About

TREASURY DIRECTIVE 25-08

 

DATE:  December 22, 2009

 
SUBJECT:    Safeguarding Against and Responding to the Breach of Personally Identifiable
                        Information
 
1.   PURPOSE.  This directive establishes the Department of the Treasury�s (Department�s) Personally Identifiable Information (PII) protection and Breach response and notification policy and plan. This directive also authorizes the issuance of a handbook or other guidance to implement this policy.
 
2.   SCOPE.  This directive applies to all bureaus, offices, and organizations in the Department of the Treasury, including the offices of Inspectors General within the Department.  The provisions of this directive shall not be construed to interfere with or impede the authorities or independence of the Department�s inspectors general.
 
3.   POLICY.  It is the policy of the Department to retain the trust of the American public by safeguarding PII in all forms.  The Department is committed to implementing PII protection in the development and execution of Departmental programs and policies as outlined in the Responsibilities section.
 
4.   BACKGROUND.  Breaches of PII can lead to significant financial losses and emotional burdens to affected individuals, as well as the inappropriate disclosure of records of the Department.  The best protection against a Breach is to prevent its occurrence through policies that train individuals to protect PII, by implementing procedural safeguards to prevent misuse of or unauthorized access to PII, and by imposing accountability for failures to properly safeguard PII.
 
5.   DEFINITIONS.
 
a.   Breach means the suspected or actual loss of control, compromise, unauthorized disclosure, unauthorized acquisition, unauthorized access, or any similar term referring to situations where persons other than authorized users and for other than authorized purposes have access or potential access to PII whether in physical or electronic form.
 
b.   Breach Risk Assessment means the process by which a bureau estimates the severity of a Breach.  The Breach Risk Assessment must include the following steps:
 
1)   Evaluate the nature of the data elements subject to Breach;
 
2)   Assess the individuals who are likely to be affected by the Breach;
 
3)   Determine the likelihood that the Breached PII is accessible to and usable by those with unauthorized access to it;
 
4)   Estimate the risk of harm resulting from the Breach; and
 
5)   Determine the capability of the bureau or office to mitigate the harm resulting from the Breach independently.
 
c.   Breach Notification means a written statement issued in coordination with the Department that informs outside agencies, individuals, or entities of a Breach.  A Breach Notification should contain the following elements:
 
1)   A brief description of the nature of the Breach, including the date(s) that it occurred and was discovered;
 
2)   A description of the types of PII involved in the Breach;
 
3)   A statement of whether the PII was encrypted or protected by other means, when determined that such information would be beneficial and would not compromise the security of the system;
 
4)   A description of the steps individuals should take to protect themselves from potential harm, if any;
 
5)   A description of what the Department is doing to investigate the Breach, mitigate losses, and to protect against further  Breaches; and
 
6)   A statement identifying the appropriate Department personnel whom the affected individuals may contact for more information.
 
d.   Breach Notification Plan means a formal proposal by a bureau to a Bureau Head to issue a Breach Notification arising from a specific Breach.  The Breach Notification Plan shall consist of the following items:
 
1)   A description of the need based on the risk assessment for a Breach Notification;
 
2)   Identification of the Notification Source;
 
3)   A description of the proposed Notification Process;
 
4)   Identification of the proposed timing for issuing the Breach Notification;
 
5)   Identification of the planned recipients of the Breach Notification; and
 
6)   A proposed form of Breach Notification.
 
e.   Bureau Heads means all Treasury bureau heads, including the Inspectors General within the Department, and the Deputy Assistant Secretary for Privacy and Treasury Records (on behalf of the Departmental Offices).
 
f.    Notification Process means the method or methods used to transmit the Breach Notification.  These methods should be commensurate with the number of people affected and the urgency with which they need to receive notice.  Examples of appropriate Notification Processes may include telephone, first-class mail, email, newspapers, or other public media outlets.
 
g.    Notification Source means the bureau or office issuing the official Breach Notification.
 
h.   Personally Identifiable Information (PII) means information which can be used to distinguish or trace an individual�s identity, such as their name, social security number, biometric records, etc., alone, or when combined with other personal or identifying information which is linked or linkable to a specific individual, such as date and place of birth, mother�s maiden name, etc.
 
i.    The Personally Identifiable Information Risk Management Group (PIIRMG) comprises principals in various Department disciplines and competencies.  The PIIRMG oversees the Department�s compliance with applicable privacy laws and regulations, reviews and evaluates the Department�s PII protection policies, tracks relevant trends and identifies best practices, and assists the bureaus in addressing certain extraordinary Breaches. 
 
6.   RESPONSIBILITIES.
 
a.   The Assistant Secretary for Management and Chief Financial Officer has been designated as the Treasury Department�s Chief Privacy and Civil Liberties Officer pursuant to Treasury Order 102-25 and shall:
 
1)   Chair the PIIRMG;
 
2)   Notify the Secretary and Deputy Secretary of the occurrence of a Breach,  as necessary; and
 
3)   Serve as focal point with the Office of Management and Budget and Congress on all matters pertaining to the Breach and coordinate mitigation actions with the respective Inspectors� General Offices as appropriate.
 
b.   The Deputy Assistant Secretary for Privacy and Treasury Records (DASPTR) shall be responsible for the following, in addition to having the responsibilities of a Bureau Head with respect to the Departmental Offices, as set forth below in section 6(d):
 
1)   Provide the day-to-day operational support for the PIIRMG;
 
2)   Prepare correspondence, reports, schedules, plans, and procedures as necessary for the PIIRMG to oversee and coordinate Breach mitigation and privacy protection activities within the Department;
 
3)   Provide critical review and analysis of issues and problems impacting mitigation of Breaches and privacy protection activities within Treasury; and
 
4)   Notify the PIIRMG of any Breach discussed below in section 6(d)(3).
 
c.   Bureau Heads shall take the following steps to prevent Breaches and to minimize their impact:
 
1)   Conduct periodic reviews of their PII holdings to ensure that these holdings are accurate, relevant, timely and complete, and reduce their holdings of PII to the minimum necessary to effectively administer Department programs.
 
2)   Limit access to PII to employees who have a business need for doing so.
 
3)   Periodically review and update policies, guidance, and procedures that address the manner in which occurrences of Breaches of PII can be prevented and their effects minimized.
 
4)   Provide annual privacy training to employees who have access to PII.  Such training shall instruct such individuals of their responsibility to appropriately safeguard PII and the disciplinary and legal consequences of not doing so.
 
5)   For all Departmental systems of records that contain PII, establish a �routine use� for such records, pursuant to the Privacy Act of 1974, as amended, by which the Department may disclose such records when necessary in order to respond effectively to a Breach.
 
d.   Bureau Heads shall take the following steps in the event of a Breach:
 
1)   Report confirmed or suspected Breaches in paper and electronic formats pursuant to Treasury Directive 85‑01, �Department of the Treasury Information Technology (IT) Security Program,� and Treasury Directive Publication 85-01, Appendix G, �Incident Response Guidelines and Procedures.�  Bureau Heads are responsible for reporting a reach within one hour of discovery to the Department of the Treasury Computer Security Incident Response Center (TCSIRC) and the appropriate Treasury Inspectors General.
 
2)   Instruct the affected bureau to conduct a Breach Risk Assessment and prepare a Breach Notification Plan in the event that the Breach Risk Assessment indicates a risk of significant harm arising from a Breach. 
 
3)   Notify the PIIRMG (through the Deputy Assistant Secretary for Privacy and Treasury Records) prior to issuing a Breach Notification in the event that the Bureau Head or designee determines that a Breach has ramifications beyond the affected bureau or cannot be adequately addressed by the affected bureau alone.  The PIIRMG shall work with the Bureau Head to design and implement an appropriate response to the Breach.
 
4)   Implement the Breach Notification Plan if the Bureau Head or designee determines that:
 
a)      There is no need to obtain the prior approval of the PIIRMG or such approval has been obtained;            
 
b)   The risk of harm arising from a Breach is significant;
 
c)   Issuance of a Breach Notification would be prudent; and
 
d)   The proposed Notification Process and form of Notification are appropriate and likely to be effective under the circumstances.
 
7.   AUTHORITIES.
 
a.   Privacy Act of 1974, as amended, 5 USC 552a.
 
b.   Federal Information Security Management Act of 2002, 44 USC 3531 et. seq.
 
c.   E-Government Act of 2002, Section 208.
 
d.   Consolidated Appropriations Act of 2005, Pub L. 108-447, Section 522.
 
e.   Executive Order (EO) 13402, �Strengthening Federal Efforts to Protect Against Identity   Theft,� as amended, November 3, 2006.
 
f.    Department of the Treasury Regulations, 31 CFR Part 1, Subpart C.
 
g.   Department of the Treasury Regulations, 31 CFR Part 0, Employee Rules of Conduct.
 
h.   OMB Memorandum M-06-15, �Safeguarding Personally Identifiable Information,� May 22, 2006.
 
i.    OMB Memorandum M-06-19, �Reporting Incidents Involving PII,� July 12, 2006.
 
j.    OMB Memorandum, �Recommendations for Identity Theft Related Data Breach Notification,� September 20, 2007.
 
k.   OMB Memorandum M-07-16, �Safeguarding Against and Responding to the Breach of Personally Identifiable Information,� May 22, 2007.
 
l.    Treasury Order (TO) 102-25, �Delegation of Authority Concerning Privacy and Civil Liberties.�
 
m.  Treasury Directive (TD) 25-04, �The Privacy Act of 1974, As Amended.�
 
8.   REFERENCES.
 
a.   The President�s Identity Theft Task Force Memorandum, �Identity Theft Related Data Security Breach Notification Guidance,� September 12, 2006.
 
b.   The President�s Identity Theft Task Force Strategic Plan, �Combating Identity Theft,� April 2007.
 
c.   Government Accountability Office Report 07-657, �Privacy:  Lessons Learned about Data Breach Notification,� April 2007.
 
d.   TD 25-06, "The Treasury Data Integrity Board."
 
e.   TD 85-01, �Department of the Treasury Information Technology (IT) Security Program.�
 
f.    Treasury Directive Publication (TD P) 85-01, �Treasury Information Technology Security Program,� Volume I.
 
g.   Appendix G, �Treasury Incident Response Guidelines and Procedures� of TD P 85-01, Volume I.
 
h.   TD P 15-71, �Security Manual.�
 
i.    TD P 25-04, "Privacy Act Handbook."
 
j.    National Institute of Standards and Technology (NIST) Special Publication 800-61, �Computer Security Incident Handling Guide.�
 
k.   Treasury Personally Identifiable Information Risk Management Group Charter.
 
l.    Department of the Treasury�s data breach routine use published on October 3, 2007, at
      72 FR56434.
 
9.   OFFICE OF PRIMARY INTEREST.  Office of the Assistant Secretary for Management and Chief Financial Officer, Office of the Deputy Assistant Secretary for Privacy and Treasury Records, and Office of the Deputy Assistant Secretary for Information Systems and Chief Information Officer.
 
 
 
/S/
Dan Tangherlini
Assistant Secretary for Management
and Chief Financial Officer

 
Last Updated: 11/4/2010 10:00 PM