NCJ Number
40466
Date Published
1976
Length
72 pages
Annotation
THIS DOCUMENT PRESENTS A LOGICAL, STRUCTURED METHOD FOR EVALUATING THE ECONOMIC CONSIDERATIONS ASSOCIATED WITH ALTERNATIVE TECHNICAL AND INFORMATION MANAGEMENT APPROACHES FOR COMPLIANCE WITH THE PRIVACY ACT OF 1974.
Abstract
THE METHODOLOGY PRESENTED REDUCES THE LEGISLATION TO 17 COMPLIANCE STEPS. EACH COMPLIANCE STEP THEN DECOMPOSES INTO ONE OR MORE SPECIFIC ACTIONS REQUIRED OF THE RECORD-KEEPER. THE ACTIONS, IN TURN, TRANSLATE INTO THE EXPENDITURE OF DIFFERENT RESOURCES. THE RESOURCES, IN DOLLARS, ARE COMPUTED BY A SET OF ALGORITHMS COLLECTIVELY CALLED A PRIVACY MODEL AND IMPLEMENTED AS A COMPUTER PROGRAM. THE PRIVACY MODEL CONTAINS ALGORITHMS REFLECTING RESOURCE EXPENDITURES FOR 56 DISTINCT ACTIONS. WRITTEN AS A FORTRAN PROGRAM, THE MODEL PRODUCES SEVERAL PRINTOUTS THAT SHOW THE USER THE CONSEQUENCES OF THE INPUT DATA. IN ADDITION TO A TOTAL COST FOR CONVERSION AND AN ANNUAL OPERATING COST, THE MODEL PROVIDES SUBTOTAL COSTS FOR EACH COMPLIANCE STEP. THE MODEL'S POTENTIAL USES INCLUDE THE COMPARISON OF COSTS ASSOCIATED WITH ALTERNATIVE SAFEGUARDS, THE SELECTION OF AN OPTIMAL SET OF COST-EFFECTIVE SAFEGUARDS, AND THE ANALYSIS OF THOSE FACTORS HAVING THE GREATEST IMPACT ON COSTS. (AUTHOR ABSTRACT)...ELW