OSHA — Business Information Systems (OBIS)
1.1 Overview
The OSHA Business Information System (OBIS) is a consolidated major application (MA) system that is comprised of three minor applications (MI) for processing and supporting business functions in OSHA. The function of this system is to collect and process data from the different MIs. OBIS is hosted in a physical server and virtualized environment in a secure data center located in Sandy, Utah and Washington, D.C. The alternate site for Sandy, Utah is located at the Frances Perkins Building (FPB) in Washington, D.C and the alternate for FPB is located at Sandy, Utah. Access to the data centers is controlled through physical and logical security controls, which includes video surveillance, security guards, and an access control system.
OBIS accreditation logical boundaries include web applications, databases, web services, web content, and application development. The major application's legacy component is connected to the SunGard mainframe and Bank of America's LockBox. An interconnection agreement exists in support of the connection with LockBox. Infrastructure lines of demarcation are directly connected and managed via a memorandum of understanding.
The subsystems functionality is supplied via web-services located on intranet and extranet sites. OBIS includes web page development services, including dynamic database driven content and database management, and application development.
OBIS major application is comprised of the following MIs: Legacy Integrated Management Information System (Legacy-IMIS), Web Integrated Management Information System (WebIMIS), and OSHA Web Services (OWS).
- Legacy IMIS provides planning, managing, tracking, and reporting functionality for its programs and services. The IMIS Host Computer Facility supports a National consolidated database system for collecting, manipulating, maintaining, and retrieving enforcement, consultation, and discrimination data. The National database contains a variety of information, including inspection history for specific establishments, citations issued, penalties assessed and paid, accidents and injuries, standards cited, complaints received and investigated, referrals, cases contested, State Programs activities, Federal Agency Programs activities, consultation visits, and discrimination investigations.
WebIMIS applications are Web-based systems enabling users to access and manipulate IMIS data. The system is developed using Oracle 10g Technologies and offers a high assurance, scalable and redundant infrastructure for high system availability. The system is accessible over the Internet or ECN/DCN GSS. WebIMIS is comprised of 6 sub-components:
- Whistleblower application: supports the Directorate of Whistleblower Protection Programs for case lifecycle management.
- Consultation Form 33, Safety and Health Assessment: supports the Directorate of Cooperative and State Programs (DCSP) in providing a tool for analyzing a company's safety and health program.
- OSHA's Voluntary Protection Plan Automated Data System (VADS): supports tracking of OSHA's program to promote effective worksite-based safety and health. Voluntary Protection Program (VPP) sets performance-based criteria for a managed safety and health system, invites sites to apply, and then assesses applicants against these criteria
- OSHA's Partnership (OSPADS): integrates partnership evaluations with other IMIS activities in the consultation and enforcement portions of the OSHA program.
- Activity and Hours (A&H): provides tracking for Compliance Assistance activities, and recording Activity Hours related to Consultation, Enforcement, Whistleblower, Voluntary Protection Program (VPP), OSHA Strategic Partnerships Program (OSPP), and Alliance Program.
- OSHA Maritime and Crane: allows the Directorate of Enforcement Programs (DEP) to issue, track, and renew Maritime Crane Certification related to OSHA-71 and OSHA-72 forms. The system also allows accredited employers to fill in the forms online.
- OSHA Web Services (OWS): provides webpage development services including, dynamic database driven content and database management, application development, operating system management, and server hardware management. OWS provides hosting services to the OBIS Minor Applications, the OSHA public website, the OSHA intranet/extranet internal website, the joint US / European Union website, the joint Tri-National website, the whistleblowers website, and several applications.
1.2 Characterization of the Information
What are the sources of the PII in the information system? |
---|
|
What PII is Collected? |
---|
|
How is the PII collected? |
---|
|
How will the information be checked for accuracy? |
---|
|
What specific legal authorities, arrangements, and/or agreements defined the collection of information? |
---|
|
Privacy Impact Analysis |
---|
|
1.3 Uses of the PII
Describe all the uses of the PII |
---|
|
What types of tools are used to analyze data and what type of data may be produced? |
---|
|
Will the system derive new data, or create previously unavailable data, about an individual through aggregation of the collected information? |
---|
No |
If the system uses commercial or publicly available data, please explain why and how it is used. |
---|
|
Will the use of PII create or modify a “system of records notification” under the Privacy Act? |
---|
No |
Is the agency's use of PII regarding third-party website or application consistent with all applicable laws, regulations and policies? |
---|
Yes |
Privacy Impact Analysis |
---|
|
1.4 Retention
How long is information retained in the system? |
---|
|
Is a retention period established to minimize privacy risk? |
---|
No |
Has the retention schedule been approved by the DOL agency records officer and the National Archives and Records Administration (NARA)? |
---|
No |
What efforts are being made to eliminate or reduce PII that is collected, stored or maintained by the system if it is no longer required? |
---|
|
How is it determined that PII is no longer required? |
---|
|
Privacy Impact Analysis |
---|
|
1.5 Internal Sharing and Disclosure
With which internal organization(s) is the PII shared, what information is shared, and for what purpose? |
---|
|
How is the PII transmitted or disclosed? |
---|
|
Privacy Impact Analysis |
---|
|
1.6 External Sharing and Disclousre
With which external organization(s) is the PII shared, what information is shared, and for what purpose? |
---|
|
Is the sharing of PII outside the Department compatible with the original collection? |
---|
Yes |
How is the information shared outside the Department and what security measures safeguard its transmission? |
---|
|
Privacy Impact Analysis |
---|
|
1.7 Notice
Was notice provided to the individual prior to collection of PII? |
---|
Yes |
Do individuals have the opportunity and/or right to decline to provide information? |
---|
Yes |
Do individuals have the right to consent to particular uses of the information? If so, how does the individual exercise the right? |
---|
|
Privacy Impact Analysis |
---|
|
1.8 Access, Redress, and Correction
What are the procedures that allow individuals to gain access to their information? |
---|
|
What are the procedures for correcting inaccurate or erroneous information? |
|
How are individuals notified of the procedures for correcting their information? |
---|
|
If no formal redress is provided, what alternatives are available to the individual? |
---|
|
Privacy Impact Analysis |
---|
|
1.9 Technical Access and Security
What procedures are in place to determine which users may access the system and are they documented? |
---|
|
Will Department contractors have access to the system? |
---|
Yes |
Describe what privacy training is provided to users, either generally or specifically relevant to the program or system? |
|
What auditing measures and technical safeguards are in place to prevent misuse of data? |
---|
|
Privacy Impact Analysis |
---|
|
1.10 Technology
What stage of development is the system in, and what project development life cycle was used? |
---|
|
Does the project employ technology which may raise privacy concerns? If so please discuss their implementation? |
---|
No |
1.11 Determination
As a result of performing the PIA, what choices has the agency made regarding the information technology system and collection of information?
- OSHA has completed the PIA for OSHA Business Information System (OBIS), which is currently in operation. OSHA has determined that the safeguards and controls for this MODERATE system adequately protect the information.
- OSHA has determined that it is collecting the minimum necessary information for the proper performance of a documented agency function.