NCJ Number
54561
Date Published
1976
Length
76 pages
Annotation
THE REQUIREMENTS OF THE PRIVACY ACT OF 1974 ARE REDUCED TO 17 COMPLIANCE STEPS. A COMPUTER SIMULATION IS THEN USED TO COMPARE COSTS ASSOCIATED WITH ALTERNATIVE MEANS OF IMPLEMENTING THE MANDATED SAFEGUARDS.
Abstract
THE PRIVACY MODEL, WHICH IS WRITTEN AS A FORTRAN PROGRAM, CONTAINS ALGORITHMS REFLECTING RESOURCE EXPENDITURES FOR 56 DIFFERENT ACTIONS REQUIRED BY THE 17 IDENTIFIED COMPLIANCE STEPS. THIS DOCUMENT EXPLAINS EACH OF THE ACTIONS UNDER ITS COMPLIANCE STEP, GIVES THE APPROPRIATE ALGORITHMS, THEN EXPLAINS THE USE OF THE ALGORITHMS IN THE MODEL. THE ACT'S REQUIREMENTS AND THE IDENTIFIED COMPLIANCE STEPS ARE AS FOLLOWS: REQUIREMENT 1--CONTROLLING DISCLOSURE OF DATA (OBTAINING CONSENT FOR ADDITIONAL USES OF DATA, CHECK CONSENT HAS BEEN OBTAINED, CLAIM DISSEMINATION, AND RETROACTIVE CLAIM DISSEMINATION); REQUIREMENT 2--ACCOUNTING FOR DISCLOSURES (USAGE LOG, RECORD USE INQUIRIES, LEGAL PROCESS NOTIFICATION); REQUIREMENT 3--ACCESS TO RECORDS (RECORD EXISTENCE INQUIRIES, DATA ACCURACY INQUIRIES, CLAIM STORAGE); AND REQUIREMENT 4--GENERAL AGENCY REQUIREMENTS (DATA ACCURACY, ADDITIONAL DATA, REVISE DATA COLLECTION FORMS, PHYSICAL SECURITY, TRAINING AUDIT, AND PUBLIC NOTICE). CHARTS AND TABLES SHOW INTERRELATIONSHIPS AMONG THESE REQUIREMENTS AND THE EFFECTS OF EACH ON THE COMPUTER SYSTEM. THE RESULTING MODEL CONSISTS OF TWO PARTS. THE FIRST ACCEPTS INPUTS ABOUT THE PERSONAL DATA SYSTEM UNDER STUDY, AND THE ALGORITHMS PROVIDE INCREMENTAL RESOURCES REQUIRED TO COMPLY WITH THE PRIVACY ACT. THE SECOND PART APPLIES BOTH NONRECURRING AND RECURRING COST FACTORS TO THE RESOURCES, PROVIDING ESTIMATES OF THE EXPENSE FOR BRINGING THE SYSTEM INTO COMPLIANCE. THE TWO APPENDIXES CONTAIN A GLOSSARY OF FORTRAN VARIABLES AND A SAMPLE PATTERNED INTERVIEW DATA COLLECTION FORM FOR GATHERING INFORMATION NECESSARY FOR USE OF THE ALGORITHMS. (GLR)