OITSS (OSHA Information Technology Support System)
Overview
The OSHA Information Technology Support System (OITSS) is a consolidated Major Information System (MIS) that is comprised of minor applications for processing and supporting business functions in OSHA. OITSS is hosted in a virtualized environment in a secure data center located in Kansas City, MO.
OITSS is one of the OSHA umbrella systems that consolidates and migrate key business applications hosted within the United States Department of Agriculture (USDA) National Information technology Center (NITC) Virtual Government Fedramp certified Cloud infrastructure. OITSS is currently under development and will consist of key OSHA business support applications that will support the agency's mission.
The initial deployment of OITSS includes OSHA's Legacy Data (OLD) application. OLD utilizes OITSS' server infrastructure, multitier system architecture design and is subject to all applicable OITSS security controls. The OLD application includes a Web based interface developed using Oracle Jdeveloper 12c Application Development Framework (ADF) and Java Server Face (JSF) - deployed on Oracle WebLogic 12c server. It also uses Oracle Fusion Middleware (FMW) technologies and Oracle Enterprise Database 12c.
The details of the other minor applications under the OITSS will be added in the future as appendices to this document as they are deployed. Future OITSS minor applications include, but not limited to the following:
- Whistleblower
- Voluntary Protection Plan Automated Data System
- OSHA Strategic Partnership
- Activity and Hours
- Maritime Crane
- Web Services
- Injury Tracking Application
OLD allows OSHA enforcement and consultation users access pertaining OSHA legacy data. It will provide limited functions for designated enforcement users to continue to update existing open case information until closure. This includes debt collection, abatement status, etc. In addition, OLD include legacy data limited search interface and report generation capabilities.
A Privacy Impact Assessment (PIA) is being conducted because of collection of non-sensitive PII by the minor applications hosted on OITSS.
Characterization of the Information
From who is information to be collected? |
---|
|
Why is the Information being collected? |
---|
|
What is the PII being collected, used, disseminated, or maintained? |
---|
|
How is the PII collected? |
---|
|
How will the information collected from individuals or derived from the system be checked for accuracy? |
---|
|
What specific legal authorities, arrangements, and/or agreements defined allow the collection of information? |
---|
|
Privacy Impact Analysis |
---|
|
Describe the Uses of the PII
The following questions are intended to clearly delineate the use of information and the accuracy of the data being used.
Describe all the uses of the PII |
---|
|
What types of tools are used to analyze data and what type of data may be produced? |
---|
|
Will the system derive new data, or create previously unavailable data, about an individual through aggregation of the collected information? |
---|
No |
If the system uses commercial or publicly available data, please explain why and how it is used. |
---|
|
Will the use of PII create or modify a "system of records notification" under the Privacy Act? |
---|
No |
Privacy Impact Analysis |
---|
|
Retention
The following questions are intended to outline how long information will be retained after the initial collection.
What is the retention period for the data in the system? |
---|
|
Is a retention period established to minimize privacy risk? |
---|
No |
Has the retention schedule been approved by National Archives and Records Administration (NARA)? |
---|
No |
Per M-O7-16, Safeguarding Against and Responding to the Breach of Personally Identifiable Information; What efforts are being made to eliminate or reduce PII that is collected, stored or maintained by the system if it is no longer required? |
---|
|
Have you implemented the DOL PII Data Extract Guide for the purpose of eliminating or reducing PII? |
---|
Yes |
How is it determined that PII is no longer required? |
---|
|
If you are unable to eliminate PII from this system, what efforts are you undertaking to mask, de-identify or anonymize PII. |
---|
|
Privacy Impact Analysis |
---|
|
Internal Sharing and Disclosure
The following questions are intended to define the scope of sharing within the Department of Labor.
With which internal organization(s) is the PII shared, what information is shared, and for what purpose? |
---|
|
How is the PII transmitted or disclosed? |
---|
|
Does the agency review when the sharing of personal information is no longer required to stop the transfer of sensitive information? |
---|
Yes |
Privacy Impact Analysis |
---|
|
External Sharing and Disclosure
The following questions are intended to define the content, scope, and authority for information sharing external to DOL which includes federal, state and local government, and the private sector.
With which external organization(s) is the PII shared, what information is shared, and for what purpose? |
|
Is the sharing of PII outside the Department compatible with the original collection? If so, is it covered by an appropriate routine use in a SORN? If so, please describe. If not, please describe under what legal mechanism the program or system is allowed to share the PII outside of DOL. |
---|
|
How is the information shared outside the Department and what security measures safeguard its transmission? |
---|
|
How is the PII transmitted or disclosed? |
---|
|
Is a Memorandum of Understanding (MOU), contract, or any agreement in place with any external organizations with whom information is shared, and does the agreement reflect the scope of the information currently shared? If yes, include who the agreement is with and the duration of the agreement. |
---|
|
How is the shared information secured by the recipient? |
---|
|
What type of training is required for users from agencies outside DOL prior to receiving access to the information? |
---|
|
Privacy Impact Analysis |
---|
|
Notice
The following questions are directed at notice to the individual of the scope of PII collected, the right to consent to uses of said information, and the right to decline to provide information.
Was notice provided to the individual prior to collection of PII? |
---|
Yes |
Do individuals have the opportunity and/or right to decline to provide information? |
---|
Yes |
Do individuals have the right to consent to particular uses of the information? If so, how does the individual exercise the right? |
---|
|
Privacy Impact Analysis |
---|
|
Individual Access, Redress, and Correction
The following questions are directed at an individual's ability to ensure the accuracy of the information collected about them.
What are the procedures that allow individuals to gain access to their information? |
---|
|
What are the procedures for correcting inaccurate or erroneous information? |
---|
|
How are individuals notified of the procedures for correcting their information? |
---|
|
If no formal redress is provided, what alternatives are available to the individual? |
---|
|
Privacy Impact Analysis |
---|
|
Technical Access and Security
The following questions are intended to describe technical safeguards and security measures.
Which user group(s) will have access to the system? (for example, program managers, IT specialists, and analysts will have general access to the system and registered users from the public will have limited access.) |
---|
|
Will contractors to DOL have access to the system? If so, please include a copy of the contract describing their role to the OCIO Security with this PIA. |
---|
|
Does the system use "role" to assign privileges to users of the system? If yes, describe the roles. |
---|
|
What procedures are in place to determine which users may access the system and are they documented? |
---|
|
How are the actual assignments of roles and Rules of Behavior, verified according to established security and auditing procedures? How often training is provided? Provide date of last training. |
---|
|
Describe what privacy training is provided to users, either generally or specifically relevant to the program or system? |
---|
|
What auditing measures and technical safeguards are in place to prevent misuse of data |
---|
|
Is the data secured in accordance with FISMA requirements? If yes, when was Security Assessment and Authorization last completed? |
---|
|
Privacy Impact Analysis |
---|
|
Technology
The following questions are directed at critically analyzing the selection process for any technologies utilized by the system, including system hardware, biometrics, and other technology.
Was the system built from the ground up or purchased and installed? |
---|
|
Describe how data integrity, privacy and security were analyzed as part of the decisions made for your system. |
---|
|
What design choices were made to enhance privacy? |
---|
|
For systems in development, what stage of development is the system in, and what project development life cycle was used? |
---|
|
For systems in development, does the project employ technology which may raise privacy concerns? If so please discuss their implementation? |
---|
No |
Does the project employ technology which may raise privacy concerns? If so please discuss their implementation? |
---|
No |
Determination
As a result of performing the PIA, what choices has the agency made regarding the information technology system and collection of information?
- OSHA has completed the PIA for OSHA IT Support System (OITSS) which is currently in development. OSHA has determined that the safeguards and controls for this moderate system will adequately protect the information and will be referenced in OSHA IT Support System (OITSS) System Security Plan to be completed by September 15, 2016.
- OSHA has determined that it is collecting the minimum necessary information for the proper performance of a documented agency function.