M-05-08, the senior agency official for privacy is responsible for, among other things, ensuring agency compliance with all federal privacy laws and has responsibility for playing a central policy-making role in the development of policy proposals that implicate privacy issues. [8] OPM, Investigator's Handbook (July 2007); OPM, Policy on the Protection of Personally Identifiable Information (PII) (Nov. 15, 2009). [9] OPM OIG, Audit of the Security of Personally Identifiable Information in the Federal Investigative Service Division of the U.S. Office of Personnel Management, Report No. 4A-IS-00-08-014 (Apr. 21, 2009). [10] The summary sheet allows FIS contractors to quickly see the case number, the name of the subject, and if there are any attachments with the questionnaire. [11] Pub. L. No. 108-458, § 3001(g) (2004). Executive Order 13467 defines adjudication as the evaluation of pertinent data in a background investigation, as well as any other available information that is relevant and reliable, to determine whether an individual is (1) suitable for government employment; (2) eligible for logical and physical access; (3) eligible for access to classified information; (4) eligible to hold a sensitive position; or (5) fit to perform work for or on behalf of the government as a contractor employee. [12] Other sources can include military personnel records, official personnel folders and information obtained from Citizenship and Immigration Services, investigative agencies, federal agency security offices, and the Central Intelligence Agency. [13] Due to the scope of our review, we did not test the effectiveness of physical and information security controls. [14] An approved user located at FIPC can directly access the system using his or her assigned unique username and password. If accessing the system remotely, users are required to log into a FIS Web portal prior to logging onto PIPS. [15] National Institute of Standards and Technology, Information Security: Recommended Security Controls for Federal Information Systems, NIST Special Publication 800-53 (Gaithersburg, Md., August 2009). [16] National Institute of Standards and Technology, Security Requirements for Cryptographic Modules, FIPS PUB 140-2 (Gaithersburg, Md., May 25, 2001). [17] OPM OIG, Audit of the Security of Personally Identifiable Information in the Federal Investigative Service Division of the U.S. Office of Personnel Management, Report No. 4A-IS-00-08-014 (Apr. 21, 2009). [18] GAO, Privacy: Alternatives Exist for Enhancing Protection of Personally Identifiable Information, [hyperlink, http://www.gao.gov/products/GAO-08-536] (Washington, D.C.: May 19, 2008). [19] For purposes of this report, the terms personal information and personally identifiable information are used interchangeably to refer to any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual's identity, such as name, Social Security number, date and place of birth, mother's maiden name, or biometric records, and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information. [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Phone: The price of each GAO publication reflects GAO’s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO’s Web site, [hyperlink, http://www.gao.gov/ordering.htm]. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548: