Sie sind auf Seite 1von 5

38944 Federal Register / Vol. 70, No.

128 / Wednesday, July 6, 2005 / Notices

budget period. The progress report will DEPARTMENT OF HEALTH AND representative; (4) support litigation
serve as your non-competing HUMAN SERVICES involving the agency; and (5) combat
continuation application, and must fraud and abuse in certain health
contain the following elements: Centers for Medicare & Medicaid benefits programs. We have provided
Services background information about the
a. Current Budget Period Activities
modified system in the ‘‘Supplementary
Objectives. Privacy Act of 1974; Report of a New Information’’ section below. Although
b. Current Budget Period Financial System of Records the Privacy Act requires only that CMS
Progress. AGENCY: Department of Health and provide an opportunity for interested
c. New Budget Period Program Human Services (HHS), Centers for persons to comment on the proposed
Proposed Activity Objectives. Medicare & Medicaid Services (CMS). routine uses, CMS invites comments on
all portions of this notice. See ‘‘Effective
d. Budget. ACTION: Notice of a new System of
Dates’’ section for comment period.
e. Measures of Effectiveness. Records (SOR).
DATES: Effective Date: CMS filed a new
f. Additional Requested Information. SUMMARY: In accordance with the SOR report with the Chair of the house
requirements of the Privacy Act of 1974, Committee on Government Reform and
2. Annual progress report, due 90
we are proposing to establish a new Oversight, the Chair of the Senate
days after the end of the budget period. Committee on Governmental Affairs,
system of records titled, ‘‘Health
3. Financial status report, no more Insurance Portability and and the Administrator, Office of
than 90 days after the end of the budget Accountability Act (HIPAA) Information Information and Regulatory Affairs,
period. Tracking System (HITS), System No. Office of Management and Budget
4. Final financial and performance 09–70–0544.’’ The Office of E-Health (OMB) on June 28, 2005. We will not
reports, no more than 90 days after the Standards and Services (OESS) has been disclose any information under a
end of the project period. delegated the responsibility to regulate routine use until 30 days after
and enforce compliance for violations of publication. We may defer
VII. Agency Contacts Transactions and Code Sets, Security, implementation of this SOR or one or
and Unique Identifier provisions of more of the routine use statements listed
We encourage inquiries concerning below if we receive comments that
HIPAA. Enforcement of these provisions
this announcement. For general persuade us to defer implementation.
is a complaint driven process; seeking
questions, contact: Technical ADDRESSES: The public should address
voluntary compliance from all HIPAA
Information Management Section, CDC comment to the CMS Privacy Officer,
covered entities. OESS has procured the
Procurement and Grants Office, 2920 services of a contractor to provide a Mail-stop N2–04–27, 7500 Security
Brandywine Road, Atlanta, GA 30341, database for complaint intake and Boulevard, Baltimore, Maryland 21244–
Telephone: 770–488–2700. management, to manage and maintain 1850. Comments received will be
For program technical assistance, the overall electronic complaint process. available for review at this location, by
contact: Debra Hayes-Hughes, Project Due to investigatory activities, CMS is appointment, during regular business
Officer, Centers for Disease Control and exempting this system from the hours, Monday through Friday from 9
Prevention, 1600 Clifton Road, NE., MS notification, access, correction and a.m.–3 p.m., eastern daylight time.
E–47, Atlanta, GA 30333, Telephone: amendment provisions of the Privacy FOR FURTHER INFORMATION CONTACT:
404–639–4493, E-mail: DHayes- Act of 1974. Michael Phillips, Health Insurance
Hughes@cdc.gov. The purpose of this system is to store Specialist, OESS, CMS, 7500 Security
the results of all OESS regional Boulevard, Mail Stop S2–24–15,
For financial, grants management, or Baltimore, Maryland 21244–1849,
investigations, to determine if there
budget assistance, contact: Kang Lee, were violations as charged in the Telephone Number (410) 786–6713,
Grants Management Specialist, CDC original complaint, to investigate mphillips@cms.hhs.gov.
Procurement and Grants Office, 2920 complaints that appear to be in violation SUPPLEMENTARY INFORMATION: HITS is
Brandywine Road, Atlanta, GA 30341, of the Transactions and Code Sets, used by OESS staff and consists of an
Telephone: 404–498–1917, E-mail: Security, and Unique Identifier electronic repository of information and
kil8@cdc.gov. provisions of HIPAA, to refer violations documents and supplementary paper
VIII. Other Information to law enforcement activities as document files. The HITS system allows
necessary, and to maintain and retrieve OESS to integrate all of OESS’ various
This and other CDC funding records of the results of the complaint business process including all of its
opportunity announcements can be investigations. Information retrieved investigation activities to allow real
found at http://www.cdc.gov. Click on from this SOR will also be disclosed to: time access and results reporting and
‘‘Funding,’’ then ‘‘Grants and (1) Support regulatory, reimbursement, other varied information management
Cooperative Agreements.’’ and policy functions performed within needs. HITS provides (1) a single,
the agency, HIPAA entities, or by a central, electronic repository of all OHS
Dated: June 28, 2005. contractor or consultant; (2) assist complaint documents and information
Alan A. Kotch, another Federal or state agency in the including investigative files,
Acting Deputy Director, Procurement and enforcement of HIPAA regulations correspondence, and administrative
Grants Office, Centers for Disease Control where sharing the information is records; (2) easy, robust capability to
and Prevention. necessary to complete the processing of search all of the information in OESS’
[FR Doc. 05–13223 Filed 7–5–05; 8:45 am] a complaint, contribute to the accuracy repository; (3) better quality control at
BILLING CODE 4163–18–P of CMS’s proper payment of Medicare the front end with simplified data entry
benefits, and/or enable such agency to and stronger data validation; (4) tools to
administer a Federal health benefits help staff work on and manage their
program; (3) support constituent casework; and (5) includes
requests made to a congressional supplementary paper files. The system

VerDate jul<14>2003 16:35 Jul 05, 2005 Jkt 205001 PO 00000 Frm 00083 Fmt 4703 Sfmt 4703 E:\FR\FM\06JYN1.SGM 06JYN1
Federal Register / Vol. 70, No. 128 / Wednesday, July 6, 2005 / Notices 38945

has the capacity to generate reports II. Agency Policies, Procedures, and 4. Determines that the data are valid
concerning the status of current and Restrictions on the Routine Use and reliable.
closed complaints, reviews and A. Agency Policies, Procedures, and III. Proposed Routine Use Disclosures
correspondence. Restrictions on the Routine Use of Data in the System
OESS investigative files maintained in A. The Privacy Act allows us to
The Privacy Act permits us to disclose
HITS are either received as electronic disclose information without an
information without an individual’s
documents or paper records that are consent if the information is to be used individual’s consent if the information
compiled for law enforcement purposes. for a purpose that is compatible with the is to be used for a purpose that is
In the course of investigations, OESS purpose(s) for which the information compatible with the purpose(s) for
often has a need to obtain confidential was collected. Any such disclosure of which the information was collected.
information involving individuals other data is known as a ‘‘routine use.’’ The Any such compatible use of data is
than the complainant. In these cases, it government will only release HITS known as a ‘‘routine use.’’ The proposed
is necessary for OHS to: (1) Preserve the information that can be associated with routine uses in this system meet the
confidentiality of this information, (2) an individual as provided for under compatibility requirement of the Privacy
avoid unwarranted invasions of ‘‘Section III. Proposed Routine Use Act. We are proposing to establish the
personal privacy, and (3) assure Disclosures of Data in the System.’’ Both following routine use disclosures of
recipients of Federal financial assistance identifiable and non-identifiable data information maintained in the system:
that such information provided to OESS may be disclosed under a routine use. 1. To agency contractors or consultant
will be kept confidential. This assurance We will only collect the minimum who have been engaged by the agency
facilitates prompt and effective personal data necessary to achieve the to assist in the performance of a service
completion of the investigations. purpose of HITS. CMS has the following related to this system of records and
policies and procedures concerning who need to have access to the records
Unrestricted disclosure of in order to perform the activity.
disclosures of information that will be
confidential information in OESS files We contemplate disclosing
maintained in the system. Disclosure of
can impede ongoing investigations, information under this routine use only
information from the SOR will be
invade personal privacy of individuals approved only to the extent necessary to in situations in which CMS may enter
and organizations, reveal the identities accomplish the purpose of the into a contractual or similar agreement
of confidential sources, or otherwise disclosure and only after CMS: with a third party to assist in
impair the ability of OESS to conduct 1. Determines that the use or accomplishing CMS function relating to
investigations. For these reasons, the disclosure is consistent with the reason purposes for this system or records.
CMS is exempting all investigative files that the data is being collected, e.g., to CMS occasionally contracts out
from the notification, access, correction store the results of all OESS regional certain of its functions when doing so
and amendment provisions under investigations, to determine if there would contribute to effective and
subsection (k)(2) of the Privacy Act. were violations as charged in the efficient operations. CMS must be able
original complaint, to investigate to give a contractor or consultant
I. Description of the Proposed System of whatever information is necessary for
complaints that appear to be in violation
Records the contractor or consultant to fulfill its
of the HIPAA, to refer violations to law
enforcement activities as necessary, and duties. In these situations, safeguards
A. Statutory and Regulatory Basis for
to maintain and retrieve records of the are provided in the contract prohibiting
SOR
results of the complaint investigations. the contractor or consultant from using
Authority for maintenance of this 2. Determines that: or disclosing the information for any
system is given under provisions of the purpose other than that described in the
a. The purpose for which the
Health Insurance Portability and contract and requires the contractor or
disclosure is to be made can only be
Accountability Act of 1996, Public Law consultant to return or destroy all
accomplished if the record is provided
(Pub. L. 104–191), published at 68 FR information at the completion of the
in individually identifiable form;
60694 (October 23, 2003). These contract.
b. The purpose for which the 2. To another Federal or state agency
regulations are codified at 45 Code of disclosure is to be made is of sufficient to:
Federal Regulation, parts 160, 162, and importance to warrant the effect and/or a. Assist in the enforcement of HIPAA
164. risk on the privacy of the individual that regulations for violations of
additional exposure of the record might Transactions and Code Sets, Security,
B. Collection and Maintenance of Data bring; and
in the System and Unique Identifiers where sharing
c. There is a strong probability that the information is necessary to complete
HITS will maintain a file of complaint the proposed use of the data would in the processing of a complaint,
allegations, information gathered during fact accomplish the stated purpose(s). b. Contribute to the accuracy of CMS’s
the complaint investigation, findings, 3. Requires the information recipient proper payment of Medicare benefits,
and results of the investigation, and to: and/or
a. Establish administrative, technical, c. Enable such agency to administer a
correspondence relating to the
and physical safeguards to prevent Federal health benefits program, or as
investigation. The collected information
unauthorized use of disclosure of the necessary to enable such agency to
will contain name, address, telephone
record; fulfill a requirement of a Federal statute
number, health insurance claim (HIC) b. Remove or destroy at the earliest or regulation that implements a health
number, geographic location, as well as, time all patient-identifiable information; benefits program funded in whole or in
background information relating to and part with Federal funds.
Medicare or Medicaid issues of the c. Agree to not use or disclose the Other Federal or state agencies in
complainant. information for any purpose other than their administration of a Federal health
the stated purpose under which the program may require HITS information
information was disclosed. in order to investigate complaint

VerDate jul<14>2003 16:35 Jul 05, 2005 Jkt 205001 PO 00000 Frm 00084 Fmt 4703 Sfmt 4703 E:\FR\FM\06JYN1.SGM 06JYN1
38946 Federal Register / Vol. 70, No. 128 / Wednesday, July 6, 2005 / Notices

allegations, evaluate information CMS occasionally contracts out maintain records in this system are
gathered during the complaint certain of its functions and makes grants instructed not to release data until the
investigation, review findings and when doing so would contribute to intended recipient agrees to implement
results of the investigation relating to effective and efficient operations. CMS appropriate management, operational
the enforcement of HIPAA regulations must be able to give a contractor or and technical safeguards sufficient to
for violations of Transactions and Code grantee whatever information is protect the confidentiality, integrity and
Sets, Security, and Unique Identifiers. necessary for the contractor or grantee to availability of the information and
3. To a member of Congress or to a fulfill its duties. In these situations, information systems and to prevent
congressional staff member in response safeguards are provided in the contract unauthorized access.
to an inquiry of the congressional office prohibiting the contractor or grantee
made at the written request of the from using or disclosing the information This system will conform to all
constituent about whom the record is for any purpose other than that applicable Federal laws and regulations
maintained. described in the contract and requiring and Federal, HHS, and CMS policies
Beneficiaries sometimes request the the contractor or grantee to return or and standards as they relate to
help of a member of Congress in destroy all information. information security and data privacy.
resolving an issue relating to a matter 6. To another Federal agency or to an These laws and regulations include but
before CMS. The member of Congress instrumentality of any governmental are not limited to: the Privacy Act of
then writes CMS, and CMS must be able jurisdiction within or under the control 1974; the Federal Information Security
to give sufficient information to be of the United States (including any State Management Act of 2002; the Computer
responsive to the inquiry. or local governmental agency), that Fraud and Abuse Act of 1986; the
4. To the Department of Justice (DOJ), administers, or that has the authority to Health Insurance Portability and
court or adjudicatory body when: investigate potential fraud or abuse in, Accountability Act of 1996; the E-
a. The agency or any component a health benefits program funded in Government Act of 2002, the Clinger-
thereof, or whole or in part by Federal funds, when
b. Any employee of the agency in his Cohen Act of 1996; the Medicare
disclosure is deemed reasonably
or her official capacity, or Modernization Act of 2003, and the
necessary by CMS to prevent, deter,
c. Any employee of the agency in his discover, detect, investigate, examine, corresponding implementing
or her individual capacity where the prosecute, sue with respect to, defend regulations. OMB Circular A–130,
DOJ has agreed to represent the against, correct, remedy, or otherwise Management of Federal Resources,
employee, or combat fraud or abuse in such programs. Appendix III, Security of Federal
d. The United States Government is a Other agencies may require HITS Automated Information Resources also
party to litigation or has an interest in information for the purpose of applies. Federal, HHS, and CMS
such litigation, and by careful review, combating fraud and abuse in such policies and standards include but are
CMS determines that the records are Federally funded programs. not limited to: All pertinent NIST
both relevant and necessary to the B. Additional Provisions Affecting publications; the DHHS Information
litigation and that the use of such Routine Use Disclosures. This system Security Program Handbook and the
records by the DOJ, court or contains Protected Health Information CMS Information Security Handbook.
adjudicatory body is compatible with (PHI) as defined by HHS regulation
the purpose for which the agency ‘‘Standards for Privacy of Individually V. Effects of the Proposed System of
collected the records. Identifiable Health Information’’ (45 Records on Individual Rights
Whenever CMS is involved in CFR Parts 160 and 164, 65 FR 82462
litigation, and occasionally when CMS proposes to establish this system
(12–28–00), Subparts A and E.
another party is involved in litigation in accordance with the principles and
Disclosures of PHI authorized by these
and CMS’ policies or operations could routine uses may only be made if, and requirements of the Privacy Act and will
be affected by the outcome of the as, permitted or required by the collect, use, and disseminate
litigation, CMS would be able to ‘‘Standards for Privacy of Individually information only as prescribed therein.
disclose information to the DOJ, court or Identifiable Health Information.’’ Data in this system will be subject to the
adjudicatory body involved. In addition, our policy will be to authorized releases in accordance with
5. To a CMS contractor (including, but prohibit release even of not directly the routine uses identified in this
not necessarily limited to fiscal identifiable information, except system of records.
intermediaries and carriers) that assists pursuant to one of the routine uses or CMS will take precautionary
in the administration of a CMS- if required by law, if we determine there measures (see item IV above) to
administered health benefits program, is a possibility that an individual can be minimize the risks of unauthorized
or to a grantee of a CMS-administered identified through implicit deduction access to the records and the potential
grant program, when disclosure is based on small cell sizes (instances harm to individual privacy or other
deemed reasonably necessary by CMS to where the patient population is so small personal or property rights of patients
prevent, deter, discover, detect, that individuals who are familiar with
investigate, examine, prosecute, sue whose data are maintained in the
the enrollees could, because of the small
with respect to, defend against, correct, system. CMS will collect only that
size, use this information to deduce the
remedy, or otherwise combat fraud or information necessary to perform the
identity of the beneficiary).
abuse in such program. system’s functions. In addition, CMS
We contemplate disclosing IV. Safeguards will make disclosure from the proposed
information under this routine use only CMS has safeguards in place for system only with consent of the subject
in situations in which CMS may enter authorized users and monitors such individual, or his/her legal
into a contractual relationship or grant users to ensure against excessive or representative, or in accordance with an
with a third party to assist in unauthorized use. Personnel having applicable exception provision of the
accomplishing CMS functions relating access to the system have been trained Privacy Act. CMS, therefore, does not
to the purpose of combating fraud and in the Privacy Act and information anticipate an unfavorable effect on
abuse. security requirements. Employees who

VerDate jul<14>2003 16:35 Jul 05, 2005 Jkt 205001 PO 00000 Frm 00085 Fmt 4703 Sfmt 4703 E:\FR\FM\06JYN1.SGM 06JYN1
Federal Register / Vol. 70, No. 128 / Wednesday, July 6, 2005 / Notices 38947

individual privacy as a result of records of the results of the complaint a. The agency or any component
information relating to individuals. investigations. Information retrieved thereof, or
from this SOR will also be disclosed to: b.Any employee of the agency in hisor
John R. Dyer, h4r official capacity, or
(1) Support regulatory, reimbursement,
Chief Operating Officer. and policy functions performed within c. Any employee of the agency in his
SYSTEM NO. 09–70–0544 the agency, HIPAA entities, or by a or her individual capacity where the
contractor or consultant; (2) assist DOJ has agreed to The United States
SYSTEM NAME: another Federal or state agency in the Government is a party to litigation or
‘‘Health Insurance Portability and enforcement of HIPAA regulations has an interest in such litigation, and by
Accountability Act (HIPAA) Information where sharing the information is careful review, CMS determines that the
Tracking System (HITS), HHS/CMS/ necessary to complete the processing of records are both relevant and necessary
OESS’’. a complaint, contribute to the accuracy to the litigation and that the use of such
of CMS’s proper payment of Medicare records by the DOJ, court or
SECURITY CLASSIFFICATION: adjudicatory body is compatible with
benefits, and/or enable such agency to
Level Three Privacy Act Sensitive administer a Federal health benefits the purpose for which the agency
Data. program; (3) support constituent collected the records.
requests made to a congressional 5. To a CMS contractor (including, but
SYSTEM LOCATION:
representative; (4) support litigation not necessarily limited to fiscal
Atlantic Telephone & Telegraph intermediaries and carriers) that assists
Company, Ashburn, Virginia facility involving the agency; and (5) combat
fraud and abuse in certain health in the administration of a CMS-
under the control of the Center for administered health benefits program,
Medicare & Medicaid Services. benefits programs.
or to a grantee of a CMS-administered
CATEGORIES OF INDIVIDUALS COVERED BY THE
ROUTINE USES OF RECORDS MAINTAINED IN THE grant program, when disclosure is
SYSTEM, INCLUDING CATEGORIES OR USERS AND deemed reasonably necessary by CMS to
SYSTEM:
THE PURPOSES OF SUCH USES: prevent, deter, discover, detect,
Individuals who have filed
The Privacy Act allows us to disclose investigate, examine, prosecute, sue
complaints alleging violations of the
information without an individual’s with respect to, defend against, correct,
Transactions and Code Sets, Security,
consent if the information is to be used remedy, or otherwise combat fraud or
and Unique Identifier provisions under
for a purpose that is compatible with the abuse in such program.
the Health Insurance Portability and 6. To another Federal agency or to an
purpose(s) for which the information
Accountability Act of 1996, Public Law instrumentality of any governmental
was collected. Any such compatible use
104–191, 68 FR 60694 (October 23, jurisdiction within or under the control
of data is known as a ‘‘routine use.’’ We
2003). These regulations are codified at of the United States (including any State
are proposing to establish the following
45 CFR, parts 160, 162 and 164. or local governmental agency), that
routine use disclosures of information
CATEGORIES OF RECORDS IN THE SYSTEM: maintained in the system. Information administers, or that has the authority to
HITS will maintain a file of complaint will be disclosed: investigate potential fraud or abuse in,
allegations, information gathered during 1. To agency contractors or a health benefits program funded in
the complaint investigation, findings, consultants who have been engaged by whole or in part by Federal funds, when
and results of the investigation, and the agency to assist in the performance disclosure is deemed reasonably
correspondence relating to the of a service related to this system of necessary by CMS to prevent, deter,
investigation. The collected information records and who need to have access to discover, detect, investigate, examine,
will contain name, address, telephone the records in order to perform the prosecute, sue with respect to, defend
number, health insurance claim (HIC) activity. against, correct, remedy, or otherwise
number, geographic location, as well as, 2. To another Federal or state agency combat fraud or abuse in such programs.
background information relating to to: B. Additional Provisions Affecting
Medicare or Medicaid issues. a. Assist in the enforcement of HIPAA Routine Use Disclosures This system
regulations for violations of contains Protected Health Information
AUTHORITY FOR MAINTENANCE OF THE SYSTEM: Transactions and Code Sets, Security, as defines by HHS regulation
Authority for maintenance of this and Unique Identifiers where sharing ‘‘Standards for Privacy of Individually
system is given under provisions of the the information is necessary to complete Identifiable Health Information’’ (45
Health Insurance Portability and the processing of a complaint, CFR Parts 160 and 164, 65 FR 82462
Accountability Act of 1996, (Pub. L. b. Contribute to the accuracy of CMS’s (12–28–00), Subparts A and E).
104–191), published at 68 FR 60694 proper payment of Medicare benefits, Disclosures of Protected Health
(October 23, 2003). These regulations and/or Information authorized by these routine
are codified at 45 Code of Federal c. Enable such agency to administer a uses may only be made if, and as,
Regulation, parts 160, 162, and 164. Federal health benefits program, or as permitted or required by the ‘‘Standards
necessary to enable such agency to for Privacy of Individually Identifiable
PURPOSE(S) OF THE SYSTEM: fulfill a requirement of a Federal statute Health Information.’’
The purpose of this system is to store or regulation that implements a health In addition, our policy will be to
the results of all OESS regional benefits program funded in whole or in prohibit release even of not directly
investigations, to determine if there part with Federal funds. identifiable information, except
were violations as charged in the 3. To a member of congress or to a pursuant to one of the routine uses or
original complaint, to investigate congressional staff member in response if required by law, if we determine there
complaints that appear to be in violation to an inquiry of the congressional office is a possibility that an individual can be
of the Transactions and Code Sets, made at the written request of the identified through implicit deduction
Security, and Unique Identifier constituent about whom the record is based on small cell sizes (instances
provisions of HIPAA, to refer violations maintained. where the complaint population is so
to law enforcement activities as 4. To the Department of Justice (DOJ), small that individuals who are familiar
necessary, and to maintain and retrieve court or adjudicatory body when: with the complainants could, because of

VerDate jul<14>2003 16:35 Jul 05, 2005 Jkt 205001 PO 00000 Frm 00086 Fmt 4703 Sfmt 4703 E:\FR\FM\06JYN1.SGM 06JYN1
38948 Federal Register / Vol. 70, No. 128 / Wednesday, July 6, 2005 / Notices

the small size, use this information to NOTIFICATION PROCEDURE: Funding Opportunity Number: HHS–
deduce the identity of the complainant). Exempt. However, portions of this 2005–ACF–ACYF–CO–0051.
system notice are non-exempt and CFDA Number: 93.652.
POLICIES AND PRACTICES FOR STORING, Due Date for Applications:
consideration will be given to requests
RETRIEVING, ACCESSING, RETAINING, AND
addressed to the system manager for Application is due August 10, 2005.
DISPOSING OF RECORDS IN THE SYSTEM:
those portions. For general inquiries, it Category of Funding Activity: Social
STORAGE: would be helpful if the request included Services and Income Security.
All records are stored electronically. the system name, address, age, sex, and Executive Summary
for verification purposes, the subject
RETRIEVABILITY: individual’s name (woman’s maiden The purposes of funding these
The complaint data are retrieved by name, if applicable) and complaint demonstration projects are to: (1)
an individual identifier i.e., name of tracking ID number. Demonstrate the effective
complainant. implementation of strategies for
RECORD ACCESS PROCEDURE: introducing the concept of open
SAFEGUARDS: Same as notification procedures. adoption to youth and/or sibling groups
Requestors should also specify the who prefer to maintain contact with
CMS has safeguards in place for
record contents being sought. birth families and/or siblings; (2)
authorized users and monitors such
users to ensure against excessive or demonstrate effective implementation
CONTESTING RECORDS PROCEDURES:
unauthorized use. Personnel having strategies for connecting youth to adults
The subject individual should contact to promote a range of permanency
access to the system have been trained the system manager named above and
in the Privacy Act and information options, particularly adoption and open
reasonably identify the records and adoption, and including guardianship
security requirements. Employees who specify the information to be contested.
maintain records in this system are and kinship care; (3) demonstrate the
State the corrective action sought and effective models of youth leadership
instructed not to release data until the the reasons for the correction with
intended recipient agrees to implements and collaboration between youth,
supporting justification. (These siblings and other family members,
appropriate management, operational Procedures are in accordance with
and technical safeguards sufficient to caseworkers and possible adoptive
Department regulation 45 CFR 5b.7). families in planning for youth
protect the confidentiality, integrity and
availability of the information and RECORDS SOURCE CATEGORIES: permanency; (4) evaluate the processes
information systems and to prevent OESS investigative files maintained in and outcomes of these strategies and
unauthorized access. HITS are either received as electronic models; and (5) disseminate information
documents or paper records that are about these strategies and models so
This system will conform to all
compiled for law enforcement purposes. that other States/locales seeking to
applicable Federal laws and regulations
In the course of investigations, OESS implement effective open adoption
and Federal, HHS, and CMS policies
often has a need to obtain confidential programs for youth and sibling groups
and standards as they relate to
information involving individuals other have a demonstrated resource for
information security and data privacy.
than the complainant. guidance, insight, and possible
These laws and regulations include but
replication.
are not limited to: The Privacy Act of SYSTEMS EXEMPTED FROM CERTAIN PROVISIONS
1974; the Federal Information Security OF THE ACT: Priority Area 1
Management Act of 2002; the Computer
HHS claims exemption of certain I. Funding Opportunity Description
Fraud and Abuse Act of 1986; the
records (case files on active fraud The purposes of funding these
Health Insurance Portability and
investigations) in the system from demonstration projects are to: (1)
Accountability Act of 1996; the E-
notification and access procedures Demonstrate the effective
Government Act of 2002; the Clinger-
under 5 U.S.C. 552a(k)(2) inasmuch as implementation of strategies for
Cohen Act of 1996; the Medicare
these records are investigatory materials introducing the concept of open
Modernization Act of 2003, and the
compiled for program (law) enforcement adoption to youth and/or sibling groups
corresponding implementing
in anticipation of a criminal or who prefer to maintain contact with
regulations. OMB Circular A–130,
administrative proceedings. (See birth families and/or siblings; (2)
Management of Federal Resources,
Department Regulation (45 CFR 5b.11)). demonstrate effective implementation
Appendix III, Security of Federal
Automated Information Resources also [FR Doc. 05–13188 Filed 7–5–05; 8:45 am] strategies for connecting youth to adults
applies. Federal, HHS, and CMS BILLING CODE 4120–03–P to promote a range of permanency
policies and standards include but are options, particularly adoption and open
not limited to: All pertinent NIST adoption, and including guardianship
publications; the DHHS Information DEPARTMENT OF HEALTH AND and kinship care; (3) demonstrate the
Security Program Handbook and the HUMAN SERVICES effective models of youth leadership
CMS Information Security Handbook. and collaboration between youth,
Administration for Children and siblings and other family members,
RETENTION AND DISPOSAL: Families caseworkers and possible adoptive
CMS will retain complaint families in planning for youth
Administration on Children, Youth and
information for a total period not to permanency; (4) evaluate the processes
Families, Children’s Bureau
exceed 25 years. and outcomes of these strategies and
Funding Opportunity Title: models; and (5) disseminate information
SYSTEM MANAGER AND ADDRESS: Developing Adoption Services and about these strategies and models so
Director, Office of E-Health Standards Supports for Youth Who Wish to Retain that other States/locales seeking to
and Services, CMS, Room S2–26–17, Contact with Family Members in Order implement effective open adoption
7500 Security Boulevard, Baltimore, to Improve Permanency Outcomes. programs for youth and sibling groups
Maryland 21244–1850. Announcement Type: Initial. have a demonstrated resource for

VerDate jul<14>2003 17:28 Jul 05, 2005 Jkt 205001 PO 00000 Frm 00087 Fmt 4703 Sfmt 4703 E:\FR\FM\06JYN1.SGM 06JYN1

Das könnte Ihnen auch gefallen