This is the accessible text file for GAO report number GAO-06-421 
entitled 'Personal Information: Agency and Reseller Adherence to Key 
Privacy Principles' which was released on April 4, 2006. 

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as part 
of a longer term project to improve GAO products' accessibility. Every 
attempt has been made to maintain the structural and data integrity of 
the original printed product. Accessibility features, such as text 
descriptions of tables, consecutively numbered footnotes placed at the 
end of the file, and the text of agency comment letters, are provided 
but may not exactly duplicate the presentation or format of the printed 
version. The portable document format (PDF) file is an exact electronic 
replica of the printed version. We welcome your feedback. Please E-mail 
your comments regarding the contents or accessibility features of this 
document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

Report to Congressional Committees: 

April 2006: 

Personal Information: 

Agency and Reseller Adherence to Key Privacy Principles: 

GAO-06-421: 

GAO Highlights: 

Highlights of GAO-06-421, a report to congressional committees: 

Why GAO Did This Study: 

Federal agencies collect and use personal information for various 
purposes, both directly from individuals and from other sources, 
including information resellers—companies that amass and sell data from 
many sources. In light of concerns raised by recent security breaches 
involving resellers, GAO was asked to determine how the Departments of 
Justice, Homeland Security, and State and the Social Security 
Administration use personal data from these sources. In addition, GAO 
reviewed the extent to which information resellers’ policies and 
practices reflect the Fair Information Practices, a set of widely 
accepted principles for protecting the privacy and security of personal 
data. GAO also examined agencies’ policies and practices for handling 
personal data from resellers to determine whether these reflect the 
Fair Information Practices. 

What GAO Found: 

In fiscal year 2005, the Departments of Justice, Homeland Security, and 
State and the Social Security Administration reported that they used 
personal information obtained from resellers for a variety of purposes. 
Components of the Department of Justice (the largest user of resellers) 
used such information in performing criminal investigations, locating 
witnesses and fugitives, researching assets held by individuals of 
interest, and detecting prescription drug fraud. The Department of 
Homeland Security used reseller information for immigration fraud 
detection and border screening programs. Uses by the Social Security 
Administration and the Department of State were to prevent and detect 
fraud, verify identity, and determine eligibility for benefits. The 
agencies spent approximately $30 million on contractual arrangements 
with resellers that enabled the acquisition and use of such 
information. About 91 percent of the planned fiscal year 2005 spending 
was for law enforcement (69 percent) or counterterrorism (22 percent). 

The major information resellers that do business with the federal 
agencies we reviewed have practices in place to protect privacy, but 
these measures are not fully consistent with the Fair Information 
Practices. For example, the principles that the collection and use of 
personal information should be limited and its intended use specified 
are largely at odds with the nature of the information reseller 
business, which presupposes that personal information can be made 
available to multiple customers and for multiple purposes. Resellers 
said they believe it is not appropriate for them to fully adhere to 
these principles because they do not obtain their information directly 
from individuals. Nonetheless, in many cases, resellers take steps that 
address aspects of the Fair Information Practices. For example, 
resellers reported that they have taken steps recently to improve their 
security safeguards, and they generally inform the public about key 
privacy principles and policies. However, resellers generally limit the 
extent to which individuals can gain access to personal information 
held about themselves, as well as the extent to which inaccurate 
information contained in their databases can be corrected or deleted. 

Agency practices for handling personal information acquired from 
information resellers did not always fully reflect the Fair Information 
Practices. That is, some of these principles were mirrored in agency 
practices, but for others, agency practices were uneven. For example, 
although agencies issued public notices on information collections, 
these did not always notify the public that information resellers were 
among the sources to be used. This practice is not consistent with the 
principle that individuals should be informed about privacy policies 
and the collection of information. Contributing to the uneven 
application of the Fair Information Practices are ambiguities in 
guidance from the Office of Management and Budget (OMB) regarding the 
applicability of privacy requirements to federal agency uses of 
reseller information. In addition, agencies generally lack policies 
that specifically address these uses. 

What GAO Recommends: 

The Congress should consider the extent to which resellers should 
adhere to the Fair Information Practices. In addition, GAO is making 
recommendations to OMB and the four agencies to establish policy to 
address agency use of personal information from commercial sources. 

Agency officials generally agreed with the content of this report. 
Resellers questioned the applicability of the Fair Information 
Practices, especially with regard to public records. 

www.gao.gov/cgi-bin/getrpt?GAO-06-421. 

To view the full product, including the scope and methodology, click on 
the link above. For more information, contact Linda Koontz at (202) 
512- 6240 or koontzl@gao.gov. 

[End of section] 

Contents: 

Letter: 

Results in Brief: 

Background: 

Using Governmentwide Contracts, Federal Agencies Obtain Personal 
Information from Information Resellers for a Variety of Purposes: 

Resellers Take Steps to Protect Privacy, but These Measures Are Not 
Fully Consistent with the Fair Information Practices: 

Agencies Lack Policies on Use of Reseller Data, and Practices Do Not 
Consistently Reflect the Fair Information Practices: 

Conclusions: 

Matter for Congressional Consideration: 

Recommendations for Executive Action: 

Agency Comments and Our Evaluation: 

Comments from Information Resellers: 

Appendixes: 

Appendix I: Objectives, Scope, and Methodology: 

Appendix II: Federal Laws Affecting Information Resellers: 

Gramm-Leach-Bliley Act: 

Health Insurance Portability and Accountability Act: 

Fair Credit Reporting Act: 

Fair and Accurate Credit Transactions Act: 

Appendix III: Comments from the Department of Justice: 

Appendix IV: Comments from the Department of Homeland Security: 

Appendix V: Comments from the Social Security Administration: 

Appendix VI: Comments from the Department of State: 

Tables: 

Table 1: Federal Laws Addressing Private Sector Disclosure of Personal 
Information: 

Table 2: The OECD Fair Information Practices: 

Table 3: Reported Uses of Personal Information: Department of Justice 
Contracts with Information Resellers, Fiscal Year 2005: 

Table 4: Reported Uses of Personal Information: DHS Contracts with 
Information Resellers, Fiscal Year 2005: 

Table 5: Reported Uses of Personal Information: SSA Contracts with 
Information Resellers, Fiscal Year 2005: 

Table 6: Reported Uses of Personal Information: Department of State 
Contracts with Information Resellers, Fiscal Year 2005: 

Table 7: Information Resellers' Application of Principles of the Fair 
Information Practices: 

Table 8: Application of Fair Information Practices to the Reported 
Handling of Personal Information from Data Resellers at Four Agencies: 

Figures: 

Figure 1: Typical Information Flow through Resellers to Government 
Customers: 

Figure 2: Fiscal Year 2005 Contractual Vehicles Enabling the Use of 
Personal Information from Information Resellers, Categorized by 
Reported Use: 

Figure 3: Total Dollar Values, Categorized by Agency, of Fiscal Year 
2005 Acquisition of Personal Information from Information Resellers: 

APEC: Asia-Pacific Economic Cooperation: 

ATF: Bureau of Alcohol, Tobacco, Firearms, and Explosives: 

CBP: Customs and Border Protection: 

DEA: Drug Enforcement Administration: 

DHS: Department of Homeland Security: 

FBI: Federal Bureau of Investigation: 

FEDLINK: Federal Library and Information Network: 

FEMA: Federal Emergency Management Agency: 

FISMA: Federal Information Security Management Act: 

FTTTF: Foreign Terrorist Tracking Task Force: 

GSA: General Services Administration: 

ICE: Immigration and Customs Enforcement: 

OECD: Organization for Economic Cooperation and Development: 

OIG: Office of the Inspector General: 

OMB: Office of Management and Budget: 

PIA: privacy impact assessment: 

SSA: Social Security Administration: 

TSA: Transportation Security Administration: 

USCIS: Citizenship and Immigration Services: 

Letter April 4, 2006: 

Congressional Committees: 

Recent security breaches at large information resellers, such as 
ChoicePoint and LexisNexis, have highlighted the extent to which such 
companies collect and disseminate personal information.[Footnote 1] 
Information resellers are companies that collect information, including 
personal information about consumers, from a wide variety of sources 
for the purpose of reselling such information to their customers, which 
include both private-sector businesses and government agencies. Before 
advanced computerized techniques made aggregating and disseminating 
such information relatively easy, much personal information was less 
accessible, being stored in paper-based public records at courthouses 
and other government offices or in the files of nonpublic businesses. 
However, information resellers have now amassed extensive amounts of 
personal information about large numbers of Americans, and federal 
agencies access this information for a variety of reasons. Federal 
agency use of such information is governed primarily by the Privacy Act 
of 1974,[Footnote 2] which requires that the use of personal 
information be limited to predefined purposes and involve only 
information germane to those purposes. 

The provisions of the Privacy Act are largely based on a set of 
principles for protecting the privacy and security of personal 
information, known as the Fair Information Practices, which were first 
proposed in 1973 by a U.S. government advisory committee.[Footnote 3] 
These principles, now widely accepted, include: 

* collection limitation, 

* data quality, 

* purpose specification, 

* use limitation, 

* security safeguards, 

* openness, 

* individual participation, and: 

* accountability.[Footnote 4] 

These principles, with some variation, are used by organizations to 
address privacy considerations in their business practices and are also 
the basis of privacy laws and related policies in many countries, 
including the United States, Germany, Sweden, Australia, New Zealand, 
and the European Union. 

Given recent events involving information resellers and federal 
agencies' use of information obtained from these resellers, you asked 
us to review how selected federal agencies use such information. 
Specifically, our objectives were to determine (1) how the Departments 
of Justice, Homeland Security (DHS), and State and the Social Security 
Administration (SSA) are making use of personal information obtained 
through contracts with information resellers; (2) the extent to which 
information resellers providing personal information to these agencies 
have policies and practices in place that reflect the Fair Information 
Practices; and (3) the extent to which these agencies have policies and 
practices in place for the handling of personal data from resellers 
that reflect the Fair Information Practices. 

To address our first objective, we analyzed fiscal year 2005 contracts 
and other vehicles for the acquisition of personal information from 
information resellers by DHS, Justice, State, and SSA to identify their 
purpose, scope, and value. We obtained additional information on these 
contracts and uses in discussions with agency officials to ensure that 
all relevant information had been provided to us. 

To address our second objective, we reviewed documentation from five 
major information resellers[Footnote 5] and conducted site visits at 
three of them[Footnote 6] to obtain information on privacy and security 
policies and procedures and compared these with the Fair Information 
Practices. In conducting our analysis, we identified the extent to 
which reseller practices were consistent with the key privacy 
principles of the Fair Information Practices. We also assessed the 
potential effect of any inconsistencies; however, we did not attempt to 
make determinations of whether or how information reseller practices 
should change. Such determinations are a matter of policy based on 
balancing the public's right to privacy with the value of services 
provided by resellers to customers such as government agencies. We 
determined that the five resellers we reviewed accounted for most of 
the contract value of personal information obtained from resellers in 
fiscal year 2005 by the four agencies we reviewed. We did not evaluate 
the effectiveness of resellers' information security programs. 

To address our third objective, we identified and evaluated agency 
guidelines and management policies and procedures governing the use of 
personal information obtained from information resellers and compared 
these to the Fair Information Practices. We also conducted interviews 
at the four agencies with senior agency officials designated for 
privacy issues as well as officials of the Office of Management and 
Budget (OMB) to obtain their views on the applicability of federal 
privacy laws and related guidance to agency use of information 
resellers. We performed our work from May 2005 to March 2006 in the 
Washington, D.C., metropolitan area; Little Rock, Arkansas; Alpharetta, 
Georgia; and Miamisburg, Ohio. Our work was performed in accordance 
with generally accepted government auditing standards. Our objectives, 
scope, and methodology are discussed in more detail in appendix I. 

Results in Brief: 

In fiscal year 2005, Justice, DHS, State, and SSA reported using 
personal information from information resellers for a variety of 
purposes, including law enforcement, counterterrorism, fraud 
prevention, and debt collection. Taken together, approximately 91 
percent of planned spending on resellers reported by the agencies for 
fiscal year 2005 was for law enforcement (69 percent) or 
counterterrorism (22 percent). For example, components of the 
Department of Justice (the largest user of resellers) made use of such 
information for criminal investigations, location of witnesses and 
fugitives, research of assets held by individuals of interest, and 
detection of fraud in prescription drug transactions. Examples of uses 
by the DHS include immigration fraud detection and border screening 
programs. SSA and State acquire personal information from information 
resellers for fraud detection and investigation, identity verification, 
and benefit eligibility determination. The four agencies obtained 
personal information from resellers primarily through two general- 
purpose governmentwide contract vehicles--the Federal Supply Schedule 
of the General Services Administration (GSA) and the Library of 
Congress's Federal Library and Information Network. Collectively, the 
four agencies reported approximately $30 million[Footnote 7] in fiscal 
year 2005 in contractual arrangements with information resellers that 
enabled the acquisition and use of personal information. 

The major information resellers that do business with the federal 
agencies we reviewed have practices in place to protect privacy, but 
these measures are not fully consistent with the Fair Information 
Practices. For example, the nature of the information reseller business 
is largely at odds with the principles of collection limitation, data 
quality, purpose specification, and use limitation. These principles 
center on limiting the collection and use of personal information, and 
they link data quality (e.g., accuracy) requirements to these 
limitations. Resellers said they believe it may not be appropriate or 
practical for them to fully adhere to these principles because they do 
not obtain their information directly from individuals. In fact, the 
information reseller industry is based on multipurpose collection and 
use of personal and other information[Footnote 8] information from 
multiple sources. In many cases, resellers take steps that address 
aspects of the Fair Information Practices. For example, resellers 
reported that they have taken steps recently to improve their security 
safeguards, and they generally inform the public about key privacy 
principles and policies (relevant to the openness principle). However, 
resellers generally limit the extent to which individuals can gain 
access to personal information held about themselves as well as the 
extent to which inaccurate information contained in their databases can 
be corrected or deleted (relevant to the individual participation 
principle). 

Agency practices for handling personal information acquired from 
information resellers reflected the principles of the Fair Information 
Practices in four cases and in the other four did not. Specifically, 
regarding the collection limitation, data quality, use limitation, and 
security safeguards principles, agency practices generally reflected 
the Fair Information Practices. For example, regarding the data quality 
principle that data should be accurate, current, and complete, as 
needed for the defined purpose, law enforcement agencies (including the 
Federal Bureau of Investigation and the U.S. Secret Service) generally 
reported that they corroborate information obtained from resellers to 
ensure that it is accurate when it is used as part of an investigation. 

Regarding other principles, however, agency practices were uneven. 
Specifically, agencies did not always have practices in place to fully 
address the purpose specification, individual participation, openness, 
and accountability principles with regard to use of reseller 
information. For example, 

* although agencies notify the public through Federal Register notices 
and published privacy impact assessments that they collect personal 
information from various sources, they do not always indicate 
specifically that information resellers are among those sources, and: 

* some agencies lack robust audit mechanisms to ensure that use of 
personal information from information resellers is for permissible 
purposes, reflecting an uneven application of the accountability 
principle. 

Contributing to the uneven application of the Fair Information 
Practices are ambiguities in guidance from OMB regarding the 
applicability of privacy requirements to federal agency uses of 
reseller information. In addition, agencies generally lack policies 
that specifically address these uses. 

The Congress should consider the extent to which information resellers 
should adhere to the Fair Information Practices. We are also 
recommending that the Director, OMB, revise privacy guidance to clarify 
the applicability of requirements for public notices and privacy impact 
assessments to agency use of personal information from resellers and 
direct agencies to review their uses of such information to ensure it 
is explicitly referenced in privacy notices and assessments. Further, 
we are recommending that agencies develop specific policies for the use 
of personal information from resellers. 

We obtained written comments on a draft of this report from Justice, 
DHS, SSA, and State. We also received comments via E-mail from OMB. 
Comments from Justice, DHS, SSA, and State are reproduced in appendixes 
III to VI, respectively. Justice, DHS, SSA, and OMB all generally 
agreed with the report and described actions initiated to address our 
recommendations. In its comments, Justice recommended that prior to 
issuance of any new or revised policy, careful consideration be given 
to its impact on Justice. We believe the policy clarifications we are 
proposing are unlikely to result in an adverse impact on law 
enforcement activities at Justice. Justice and SSA also provided 
technical comments, which were incorporated in the final report as 
appropriate. 

State interpreted our draft report to "rest on the premise that records 
from 'information resellers' should be accorded special treatment when 
compared with sensitive information from other sources." State also 
indicated that it does not distinguish between types of information or 
sources of information in complying with privacy laws. However, our 
report does not suggest that data from resellers should receive special 
treatment. Instead, our report takes the widely accepted Fair 
Information Practices as a universal benchmark of privacy protections 
and assesses agency practices in comparison with them. 

We also obtained comments on excerpts of our draft report from the five 
information resellers we reviewed. Several resellers raised concerns 
regarding the version of the Fair Information Practices we used to 
assess their practices, stating their view that it was more appropriate 
for organizations that collection information directly from consumers 
and that they were not legally bound to adhere to the Fair Information 
Practices. As discussed in our report, the version of the Fair 
Information Practices we used has been widely adopted and cited within 
the federal government as well as internationally. Further, we use it 
as an analytical framework for identifying potential privacy issues for 
further consideration by Congress--not as criteria for strict 
compliance. Resellers also stated that the draft did not take into 
account that public record information is open to all for any use not 
prohibited by state or federal law. However, we believe it is not clear 
that individuals give up all privacy rights to personal information 
contained in public records, and we believe it is important to assess 
the status of privacy protections for all personal information being 
offered commercially to the government so that informed policy decision 
can be made about the appropriate balance between resellers' services 
and the public's right to privacy. Resellers also offered technical 
comments, which were incorporated in the final report as appropriate. 

Background: 

Before advanced computerized techniques for aggregating, analyzing, and 
disseminating data came into widespread use, personal information 
contained in paper-based public records at courthouses or other 
government offices was relatively difficult to obtain, usually 
requiring a personal visit to inspect the records. Nonpublic 
information, such as personal information contained in product 
registrations, insurance applications, and other business records, was 
also generally inaccessible. In recent years, however, advances in 
technology have spawned information reseller businesses that 
systematically collect extensive amounts of personal information from a 
wide variety of sources and make it available electronically over the 
Internet and by other means to customers in both government and the 
private sector. This automation of the collection and aggregation of 
multiple-source data, combined with the ease and speed of its 
retrieval, have dramatically reduced the time and effort needed to 
obtain information of this type. Among the primary customers of 
information resellers are financial institutions (including insurance 
companies), retailers, law offices, telecommunications and technology 
companies, and marketing firms. 

We use the term "information resellers" to refer to businesses that 
vary in many ways but have in common the fact that they collect and 
aggregate personal information from multiple sources and make it 
available to their customers. These businesses do not all focus 
exclusively on aggregating and reselling personal information. For 
example, Dun & Bradstreet primarily provides information on commercial 
enterprises for the purpose of contributing to decision making 
regarding those enterprises. In doing so, it may supply personal 
information about individuals associated with those commercial 
enterprises. To a certain extent, the activities of information 
resellers may also overlap with the functions of consumer reporting 
agencies, also known as credit bureaus--entities that collect and sell 
information about individuals' creditworthiness, among other things. As 
is discussed further below, to the extent that information resellers 
perform the functions of consumer reporting agencies, they are subject 
to legislation specifically addressing that industry, particularly the 
Fair Credit Reporting Act. 

Information resellers obtain personal information from many different 
sources. Generally, three types of information are collected: public 
records, publicly available information, and nonpublic information. 

* Public records are a primary source of information about consumers, 
available to anyone, and can be obtained from governmental entities. 
What constitutes public records is dependent upon state and federal 
laws, but generally these include birth and death records, property 
records, tax lien records, motor vehicle registrations, voter 
registrations, licensing records, and court records (including criminal 
records, bankruptcy filings, civil case files, and legal judgments). 

* Publicly available information is information not found in public 
records but nevertheless publicly available through other sources. 
These sources include telephone directories, business directories, 
print publications such as classified ads or magazines, Internet sites, 
and other sources accessible by the general public. 

* Nonpublic information is derived from proprietary or nonpublic 
sources, such as credit header data,[Footnote 9] product warranty 
registrations, and other application information provided to private 
businesses directly by consumers. 

Private sector businesses rely on information resellers for information 
to support a variety of activities, such as: 

* conducting pre-employment background checks on prospective employees, 

* verifying individuals' identities by reviewing records of their 
personal information; 

* marketing commercial products to consumers matching specified 
demographic characteristics; and: 

* preventing financial fraud by examining insurance, asset, and other 
financial record information. 

Typically, while information resellers may collect and maintain 
personal information in a variety of databases, they provide their 
customers with a single, consolidated online source for a broad array 
of personal information. Figure 1 illustrates how information is 
collected from multiple sources and ultimately accessed by customers, 
including government agencies, through contractual agreements. 

Figure 1: Typical Information Flow through Resellers to Government 
Customers: 

[See PDF for image] 

[End of figure] 

In addition to providing consolidated access to personal information 
through Internet-based Web sites, information resellers offer a variety 
of products tailored to the specific needs of various lines of 
business. For example, an insurance company could obtain different 
products covering police and accident reports, insurance carrier 
information, vehicle owner verification or claims history, or online 
public records. Typically, services offered to law enforcement officers 
include more information--including sensitive information, such as full 
Social Security numbers and driver's license numbers--than is offered 
to other customers. 

Federal Laws and Guidance Govern Use of Personal Information in Federal 
Agencies: 

There is no single federal law that governs all use or disclosure of 
personal information. Instead, U.S. law includes a number of separate 
statutes that provide privacy protections for information used for 
specific purposes or maintained by specific types of entities. The 
major requirements for the protection of personal privacy by federal 
agencies come from two laws, the Privacy Act of 1974 and the privacy 
provisions of the E-Government Act of 2002. The Federal Information 
Security Management Act of 2002 (FISMA) also addresses the protection 
of personal information in the context of securing federal agency 
information and information systems. 

The Privacy Act places limitations on agencies' collection, disclosure, 
and use of personal information maintained in systems of records. The 
act describes a "record" as any item, collection, or grouping of 
information about an individual that is maintained by an agency and 
contains his or her name or another personal identifier. It also 
defines "system of records" as a group of records under the control of 
any agency from which information is retrieved by the name of the 
individual or by an individual identifier. The Privacy Act requires 
that when agencies establish or make changes to a system of records, 
they must notify the public by a notice in the Federal Register 
identifying, among other things, the type of data collected, the types 
of individuals about whom information is collected, the intended 
"routine" uses of data, and procedures that individuals can use to 
review and correct personal information.[Footnote 10] 

The act's requirements also apply to government contractors when 
agencies contract for the development and maintenance of a system of 
records to accomplish an agency function.[Footnote 11] The act limits 
its applicability to cases in which systems of records are maintained 
specifically on behalf of a government agency. 

Several provisions of the act require agencies to define and limit 
themselves to specific predefined purposes. For example, the act 
requires that to the greatest extent practicable, personal information 
should be collected directly from the subject individual when it may 
affect an individual's rights or benefits under a federal program. The 
act also requires that an agency inform individuals whom it asks to 
supply information of (1) the authority for soliciting the information 
and whether disclosure of such information is mandatory or voluntary; 
(2) the principal purposes for which the information is intended to be 
used; (3) the routine uses that may be made of the information; and (4) 
the effects on the individual, if any, of not providing the 
information. According to OMB, this requirement is based on the 
assumption that individuals should be provided with sufficient 
information about the request to make a decision about whether to 
respond. 

In handling collected information, the Privacy Act also requires 
agencies to, among other things, allow individuals to (1) review their 
records (meaning any information pertaining to them that is contained 
in the system of records), (2) request a copy of their record or 
information from the system of records, and (3) request corrections in 
their information. Such provisions can provide a strong incentive for 
agencies to correct any identified errors. 

Agencies are allowed to claim exemptions from some of the provisions of 
the Privacy Act if the records are used for certain purposes. For 
example, records compiled for criminal law enforcement purposes can be 
exempt from a number of provisions, including (1) the requirement to 
notify individuals of the purposes and uses of the information at the 
time of collection and (2) the requirement to ensure the accuracy, 
relevance, timeliness, and completeness of records. A broader category 
of investigative records compiled for criminal or civil law enforcement 
purposes can also be exempted from a somewhat smaller number of Privacy 
Act provisions, including the requirement to provide individuals with 
access to their records and to inform the public of the categories of 
sources of records. In general, the exemptions for law enforcement 
purposes are intended to prevent the disclosure of information 
collected as part of an ongoing investigation that could impair the 
investigation or allow those under investigation to change their 
behavior or take other actions to escape prosecution. 

The E-Government Act of 2002 strives to enhance protection for personal 
information in government information systems or information 
collections by requiring that agencies conduct privacy impact 
assessments (PIA). A PIA is an analysis of how personal information is 
collected, stored, shared, and managed in a federal system. More 
specifically, according to OMB guidance,[Footnote 12] a PIA is an 
analysis of how information is handled: (i) to ensure handling conforms 
to applicable legal, regulatory, and policy requirements regarding 
privacy; (ii) to determine the risks and effects of collecting, 
maintaining, and disseminating information in identifiable form in an 
electronic information system; and (iii) to examine and evaluate 
protections and alternative processes for handling information to 
mitigate potential privacy risks. 

Agencies must conduct PIAs (1) before developing or procuring 
information technology that collects, maintains, or disseminates 
information that is in a personally identifiable form or (2) before 
initiating any new data collections involving personal information that 
will be collected, maintained, or disseminated using information 
technology if the same questions are asked of 10 or more people. OMB 
guidance also requires agencies to conduct PIAs when a system change 
creates new privacy risks, for example, changing the way in which 
personal information is being used. The requirement does not apply to 
all systems. For example, no assessment is required when the 
information collected relates to internal government operations, the 
information has been previously assessed under an evaluation similar to 
a PIA, or when privacy issues are unchanged. 

FISMA also addresses the protection of personal information. FISMA 
defines federal requirements for securing information and information 
systems that support federal agency operations and assets; it requires 
agencies to develop agencywide information security programs that 
extend to contractors and other providers of federal data and 
systems.[Footnote 13] Under FISMA, information security means 
protecting information and information systems from unauthorized 
access, use, disclosure, disruption, modification, or destruction, 
including controls necessary to preserve authorized restrictions on 
access and disclosure to protect personal privacy, among other things. 

OMB is tasked with providing guidance to agencies on how to implement 
the provisions of the Privacy Act and the E-Government Act and has done 
so, beginning with guidance on the Privacy Act, issued in 
1975.[Footnote 14] The guidance provides explanations for the various 
provisions of the law as well as detailed instructions for how to 
comply. OMB's guidance on implementing the privacy provisions of the E- 
Government Act of 2002 identifies circumstances under which agencies 
must conduct PIAs and explains how to conduct them. OMB has also issued 
guidance on implementing the provisions of FISMA. 

Additional Laws Provide Privacy Protections for Specific Types and Uses 
of Information: 

Although federal laws do not specifically regulate the information 
reseller industry as a whole, they provide safeguards for personal 
information under certain specific circumstances, such as when 
financial or health information is involved, or for such activities as 
pre-employment background checks. Specifically, the Fair Credit 
Reporting Act, the Gramm-Leach-Bliley Act, the Driver's Privacy 
Protection Act, and the Health Insurance Portability and Accountability 
Act all restrict the ways in which businesses, including information 
resellers, may use and disclose consumers' personal information (see 
app. II for more details about these laws). The Gramm-Leach-Bliley Act, 
for example, limits financial institutions' disclosure of nonpublic 
personal information to nonaffiliated third parties and requires 
companies to give consumers privacy notices that explain the 
institutions' information sharing practices. Consumers then have the 
right to limit some, but not all, sharing of their nonpublic personal 
information. 

As shown in table 1, these laws either restrict the circumstances under 
which entities such as information resellers are allowed to disclose 
personal information or restrict the parties with whom they are allowed 
to share information. 

Table 1: Federal Laws Addressing Private Sector Disclosure of Personal 
Information: 

Federal laws: Fair Credit Reporting Act; 
Provisions: Consumer reporting agencies are limited to providing data 
only to their customers that have a permissible purpose for using the 
data. With few exceptions, government agencies are treated like other 
parties and must have a permissible purpose in order to obtain a 
consumer report. 

Federal laws: Gramm-Leach-Bliley Act; 
Provisions: Sets limitations on financial institutions' disclosure of 
customer data to third parties, such as information resellers. Requires 
companies to give consumers privacy notices that explain the 
institutions' information-sharing practices. In turn, consumers have 
the right to limit some, but not all, sharing of their nonpublic 
personal information. 

Federal laws: Driver's Privacy Protection Act; 
Provisions: Restricts a third party's ability to obtain Social Security 
numbers and other driver's license information from state motor vehicle 
offices unless doing so for a permissible purpose under the law; 
restricts state motor vehicle offices' ability to disclose driver's 
license information. 

Federal laws: Health Insurance Portability and Accountability Act; 
Provisions: Health care organizations are restricted from disclosing a 
patient's health information without the patient's consent, except for 
permissible reasons, and are required to inform individuals of privacy 
practices. 

Federal laws: Fair and Accurate Credit Transactions Act; 
Provisions: Consumers may obtain one free annual consumer report from 
nationwide consumer reporting agencies. 

Source: GAO analysis. 

Note: Appendix II provides additional details on the requirements of 
these laws. 

[End of table] 

Information resellers are also affected by various state laws. For 
example, California state law requires businesses to notify consumers 
about security breaches that could directly affect them. Legal 
requirements, such as the California law, led ChoicePoint, a large 
information reseller, to notify its customers in mid-February 2005 of a 
security breach in which unauthorized persons gained access to personal 
information from its databases. Since the ChoicePoint notification, 
bills were introduced in at least 35 states and enacted in at least 22 
states[Footnote 15] that require some form of notification upon a 
security breach. 

The Fair Information Practices Are Widely Agreed to Be Key Principles 
for Privacy Protection: 

The Fair Information Practices are a set of internationally recognized 
privacy protection principles. First proposed in 1973 by a U.S. 
government advisory committee, the Fair Information Practices were 
intended to address what the committee termed a poor level of 
protection afforded to privacy under contemporary law.[Footnote 16] A 
revised version of the Fair Information Practices, developed by the 
Organization for Economic Cooperation and Development (OECD)[Footnote 
17] in 1980, has been widely adopted. The OECD principles are shown in 
table 2. 

Table 2: The OECD Fair Information Practices: 

Principle: Collection limitation; 
Description: The collection of personal information should be limited, 
should be obtained by lawful and fair means, and, where appropriate, 
with the knowledge or consent of the individual. 

Principle: Data quality; 
Description: Personal information should be relevant to the purpose for 
which it is collected, and should be accurate, complete, and current as 
needed for that purpose. 

Principle: Purpose specification; 
Description: The purposes for the collection of personal information 
should be disclosed before collection and upon any change to that 
purpose, and its use should be limited to those purposes and compatible 
purposes. 

Principle: Use limitation; 
Description: Personal information should not be disclosed or otherwise 
used for other than a specified purpose without consent of the 
individual or legal authority. 

Principle: Security safeguards; 
Description: Personal information should be protected with reasonable 
security safeguards against risks such as loss or unauthorized access, 
destruction, use, modification, or disclosure. 

Principle: Openness; 
Description: The public should be informed about privacy policies and 
practices, and individuals should have ready means of learning about 
the use of personal information. 

Principle: Individual participation; 
Description: Individuals should have the following rights: to know 
about the collection of personal information, to access that 
information, to request correction, and to challenge the denial of 
those rights. 

Principle: Accountability; 
Description: Individuals controlling the collection or use of personal 
information should be accountable for taking steps to ensure the 
implementation of these principles. 

Source: OECD. 

[End of table] 

The Fair Information Practices are, with some variation, the basis of 
privacy laws and related policies in many countries, including the 
United States, Germany, Sweden, Australia, New Zealand, and the 
European Union.[Footnote 18] They are also reflected in a variety of 
federal agency policy statements, beginning with an endorsement of the 
OECD principles by the Department of Commerce in 1981,[Footnote 19] and 
including policy statements of the DHS, Justice, Housing and Urban 
Development, and Health and Human Services.[Footnote 20] In 2004, the 
Chief Information Officers Council issued a coordinating draft of their 
Security and Privacy Profile for the Federal Enterprise 
Architecture[Footnote 21] that links privacy protection with a set of 
acceptable privacy principles corresponding to the OECD's version of 
the Fair Information Practices. 

The Fair Information Practices are not precise legal requirements. 
Rather, they provide a framework of principles for balancing the need 
for privacy with other public policy interests, such as national 
security, law enforcement, and administrative efficiency. Striking that 
balance varies among countries and among types of information (e.g., 
medication versus employment information). 

The Fair Information Practices also underlie the provisions of the 
Privacy Act of 1974. For example, the system of records notice required 
under the Privacy Act embodies the purpose specification, openness, and 
individual participation principles in that it provides a public 
accounting through the Federal Register of the purpose and uses for 
personal information, and procedures by which individuals may access 
and correct, if necessary, information about themselves. Further, the E-
Government Act's requirement to conduct PIAs likewise reflects the Fair 
Information Practices. Under the act, agencies are to make these 
assessments publicly available, if practicable, through agency Web 
sites or by publication in the Federal Register, or other means. To the 
extent that such assessments are made publicly available, they also 
provide notice to the public about the purpose of planned information 
collections and the planned uses of the information being collected. 

Congressional Interest in the Information Reseller Industry Has Been 
Heightened: 

A number of congressional hearings were held and bills introduced in 
2005 in the wake of widely publicized data security breaches at major 
information resellers such as ChoicePoint and LexisNexis as well as 
other firms. In March 2005, the House Subcommittee on Commerce, Trade, 
and Consumer Protection of the House Energy and Commerce Committee held 
a hearing entitled "Protecting Consumers' Data: Policy Issues Raised by 
ChoicePoint," which focused on potential remedies for security and 
privacy concerns regarding information resellers. Similar hearings were 
held by the House Energy and Commerce Committee and by the U.S. Senate 
Committee on Commerce, Science, and Transportation in spring 2005. 

The heightened interest in this subject led a number of Members of 
Congress to propose a variety of bills aimed at regulating companies 
that handle personal information, including information resellers. 
Several of these bills require companies such as information resellers 
to notify the public of security breaches, while a few also allow 
consumers to "freeze" their credit (i.e., prevent new credit accounts 
from being opened without special forms of authentication), or see and 
correct personal information contained in reseller data collections. 
Other proposed legislation includes (1) the Data Accountability and 
Trust Act,[Footnote 22] requiring security policies and procedures to 
protect computerized data containing personal information and 
nationwide notice in the event of a security breach, and (2) the 
Personal Data Privacy and Security Act of 2005,[Footnote 23] requiring 
data brokers to disclose personal electronic records pertaining to an 
individual and inform individuals on procedures for correcting 
inaccuracies. 

Using Governmentwide Contracts, Federal Agencies Obtain Personal 
Information from Information Resellers for a Variety of Purposes: 

Primarily through governmentwide contracts, Justice, DHS, State, and 
SSA reported using personal information obtained from resellers for a 
variety of purposes, including law enforcement, counterterrorism, fraud 
detection/prevention, and debt collection. Most uses by Justice were 
for law enforcement and counterterrorism, such as investigations of 
fugitives and obtaining information on witnesses and assets held by 
individuals of interest. DHS also used reseller information primarily 
for law enforcement and counterterrorism, such as screening vehicles 
entering the United States. State and SSA reported acquiring personal 
information from information resellers for fraud detection and 
investigation, identity verification, and benefit eligibility 
determination. The four agencies reported approximately $30 million in 
contractual arrangements with information resellers in fiscal year 
2005.[Footnote 24] Justice accounted for most of the funding (about 63 
percent). 

Approximately 91 percent of agency uses of reseller data were in the 
categories of law enforcement (69 percent) or counterterrorism (22 
percent). Figure 2 details contract values categorized by their 
reported use. (Details on uses by each agency are given in the 
individual agency discussions.) 

Figure 2: Fiscal Year 2005 Contractual Vehicles Enabling the Use of 
Personal Information from Information Resellers, Categorized by 
Reported Use: 

[See PDF for image] 

[End of figure] 

Department of Justice Uses Information Resellers Primarily for Law 
Enforcement and Counterterrorism Purposes: 

According to Justice contract documentation, access to up-to-date and 
comprehensive public record information is a critical ongoing mission 
requirement, and the department relies on a wide variety of information 
resellers--including ChoicePoint, Dun & Bradstreet, LexisNexis, and 
West--to meet that need. Departmental use of information resellers was 
primarily for purposes related to law enforcement (75 percent) and 
counterterrorism (18 percent), including support for criminal 
investigations, location of witnesses and fugitives, information on 
assets held by individuals under investigation, and detection of fraud 
in prescription drug transactions. In fiscal year 2005, Justice and its 
components reported approximately $19 million in acquisitions from 
information resellers involving personal information. The department 
acquired these services primarily through use of GSA's Federal Supply 
Schedule[Footnote 25] offerings including a blanket purchase 
agreement[Footnote 26] with ChoicePoint valued at approximately $15 
million.[Footnote 27] Several component agencies, such as the Federal 
Bureau of Investigation (FBI), the Drug Enforcement Administration 
(DEA), and the Bureau of Alcohol, Tobacco, Firearms, and Explosives 
(ATF) placed orders with information resellers based on the schedules. 
In addition, for fiscal year 2005, Justice established separate 
departmentwide contracts with LexisNexis and West valued at $4.5 
million and $5.2 million, respectively.[Footnote 28] 

Tasked to protect and defend the United States against terrorist and 
foreign intelligence threats and to enforce criminal laws, the FBI is 
Justice's largest user of information resellers, with about $11 million 
in contracts in fiscal year 2005. The majority of FBI's use involves 
two major programs, the Public Source Information Program and the 
Foreign Terrorist Tracking Task Force (FTTTF). In support of the 
investigative and intelligence missions of the FBI, the Public Source 
Information Program provides all offices of the FBI with access via the 
Internet to public record, legal, and news media information available 
from various online commercial databases. These databases are used to 
assist with investigations by identifying the location of individuals 
and identifying alias names, Social Security numbers, relatives, dates 
of birth, telephone numbers, vehicles, business affiliations, other 
associations, and assets. Public Source Information Program officials 
reported that use of these commercial databases often results in new 
information regarding the subject of the investigation. Officials noted 
that commercial databases are used in preliminary investigations, and 
that subsequently, investigative personnel must verify the results of 
each search. 

The FBI's FTTTF also contracts with several information resellers (1) 
to assist in fulfilling its mission of assisting federal law 
enforcement and intelligence agencies in locating foreign terrorists 
and their supporters who are in or have visited the United States and 
(2) to provide information to other law enforcement and intelligence 
community agencies that can lead to their surveillance, prosecution, or 
removal. As we previously reported,[Footnote 29] FTTTF makes use of 
personal information from several commercial sources to analyze 
intelligence and detect terrorist activities in support of ongoing 
investigations by law enforcement agencies and the intelligence 
community. Information resellers provide FTTTF with names, addresses, 
telephone numbers, and other biographical and demographical information 
as well as legal briefs, vehicle and boat registrations, and business 
ownership records. 

Other Justice components reported using personal information from 
information resellers to support the conduct of investigations and 
other law enforcement-related activities. For example, the U.S. 
Marshals Service uses an information reseller to, among other things, 
locate fugitives by identifying a fugitive's relatives and their 
addresses.[Footnote 30] Through interviews with relatives, a U.S. 
Marshal may be able to ascertain the location of a fugitive and 
subsequently apprehend the individual. 

DEA, the second largest Justice user of information resellers in fiscal 
year 2005, obtains reseller data to detect fraud in prescription drug 
transactions.[Footnote 31] Through these data, DEA agents can detect 
irregular prescription patterns for specific drugs and trace this 
information to the pharmacy and prescribing doctor.[Footnote 32] DEA 
also uses an information reseller to locate individuals in asset 
forfeiture cases.[Footnote 33] Reseller data allows DEA to identify all 
possible addresses for an individual in order to meet the agency's 
obligation to make a reasonable effort to notify individuals of seized 
property and inform them of their rights to contest the seizures. 

Other uses reported by Justice components are not related to law 
enforcement. For example, uses by the U.S. Trustees, Antitrust, Civil, 
Tax, and Criminal Divisions include ascertaining the financial status 
of individuals for debt collection purposes or bankruptcy proceedings 
or for the location of individuals for court proceedings. The Executive 
Office for U.S. Attorneys uses information resellers to ascertain the 
financial status of those indebted to the United States in order to 
assess the debtor's ability to repay the debt. According to officials, 
information reseller databases may reveal assets that a debtor is 
attempting to conceal. Further, the U.S. Attorneys use information 
resellers to locate victims of federal crime in order to notify these 
individuals of relevant court proceedings pursuant to the Justice for 
All Act.[Footnote 34] 

Table 3 details in aggregate the vendors, fiscal year 2005 contract 
values, and reported uses for contracts with information resellers by 
major Justice components. 

Table 3: Reported Uses of Personal Information: Department of Justice 
Contracts with Information Resellers, Fiscal Year 2005: 

Major component: Federal Bureau of Investigation; 
Information resellers: ChoicePoint, LexisNexis, West, Credit Bureau 
Reports, Dun & Bradstreet, Seisint[A]; 
Aggregate contract value: $11,248,000; 
Uses involving personal information: Public Source Information Program. 
Find individuals and identify alias names, Social Security numbers, 
relatives, dates of birth, telephone numbers, vehicles, business 
affiliations, associations, and assets. The program provides FBI units 
with access to public record, legal, and news media information from 
various online commercial databases; Criminal Investigative Division. 
Same use. Foreign Terrorist Tracking Task Force. Obtain such 
information as names, addresses, telephone numbers, other biographical 
information, vehicle and boat registrations, and business ownership 
records. 

Major component: Drug Enforcement Administration; 
Information resellers: ChoicePoint, LexisNexis, Dun & Bradstreet; 
Aggregate contract value: $4,283,000; 
Uses involving personal information: Conduct investigations of drug 
diversions and improper drug transactions; For example, identifying 
cases in which physicians sell prescriptions to drug dealers or 
abusers, pharmacists falsely report legitimate drug sales and 
subsequently sell the drugs illegally, and employees steal from 
inventory and falsify orders to hide illicit sales. Support criminal 
investigations of specific individuals and companies; Locate an 
individual's address in asset removal cases. 

Major component: U.S. Marshals Service; 
Information resellers: ChoicePoint, LexisNexis, West; 
Aggregate contract value: $1,661,000; 
Uses involving personal information: Generate leads related to fugitive 
investigations (e.g., a fugitive's relatives and their contact 
information). Asset Forfeiture Office. Obtain information on preseized, 
seized, and forfeited property. The Marshals Service offers property 
for sale to the public that has been forfeited under laws enforced or 
administered by Justice and its investigative agencies. Office of 
General Counsel. Research assets to administer tort claims against the 
service. For example, if a claimant makes an assertion that the service 
is responsible for damaging property and does not provide supporting 
documentation, General Counsel personnel may use commercial data to 
verify tax assessment records, proof of ownership, etc. 

Major component: Executive Office for U.S. Attorneys; 
Information resellers: ChoicePoint, CBR Information Services; 
Aggregate contract value: $855,000; 
Uses involving personal information: Financial Litigation Units. 
Ascertain the financial status of individuals and uncover concealed 
assets for civil and criminal debt collection efforts; Locate and 
notify crime victims of relevant court proceedings pursuant to the 
Justice for All Act of 2004. 

Major component: Bureau of Alcohol, Tobacco, Firearms, and Explosives; 
Information resellers: ChoicePoint, Dun & Bradstreet, LexisNexis, West; 
Aggregate contract value: $791,000; 
Uses involving personal information: Support investigative activities 
such as locating and apprehending fugitives or obtaining data on 
businesses (such as in arson investigations), which may include 
personal information about business owners. 

Major component: Executive Office of the United States Trustees; 
Information resellers: ChoicePoint, Equifax,[B] Real Data Corp, MLS 
Hawaii; 
Aggregate contract value: $303,000; 
Uses involving personal information: Obtain information on assets 
(openly held or concealed) of individuals in bankruptcy proceedings (as 
part of office's mission to enforce bankruptcy laws and provide 
oversight of private trustees). Obtain credit reports on employees as 
part of a security clearance process. 

Major component: Office of the Inspector General; 
Information resellers: ChoicePoint, LexisNexis, West; 
Aggregate contract value: $43,000; 
Uses involving personal information: Investigations Division. Support 
investigations of alleged violations of fraud, abuse, and integrity 
laws that govern Justice employees, operations, grantees, and 
contractors. 

Major component: U.S. National Central Bureau; 
Information resellers: ChoicePoint; 
Aggregate contract value: $31,000; 
Uses involving personal information: Conduct business and address 
checks on individuals who may be potentially involved in fraud or 
fugitive cases. The bureau facilitates international law enforcement 
cooperation as the U.S. representative of the International Criminal 
Police Organization (INTERPOL). 

Major component: National Drug Intelligence Center; 
Information resellers: ChoicePoint; 
Aggregate contract value: $28,000; 
Uses involving personal information: Document Exploitation Division. 
Locate individuals, identify assets, and investigate fraud. The 
Document Exploitation Division specializes in analyzing information 
seized in major federal drug investigations. 

Major component: Office of Justice Programs; 
Information resellers: Dun & Bradstreet; 
Aggregate contract value: $22,000; 
Uses involving personal information: Office of Comptroller, Financial 
Management Division. Obtain credit reports to assess new grantees' 
(nongovernmental or nontribal) financial integrity. These credit 
reports may include personal information on company owners. This 
information is used to support the new grantee's ability to operate the 
grant programs of the Office of Justice Programs, to confirm the 
existence of the company, and to determine any outstanding liens or 
obligations that might influence the success of the grant program. 

Major component: Litigating Divisions (Civil, Criminal, Antitrust, and 
Tax); 
Information resellers: ChoicePoint, Credit Bureau Reports (division of 
CBC Companies); 
Aggregate contract value: $21,000; 
Uses involving personal information: Civil Division. Locate individuals 
and assets in connection with litigation for purposes such as obtaining 
depositions, debt collection, and identifying assets that a debtor may 
be concealing in bankruptcy proceedings. Criminal Division, Office of 
Special Investigations. Locate individuals who may have taken part in 
Nazi-sponsored acts of persecution abroad before and during World War 
II and who subsequently entered, or seek to enter, the United States 
illegally and/or fraudulently. Antitrust Division. Locate witnesses for 
trials. Tax Division. Obtain credit bureau reports for debt collection 
purposes. 

Source: Department of Justice. 

Notes: The table represents fiscal year 2005 contract values and may 
not reflect actual expenditures. We did not verify the accuracy or 
completeness of the dollar figures provided to us. 

Contract values were rounded to the nearest thousand. Several Justice 
components use departmentwide contracts with LexisNexis and West, which 
provide, among other things, access to public records information. 
Several components, including the litigating divisions (Civil, 
Criminal, Antitrust, and Tax), the Office of Justice Programs, and the 
Executive Office for U.S. Attorneys, reported that their use of these 
departmentwide contracts was primarily for legal research, and 
therefore we did not include these uses in the table. 

[A] Seisint is now owned by LexisNexis. 

[B] Equifax is an example of a consumer reporting agency. Consumer 
reporting agencies, also known as credit bureaus, are entities that 
collect and sell information about the creditworthiness, among other 
things, of individuals and are required by the Fair Credit Reporting 
Act to disclose such information only for permissible purposes. 

[End of table] 

DHS Uses Information Resellers Primarily for Law Enforcement and 
Counterterrorism: 

In fiscal year 2005, DHS and its components reported that they used 
information reseller data primarily for law enforcement purposes, such 
as for developing leads on subjects in criminal investigations and 
detecting fraud in immigration benefit applications (part of enforcing 
the immigration laws). Counterterrorism uses involved screening 
programs at the northern and southern borders as well as at the 
nation's airports. DHS reported planning to spend about $9 million 
acquiring personal information from resellers in fiscal year 2005. DHS 
acquired these services primarily for law enforcement (63 percent) and 
counterterrorism (35 percent) purposes through FEDLINK--a 
governmentwide contract vehicle provided by the Library of Congress-- 
and GSA's Federal Supply Schedule contracts as well as direct purchases 
by its components. DHS's primary vehicle for acquiring data from 
information resellers was the FEDLINK contract vehicle, which DHS used 
to acquire reseller services from Choicepoint ($4.1 million), Dun & 
Bradstreet ($640,000), LexisNexis ($2 million), and West ($1 million). 

U.S. Immigration and Customs Enforcement (ICE) is DHS's largest user of 
personal information from resellers, with acquisitions worth over $4.3 
million. The largest investigative component of DHS, ICE has as its 
mission to prevent acts of terrorism by targeting the people, money, 
and materials that support terrorist and criminal activities. ICE uses 
information resellers to collect personal information for criminal 
investigative purposes and to perform background security checks. Data 
commonly obtained include address and vehicle information; according to 
officials, this information is either used to verify data already 
collected or is itself verified by investigators through other means. 
For example, ICE's Federal Protective Service has about 50 users who 
access an information reseller database to assist in properly 
identifying and locating potential criminal suspects. Investigators may 
verify an address obtained from the database by confirming billing 
information with a utility company or by conducting "drive-by" 
surveillance. The Federal Protective Service views information obtained 
from resellers as "raw" or "unverified" data, which may or may not be 
of use to investigators. 

Other DHS components likewise reported using personal information from 
resellers to support investigations and other law enforcement-related 
activities. For example, U.S. Customs and Border Protection (CBP)-- 
tasked with managing, controlling, and protecting the nation's borders 
at and between the official ports of entry--uses information resellers 
for law enforcement, intelligence gathering, and prosecution support. 
Using these databases, investigators conduct queries on people, 
businesses, property, and corresponding links via a secure Internet 
connection. According to officials, information obtained is 
corroborated with other previously obtained data, open-source 
information, and investigative leads. 

CBP also uses a specially developed information reseller product to 
assist law enforcement officials in vehicle identification at northern 
and southern land borders. CBP uses electronic readers to capture 
license plate data on vehicles entering or exiting U.S. borders, 
converts the data to an electronic format, and transmits the data to an 
information reseller, which returns U.S. motor vehicle registration 
information to CBP. The license plate data, merged with the associated 
motor vehicle registration data provided by the reseller, are then 
checked against government databases in order to help assess risk 
related to vehicles (i.e., a vehicle whose license plate is associated 
with a law enforcement record might be referred for secondary 
examination). 

The Federal Emergency Management Agency (FEMA), charged with building 
and supporting the nation's emergency management system, uses an 
information reseller to detect fraud in disaster assistance 
applications. FEMA uses this service to verify information that 
individuals present in their applications for disaster assistance via 
the Internet. At the time of application, an individual is required to 
pass an identity check that determines whether the presented identity 
exists, followed by an identity validation quiz to better ensure that 
the applicant corresponds to the identity presented. The information 
reseller is used to verify the applicant's name, address, and Social 
Security number. 

DHS is also using information resellers in its counterterrorism 
efforts. For example, the Transportation Security Administration (TSA), 
tasked with protecting the nation's transportation systems, used data 
obtained from information resellers as part of a test associated with 
the development of ts domestic passenger prescreening program, called 
"Secure Flight."[Footnote 35] TSA's plans for Secure Flight involve the 
submission of passenger information by an aircraft operator to TSA 
whenever a reservation is made for a flight in which the origin and 
destination are domestic airports. In the prescreening of airline 
passengers, this information would be compared with federal watch lists 
of individuals known or suspected of activities related to terrorism. 
TSA conducted a test designed to help determine the extent to which 
information resellers could be used to authenticate passenger identity 
information provided by air carriers. It plans to use the test results 
to determine whether commercial data can be used to improve the 
effectiveness of watch-list matching by identifying passengers who 
would not have been identified from passenger name records and 
government data alone. The test results also may be used to identify 
items of personally identifying information that should be required of 
passengers to improve aviation security. 

Table 4 provides detailed information about DHS uses of information 
resellers in fiscal year 2005, as reported by officials of the 
department's components. 

Table 4: Reported Uses of Personal Information: DHS Contracts with 
Information Resellers, Fiscal Year 2005: 

Major component: U.S. Immigration and Customs Enforcement; 
Information reseller: ChoicePoint, Dun & Bradstreet, LexisNexis, West; 
Aggregate contract value: $4,389,000; 
Uses involving personal information: Acquire data (generally, address 
and vehicle information) for criminal investigations and background 
security checks. According to officials, information is either used to 
verify data already collected or is itself verified by investigators 
through other means. Federal Protective Service. Identify and locate 
potential criminal suspects using address, vehicle, and other 
information. Office of Detention and Removal. Locate and remove illegal 
aliens from the United States using address, vehicle, and other 
information. 

Major component: U.S. Customs and Border Protection; 
Information reseller: ChoicePoint, LexisNexis, Dun & Bradstreet, and 
West; 
Aggregate contract value: $2,375,000; 
Uses involving personal information: Conduct queries on people, 
businesses, property, and corresponding links in support of law 
enforcement, intelligence gathering, and prosecution support. Border 
Patrol Del Rio Sector. Obtain information such as addresses, telephone 
numbers, and names of relatives in support of investigations involving 
registered owners of seized vehicles and property. National Targeting 
Center. Look up information associated with license plate data to 
assist in vehicle identification at northern and southern land borders. 
License plate readers capture data on vehicles and cross-check against 
information reseller and government databases. Data captured are used 
to help assess risk related to these vehicles (e.g., a car whose 
license plate is associated with a law enforcement record might be 
referred for secondary examination). 

Major component: U.S. Citizenship and Immigration Services; 
Information reseller: ChoicePoint, LexisNexis, West; 
Aggregate contract value: $960,000; 
Uses involving personal information: Offices of Fraud Detection and 
National Security and Asylum. Detect fraud in applications for 
immigrant benefits and obtain court records (including judgments and 
conviction documents) to support a broad range of evidentiary 
requirements for official adjudication proceedings. 

Major component: Transportation Security Administration; 
Information reseller: Acxiom, Insight America, Qsent[A]; 
Aggregate contract value: $897,000; 
Uses involving personal information: Test the feasibility of using 
commercial data sources to authenticate identity information contained 
in passenger records to support passenger prescreening. As part of the 
Secure Flight Program, TSA conducted a test to determine whether 
commercial data could be used to improve the effectiveness of watch 
list matching by identifying passengers who would not have been 
identified from passenger name records and government data alone. TSA 
plans to use the results of the test to identify what personally 
identifying information should be required in passenger name records to 
maximize aviation security. 

Major component: U.S. Secret Service; 
Information reseller: ChoicePoint, Dallas Computer Services, Dun & 
Bradstreet, LocatePLUS, and APPRISS; 
Aggregate contract value: $471,000; 
Uses involving personal information: Provide investigative leads to 
field agents and other Secret Service personnel in conducting their 
investigations (e.g., to develop background information on persons, 
locations, or businesses). Acquire jail data that are used as a cross-
check against state and federal databases on warrants, sex offenders, 
child support, probations, and paroles. 

Major component: Federal Emergency Management Agency; 
Information reseller: ChoicePoint; 
Aggregate contract value: $113,000; 
Uses involving personal information: Acquire information such as name, 
address, and Social Security number to help verify and validate the 
identities of individuals applying for disaster assistance via the 
Internet. 

Major component: Office of Inspector General; 
Information reseller: ChoicePoint, LexisNexis; 
Aggregate contract value: $39,000; 
Uses involving personal information: Generate leads in law enforcement 
investigations. 

Major component: U.S. Coast Guard; 
Information reseller: ChoicePoint; 
Aggregate contract value: $19,000; 
Uses involving personal information: Obtain up-to-date credit reports 
as needed to assist in the resolution of financial issues that are of a 
security concern in adjudications. 

Major component: Federal Law Enforcement Training Center--Special 
Investigations Division; 
Information reseller: ChoicePoint; 
Aggregate contract value: $7,900; 
Uses involving personal information: Verify addresses, conduct 
background checks, criminal and administrative investigations. 

Source: DHS. 

Notes: The table represents fiscal year 2005 contract values and may 
not reflect actual expenditures. We did not verify the accuracy or 
completeness of the dollar figures provided to us. 

Contract values were rounded to the nearest thousand. 

Several DHS components use the departmentwide contracts with LexisNexis 
and West. Components such as the Science and Technology and Management 
Directorates reported that their use of these departmentwide contracts 
did not involve the use of personal information (e.g., reported uses 
were for legal or scientific research); accordingly, we did not include 
these values in the table. 

To the extent possible, we excluded uses that did not involve personal 
information; however, since DHS officials responsible for administering 
departmentwide FEDLINK contracts were unable to provide a breakdown of 
component billings by information reseller, the values reflected in the 
table may include uses that do not involve personal information. For 
example, U.S. Citizenship and Immigration Services' fiscal year 2005 
use of departmentwide FEDLINK contracts totaled approximately $960,000, 
but contract officials could not provide specific amounts for this 
organization's use of ChoicePoint, LexisNexis, and West. Although U.S. 
Citizenship and Immigration Services described use of West as primarily 
for legal research, we could not separate costs associated with use of 
personal information. 

[A] Acxiom, Insight America (now owned by Acxiom), and Qsent were 
subcontractors on the EagleForce Associates contract to conduct a 
commercial data test for the Secure Flight Program. Although EagleForce 
is not an information reseller, we included the contract value because 
the commercial data test involved the acquisition of personal 
information from resellers. 

[End of table] 

SSA Uses Information Resellers Primarily for Fraud Prevention and 
Identity Verification: 

In an effort to ensure the accuracy of Social Security benefit 
payments, SSA and its components reported using approximately $1.3 
million in contracts in fiscal year 2005 with information resellers for 
a variety of purposes relating to fraud prevention (66 percent), such 
as skiptracing,[Footnote 36] confirming suspected fraud related to 
workers compensation payments, obtaining information on criminal 
suspects for follow-up investigations (18 percent), and collecting 
debts (16 percent). SSA and its components acquired these services 
through the use of the GSA and FEDLINK governmentwide contracts and 
their own contracts. In fiscal year 2005, SSA contracted with 
ChoicePoint, LexisNexis, SourceCorp, and Equifax. 

The Office of the Inspector General (OIG), the largest user of 
information reseller data at SSA, supports the agency's efforts to 
prevent fraud, waste, and abuse. The OIG uses several information 
resellers to assist investigative agents in detecting benefit abuse by 
Social Security claimants and to assist agents in locating claimants. 
For example, OIG agents access reseller data to verify the identity of 
subjects undergoing criminal investigations. 

Regional office agents may also use reseller data in investigating 
persons suspected of claiming disability fraudulently and draw upon 
assistance from OIG headquarters staff and state investigators from the 
state Attorney General's office in these investigations. For example, 
the Northeastern Program Service Center, located in the New York branch 
of SSA, obtains New York State Workers Compensation Board data from 
SourceCorp, the only company legally permitted to maintain the physical 
and electronic records for New York State Workers Compensation. Through 
the use of this information, SSA can identify persons collecting 
workers compensation benefits but not reporting those benefits, as 
required, to the SSA. 

Table 5 details in aggregate the vendors, fiscal year 2005 contract 
values, and uses of contracts with information resellers reported by 
major SSA components. 

Table 5: Reported Uses of Personal Information: SSA Contracts with 
Information Resellers, Fiscal Year 2005: 

User: Agencywide; 
Information reseller: LexisNexis; 
Contract value: $848,000[A]; 
Uses involving personal information: Field Office Staff. Obtain 
resource information (i.e., real property ownership, values, real 
property transfers, and information concerning the ownership of 
automobiles and boats) to verify the validity of Supplemental Security 
Income applicants and recipients. Office of Inspector General. Access 
public records information to assist with investigations of fraud and 
abuse within the SSA programs. Office of Hearings and Appeals. Access 
public records information to locate the addresses of individuals. 

User: Office of the Inspector General; 
Information reseller: ChoicePoint; 
Contract value: $240,000; 
Uses involving personal information: Acquire information on subjects of 
criminal investigations (e.g., locations, assets, relatives) and help 
corroborate fraud allegations that are submitted to the Office of the 
Inspector General by SSA or the general public.[B]. 

User: Agencywide[C]; 
Information reseller: Equifax; 
Contract value: $204,000; 
Uses involving personal information: Obtain address verification 
reports for the most current address of delinquent debtors for 
undeliverable overpayment-related notices and follow up billing and 
teleprinter profile reports (standard credit reports) that show the 
credit history of the debtor referred to Justice for enforced 
collection via civil suit. 

User: Northeastern Program Service Center; 
Information reseller: SourceCorp; 
Contract value: $14,000; 
Uses involving personal information: Access New York State Worker 
Compensation Board payment data to ensure that persons claiming Social 
Security benefits are correctly reporting workers compensation benefits 
on their forms. 

User: Office of the Inspector General New Jersey Cooperative Disability 
Investigation Unit[D]; 
Information reseller: ChoicePoint; 
Contract value: $4,000; 
Uses involving personal information: Access information on disability 
claimants and their physicians to determine if the claimants may be 
hiding assets and other sources of income that may make them ineligible 
for disability benefits. 

Source: SSA. 

Notes: The table represents fiscal year 2005 contract values and may 
not reflect actual expenditures. We did not verify the accuracy or 
completeness of the dollar figures provided to us. 

Contract values were rounded to the nearest thousand. 

[A] This figure may include uses that do not involve personal 
information since LexisNexis provides news and legal research in 
addition to public records. SSA was unable to separate the dollar 
values associated with use of personal information from uses for other 
purposes. 

[B] In addition to initiating its own investigations, the Office of the 
Inspector General receives notices from the general public about 
suspected fraud. According to one agency official, a large portion of 
these fraud allegations are either incomplete or unfounded and must be 
supported by substantial evidence. Before moving ahead with an 
investigation, officials obtain data from an information reseller to 
verify the legitimacy of the fraud allegations, fill in any missing 
information on the submitted forms and develop leads that would further 
the development of the allegation and any subsequent investigation if 
warranted. 

[C] The Equifax data are accessible by the Northeastern Program Service 
Center, Mid-Atlantic Program Service Center, Southeastern Program 
Service Center, Great Lakes Program Service Center, Western Program 
Service Center, Mid-America Program Service Center, Office of Central 
Operations, and Office of Financial Policy and Operations. 

[D] This is an SSA-funded joint investigation between SSA and the New 
Jersey State Attorney General's Office. 

[End of table] 

The Department of State Uses Information Resellers Primarily for 
Passport Fraud Detection and Investigation: 

The Department of State and its components reported approximately 
$569,000 in contracts in fiscal year 2005 with information resellers, 
primarily for assistance in fraud related activities through criminal 
investigations (51 percent), fraud detection (26 percent), and other 
uses (23 percent) such as background screening. State acquired 
information reseller services through the GSA schedule and a Justice 
blanket-purchase agreement. In fiscal year 2005, the majority of State 
contracts were with ChoicePoint; the agency also had contracts with 
LexisNexis, Equifax and Metronet. 

State's components reported use of these contracts mainly for passport- 
related activities. For example, several components of State accessed 
personal information to validate information submitted on immigrant and 
nonimmigrant visa petitions, such as marital or familial relationships, 
birth and identity information, and address validation. A major use of 
reseller data at State is by investigators acquiring information on 
suspects in passport and visa fraud cases. According to State, 
information reseller data are increasingly important to its operations, 
because the number of passport and visa fraud cases has increased, and 
successful investigations of passport and visa fraud are critical to 
combating terrorism. 

In addition to these uses, State acquires personal information through 
Equifax to support the financial background screening of its job 
applicants. 

Table 6 details the vendors, fiscal year 2005 contract values, and uses 
of contracts with information resellers reported by major State 
components. 

Table 6: Reported Uses of Personal Information: Department of State 
Contracts with Information Resellers, Fiscal Year 2005: 

Component: Diplomatic Security; 
Information reseller: ChoicePoint; 
Contract value: $288,000; 
Uses involving personal information: Criminal Investigations Division. 
Obtain leads on addresses, locations, identity, etc., used in the 
conduct of criminal investigations of passport and visa fraud. 
Diplomatic Security Command Center and Diplomatic Security agents at 26 
overseas posts. Same use. 

Component: Office of Personnel Security and Suitability; 
Information reseller: Equifax; 
Contract value: $132,000; 
Uses involving personal information: Obtain credit checks on applicants 
and new hires to support background screening processes. 

Component: Bureau of Consular Affairs; 
Information reseller: ChoicePoint, Metronet; 
Contract value: $89,000; 
Uses involving personal information: Check the validity of selected 
passport applications, particularly two categories of high-risk 
applications.[A]. 

Component: National Visa Center; 
Information reseller: ChoicePoint; 
Contract value: $40,000; 
Uses involving personal information: Verify information submitted on 
immigrant and nonimmigrant visa petitions. 

Component: Office of Consular Fraud Prevention Programs; 
Information reseller: LexisNexis; 
Contract value: $21,000; 
Uses involving personal information: Investigate claims of marital and 
familial relationships on immigrant visa applications and determine the 
bona fides of prospective employers for employment-based nonimmigrant 
visas. 

Source: Department of State. 

Note: The table represents fiscal year 2005 contract values and may not 
reflect actual expenditures. We did not verify the accuracy or 
completeness of the dollar figures provided to us. 

[A] The two categories of high-risk passport applications include those 
with birth certificates from Puerto Rico and those from applicants 
lacking acceptable primary identification documents, who include 
affidavits from family or associates attesting to their identity. 

[End of table] 

Agencies Contract with Information Resellers Primarily through Use of 
GSA's Federal Supply Schedules and the Library of Congress's FEDLINK 
Service: 

In fiscal year 2005, the four agencies acquired personal information 
primarily through governmentwide contracts, including GSA's Federal 
Supply Schedule (52 percent) contracts and the Library of Congress's 
FEDLINK contracts (28 percent). Components within these agencies also 
initiated separate contracts with resellers as well. The Department of 
Justice was the largest user, accounting for approximately $19 million 
of the $30 million total for all four agencies. Figure 3 shows the 
values of reseller data acquisition by agency for fiscal year 2005. 

Figure 3: Total Dollar Values, Categorized by Agency, of Fiscal Year 
2005 Acquisition of Personal Information from Information Resellers: 

[See PDF for image] 

[End of figure] 

In fiscal year 2005, the most common vehicles used among all four 
agencies to acquire personal information from information resellers 
were the governmentwide contracts made available through GSA's Federal 
Supply Schedule. The GSA schedule provides agencies with simplified, 
streamlined contracting vehicles, allowing them to obtain access to 
information resellers' services either by issuing task or purchase 
orders or by establishing blanket purchase agreements based on the 
schedule contracts. The majority of Justice's acquisition of 
information reseller services was obtained through the GSA schedule, 
including a blanket purchase agreement with ChoicePoint that was also 
made available to non-Justice agencies (for example, the Departments of 
State and Health and Human Services). In addition, components of DHS 
such as the U.S. Secret Service and the SSA's Office of Inspector 
General made use of GSA schedule contracts with information resellers. 

The Federal Supply Schedule allows agencies to take advantage of 
prenegotiated contracts with a variety of vendors, including 
information resellers. GSA does not assess fees for the use of these 
contracts; rather it funds the operation of the schedules in part by 
obtaining administrative fees from vendors on a quarterly basis. 
According to GSA officials, use of the schedule contracts allows 
agencies to obtain the best price and reduce their procurement lead 
time. Since these contracts have been prenegotiated, agencies do not 
need to issue their own solicitation. Instead, agencies may simply 
place a task order directly with the vendor, citing the schedule 
number. GSA's role in administering these contracts is primarily to 
negotiate baseline contract requirements and pricing; it does not 
monitor which agencies are using its schedule contracts. GSA officials 
noted that the requirements contained in the schedule contracts are 
baseline, and agencies may add more stringent requirements to their 
individual task orders. 

Another contract vehicle commonly used to obtain personal information 
from information resellers was the Library of Congress's FEDLINK 
service (28 percent). This vehicle was used by both DHS and 
SSA.[Footnote 37] FEDLINK, an intragovernmental revolving 
fund,[Footnote 38] is a cooperative procurement, accounting, and 
training program designed to provide access to online databases, 
periodical subscriptions, books, and other library and information 
support services from commercial suppliers, including information 
resellers. At DHS, use of the FEDLINK service was the primary vehicle 
for contracting with information resellers. DHS also used GSA schedule 
buys, and some smaller purchases were made directly between DHS 
components and information resellers. The majority of SSA's fiscal year 
2005 acquisitions from information resellers were through FEDLINK, with 
some use of the GSA schedule contracts. 

FEDLINK allows agencies to take advantage of prenegotiated contracts at 
volume discounts with a variety of vendors, including information 
resellers. As with the GSA schedule contracts, the requirements of the 
FEDLINK contracts serve as a baseline, and agencies may add more 
stringent requirements if they so choose. 

FEDLINK offers two different options for using its contracts: direct 
express and transfer pay. The direct express option is similar to the 
GSA schedule process, in which the agency issues a purchase order 
directly to the vendor and cites the underlying FEDLINK contract. Under 
direct express, the ordering agency is responsible for managing the 
delivery of products and services and paying invoices, and the vendor 
pays an administrative fee to the Library. Under the transfer pay 
option, ordering agencies must sign an interagency agreement and pay an 
administrative fee to the Library. In turn, the ordering agencies 
receive additional administrative services. DHS used both the direct 
express and transfer pay options in fiscal year 2005, while SSA used 
transfer pay exclusively. 

Resellers Take Steps to Protect Privacy, but These Measures Are Not 
Fully Consistent with the Fair Information Practices: 

Although the information resellers that do business with the federal 
agencies we reviewed[Footnote 39] have practices in place to protect 
privacy, these measures were not fully consistent with the Fair 
Information Practices. Most significantly, the first four principles, 
relating to collection limitation, data quality, purpose specification, 
and use limitation, are largely at odds with the nature of the 
information reseller business. These principles center on limiting the 
collection and use of personal information and require data accuracy 
based on that limited purpose and limited use of the information. 
However, the information reseller industry presupposes that the 
collection and use of personal information is not limited to specific 
purposes, but instead that information can be collected and made 
available to multiple customers for multiple purposes. Resellers make 
it their business to collect large amounts of personal 
information[Footnote 40] and to combine that information in new ways so 
that it serves purposes other than those for which it was originally 
collected. Further, they are limited in their ability to ensure the 
accuracy, currency, or relevance of their holdings, because these 
qualities may vary based on customers' varying uses. 

Information reseller policies and procedures were consistent with 
aspects of the remaining four Fair Information Practices. Large 
resellers reported implementing a variety of security safeguards, such 
as stringent customer credentialing, to improve protection of personal 
information. Resellers also generally provided public notice of key 
aspects of their privacy policies and practices, (relevant to the 
openness principle) and reported taking actions to ensure internal 
compliance with their own privacy policies (relevant to the 
accountability principle). However, resellers generally limited the 
extent to which individuals could gain access to personal information 
held about themselves, and because they obtain their information from 
other sources, most resellers also had limited provisions for 
correcting or deleting inaccurate information contained in their 
databases (relevant to the individual participation 
principle).[Footnote 41] Instead, they directed individuals wishing to 
make corrections to contact the original sources of the data. Table 7 
provides an overview of information resellers' application of the Fair 
Information Practices. 

Table 7: Information Resellers' Application of Principles of the Fair 
Information Practices: 

Principle: Collection limitation. The collection of personal 
information should be limited, should be obtained by lawful and fair 
means, and, where appropriate, with the knowledge or consent of the 
individual; 
Resellers' application: Resellers do not limit collections to specific 
purposes but collect large amounts of personal information, within the 
bounds of the law. Further, in many cases, individuals do not know that 
their personal information is being collected by the reseller, even 
though they may have known of the original (source) collection. 

Principle: Data quality. Personal information should be relevant to the 
purpose for which it is collected, and should be accurate, complete, 
and current as needed for that purpose; 
Resellers' application: Although they often have measures in place for 
ensuring data accuracy in the aggregate, resellers do not ensure that 
the information they provide is accurate, complete, and current for a 
specific purpose. Instead, they monitor and rely on the quality 
controls of the original data source. 

Principle: Purpose specification. The purpose for the collection of 
personal information should be disclosed before collection and upon any 
change to that purpose, and its use should be limited to that purpose 
and compatible purposes; 
Resellers' application: Resellers disclose general categories of 
purposes for their data collection rather than specific purposes. They 
obtain information originally collected for specific purposes and 
generally offer it for a much wider range of purposes. 

Principle: Use limitation. Personal information should not be disclosed 
or otherwise used for other than a specified purpose without consent of 
the individual or legal authority; 
Resellers' application: Resellers generally limit the use of 
information as required by law rather than on the basis of the purposes 
originally specified when the information was collected. Resellers 
generally pass responsibility for legal use restrictions to customers 
through licensing and contract terms and agreements. Customers must 
contractually agree to appropriate uses of the data and must agree to 
comply with applicable laws. 

Principle: Security safeguards. Personal information should be 
protected with reasonable security safeguards against risks such as 
loss or unauthorized access, destruction, use, modification, or 
disclosure; 
Resellers' application: Resellers reported implementing a variety of 
security safeguards, such as stringent customer credentialing, to 
improve protection of personal information. 

Principle: Openness. The public should be informed about privacy 
policies and practices, and individuals should have ready means of 
learning about the use of personal information; 
Resellers' application: Resellers generally inform the public of key 
aspects of privacy policies through Web sites, brochures, and so on. 

Principle: Individual participation. Individuals should have the 
following rights: to know about the collection of personal information, 
to access that information, to request correction, and to challenge the 
denial of those rights; 
Resellers' application: Although information resellers allow 
individuals access to their personal information, this access is 
generally limited, as is the opportunity to make corrections. 
Generally, resellers only correct errors they may have introduced in 
the process of obtaining and aggregating data. 

Principle: Accountability. Individuals controlling the collection or 
use of personal information should be accountable for taking steps to 
ensure the implementation of these principles; 
Resellers' application: Resellers reported taking actions, such as 
designating a chief privacy officer or equivalent, to ensure compliance 
with their privacy policies. Annual privacy audits were conducted in 
one case. 

Source: GAO analysis of reseller information. 

Note: We did not evaluate the effectiveness of information reseller 
practices, only the extent to which resellers applied the Fair 
Information Practices. 

[End of table] 

Information Resellers Generally Did Not Report Limiting Their Data 
Collection to Specific Purposes or Notifying Individuals about Them: 

According to the collection limitation principle of the Fair 
Information Practices, the collection of personal information should be 
limited, information should be obtained by lawful and fair means, and, 
where appropriate, it should be collected with the knowledge and 
consent of the individual. The collection limitation principle also 
suggests that organizations could limit collection to the minimum 
amount of data necessary to process a transaction. 

In practice, resellers are limited in the personal information that 
they can obtain by laws that apply to specific kinds of information 
(for example, the Fair Credit Reporting Act and the Gramm-Leach-Bliley 
Act, which restrict the collection, use, and disclosure of certain 
consumer and financial data). One reseller reported that it also 
restricts collection of Social Security number information from public 
records, as well as collection of identifying information on children 
from public sources, such as telephone directories. 

Beyond specific legal restrictions, information resellers generally 
attempt to aggregate large amounts of personal information so as to 
provide useful information to a broad range of customers. For example, 
resellers collect personal information from a wide variety of sources, 
including state motor vehicle records; local government records on 
births, real property, and voter registrations; and various court 
records. Information resellers may also obtain information from 
telephone directories, Internet sites, and consumer applications for 
products or services. The widely varying sources and types of 
information demonstrate the broad nature of the collection of personal 
information. The amount and scope of information collected vary from 
company to company, and resellers use this information to offer a range 
of products tailored to different markets and uses.[Footnote 42] 

Regarding the principle that information should be obtained by lawful 
and fair means, resellers stated that they take steps to ensure that 
their collection of information is legal. For example, resellers told 
us that they obtain assurances from their data suppliers that 
information is legally collected from reputable sources. Further, they 
design their products and services to ensure they are in conformance 
with laws such as the Gramm-Leach-Bliley Act and the Fair Credit 
Reporting Act. 

Regarding the principle that, where appropriate, information should be 
collected with the knowledge and consent of the individual, resellers 
do not make provisions to notify the individuals involved when they 
obtain personal data from their many sources, including public records. 
Concomitantly, individuals are not afforded an opportunity to express 
or withhold their consent when the information is collected. Resellers 
said they believe it may not be appropriate or practical for them to 
provide notice or obtain consent from individuals because they do not 
collect information directly from them. One reseller noted that in many 
instances the company does not have a direct relationship with the data 
subject and is therefore not in a position to interact with the 
consumer for purposes such as providing notice. Further, this reseller 
stated its belief that requiring resellers to notify and obtain consent 
from each individual about whom they obtain information would result in 
consumers being overwhelmed with notices and negate the value of 
notice. 

Under certain conditions, some information resellers offer consumers an 
"opt-out" option--that is, individuals may request that information 
about themselves be suppressed from selected databases. However, 
resellers generally offer this option only with respect to certain 
types of information and only under limited circumstances. For example, 
one reseller allows consumers to opt out of its marketing products but 
not other products, such as background screening and fraud detection 
products. The privacy policy for another information reseller states 
that it will allow certain individuals to opt out of its nonpublic 
information databases containing sensitive information under specific 
conditions: if the individual is a state, local, or federal law 
enforcement officer or public official whose position exposes him or 
her to a threat of imminent harm; if the individual is a victim of 
identity theft; or if the individual is at risk of physical harm. In 
order to exercise this option, consumers generally must provide 
satisfactory documentation to support the basis for their request. In 
any event, the reseller retains the right to determine (1) whether to 
grant or deny any request, (2) to which databases the request for 
removal will apply, and (3) the duration of the removal. Two resellers 
stated their belief that under certain circumstances it may not be 
appropriate to provide consumers with opportunities for opting out, 
such as for information products designed to detect fraud or locate 
criminals. These resellers stated that if individuals were permitted to 
opt out of fraud prevention databases, some of those opting out could 
be criminals, which would undermine the effectiveness and utility of 
these databases. 

Information Resellers Do Not Ensure That Personal Information They 
Provide Is Accurate for Specific Purposes: 

According to the data quality principle, personal information should be 
relevant to the purpose for which it is collected, and should be 
accurate, complete, and current as needed for that purpose. Information 
resellers reported taking steps to ensure that they generally receive 
accurate data from their sources and that they do not introduce errors 
in the process of transcribing and aggregating information; however, 
they generally provide their customers with exactly the same data they 
obtain and do not claim or guarantee that the information is accurate 
for a specific purpose. Some resellers' privacy policies state that 
they expect their data to contain some errors. Further, resellers 
varied in their policies regarding correction of data determined to be 
inaccurate as obtained by them. One reseller stated that it would 
delete information in its databases that was found to be inaccurate. 
Another stated that even if an individual presents persuasive evidence 
that certain information is in error, the reseller generally does not 
make changes if the information comes directly from an official public 
source (unless instructed to do so by that source). Because they are 
not the original source of the personal information, information 
resellers generally direct individuals to the original sources to 
correct any errors. Several resellers stated that they would correct 
any identified errors introduced through their own processing and 
aggregation of data. 

While not providing specific assurance of the accuracy of the data they 
provide, information resellers reported that they take steps to ensure 
that their suppliers have data quality controls in place. For example, 
officials from one information reseller said they use a screening 
process to help determine whether they should use a particular 
supplier.[Footnote 43] As part of this process, the reseller assesses 
whether the supplier has internal controls in place that are in line 
with the reseller's policies. Information resellers also reported that 
they conduct annual audits of their suppliers aimed at assessing the 
integrity and quality of the information they receive. If these audits 
show that a supplier has failed to provide accurate, complete, and 
timely information, the reseller may discontinue using that supplier. 

Resellers also noted that data accuracy is contingent upon intended 
use. That is, data that may be perfectly adequate for one purpose may 
not be precise enough or appropriate for another purpose. While end 
users, such as federal agencies, may address data quality for their 
specific purposes, resellers--who maintain personal information for 
multiple purposes--are less able to achieve accuracy because they 
support multiple uses. Thus, resellers generally disclaim data accuracy 
and leave it to their customers to ensure that the data are accurate 
for their intended uses. One reseller stated that their customers 
understand the accuracy limitations of the data they obtain and take 
the potential for data inaccuracy into account when using the data. 

Information Resellers' Specification of the Purpose of Data Collection 
Consists of Broad Descriptions of Business Categories: 

According to the purpose specification principle, the purpose for the 
collection of personal information should be disclosed before 
collection and upon any change to that purpose, and its use should be 
limited to that purpose and compatible purposes. While information 
resellers specify purpose in a general way by describing the types of 
businesses that use their data, they generally do not designate 
specific intended uses for each of their data collections. Resellers 
generally obtain information that has already been collected for a 
specific purpose and make that information available to their 
customers, who in turn have a broader variety of purposes for using it. 
For example, personal information originally submitted by a customer to 
register a product warranty could be obtained by a reseller and 
subsequently made available to another business or government agency, 
which might use it for an unrelated purpose, such as identity 
verification, background checking, or marketing. 

In a general sense, information resellers specify their purpose by 
indicating (on company Web sites, for example) the business categories 
of the customers for whom they collect information. For example, 
reseller privacy policies generally state that resellers make personal 
information available for legitimate uses by business and government 
organizations. Examples of business categories may be provided, but 
resellers do not specify which types of information are to be used in 
which business categories. It is difficult for resellers to provide 
greater specificity because they make their data available to many 
customers for a wide range of legitimate purposes. As a result, the 
public is made aware only of the broad range of potential uses to which 
their personal information may be applied, rather than a specific use, 
as envisioned in the Fair Information Practices. 

Information Resellers Generally Limit the Use of Information as 
Required by Law, Rather Than on the Basis of Purposes Originally 
Specified When the Information Was Collected: 

Under the use limitation principle, personal information should not be 
disclosed or used for other than the originally specified purpose 
without consent of the individual or legal authority. However, because 
information reseller purposes are specified very broadly, it is 
difficult for resellers to ensure that use of the information in their 
databases is limited. As previously discussed, information reseller 
data may have many different uses, depending on the types of customers 
involved. Resellers do take steps to ensure that their customers' use 
of personal information is limited to legally sanctioned purposes. 
Information resellers pass this responsibility to their customers 
through licensing agreements and contract terms and agreements. 

According to two large information resellers, customers are generally 
contractually required to use data from resellers appropriately and 
must agree to comply with applicable laws, such as the Gramm-Leach- 
Bliley Act, the Fair Credit Reporting Act, and the Driver's Privacy 
Protection Act. For example, one information reseller uses a service 
agreement that includes provisions governing permissible use of 
information sought by the customer, the confidentiality of information 
provided, legal requirements under federal and state laws, and other 
customer obligations. The reseller reported that the company monitors 
its customers' compliance by conducting periodic audits and taking 
appropriate actions in response to any audit findings. 

In a standardized agreement form used by another reseller, federal 
agencies must certify that they will use information obtained from the 
reseller only as permissible under the Gramm-Leach-Bliley Act and the 
Driver's Privacy Protection Act. The service agreement identifies 
permissible purposes for information whose use is restricted by these 
laws and requires agencies to agree that they will use the information 
only in the performance or the furtherance of appropriate government 
activities. In conformance with the Gramm-Leach-Bliley Act permissible 
uses, the information reseller requires agencies to certify that they 
will use personal information "only as requested or authorized by the 
consumer." 

The information resellers used by the federal agencies we reviewed 
generally also reported taking steps to ensure that access to certain 
sensitive types of personally identifiable information is limited to 
certain customers and uses. For example, two resellers reported that 
they provide full Social Security numbers and driver's license numbers 
only to specific types of customers, including law enforcement agencies 
and insurance companies, and for purposes such as employment or tenant 
screening. While actions such as these are useful in protecting privacy 
and are consistent with the use limitation principle in that they 
narrow the range of potential uses for this type of information, they 
are not equivalent to limiting use only to a specific predefined 
purpose. Without limiting use to predefined purposes, resellers cannot 
provide individuals with assurance that their information will only be 
accessed and used for the purpose originally specified when the 
information was collected. 

Information Resellers Reported Taking Steps to Improve Security 
Safeguards: 

According to the security safeguards principle, personal information 
should be protected with reasonable safeguards against risks such as 
loss or unauthorized access, destruction, use, modification, or 
disclosure. While we did not evaluate the effectiveness of resellers' 
information security programs, resellers we spoke with said they employ 
various safeguards to protect consumers' personal information. They 
implemented these safeguards in part for business reasons but also 
because federal laws require such protections. Resellers describe these 
safeguards in various policy statements, such as online and data 
privacy policies or privacy statements posted on Internet sites. 
Resellers also generally had information security plans describing, 
among other things, access controls for information and systems, 
document management practices, incident reporting, and premises 
security. 

Given recent incidents, large information resellers reported having 
recently taken steps to improve their safeguards against unauthorized 
access. In a well-publicized incident, in February 2005, ChoicePoint 
disclosed that unauthorized individuals had gained access to personal 
information by posing as a firm of private investigators. In the 
following month, LexisNexis disclosed that unauthorized individuals had 
gained access to personal information through the misappropriation of 
user IDs and passwords from legitimate customers. These disclosures 
were required by state law, as previously discussed. In January 2006, 
ChoicePoint reached a settlement with the Federal Trade 
Commission[Footnote 44] over charges that the company did not have 
reasonable procedures to verify the identity of prospective new users. 
The company agreed to implement new procedures to ensure that it 
provides consumer reports only to legitimate business for lawful 
purposes. In the mean time, both information resellers reported that 
they had taken steps to improve their procedures for authorizing 
customers to have access to sensitive information, such as Social 
Security numbers. For example, one reseller established a credentialing 
task force with the goal of centralizing its customer credentialing 
process. In order for customers of this reseller to obtain products and 
services containing sensitive personal information, they must now 
undergo a credentialing process involving a site visit by the 
information reseller to verify the accuracy of information reported 
about the business. Applicants are then scored against a credentialing 
checklist to determine whether they will be granted access to sensitive 
information. In addition, both resellers reported efforts to strengthen 
user ID and password protections and restrict access to sensitive 
personal information (including full driver's license numbers and 
Social Security numbers) to a limited number of customers, such as law 
enforcement agencies (others would be able to view masked information). 
Although we did not test the effectiveness of these measures, if 
implemented correctly, they could help provide assurance that sensitive 
information is protected appropriately. 

In addition to enhancing safeguards on customer access authorizations, 
resellers have instituted a variety of other security controls. For 
example, three large information resellers have implemented physical 
safeguards at their data centers, such as continuous monitoring of 
employees entering and exiting facilities, monitoring of activity on 
customer accounts, and strong authentication of users entering and 
exiting secure areas within the data centers. Officials at one reseller 
told us that security profiles were established for each employee that 
restrict access to various sections of the center based upon employee 
job functions. Computer rooms were further protected with a combined 
system of biometric hand readers and security codes. Security cameras 
were placed throughout the facility for continuous recording of 
activity and review by security staff. Information resellers also had 
contingency plans in place to continue or resume operations in the 
event of an emergency. 

Information resellers reported that on an annual basis, or more 
frequently if needed, they conduct security risk assessments as well as 
internal and external security audits. These assessments address such 
topics as vulnerabilities to internal or external security threats, 
reporting and responding to security incidents, controls for network 
and physical facilities, and business continuity management. The 
assessments also addressed strategies for mitigating potential or 
identified risks. 

If properly implemented, security measures such as those reported by 
information resellers could contribute to effective implementation of 
the security safeguards principle. 

Information Resellers Generally Informed the Public about Their Privacy 
Policies and Practices: 

According to the openness principle, the public should be informed 
about an organization's privacy policies and practices, and individuals 
should have ready means of learning about the organization's use of 
personal information. 

To address openness, information resellers took steps to inform the 
public about key aspects of their privacy policies. They used means 
such as company Web sites and brochures to inform the public of 
specific policies and practices regarding the collection and use of 
personal information. Reseller Web sites also generally provided 
information about the types of information products the resellers 
offered--including product samples--as well as general descriptions 
about the types of customers served. Several Web sites also provided 
advice to consumers on protecting personal information and discussed 
what to do if individuals suspect they are victims of identity theft. 

Providing public notice of privacy policies informs individuals of what 
steps an organization takes to protect the privacy of the personal 
information it collects and helps to ensure the organization's 
accountability for its stated policies. 

Information Reseller Policies Generally Allow Individuals Limited 
Ability to Access and Correct Their Personal Information: 

According to the individual participation principle, individuals should 
have the right to know about the collection of personal information, to 
access that information, to request correction, and to challenge the 
denial of those rights. Information resellers generally allow 
individuals access to their personal information. However, this access 
is limited, as is the opportunity to make corrections. Resellers may 
provide an individual a report containing certain types of information-
-such as compilations of public records information--however, the 
report may not include all information maintained by the resellers 
about that individual. For example, one information reseller stated 
that it offers a free report, under certain circumstances, on an 
individual's claims history, employment history, or tenant history. 
Resellers may offer basic reports to individuals at no cost, but they 
generally charge for reports on additional information. A free consumer 
report, such as an employment history report, for example, typically 
excludes information such as driver's license data, family information, 
and credit header data that a reseller may possess in other databases. 

Although individuals can access information about themselves, if they 
find inaccuracies, they generally cannot have these corrected by the 
resellers.[Footnote 45] Information resellers direct individuals to 
take their cases to the original data sources--such as courthouses or 
other local government agencies--and attempt to have the inaccuracy 
corrected there. Several resellers stated that they would correct any 
identified errors introduced through their own processing and 
aggregation of data. As discussed above, resellers, as a matter of 
policy, do not make corrections to data obtained from other sources, 
even if the consumer provides evidence that the data are wrong. 

According to resellers, making corrections to their own databases is 
extremely difficult, for several reasons. First, the services these 
resellers provide concentrate on providing references to a particular 
individual from many sources, rather than distilling only the most 
accurate or current reference. For example, a reseller might have many 
instances in its databases of a particular individual's current 
address. Although most might be the same, there could be errors as 
well. Resellers generally would report the information as they have it 
rather than attempting to determine which entry is correct. This 
information is important to customers such as law enforcement agencies. 
Further, resellers stated that making corrections to their databases 
could be ineffective because the data are continually refreshed with 
updated data from the source, and thus any correction is likely to be 
changed back to its original state the next time the data are updated. 
In addition, as discussed in the collection limitation section, 
resellers stated their belief that it would not be appropriate to allow 
the public to access and correct information held for certain purposes, 
such as fraud detection and locating criminals, since providing such 
rights could undermine the effectiveness of these uses (e.g., by 
allowing criminals to access and change their information). However, as 
a result of these practices, individuals cannot know the full extent of 
personal information maintained by resellers or ensure its accuracy. 

Information Resellers Report Measures to Ensure Accountability for the 
Collection and Use of Personal Information: 

According to the accountability principle, individuals controlling the 
collection or use of personal information should be accountable for 
taking steps to ensure the implementation of the Fair Information 
Practices. Although information resellers' overall application of the 
Fair Information Practices varied, each reseller we spoke with reported 
actions to ensure compliance with its own privacy policies. For 
example, resellers reported designating chief privacy officers to 
monitor compliance with internal privacy policies and applicable laws 
(e.g., the Gramm-Leach-Bliley Act and the Driver's Privacy Protection 
Act). Information resellers reported that these officials had a range 
of responsibilities aimed at ensuring accountability for privacy 
policies, such as establishing consumer access and customer 
credentialing procedures, monitoring compliance with federal and state 
laws, and evaluating new sources of data (e.g., cell phone records). 

Auditing of an organization's practices is one way of ensuring 
accountability for adhering to privacy policies and procedures. 
Although there are no industrywide standards requiring resellers to 
conduct periodic audits of their compliance with privacy policies, one 
information reseller reported using a third party to conduct privacy 
audits on an annual basis. Using a third party to audit compliance with 
privacy policies further helps to ensure that an information reseller 
is accountable for the implementation of its privacy practices. 

Establishing accountability is critical to the protection of privacy. 
Actions taken by data resellers should help ensure that their privacy 
policies are appropriately implemented. 

Agencies Lack Policies on Use of Reseller Data, and Practices Do Not 
Consistently Reflect the Fair Information Practices: 

Agency practices for handling personal information acquired from 
information resellers did not always fully reflect the Fair Information 
Practices. Further, agencies generally lacked policies that 
specifically address their use of personal information from commercial 
sources, although DHS Privacy Office officials reported that they were 
drafting such a policy. As shown in table 8, four of the Fair 
Information Practices--the collection limitation, data quality, use 
limitation, and security safeguards principles--were generally 
reflected in agency practices. For example, several agency components 
(specifically, law enforcement agencies such as the FBI and the U.S. 
Secret Service) reported that in practice, they generally corroborate 
information obtained from resellers when it is used as part of an 
investigation. This practice is consistent with the data quality 
principle that data should be accurate, current, and complete. Agency 
policies and practices with regard to the other four principles, 
however, were uneven. Specifically, agencies did not always have 
policies or practices in place to address the purpose specification, 
openness, and individual participation principles with respect to 
reseller data. The inconsistencies in application of these principles 
as well as the lack of specific agency policies can be attributed in 
part to ambiguities in OMB guidance regarding the applicability of the 
Privacy Act to information obtained from resellers. Further, privacy 
impact assessments, which often are not conducted, are a valuable tool 
that could address important aspects of the Fair Information Practices. 
Finally, components within each of the four agencies did not 
consistently hold staff accountable by monitoring usage of personal 
information from information resellers and ensuring that it was 
appropriate; thus, their application of the accountability principle 
was uneven. 

Table 8: Application of Fair Information Practices to the Reported 
Handling of Personal Information from Data Resellers at Four Agencies: 

Principle: Collection limitation. The collection of personal 
information should be limited, should be obtained by lawful and fair 
means, and, where appropriate, with the knowledge or consent of the 
individual; 
Agency application of principle: General; 
Agency practices: Agencies limited personal data collection to 
individuals under investigation or their associates. 

Principle: Data quality. Personal information should be relevant to the 
purpose for which it is collected, and should be accurate, complete, 
and current as needed for that purpose; 
Agency application of principle: General; 
Agency practices: Agencies corroborated information from resellers and 
did not take actions based exclusively on such information. 

Principle: Purpose specification. The purpose for the collection of 
personal information should be disclosed before collection and upon any 
change to that purpose, and its use should be limited to that purpose 
and compatible purposes; 
Agency application of principle: Uneven; 
Agency practices: Agency system of records notices did not generally 
reveal that agency systems could incorporate information from data 
resellers. Agencies also generally did not conduct privacy impact 
assessments for their systems or programs that involve use of reseller 
data. 

Principle: Use limitation. Personal information should not be disclosed 
or otherwise used for other than a specified purpose without consent of 
the individual or legal authority; 
Agency application of principle: General; 
Agency practices: Agencies generally limited their use of personal 
information to specific investigations (including law enforcement, 
counterterrorism, fraud detection, and debt collection). 

Principle: Security safeguards. Personal information should be 
protected with reasonable security safeguards against risks such as 
loss or unauthorized access, destruction, use, modification, or 
disclosure; 
Agency application of principle: General; 
Agency practices: Agencies had security safeguards such as requiring 
passwords to access databases, basing access rights on need to know, 
and logging search activities (including "cloaked logging," which 
prevents the vendor from monitoring search content). 

Principle: Openness. The public should be informed about privacy 
policies and practices, and individuals should have ready means of 
learning about the use of personal information; 
Agency application of principle: Uneven; 
Agency practices: See Purpose specification above. Agencies did not 
have established policies specifically addressing the use of personal 
information obtained from resellers. 

Principle: Individual participation. Individuals should have the 
following rights: to know about the collection of personal information, 
to access that information, to request correction, and to challenge the 
denial of those rights; 
Agency application of principle: Uneven; 
Agency practices: See Purpose specification above. Because agencies 
generally did not disclose their collections of personal information 
from resellers, individuals were often unable to exercise these rights. 

Principle: Accountability. Individuals controlling the collection or 
use of personal information should be accountable for taking steps to 
ensure the implementation of these principles; 
Agency application of principle: Uneven; 
Agency practices: Agencies do not generally monitor usage of personal 
information from information resellers to hold users accountable for 
appropriate use; instead, they rely on users to be responsible for 
their behavior. For example, agencies may instruct users in their 
responsibilities to use personal information appropriately, have them 
sign statements of responsibility, and have them indicate what 
permissible purpose a given search fulfills. 

Legend: 

General = policies or procedures to address all major aspects of a 
particular principle. 

Uneven = policies or procedures addressed some but not all aspects of a 
particular principle or some but not all agencies and components had 
policies or practices in place addressing the principle. 

Source: GAO analysis of agency-supplied data. 

Note: We did not independently assess the effectiveness of agency 
information security programs. Our assessment of overall agency 
application of the Fair Information Practices was based on the policies 
and management practices described by the Department State and SSA as a 
whole and by major components of Justice and DHS (footnote 2 in app. I 
lists these components). We did not obtain information on smaller 
components of Justice and DHS. 

[End of table] 

Agency Procedures Reflect the Collection Limitation, Data Quality, Use 
Limitation, and Security Safeguards Principles: 

The collection limitation principle establishes, among other things, 
that organizations should obtain only the minimum amount of personal 
data necessary to process a transaction. This principle also underlies 
the Privacy Act requirement that agencies maintain in their records 
"only such information about an individual as is relevant and necessary 
to accomplish a purpose of the agency."[Footnote 46] Regarding most law-
enforcement and counterterrorism purposes, which accounted for 90 
percent of usage in fiscal year 2005, agencies generally limited their 
personal data collection in that they reported obtaining information 
only on specific individuals under investigation or associates of those 
individuals.[Footnote 47] Having initiated investigations on specific 
individuals, however, agencies generally reported that they obtained as 
much personal information as possible about the individuals being 
investigated, because law enforcement investigations require pursuing 
as many investigative leads as possible. 

The data quality principle states that, among other things, personal 
information should be relevant to the purpose for which it is collected 
and be accurate. This principle is mirrored in the Privacy Act's 
requirement for agencies to maintain all records used to make 
determinations about an individual with sufficient accuracy, relevance, 
timeliness, and completeness as is reasonably necessary to ensure 
fairness.[Footnote 48] 

Agencies reported taking steps to mitigate the risk of inaccurate 
information reseller data by corroborating information obtained from 
resellers. Agency officials described the practice of corroborating 
information as a standard element of conducting investigations. 
Officials from several law enforcement component agencies, including 
ATF and DEA, said corroboration was necessary to build legally sound 
cases from investigations. For example, U.S. Secret Service officials 
reported that they instruct agents that the information obtained from 
resellers should be independently corroborated, and that none of it 
should be used as probable cause for obtaining warrants. 

Further, FBI officials from FTTTF noted that obtaining data from 
information resellers helps to improve the overall quality and accuracy 
of the data in investigative files. Officials stated that the variety 
of private companies providing personal information enhances the value, 
quality, and diversity of the information used by the FBI, noting that 
a decision to put an individual under arrest is based on "probable 
cause," which is determined by a preponderance of evidence, rather than 
any single source of information, such as information in a reseller's 
data base. 

Likewise, for non law-enforcement use, such as debt collection and 
fraud detection and prevention, agency components reported procedures 
for mitigating potential problems with the accuracy of data provided by 
resellers by obtaining additional information from other sources when 
necessary. For example, the Executive Office for U.S. Attorneys uses 
information resellers to obtain information on assets possessed by an 
individual indebted to the United States. According to officials, 
should information contained in the information reseller databases 
conflict with information provided by an individual, further 
investigation takes place before any action to collect debts would be 
taken. Likewise, officials from the U.S. Citizenship and Immigration 
Services (USCIS) component of DHS and the Office of Consular Affairs 
within the Department of State reported similar practices. While these 
practices do not eliminate inaccuracies in data coming into the agency, 
they help ensure the quality of the information that is the basis for 
agency actions. 

The use limitation principle provides that personal information should 
not be disclosed or used for other than a specified purpose without 
consent of the individual or legal authority. This principle underlies 
the Privacy Act requirement that prevents agencies from disclosing 
records on individuals except with consent of the individual, unless 
disclosure of the record would be, for example, to another agency for 
civil or criminal law enforcement activity or for a purpose that is 
compatible with the purpose for which the information was 
collected.[Footnote 49] 

Although agencies rely on resellers' multipurpose collection of 
information as a source, agency officials said their use of reseller 
information was limited to distinct purposes, which were generally 
related to law enforcement or counterterrorism. For example, the 
Department of Justice reported uses specific to the conduct of criminal 
investigations on individuals, terrorism investigations, and the 
location of assets and witnesses. Other Justice and DHS components, 
such as the Federal Protective Service, U.S. Secret Service, FBI, and 
ATF, also reported that they used information reseller data for 
investigations. For uses not related to law enforcement, such as those 
reported by State and SSA, use of reseller information was also 
described as supporting a specific purpose (e.g., fraud detection or 
debt collection). 

The use limitation principle also precludes agencies from sharing 
personal information they collect for purposes unrelated to the 
original intended use of the information. Officials of certain law 
enforcement components of these agencies reported that in certain cases 
they share information with other law enforcement agencies, a use 
consistent with the purposes originally specified by the agency. For 
example, the FBI's FTTTF supports ongoing investigations in other law 
enforcement agencies and the intelligence community by sharing 
information obtained from resellers (among other information) in 
response to requests about foreign terrorists from FBI agents or 
officials from partner agencies.[Footnote 50] 

The security safeguards principle requires that personal information be 
reasonably protected against unauthorized access, use, or disclosure. 
This principle also underlies the Privacy Act requirement that agencies 
establish appropriate administrative, technical, and physical 
safeguards to ensure the security and confidentiality of records on 
individuals.[Footnote 51] This principle is further mirrored in the 
FISMA requirement to protect information and information systems from 
unauthorized access, use, disclosure, disruption, modification, or 
destruction, including through controls for confidentiality. 

While we did not assess the effectiveness of information security or 
the implementation of FISMA at any of these agencies, we found that all 
four had measures in place intended to safeguard the security of 
personal information obtained from resellers.[Footnote 52] For example, 
all four agencies cited the use of passwords to prevent unauthorized 
access to information reseller databases. Further, agency components 
such as ATF, DEA, CBP, and USCIS, reported that they limit access to 
sensitive personal information (e.g., full Social Security number, 
driver's license number) to those with a specific need for this 
information. Several agency components also reported that resellers 
were promptly notified to deactivate accounts for employees separated 
from government service to protect against unauthorized use. As another 
security measure, several components, including DEA and the FBI, 
reported that resellers notified them when accounts were accessed from 
Internet addresses at unexpected locations, such as outside the United 
States. 

Another measure to prevent unauthorized disclosure reported by law 
enforcement agencies, such as the FBI, ICE, and Secret Service, is the 
use of "cloaked logging," which prevents vendor personnel from 
monitoring the queries being made by law enforcement agents. Officials 
in FBI's FTTTF reported that, in order to maintain the integrity of 
investigations, resellers are contractually prohibited from tracking or 
monitoring the exact persons or other entities being searched by FTTTF 
personnel. Law enforcement officials stated that the ability to mask 
searches from vendors is important so that those outside law 
enforcement have no knowledge of who is being investigated and so that 
subjects of an investigation are not "tipped off." 

Agency adherence to the collection limitation, data quality, use 
limitation, and security safeguards principles was based on general 
business procedures--including law-enforcement investigative practices--
that reflect security and civil liberties protections, rather than 
written policies specifically regarding the collection, accuracy, use, 
and security of personal information obtained from resellers. 
Implementation of these practices provides individuals with assurances 
that only a limited amount of their personal information is being 
collected, that it is used only for specific purposes, and that 
measures are in place to corroborate the accuracy of the information 
and safeguard it from improper disclosure. These controls help prevent 
potential harm to individuals and invasion of their privacy by limiting 
the exposure of their information and reducing the likelihood of 
inaccurate data being used to make decisions that could affect their 
welfare. 

Limitations in the Applicability of the Privacy Act and Ambiguities in 
OMB Guidance Contribute to an Uneven Adherence to the Purpose 
Specification, Openness, and Individual Participation Principles: 

The purpose specification, openness, and individual participation 
principles stipulate, among other things, that individuals should be 
made aware of the purpose and intended uses of the personal information 
being collected about them and have the ability to access and correct 
such information, if necessary. The Privacy Act reflects these 
principles in part by requiring agencies to publish in the Federal 
Register, "upon establishment or revision, a notice of the existence 
and character of a system of records." This notice is to include, among 
other things, the categories of records in the system as well as the 
categories of sources of records.[Footnote 53] 

In a number of cases, agencies did not adhere to the purpose 
specification or openness principles in regard to their use of reseller 
information in that they did not notify the public that they were using 
such information and did not specify the purpose for their data 
collections. Agency officials said that they generally did not prepare 
system-of-records notices that would address these principles because 
they were not required to do so by the Privacy Act. The act's vehicle 
for public notification--the system-of-records notice--becomes binding 
on an agency only when the agency collects, maintains, and retrieves 
personal data in the way defined by the act or when a contractor does 
the same thing explicitly on behalf of the government. Agencies 
generally did not issue system-of-records notices specifically for 
their use of information resellers largely because information reseller 
databases were not considered "systems of records operated by or on 
behalf of a government agency" and thus were not considered subject to 
the provisions of the Privacy Act.[Footnote 54] OMB guidance on 
implementing the Privacy Act does not specifically refer to the use of 
reseller data or how it should be treated. According to OMB and other 
agency officials, information resellers operate their databases for 
multiple customers, and federal agency use of these databases does not 
amount to the operation of a system of records on behalf of the 
government. Further, agency officials stated that merely querying 
information reseller databases did not amount to agency "maintenance" 
of the personal information being queried and thus also did not trigger 
the provisions of the Privacy Act. In many cases, agency officials 
considered their use of resellers to be of this type--essentially "ad 
hoc" querying or "pinging" of reseller databases for personal 
information about specific individuals, which they believed they were 
not doing in connection with a formal system of records. 

In other cases, however, agencies maintained information reseller data 
in systems for which system-of-records notices had been previously 
published. For example, law enforcement agency officials stated that, 
to the extent they retain the results of reseller data queries, this 
collection and use is covered by the system of records notices for 
their case file systems. However, in preparing such notices, agencies 
generally did not specify that they were obtaining information from 
resellers. Among system of records notices that were identified by 
agency officials as applying to the use of reseller data, only one-- 
TSA's system of records notice for the test phase of its Secure Flight 
program--specifically identified the use of information reseller 
data.[Footnote 55] Other programs that involve use of information 
reseller data include the fraud prevention and detection programs 
reported by SSA and State as well as law enforcement programs within 
ATF, the U.S. Marshals, and USCIS. For these programs, associated 
system of records notices identified by officials did not specify the 
use of information reseller data. 

In several of these cases, agency sources for personal information were 
described only in vague terms, such as "private organizations," "other 
public sources," or "public source material," when information was 
being obtained from information resellers.[Footnote 56] In one case, a 
notice indicated incorrectly that personal information was collected 
only from the individuals concerned. Specifically, USCIS prepared a 
system of records notice covering the Computer Linked Application 
Information Management System, which did not identify information 
resellers as a source. Instead, the notice stated only that 
"information contained in the system of records is obtained from 
individuals covered by the system."[Footnote 57] 

The inconsistency with which agencies specify resellers as a source of 
information in system-of-records notices is in part due to ambiguity in 
OMB guidance, which states that "for systems of records which contain 
information obtained from sources other than the individual to whom the 
records pertain, the notice should list the types of sources used." 
Although the guidance is unclear what would constitute adequate 
disclosure of "types of sources," OMB and DHS Privacy Office officials 
agreed that to the extent that reseller data are subject to the Privacy 
Act, agencies should specifically identify information resellers as a 
source and that merely citing public records information does not 
sufficiently describe the source. 

The individual participation principle gives individuals the right to 
access and correct information that is maintained about them. However, 
under the Privacy Act, agencies can claim exemptions from the 
requirement to provide individual access and the ability to make 
corrections if the systems are for law enforcement purposes.[Footnote 
58] In most cases where officials identified system-of-record notices 
associated with reseller data collection for law enforcement purposes, 
agencies claimed this exemption. Like the ability to mask database 
searches from vendors, this provision is important so that the subjects 
of law enforcement investigations are not tipped off. 

Aside from the law enforcement exemptions to the Privacy Act, adherence 
to the purpose specification and openness principles is critical to 
preserving a measure of individual control over the use of personal 
information. Without clear guidance from OMB or specific policies in 
place, agencies have not consistently reflected these principles in 
their collection and use of reseller information. As a result, without 
being notified of the existence of an agency's information collection 
activities, individuals have no ability to know that their personal 
information could be obtained from commercial sources and potentially 
used as a basis, or partial basis, for taking action that could have 
consequences for their welfare. 

Privacy Impact Assessments Could Address Openness, and Purpose 
Specification Principles but Are Often Not Conducted: 

The PIA is an important tool for agencies to address privacy early in 
the process of developing new information systems, and to the extent 
that PIAs are made publicly available,[Footnote 59] they provide 
explanations to the public about such things as the information that 
will be collected, why it is being collected, how it is to be used, and 
how the system and data will be maintained and protected. In doing so, 
they serve to address the openness and purpose specification 
principles. 

However, only three agency components reported developing PIAs for 
their systems or programs that make use of information reseller 
data.[Footnote 60] As with system-of-records notices, agencies often 
did not conduct PIAs because officials did not believe they were 
required. 

Current OMB guidance on conducting PIAs is not always clear about when 
they should be conducted. According to guidance from OMB, a PIA is 
required by the E-Government Act when agencies "systematically 
incorporate into existing information systems databases of information 
in identifiable form purchased or obtained from commercial or public 
sources."[Footnote 61] However, the same guidance also instructs 
agencies that "merely querying a database on an ad-hoc basis does not 
trigger the PIA requirement." Reported uses of reseller data were 
generally not described as a "systematic" incorporation of data into 
existing information systems; rather, most involved querying a database 
and in some cases retaining the results of these queries. OMB officials 
stated that agencies would need to make their own judgments on whether 
retaining the results of searches of information reseller databases 
constituted a "systematic incorporation" of information. 

DHS has recently developed guidance requiring PIAs to be conducted 
whenever reseller data are involved. The DHS Privacy Office[Footnote 
62] guidance on conducting PIAs points out, for example, that a program 
decision to obtain information from a reseller would constitute a new 
source of information, requiring that a PIA be conducted. However, 
although the DHS guidance clearly states that PIAs are required when 
personally identifiable information is obtained from a commercial 
source, it also states that "merely querying such a source on an ad hoc 
basis using existing technology does not trigger the PIA 
requirement."[Footnote 63] Like OMB's guidance, the DHS guidance is not 
clear, because agency personnel are left to make individual 
determinations as to whether queries are "on an ad hoc basis." 

In one case, a DHS component prepared a PIA for a system that collects 
reseller data but had not identified in the assessment that resellers 
were being used. DHS's USCIS uses copies of court records obtained from 
an information reseller to support evidentiary requirements for 
official adjudication proceedings concerning fraud. Although this use 
was reported to be covered by the PIA for the office's Fraud Tracking 
System, the PIA identifies only "public records" as the source of its 
information and does not mention that the public records are obtained 
from information resellers.[Footnote 64] In contrast, the draft DHS 
guidance on PIAs instructs DHS component agencies to "list the 
individual, entity, or entities providing the specific information 
identified above. For example, is the information collected directly 
from the individual as part of an application for a benefit, or is it 
collected from another source such as a commercial data aggregator." At 
the time of our review, this draft guidance had not yet been 
disseminated to DHS components. Lacking such guidance, DHS components 
did not have policies in place regarding the conduct of PIAs with 
respect to reseller data, nor did other agencies we reviewed. 

Until PIAs are conducted more thoroughly and consistently, the public 
is likely to remain incompletely informed about agency purposes and 
uses for obtaining reseller information. 

Agencies Often Did Not Have Practices in Place to Ensure Accountability 
for Proper Handling of Information Reseller Data: 

According to the accountability principle (individuals controlling the 
collection or use of personal information should be accountable for 
taking steps to ensure the implementation of the Fair Information 
Practices), agencies should take steps to ensure that employee uses of 
personal information from information resellers are appropriate. While 
agencies described activities to oversee the use of information 
resellers, such activities were largely based on trust of the user to 
use the information appropriately. For example, in describing controls 
placed on the use of commercial data, officials from component agencies 
identified measures such as instructing users that reseller data are 
for official use only and requiring users to sign statements of 
responsibility attesting to a need to access the information reseller 
databases and that their use will be limited to official business. 
Additionally, agency officials reported that in accessing reseller 
databases, users are required to select from a list of vendor-defined 
"permissible purposes" (e.g., law enforcement, transactions authorized 
by the consumer) before conducting a search. While these practices 
appear consistent with the accountability principle, they are focused 
on individual user responsibility rather than management oversight. 

For example, agencies did not have practices in place to obtain reports 
from resellers that would allow them to monitor usage of reseller 
databases at a detailed level. Although agencies generally receive 
usage reports from the information resellers, these reports are 
designed primarily for monitoring costs. Further, these reports 
generally contained only high-level statistics on the number of 
searches and databases accessed, not the contents of what was actually 
searched, thus limiting their utility in monitoring usage. For example, 
one information reseller reported that it does not provide reports to 
agencies on the "permissible purpose" that a user selects before 
conducting a search. 

Not all component agencies lacked robust user monitoring. Specifically, 
according to FBI officials from the FTTTF, their network records and 
monitors searches conducted by the user account, including who is 
searched against what public source database. The system also tracks 
the date and time of the query as well as what the analyst does with 
the data. FBI officials stated that the vendor reports as well as the 
network monitoring provide FBI with the ability to detect unusual usage 
of the public source providers. 

To the extent that federal agencies do not implement methods such as 
user monitoring or auditing of usage records, they provide limited 
accountability for their usage of information reseller data and have 
limited assurance that the information is being used appropriately. 

Conclusions: 

Services provided by information resellers serve as important tools 
that can enhance federal agency functions, such as law enforcement and 
fraud protection and identification. Resellers have practices in place 
to protect privacy, but these practices are not fully consistent with 
the Fair Information Practices. Among other things, resellers collect 
large amounts of information about individuals without their knowledge 
or consent, do not ensure that the data they make available are 
accurate for a given purpose, and generally do not make corrections to 
the data when errors are identified by individuals. Information 
resellers believe that application of the relevant principles of the 
Fair Information Practices is inappropriate or impractical in these 
situations. Given that reseller data may be used for a variety of 
purposes, determining the appropriate degree of control or influence 
individuals should have over the way in which their personal 
information is obtained and used--as envisioned in the Fair Information 
Practices--is critical. To more fully embrace these principles could 
require resellers to change the way they conduct business, and 
currently resellers are not legally required to follow them. As 
Congress weighs various legislative options, adherence to the Fair 
Information Practices will be an important consideration in determining 
the appropriate balance between the services provided by information 
resellers to customers such as government agencies and the public's 
right to privacy. 

Agencies take steps to adhere to Fair Information Practices such as the 
collection limitation, data quality, use limitation, and security 
safeguards principles. However, they have not taken all the steps they 
could to reflect others--or to comply with specific Privacy Act and e- 
Government Act requirements--in their handling of reseller data. 
Specifically, agencies did not always have policies or practices in 
place to address the purpose specification, individual participation, 
openness, and accountability principles with respect to reseller data. 
An important factor contributing to this is that OMB privacy guidance 
does not clearly address information reseller data, which has become 
such a valuable and useful tool for agencies. As a result, agencies are 
left largely on their own to determine how to satisfy legal 
requirements and protect privacy when acquiring and using reseller 
data. Without current and specific guidance, the government risks 
continued uneven adherence to important, well-established privacy 
principles and lacks assurance that the privacy rights of individuals 
are adequately protected. 

Matter for Congressional Consideration: 

In considering legislation to address privacy concerns related to the 
information reseller industry, Congress should consider the extent to 
which the industry should adhere to the Fair Information Practices. 

Recommendations for Executive Action: 

To improve accountability, ensure adequate public notice of agencies' 
use of personal information from commercial sources, and allay 
potential privacy concerns arising from agency use of information from 
such sources, we are making three recommendations to the Director of 
OMB and the heads of the four agencies. Specifically, we recommend 
that: 

* the Director of OMB revise guidance on system of records notices and 
privacy impact assessments to clarify the applicability of the 
governing laws (the Privacy Act and the E-Government Act) to the use of 
personal information from resellers. These clarifications should 
specify the circumstances under which agencies should make disclosures 
about their uses of reseller data so that agencies can properly notify 
the public (for example, what constitutes a "systematic" incorporation 
of reseller data into a federal system). The guidance should include 
practical scenarios based on uses agencies are making of personal 
information from information resellers (for example, visa, criminal, 
and fraud investigations). 

* the Director of OMB direct agencies to review their uses of personal 
information from information resellers, as well as any associated 
system of records notices and privacy impact assessments, to ensure 
that such notices and assessments explicitly reference agency use of 
information resellers. 

* the Attorney General, the Secretary of Homeland Security, the 
Secretary of State, and the Commissioner of SSA develop specific 
policies for the collection, maintenance, and use of personal 
information obtained from resellers that reflect the Fair Information 
Practices, including oversight mechanisms such as the maintenance and 
review of audit logs detailing queries of information reseller 
databases--to improve accountability for agency use of such 
information. 

Agency Comments and Our Evaluation: 

We received written comments on a draft of this report from the 
Justice's Assistant Attorney General for Administration (reproduced in 
appendix III), from the Director of the DHS Departmental GAO/OIG 
Liaison Office (reproduced in appendix IV), from the Commissioner of 
SSA (reproduced in appendix V), and from State's Assistant Secretary 
and Chief Financial Officer (reproduced in appendix VI). We also 
received comments via E -mail from staff of OMB's Office of Information 
and Regulatory Affairs. Justice, DHS, SSA, and OMB all generally agreed 
with the report and described actions initiated to address our 
recommendations. Justice and SSA also provided technical comments, 
which has been incorporated in the final report as appropriate. 

In its comments, Justice agreed that revised or additional guidance and 
policy could be created to address unique issues presented by use of 
personal information obtained from resellers. However, noting that the 
Privacy Act allows law enforcement agencies to exempt certain records 
from provisions of the law that reflect aspects of the Fair Information 
Practices, Justice recommended that prior to issuance of any new or 
revised policy, careful consideration be given to the balance struck in 
the Privacy Act on applying the Fair Information Practices to law 
enforcement data. We recognize that law enforcement purposes are 
afforded the opportunity for exemptions from some of the provisions of 
the Privacy Act. The report acknowledges this fact. We also agree and 
acknowledge in the report that the Fair Information Practices serve as 
a framework of principles for balancing the need for privacy with other 
public policy interests, such as national security and law enforcement. 

DHS also agreed on the importance of guidance to federal agencies on 
the use of reseller information and stated that it is working 
diligently on finalizing a DHS policy for such use. The agency 
commented that its Privacy Office has been reviewing the use and 
appropriate privacy protections for reseller data, including conducting 
a 2-day public workshop on the subject in September 2005. DHS also 
noted that it had just issued departmentwide guidance on the conduct of 
privacy impact assessments in March 2006, which include directions 
relevant to the collection and use of commercial data. We have made 
changes to the final report to reflect the recent issuance of the DHS 
guidance. 

SSA noted in its comments that it had established internal controls, 
including audit trails of systems usage, to ensure that information is 
not improperly disclosed. SSA also stated that it would amend relevant 
system-of-record notices to reflect use of information resellers and 
would explore options for enhancing its policies and internal controls 
over information obtained from resellers. 

State interpreted our draft report to "rest on the premise that records 
from 'information resellers' should be accorded special treatment when 
compared with sensitive information from other sources." State 
indicated that it does not distinguish between types of information or 
sources of information in complying with privacy laws. However, our 
report does not suggest that data from resellers should receive special 
treatment. Instead, our report takes the widely accepted Fair 
Information Practices as a universal benchmark of privacy protections 
and assesses agency practices in comparison with them. State also 
interpreted our draft report to state that fraud detection, as a 
purpose for collecting personal information, is not related to law 
enforcement. However, the draft does not make such a claim. We have 
categorized agency uses of personal information based on descriptions 
provided by agencies and have categorized fraud detection uses 
separately from law enforcement to provide insight into different types 
of uses. We do not claim the two uses are unrelated. Finally, the 
department stated that in its view, it would be bad policy to require 
specification of sources such as data resellers in agency system of 
records notices. In contrast, we believe that adding clarity and 
specificity about sources is in the spirit of the purpose specification 
practice and note that DHS has recently issued guidance on privacy 
impact assessments that is consistent with this view. 

OMB stated that, based on a staff-level meeting of agency privacy 
experts, it believes agencies recognize that when personal data are 
brought into their systems, this fact must be reflected in their 
privacy impact assessments and system-of-record notices. We do not find 
this observation inconsistent with our findings. We found, however, 
that inconsistencies occurred in agencies' determinations of when or 
whether reseller information was actually brought into their systems, 
as opposed to being merely "accessed" on an ad-hoc basis. We believe 
clarification of this issue is important. OMB further stated that 
agencies have procedures in place to verify commercial data before they 
are used in decisions involving the granting or recoupment of benefits 
or entitlements. Again, this is not inconsistent with the results of 
our review. Finally OMB stated that it would discuss its guidance with 
agency senior officials for privacy to determine whether additional 
guidance concerning reseller data is needed. 

Comments from Information Resellers: 

We also obtained comments on excerpts of our draft report from the five 
information resellers we reviewed. General comments made by resellers 
and our evaluation are summarized below: 

* Several resellers raised concerns about our reliance on the OECD 
version of the Fair Information Practices as a framework for assessing 
their privacy policies and business practices. They suggested that it 
would be unreasonable to require them to comply with aspects of the 
Fair Information Practices that they believe were intended for other 
types of users of personal information, such as organizations that 
collect information directly from consumers. Further, they commented 
that our draft summary appeared to treat strict adherence to all of the 
Fair Information Practices as if it were a legally binding requirement. 
In several cases, they suggested that it would be more appropriate for 
us to use the privacy framework developed by the Asia-Pacific Economic 
Cooperation (APEC) organization in 2004, because the APEC framework is 
more recent and because it explicitly states that it has limited 
applicability to publicly available information. 

* As discussed in our report, the OECD version of the Fair Information 
Practices is widely used and cited within the federal government as 
well as internationally. In addition, the APEC privacy framework, which 
was developed as a tool for encouraging the development of privacy 
protection in the Asia Pacific region, acknowledges that the OECD 
guidelines are still relevant and "in many ways represent the 
international consensus on what constitutes honest and trustworthy 
treatment of personal information."[Footnote 65] Further, our use of 
the OECD guidelines is as an analytical framework for identifying 
potential privacy issues for further consideration by Congress--not as 
legalistic compliance criteria. The report states that the Fair 
Information Practices are not precise legal requirements; rather they 
provide a framework of principles for balancing the needs for privacy 
against other public policy interests, such as national security, law 
enforcement, and administrative efficiency. In conducting our analysis, 
we noted that the nature of the reseller business is largely at odds 
with the principles of collection limitation, data quality, purpose 
specification, and use limitation. We also noted that resellers are not 
currently required to follow the Fair Information Practices and that 
for resellers to more fully embrace them could require that they change 
the way they do business. We recognize that it is important to achieve 
an appropriate balance between the benefits of resellers' services and 
the public's right to privacy and point out that, as Congress weighs 
various legislative options, it will be critical to determine an 
appropriate balance. We have made changes in this report to clarify 
that we did not attempt to make determinations of whether or how 
information reseller practices should change and that such 
determinations are a matter of policy based on balancing the public's 
right to privacy with the value of reseller services. 

* Several information resellers stated that the draft did not take into 
account that public record information is freely available. For 
example, one reseller stated that public records should be understood 
by consumers to be open to all for any use not prohibited by state or 
federal law. Another stated that information resellers merely 
effectuate the determination made by governmental entities that public 
records should be open to all. 

However, the views expressed by the resellers do not take into account 
several important factors. First, resellers collect information for 
their products from a variety of sources, including information 
provided by consumers to businesses. Resellers products are not based 
exclusively on public records. Thus a consideration of protections for 
public record information does not take the place of a full assessment 
of the information reseller business. Second, resellers do not merely 
pass on public record information as they find it; they aggregate 
information from many different sources to create new information 
products, and they make the information much more readily available 
than it would be if it remained only in paper records on deposit in 
government facilities. The aggregation and increased accessibility 
provided by resellers raises privacy concerns that may not apply to the 
original paper-based public records. Finally, it is not clear that 
individuals give up all privacy rights to personal information 
contained in public records. The Supreme Court has expressed the 
opinion in the past that individuals retain a privacy interest in 
publicly released personal information. We therefore believe it is 
important to assess the status of privacy protections for all personal 
information being offered commercially to the government so that 
informed policy decisions may be made about the appropriate balance 
between resellers' services and the public's right to privacy. 

* Several resellers also noted that the draft report did not address 
the complexity of the reseller business--the extent to which resellers' 
businesses vary among themselves and overlap with consumer reporting 
agencies. We have added text addressing this in the final report. 

The resellers also provided technical comments, which were incorporated 
in the final report as appropriate. 

We are sending copies of this report to the Attorney General, the 
Secretary of Homeland Security, the Secretary of State, the 
Commissioner of the Social Security Administration, the Director of the 
Office of Management and Budget, and other interested congressional 
committees. Copies will be made available to others on request. In 
addition, this report will be available at no charge on our Web site at 
[Hyperlink, http://www.gao.gov]. 

If you have any questions concerning this report, please call me at 
(202) 512-6240 or send E-mail to [Hyperlink, koontzl@gao.gov]. Contact 
points for our Offices of Congressional Relations and Public Affairs 
may be found on the last page of this report. Major contributors to 
this report are John de Ferrari, Assistant Director; Mathew Bader; 
Barbara Collier; Pamlutricia Greenleaf; David Plocher; and Jamie 
Pressman. 

Signed by: 

Linda D. Koontz: 
Director, Information Management Issues: 

List of Requesters: 

The Honorable F. James Sensenbrenner, Jr.: 
Chairman: 
The Honorable John Conyers, Jr.: 
Ranking Minority Member: 
Committee on the Judiciary: 
House of Representatives: 

The Honorable Steve Chabot: 
Chairman: 
The Honorable Jerrold Nadler: 
Ranking Minority Member: 
Subcommittee on the Constitution: 
Committee on the Judiciary: 
House of Representatives: 

The Honorable Bill Nelson: 
Ranking Minority Member: 
Subcommittee on International Operations and Terrorism, 
Committee on Foreign Relations: 
United States Senate: 

The Honorable Bennie G. Thompson: 
Ranking Minority Member: 
Committee on Homeland Security: 
House of Representatives: 

The Honorable Zoe Lofgren: 
Ranking Minority Member: 
Subcommittee on Intelligence, Information Sharing, and Terrorism Risk 
Assessment: 
Committee on Homeland Security: 
House of Representatives: 

The Honorable Loretta Sanchez: 
Ranking Minority Member: 
Subcommittee on Economic Security, Infrastructure Protection, and 
Cybersecurity: 
Committee on Homeland Security: 
House of Representatives: 

[End of section] 

Appendixes: 

Appendix I: Objectives, Scope, and Methodology: 

Our objectives were to determine the following: 

* how the Departments of Justice, Homeland Security, and State and the 
Social Security Administration are making use of personal information 
obtained through contracts with information resellers; 

* the extent to which the information resellers providing personal 
information to these agencies have policies and practices in place that 
reflect widely accepted principles for protecting the privacy and 
security of personal information; and: 

* the extent to which these agencies have policies and practices in 
place for handling information reseller data that reflect widely 
accepted principles for protecting the privacy and security of personal 
information. 

To address our objectives, we identified and reviewed applicable laws 
such as the Privacy Act of 1974 and the E-Government Act, agency 
policies and practices, and the widely accepted privacy principles 
embodied in the Organization for Economic Cooperation and Development 
(OECD) version of the Fair Information Practices. Working with liaisons 
at the four federal agencies we were requested to review, we identified 
officials responsible for the acquisition and use of personal 
information from information resellers. Through these officials, we 
obtained applicable contractual documentation such as statements of 
work, task orders, blanket purchase agreements, purchase orders, 
interagency agreements, and contract terms and conditions. 

To address our first objective, we obtained and reviewed contract 
vehicles covering federal agency use of information reseller services 
for fiscal year 2005. We also reviewed applicable General Services 
Administration (GSA) schedule and Library of Congress FEDLINK contracts 
with information resellers that agencies made use of by various means, 
including through issuance of blanket purchase agreements, task orders, 
purchase orders, or interagency agreements. We analyzed the contractual 
documentation provided to determine the nature, scope, and dollar 
amounts associated with these uses, as well as mechanisms for acquiring 
personal information. In an effort to identify all relevant instances 
of agency use of information resellers and related contractual 
documents, we developed a list of structured questions to address 
available contract documents, uses of personal information, and 
applicable agency guidance. We provided these questions to agency 
officials and held discussions with them to help ensure that they 
provided all relevant information on uses of personal information from 
information resellers. To further ensure that relevant contract 
vehicles were identified, we asked major information resellers about 
their business with the four agencies. We also interviewed officials 
from GSA and the Library of Congress to discuss the mechanisms 
available to federal agencies for acquiring personal information and to 
identify any additional uses of these mechanisms by the four agencies. 

To further address our first objective, we categorized agency use of 
information resellers into five categories: counterterrorism, debt 
collection, fraud detection/prevention, law enforcement, and other. 
These categorizations were based on the component and applicable 
program's mission, as well as the specific reported use of the 
contract. In identifying relevant uses of information resellers, we 
were unable to identify small purchases (e.g., purchases below $2,500), 
as agencies do not track this information centrally. In addition, to 
the extent practicable, we excluded uses that generally did not involve 
the use of personal information. For example, officials from several 
component agencies reported that their use of the LexisNexis and West 
services was primarily for legal research rather than for public 
records information. In other cases, reported amounts may reflect uses 
that do not involve personal information because agencies were unable 
to separate such uses from uses involving personal information. 

To address our second objective, we obtained and reviewed relevant 
private sector laws and guidance, such as the Gramm-Leach-Bliley Act, 
the Fair Credit Reporting Act, and the Fair Information Practices. We 
also identified major information resellers in agency contractual 
agreements for personal information and held interviews with officials 
from these companies, including Acxiom, ChoicePoint, Dun & 
Bradstreet,[Footnote 66] LexisNexis, and West, to discuss security, 
quality controls, and privacy policies. In addition, we conducted site 
visits at Acxiom, ChoicePoint, and LexisNexis, and obtained written 
responses to related questions from West. These five resellers 
accounted for approximately 95 percent of the dollar value of all 
reported contracts with resellers. To determine the extent that they 
reflect widely accepted Fair Information Practices, we reviewed and 
compared information reseller's privacy policies and procedures with 
these principles. In conducting our analysis, we identified the extent 
to which reseller practices were consistent with the key privacy 
principles of the Fair Information Practices. We also assessed the 
effect of any inconsistencies; however, we did not attempt to make 
determinations of whether or how information reseller practices should 
change. Such determinations are a matter of policy based on balancing 
the public's right to privacy with the value of services provided by 
resellers to customers such as government agencies. 

To address our third objective, we identified applicable guidelines and 
management controls regarding the acquisition, maintenance, and use of 
personal information from information resellers at each of the four 
agencies. We also interviewed agency officials, including acquisition 
and program staff, to further identify relevant policies and 
procedures. Our assessment of overall agency application of the Fair 
Information Practices was based on the policies and procedures of major 
components at each of the four agencies.[Footnote 67] We also conducted 
interviews at the four agencies with senior agency officials designated 
for privacy as well as officials of the Office of Management and Budget 
(OMB) to obtain their views on the applicability of federal privacy 
laws (including the Privacy Act of 1974 and the E-Government Act of 
2002) and related guidance on agency use of information resellers. In 
addition, we compared relevant policies and management practices with 
the Fair Information Practices. 

We assessed the overall application of the principles of the Fair 
Information Practices by agencies according to the following 
categories: 

1. General. We assessed the application as general if the agency had 
policies or procedures to address all major aspects of a particular 
principle. 

2. Uneven. We assessed the application as uneven if the agency had 
policies or procedures that addressed some but not all aspects of a 
particular principle or if some but not all components and agencies had 
policies or practices in place addressing the principle. 

We performed our work at the Departments of Homeland Security, Justice, 
and State in Washington, D.C; at the Social Security Administration in 
Baltimore, Maryland; Acxiom Corporation in Little Rock, Arkansas; 
ChoicePoint in Alpharetta, Georgia; Dun & Bradstreet in Washington, 
D.C; and LexisNexis in Washington, D.C., and Miamisburg, Ohio. Our work 
was conducted from May 2005 to March 2006 in accordance with generally 
accepted government auditing standards. 

[End of section] 

Appendix II: Federal Laws Affecting Information Resellers: 

Major laws that affect information resellers include the Gramm-Leach- 
Bliley Act, the Drivers Privacy Protection Act, the Health Insurance 
Portability and Accountability Act, the Fair Credit Reporting Act, and 
the Fair and Accurate Credit Transactions Act. Their major privacy 
related provisions are briefly summarized below. 

Gramm-Leach-Bliley Act: 

The Gramm-Leach-Bliley Act requires financial institutions (e.g., 
banks, insurance, and investment companies) to give consumers privacy 
notices that explain the institutions' information-sharing practices 
(P.L. 106-102 (1999), Title V, 15 U.S.C. 6801). In turn, consumers have 
the right to limit some, but not all, sharing of their nonpublic 
personal information. Financial institutions are permitted to disclose 
consumers' nonpublic personal information without offering them an opt- 
out right in a number of circumstances including the following: 

* to effect a transaction requested by the consumer in connection with 
a financial product or service requested by the consumer; maintaining 
or servicing the consumer's account with the financial institution or 
another entity as part of a private label credit card program or other 
extension of credit; or a securitization, secondary market sale, or 
similar transaction; 

* with the consent or at the direction of the consumer; 

* to protect the confidentiality or security of the consumer's records; 
to prevent fraud; for required institutional risk control or for 
resolving customer disputes or inquiries; to persons holding a legal or 
beneficial interest relating to the consumer; or to the consumer's 
fiduciary; 

* to provide information to insurance rate advisory organizations, 
guaranty funds or agencies, rating agencies, industry standards 
agencies, and the institution's attorneys, accountants, and auditors; 

* to the extent specifically permitted or required under other 
provisions of law and in accordance with the Right to Financial Privacy 
Act of 1978, to law enforcement agencies, self-regulatory 
organizations, or for an investigation on a matter related to public 
safety; 

* to a consumer reporting agency in accordance with the Fair Credit 
Reporting Act or from a consumer report reported by a consumer 
reporting agency; 

* in connection with a proposed or actual sale, merger, transfer, or 
exchange of all or a portion of a business if the disclosure concerns 
solely consumers of such business; and: 

* to comply with federal, state, or local laws; an investigation or 
subpoena; or to respond to judicial process or government regulatory 
authorities. 

Driver's Privacy Protection Act: 

The Driver's Privacy Protection Act generally prohibits the disclosure 
of personal information by state departments of motor vehicles. (P.L. 
103-322 (1994), 18 U.S.C. § 2721-2725). It also specifies a list of 
exceptions when personal information contained in a state motor vehicle 
record may be disclosed. These permissible uses include the following: 

* for use by any government agency in carrying out its functions; 

* for use in connection with matters of motor vehicle or driver safety 
and theft; motor vehicle emissions; motor vehicle product alterations, 
recalls, or advisories; motor vehicle market research activities; 

* for use in the normal course of business by a legitimate business, 
but only to verify the accuracy of personal information submitted by 
the individual to the business and, if such information is not correct, 
to obtain the correct information but only for purposes of preventing 
fraud by pursuing legal remedies against, or recovering on a debt or 
security interest against, the individual; 

* for use in connection with any civil, criminal, administrative, or 
arbitral proceeding in any federal, state, or local court or agency; 

* for use in research activities; 

* for use by any insurer or insurance support organization in 
connection with claims investigation activities; 

* for use in providing notice to the owners of towed or impounded 
vehicles; 

* for use by a licensed private investigative agency for any purpose 
permitted under the act; 

* for use by an employer or its agent or insurer to obtain information 
relating to the holder of a commercial driver's license; 

* for use in connection with the operation of private toll 
transportation facilities; 

* for any other use, if the state has obtained the express consent of 
the person to whom a request for personal information pertains; 

* for bulk distribution of surveys, marketing, or solicitations, if the 
state has obtained the express consent of the person to whom such 
personal information pertains; 

* for use by any requester, if the requester demonstrates that it has 
obtained the written consent of the individual to whom the information 
pertains; and: 

* for any other use specifically authorized under a state law, if such 
use is related to the operation of a motor vehicle or public safety. 

Health Insurance Portability and Accountability Act: 

The Health Insurance Portability and Accountability Act of 1996 (P.L. 
104-191) made a number of changes to laws relating to health insurance. 
It also directed the Department of Health and Human Services to issue 
regulations to protect the privacy and security of personally 
identifiable health information. The resulting privacy rule (45 C.F.R. 
Part 164) defines certain rights and obligations for covered entities 
(e.g., health plans and health care providers) and individuals, 
including the following: 

* giving individuals the right to be notified of privacy practices and 
to inspect, copy, request correction, and have an accounting of 
disclosures of health records, except for specified exceptions; 

* setting limits on the use of health information apart from treatment, 
payment, and health care operations (e.g., for marketing) without the 
individual's authorization; 

* permitting disclosure of health information without the individual's 
authorization for purposes of public health protection; health 
oversight; law enforcement; judicial and administrative proceedings; 
approved research activities; coroners, medical examiners, and funeral 
directors; workers' compensation programs, government abuse, neglect, 
and domestic violence authorities; organ transplant organizations; 
government agencies with specified functions, e.g., national security 
activities; and as required by law; 

* requiring that authorization forms contain specific types of 
information, such as a description of the health information to be used 
or disclosed, the purpose of the use or disclosure, and the identity of 
the recipient of the information; and: 

* requiring covered entities to take steps to limit the use or 
disclosure of health information to the minimum necessary to accomplish 
the intended purpose, unless authorized or under certain circumstances. 

Fair Credit Reporting Act: 

The Fair Credit Reporting Act (P.L. 91-508, 1970, 15 U.S.C. § 1681) 
governs the use of personal information by consumer reporting agencies, 
which are individuals or entities that regularly assemble or evaluate 
information about individuals for the purpose of furnishing consumer 
reports to third parties. The act defines a consumer report as any 
communication by a consumer reporting agency about an individual's 
credit worthiness, character, reputation, characteristics, or mode of 
living and permits its use only in the following situations: 

* as ordered by a court or federal grand jury subpoena; 

* as instructed by the consumer in writing; 

* for the extension of credit as a result of an application from a 
consumer or the review or collection of a consumer's account; 

* for employment purposes, including hiring and promotion decisions, 
where the consumer has given written permission; 

* for the underwriting of insurance as a result of an application from 
a consumer; 

* when there is a legitimate business need, in connection with a 
business transaction that is initiated by the consumer; 

* to review a consumer's account to determine whether the consumer 
continues to meet the terms of the account; 

* to determine a consumer's eligibility for a license or other benefit 
granted by a governmental instrumentality required by law to consider 
an applicant's financial responsibility or status; 

* for use by a potential investor or servicer or current insurer in a 
valuation or assessment of the credit or prepayment risks associated 
with an existing credit obligation; and: 

* for use by state and local officials in connection with the 
determination of child support payments, or modifications of 
enforcement thereof. 

The act generally limits the amount of time negative information can be 
included in a consumer report to no more than 7 years, or 10 years in 
the case of bankruptcies. Under the act, individuals have a right to 
access all information in their consumer reports; a right to know who 
obtained their report during the previous year or two, depending on the 
circumstances; and a right to dispute the accuracy of any information 
about them. 

Fair and Accurate Credit Transactions Act: 

The Fair and Accurate Credit Transactions Act (P.L. 108-159, 2003) 
amended the Fair Credit Reporting Act, extending provisions to improve 
the accuracy of personal information assembled by consumer reporting 
agencies and better provide for the fair use of and consumer access to 
personal information. The act's provisions include the following: 

* consumers may request a free annual credit report from nationwide 
consumer reporting agencies, to be made available no later than 15 days 
after the date on which the request is received; 

* persons furnishing information about individuals to consumer 
reporting agencies, and resellers of consumer reports, must have 
polices and procedures for investigating and correcting inaccurate 
information, 

* consumers are given the right to prohibit business affiliates of 
consumer reporting agencies from using information about them for 
certain marketing purposes; and: 

* consumer reporting agencies cannot include medical information in 
reports that will be used for employment, credit transactions, or 
insurance transactions unless the consumer consents to such 
disclosures. 

[End of section] 

Appendix III: Comments from the Department of Justice: 

U.S. Department of Justice: 
Washington, D.C. 20530: 

MAR 17 2006: 

Linda Koontz: 
Director, Information Management Issues: 
U.S. Government Accountability Office: 
441 G Street, NW: 
Washington, DC 20548: 

Dear Ms. Koontz: 

Thank you for the opportunity to review the final draft of the 
Government Accountability Office (GAO) report entitled Privacy: 
Opportunities Exist for Agencies and Information Resellers to More 
Fully Adhere to Key Principles (GAO-06-421/310228). The draft was 
reviewed by 16 components of the Department of Justice (DOJ) who had 
participated in this review. Earlier today, the DOJ provided you 
technical comments to be incorporated in the report as appropriate. 
This letter constitutes the formal comments of the DOJ, and I request 
that it be included in the final report. 

The DOJ is committed to protecting the privacy rights of individuals in 
the course of its counterterrorism and law enforcement mission. To 
spearhead this effort, the DOJ has recently appointed a Chief Privacy 
and Civil Liberties Officer (CPCLO) to oversee and administer the DOD's 
privacy functions. The DOJ is also establishing a departmental Privacy 
and Civil Liberties Board to assist the CPCLO in ensuring that the 
DOD's activities are carried out in a way that continues to fully 
protect the privacy and civil liberties of all Americans. 

As the GAO report points out, the recent security breaches involving 
information resellers have highlighted the public's concerns regarding 
personal data maintained by such resellers and led to the GAO's review 
of the use of personal information from information resellers by the 
DOJ, as well as the DOD's policies and practices for handling such 
information. The DOJ recognizes the unique issues presented by reseller 
information and agrees that additional measures could be taken 
regarding its use, in the form of revised or additional guidance and 
policy. At the same time, the DOJ also recognizes the need to consider 
agency resources, competing mission priorities, and the privacy 
protections that are already in place as a result of the DOD's 
compliance with the Privacy Act of 1974, 5 U.S.C. §552a. 

In recognition of the variety of government operations (such as law 
enforcement and intelligence), the Privacy Act incorporated some, but 
not all, of the Fair Information Practices. [NOTE 1] Law enforcement 
may use the regulatory process to exempt certain records from some of 
the requirements of the Privacy Act. For example, pursuant to 
regulations, criminal law enforcement records may be exempted from the 
Privacy Act's requirement that an agency make reasonable efforts to 
assure that a record is accurate, complete, timely, and relevant for 
agency purposes, prior to disseminating that record to someone other 
than an agency or pursuant to FOIA. Instead of focusing on satisfying 
the Fair Information Practices, the more appropriate metric should be 
whether an agency has met the requirements of the Privacy Act. 

Thus, the DOJ recommends that prior to the issuance of any new guidance 
or policy, a careful analysis and assessment of the degree of need for 
any new guidance should be conducted. That assessment should be used to 
ensure that the guidance is tailored in such a way as to avoid any 
negative impact on the DOD's resources and competing mission 
priorities. Further, any new guidance or policy should be crafted in 
such a way as to avoid any increase in litigation risk, and to fully 
recognize and take into account the balance that Congress has already 
struck in the Privacy Act in applying Fair Information Practices to law 
enforcement data. 

The DOJ stands willing to assist in the development of any new guidance 
or policy considered as a result of this effort. We look forward to 
working with OMB and other agencies toward a solution that strikes the 
proper balance between the furtherance of the DOD's mission and the 
protection of individuals' privacy. 

Again, we appreciate the opportunity to comment on this report. If you 
have any questions regarding our comments, please contact Richard 
Theis, Assistant Director, Audit Liaison Group, Management and Planning 
Staff. If you would like to discuss or receive a briefing, please 
contact me at (202) 514-3101. 

Sincerely, 

Signed by: 

Paul R. Corts: 
Assistant Attorney General for Administration: 

NOTE: 

[1] First proposed in 1973 by a U.S. governmental advisory committee 
and widely accepted as including: collection limitation, data quality, 
purpose specification, use limitation, security safeguards, openness, 
individual participation, and accountability. 

[End of section] 

Appendix IV: Comments from the Department of Homeland Security: 

U.S. Department of Homeland Security: 
Washington, DC 20528: 

March 17, 2006: 

Ms. Linda Koontz: 
Director, Information Management: 
Government Accountability Office: 
Washington, DC 20548: 

Dear Ms. Koontz: 

Re: Draft Report GAO-06-421, Privacy: Opportunities Exist for Agencies 
and Information Resellers to More Fully Adhere to Key Principles. 

Thank you for the opportunity to review the draft report. The 
Department of Homeland Security (DHS) and the Privacy Office commend 
the GAO for undertaking this important and informative review. 
Certainly guidance on the collection and use of commercial: 

data is important for federal agencies, such as DHS. Early on in the 
establishment of the DHS Privacy Office, the Department determined that 
one of the top three issues that needed to be addressed was the use of 
private sector information for homeland security purposes. It is an 
increasingly important issue, as the report notes. 

To that end, the Privacy Office at DHS began its review of commercial 
data use and appropriate privacy safeguards through internal DHS study 
and by doing outreach publicly and in cooperation with DHS offices and 
other federal and private sector partners. The Privacy Office hosted a 
two-day public workshop, September 8-9, 2005, on Privacy and 
Technology: Government Use of Commercial Data for Homeland Security. 
The agenda and full transcripts of the conference, including a review 
of the application of the Privacy Act and Fair Information Practice 
Principles, is posted at our website at www.dhs.gov/privacy and is 
available to the public and government agencies for review. Mention of 
this in the final GAO report could assist the dialogue and enable 
decision makers to review information and suggestions raised for 
appropriate use of commercial data and challenges experienced by 
federal agencies. 

The Department appreciates the thoughtful work of GAO in addressing 
current use and practices at DHS. We would like to report that in early 
March 2006, and since the last contact with GAO, updated Privacy Impact 
Assessment Guidance, which includes directions relevant to the 
collection and use of commercial data, has been published by the 
Privacy Office and distributed throughout the Department. It also is 
posted on both the Department's internal and external websites. Please 
see Privacy Impact Assessments, Official Guidance 2006, Privacy Office, 
U.S. Department of Homeland Security. We respectfully suggest the GAO 
report could be updated to reflect this. Prior to this, the Department 
did have guidance on Privacy Impact Assessments that had been 
distributed in draft form in July 2005, both internally in DHS and 
externally with all of our federal partners. The Department of Justice 
advised DHS of their intention to adopt the DHS published guidance of 
March 2006. 

The Department believes that our guidance, which includes questions 
that address the use of commercial data, is unique in the government in 
this regard. As a result, we believe the DHS Privacy Office should be 
given recognition in the GAO report for its efforts to encourage 
transparency regarding the use of commercial data. The Department 
continues to work diligently on finalizing a policy for DHS use of 
commercial data and expects to have that policy in circulation shortly. 
The Department will continue to address the need for transparency about 
the use of commercial data as part of the overall effort to reorganize 
and review legacy Privacy Act systems. 

We thank you again for the opportunity to review this most important 
report and provide comments. 

Sincerely, 

Signed by: 

Steven J. Pecinovsky: 
Director: 
Departmental GAO/OIG Liaison Office: 

[End of section] 

Appendix V: Comments from the Social Security Administration: 

SOCIAL SECURITY: 
The Commissioner: 

March 17,2006: 

Ms. Linda Koontz: 
Director, Information Management Issues: 
U.S. Government Accountability Office: 
Room 4-T-21: 
441 G Street, NW: 
Washington, D.C. 20548: 

Dear Ms. Koontz: 

Thank you for the opportunity to review the draft report, "Privacy: 
Opportunities Exist For Agencies and Information Resellers to More 
Fully Adhere to Key Principles" (GAO-06-421). Our comments are 
enclosed. 

If you have any questions, please have your staff contact Candace 
Skurnik, Director, Audit Management and Liaison Staff, at (410) 965- 
0374. 

Sincerely, 

Signed by: 

Jo Anne B. Barnhart: 

Enclosure: 

COMMENTS OF THE SOCIAL SECURITY ADMINISTRATION (SSA) ON THE GOVERNMENT 
ACCOUNTABILITY OFFICE'S (GAO) DRAFT REPORT, "PRIVACY: OPPORTUNITIES 
EXIST FOR AGENCIES AND INFORMATION RESELLERS TO MORE FULLY ADHERE TO 
KEY PRINCIPLES" (GAO-06-421): 

General Comments: 

Thank you for the opportunity to review and provide comments on this 
GAO draft report. We share GAO's concerns about the potential for 
security breaches involving information resellers and support GAO's 
suggestion for congressional consideration and recommendations for 
Executive Branch action in support of ensuring adherence to applicable 
laws and the Fair Information Practices relating to privacy protection. 

SSA is committed to protecting privacy with regard to information the 
Agency maintains, including information obtained from information 
resellers. We have established internal controls, including audit 
trails of any systems usage, to ensure that any information disclosed 
is for proper use. In order to identify any internal control weaknesses 
and potential problems that could result in waste, fraud and abuse, and 
to ensure compliance with the Federal Managers Financial Integrity Act 
of 1982, SSA components regularly perform Management Control Systems 
Reviews mandated by SSA and the Office of Management and Budget. 

GAO Recommendation: 

We recommend that the Attorney General, the Secretary of Homeland 
Security, the Secretary of State, and the Commissioner of SSA develop 
specific policies for the collection, maintenance, and use of personal 
information obtained from resellers that reflect the Fair Information 
Practices, including oversight mechanisms such as the maintenance and 
review of audit logs detailing queries of information reseller 
databases, to improve accountability for agency use of such 
information. 

SSA Comment: 

We agree. To better address the Fair Information Practices concerning 
information SSA obtains from information resellers, we will amend our 
relevant Privacy Act systems of records notices to reflect the use of 
information resellers/commercial data sources. 

We will also explore options for enhancing our policies and internal 
controls over information SSA obtains from information resellers, 
including options for improved audit trail maintenance and review. 

[End of section] 

Appendix VI: Comments from the Department of State: 

United States Department of State: 
Assistant Secretary and Chief Financial Officer: 
Washington, D.C. 20520: 

MAR 20 2006: 

Ms. Jacquelyn Williams-Bridgers: 
Managing Director: 
International Affairs and Trade: 
Government Accountability Office: 
441 G Street, N.W. 
Washington, D.C. 20548-0001: 

Dear Ms. Williams-Bridgers: 

We appreciate the opportunity to review your draft report, "PRIVACY: 
Opportunities Exist For Agencies and Information Resellers to More 
Fully Adhere to Key Principles," GAO Job Code 310732. 

The enclosed Department of State comments are provided for 
incorporation with this letter as an appendix to the final report. 

If you have any questions concerning this response, please contact 
Brian Egan, Legal Adviser, Bureau of Legal Affairs, at (202) 647-2227. 

Sincerely, 

Signed by: 

Bradford R. Higgins: 

cc: GAO - Jamie Pressman: 
CA & DS: 
State/OIG - Mark Duda: 

Department of State Comments on GAO Draft Report PRIVACY: Opportunities 
Exist For Agencies and Information Resellers to More Fully Adhere to 
Key Principles (GAO-06-421 GAO Code 310732): 

Thank you for giving us the opportunity to comment on GAO's draft 
report "Privacy: Opportunities Exist For Agencies and Information 
Resellers to More Fully Adhere to Key Principles." 

In general, GAO's report seems to rest on the premise that records from 
"information resellers" should be accorded special treatment when 
compared with sensitive information from other sources. We do not 
believe that this premise is inherently sound. The Department receives 
sensitive information from a variety of sources in order to ensure that 
visas and passports are issued only to those who are entitled to them, 
to conduct investigations as part of its diplomatic security mission, 
and in other contexts. The Department does not distinguish between 
types of information or sources of information in deciding whether to 
comply with privacy laws. All Department information is treated in 
accordance with applicable privacy laws, regardless of the source or 
type of information at issue. 

We also have a few specific technical comments. We request that GAO 
revise those sections of the report (e.g., at 58 and 62) which suggest 
that "fraud protection" in the passport and visa context is "not 
related to law enforcement." The Department is charged with 
investigating, making arrests, and working with other appropriate law 
enforcement agencies to detect and prosecute potential cases of visa 
and passport fraud. In the passport context, GAO recently stated that 
"[m]aintaining the integrity of the U.S. passport is essential to the 
State Department's effort to protect U.S. citizens from terrorists, 
criminals, and others," and that "Passport fraud is often intended to 
facilitate such crimes as illegal immigration, drug trafficking, and 
alien smuggling." See GAO, Improvements Needed to Strengthen U.S. 
Passport Fraud Detection Efforts (June 29, 2005) at 2. Fraud detection 
in the passport and visa context is clearly related to law enforcement, 
as well as to the vital task of providing homeland security. 

On a related note, we disagree with GAO's criticism (at 62-63) of the 
use of terms such as "public source material" to identify categories of 
sources of records in Privacy Act systems of records notices. To the 
extent that an agency's system of record notices properly identify 
"categories" of records, the notices are in compliance with the Privacy 
Act. See 5 U.S.C. § 552a(e)(4)(I). In our view, it would be bad policy 
to require separate and specific mention of information from individual 
sources such as data resellers, as this would imply that such 
information could not be considered when it was not specifically 
mentioned. Such a policy could result in critical information not being 
considered in a given case (in the case of the Department, for example, 
in adjudicating a visa or passport application), with consequent 
harmful effects on the United States national interest. The 
proliferation of such requirements for "specific mention" in systems of 
records notices would likely compound this problem, with the result 
that USG judgments would be less, not more, well-founded. 

[End of section] 

(310732): 

FOOTNOTES 

[1] For purposes of this report, the term personal information 
encompasses all information associated with an individual, including 
both identifying and nonidentifying information. Personally identifying 
information, which can be used to locate or identify an individual, 
includes such things as names, aliases, and agency-assigned case 
numbers. Nonidentifying personal information includes such things as 
age, education, finances, criminal history, physical attributes, and 
gender. 

[2] The Privacy Act of 1974, Pub. L. No. 93-579, 88 Stat. 1896 
(codified as amended at 5 U.S.C. § 552a) provides safeguards against an 
invasion of privacy through the misuse of records by federal agencies 
and allows citizens to learn how their personal information is 
collected, maintained, used, and disseminated by the federal 
government. 

[3] Congress used the committee's final report as a basis for crafting 
the Privacy Act of 1974. See Records, Computers and the Rights of 
Citizens: Report of the Secretary's Advisory Committee on Automated 
Personal Data Systems (Washington, D.C.: U.S. Department of Health, 
Education, and Welfare, July 1973). 

[4] Descriptions of these principles are shown in table 2. 

[5] The five information resellers we reviewed were ChoicePoint, 
LexisNexis, Acxiom, Dun & Bradstreet, and West. While these resellers 
were all reported by federal agencies to be sources of personal 
information, their businesses vary. A discussion of this variance in 
business practices appears in the background section of this report. 
Our results may not apply to other resellers who do very little or no 
business with these federal agencies. 

[6] ChoicePoint, LexisNexis, and Acxiom. 

[7] This figure may include uses that do not involve personal 
information. Except for instances where the reported use was primarily 
for legal research, agency officials were unable to separate the dollar 
values associated with use of personal information from uses for other 
purposes (e.g., LexisNexis and West provide news and legal research in 
addition to public records). 

[8] In certain circumstances, laws restrict the collection and use of 
specific kinds of personal information. For example, the Fair Credit 
Reporting Act regulates access to and use of consumer information under 
certain circumstances. 

[9] Credit header data are the nonfinancial identifying information 
located at the top of a credit report, such as name, current and prior 
addresses, telephone number, and Social Security number. 

[10] Under the Privacy Act of 1974, the term "routine use" means (with 
respect to the disclosure of a record) the use of such a record for a 
purpose that is compatible with the purpose for which it was collected. 
5 U.S.C. § 552a (a(7)). 

[11] 5 U.S.C. § 552a(m). 

[12] OMB, OMB Guidance for Implementing the Privacy Provisions of the E-
Government Act of 2002, M-03-22 (Sept. 26, 2003). 

[13] FISMA, Title III, E-Government Act of 2002, Pub. L. No. 107-347 
(Dec. 17, 2002). 

[14] OMB, "Privacy Act Implementation: Guidelines and 
Responsibilities," Federal Register, Volume 40, Number 132, Part III, 
pages 28948-28978 (Washington, D.C.: July 9, 1975). Since the initial 
Privacy Act guidance of 1975, OMB periodically has published additional 
guidance. Further information regarding OMB Privacy Act guidance can be 
found on the OMB Web site at 
http://www.whitehouse.gov/omb/inforeg/infopoltech.html. 

[15] States that enacted breach of information legislation in 2005 
include Arkansas, Connecticut, Delaware, Florida, Georgia, Illinois, 
Indiana (applies to state agencies only), Louisiana, Maine, Minnesota, 
Montana, Nevada, New Jersey, New York, North Carolina, North Dakota, 
Ohio, Pennsylvania, Rhode Island, Tennessee, Texas, and Washington. 

[16] Records, Computers and the Rights of Citizens: Report of the 
Secretary's Advisory Committee on Automated Personal Data Systems, 
(Washington, D.C.: U.S. Department of Health, Education, and Welfare, 
July 1973). 

[17] OECD, Guidelines on the Protection of Privacy and Transborder Flow 
of Personal Data (Sept. 23, 1980). The OECD plays a prominent role in 
fostering good governance in the public service and in corporate 
activity among its 30 member countries. It produces internationally 
agreed-upon instruments, decisions, and recommendations to promote 
rules in areas where multilateral agreement is necessary for individual 
countries to make progress in the global economy. 

[18] European Union Data Protection Directive ("Directive 95/46/EC of 
the European Parliament and of the Council of 24 October 1995 on the 
Protection of Individuals with Regard to the Processing of Personal 
Data and the Free Movement of Such Data") (1995). 

[19] "Report on OECD Guidelines Program," Memorandum from Bernard 
Wunder, Jr., Assistant Secretary for Communications and Information, 
Department of Commerce (Oct. 30, 1981). 

[20] Privacy Office Mission Statement, U.S. Department of Homeland 
Security; "Privacy Policy Development Guide," Global Information 
Sharing Initiative, U.S. Department of Justice, www.it.ojp.gov/global 
(Sept. 2005); "Homeless Management Information Systems, U.S. Department 
of Housing and Urban Development (Federal Register, July 30, 2004); and 
"Options for Promoting Privacy on the National Information 
Infrastructure," Health and Human Services Privacy Committee, Office of 
the Assistant Secretary for Planning and Evaluation, Department of 
Health and Human Services (April 1997). 

[21] The Federal Enterprise Architecture is intended to provide a 
common frame of reference or taxonomy for agencies' individual 
enterprise architecture efforts and their planned and ongoing 
information technology investment activities. An enterprise 
architecture is a blueprint, defined largely by interrelated models, 
that describes (in both business and technology terms) an entity's "as 
is" or current environment, its "to be" or future environment, and its 
investment plan for transitioning from the current to the future 
environment. 

[22] H.R. 4127; introduced by Representative Clifford B. Stearns on 
October 25, 2005. 

[23] S. 1789; introduced by Senator Arlen Specter on September 29, 
2005, and reported from the Senate Judiciary Committee on November 17, 
2005. 

[24] This figure comprises contracts and task orders with information 
resellers that included the acquisition and use of personal 
information. However, some of these funds may have been spent on uses 
that do not involve personal information; we could not omit all such 
uses because agency officials were not always able to separate the 
amounts associated with use of personal information from those for 
other uses (e.g., LexisNexis and West provide news and legal research 
in addition to public records). In some instances, where the reported 
use was primarily for legal research, we omitted these funds from the 
total. 

[25] GSA's Federal Supply Schedule allows agencies to take advantage of 
prenegotiated contracts with a variety of vendors, including 
information resellers. 

[26] A GSA schedule blanket purchase agreement simplifies the filling 
of recurring needs for supplies or services, while leveraging a 
customer's buying power by taking advantage of quantity discounts, 
saving administrative time, and reducing paperwork. 

[27] The ChoicePoint blanket purchase agreement is also available to 
non-Justice agencies, whose use accounted for approximately $2.8 
million in fiscal year 2005. 

[28] The total value of ChoicePoint, LexisNexis, and West contracts-- 
$24.7 million--exceeds the value of $19 million reported above because 
this figure omits the $2.8 million used by non-Justice agencies (see 
footnote 27) as well as uses that were reported not to involve personal 
information. Justice officials responsible for administering the 
departmentwide contracts with LexisNexis and West reported that these 
agreements are used by multiple components whose business needs vary 
and may not require use of databases that include public records about 
individuals. In cases where Justice officials were able to separate 
these costs, we omitted these costs from the total. 

[29] GAO, Data Mining: Agencies Have Taken Key Steps to Protect Privacy 
in Selected Efforts, but Significant Compliance Issues Remain, GAO-05- 
866 (Washington, D.C.: Aug. 15, 2005). 

[30] The U.S. Marshals Service is the federal government's primary 
agency for conducting investigations involving escaped federal 
prisoners; probation, parole, and bond violators; and fugitives named 
in warrants generated during drug investigations. 

[31] DEA's mission involves enforcing laws pertaining to the 
manufacture, distribution, and dispensing of legally produced 
controlled substances. 

[32] The personal information contained in this information reseller 
database is limited to the prescribing doctor and does not contain 
personal patient information. 

[33] To ensure that criminals do not benefit financially from their 
illegal acts, federal law provides that profits from drug-related 
crimes, as well as property used to facilitate certain crimes, are 
subject to forfeiture to the government. 

[34] Justice for All Act of 2004, Pub. L. No. 108-405 (Oct. 30, 2004). 
Section 102 of the act establishes rights for crime victims including 
the right to "reasonable, accurate, and timely notice of any public 
court proceeding, or any parole proceeding, involving the crime of or 
any release or escape of the accused." 

[35] For an assessment of privacy issues associated with the Secure 
Flight commercial data test, see GAO, Aviation Security: Transportation 
Security Administration Did Not Fully Disclose Uses of Personal 
Information during Secure Flight Program Testing in Initial Privacy 
Notices, but Has Recently Taken Steps to More Fully Inform the Public, 
GAO-05-864R (Washington, D.C.: July 22, 2005). 

[36] Skiptracing is the process of locating people who have fled in 
order to avoid paying debts. 

[37] Although the Library of Congress indicated that the Department of 
State also used FEDLINK contracts with Dun & Bradstreet and LexisNexis, 
State officials reported that their use of these contracts did not 
involve access to personal information. 

[38] Section 103 of Pub. L. 106-481 (2 U.S.C. 182c) establishes FEDLINK 
as a revolving fund. The law authorizes the FEDLINK revolving fund to 
provide "the procurement of commercial information services, 
publications in any format, and library support services, related 
accounting services, related education, information and support 
services" to federal offices and to other organizations entitled to use 
federal sources of supply. 

[39] We reviewed the practices of five major information resellers: 
ChoicePoint, LexisNexis, Acxiom, Dun & Bradstreet, and West. While 
these resellers were all reported by federal agencies to be sources of 
personal information, their businesses vary. A discussion of this 
variance in business practices appears in the background section of 
this report. 

[40] Resellers are constrained from collecting certain types of 
information and aggregating it with other personal information. For 
example, the Fair Credit Reporting Act and the Gramm-Leach-Bliley Act 
constrain the collection and use of personal information, such as 
financial information. 

[41] Several information resellers reported that if the inaccuracy was 
a result of their error (e.g., transposing numbers or letters or 
incorrectly aggregating information), they would correct the data in 
their databases. 

[42] One reseller reported that it maintains discrete databases 
developed and tailored toward its specific product offerings in 
marketing, fraud prevention, and directory services. These product 
offerings are geared toward specific clients. For example, the 
reseller's fraud prevention product makes use of public record and 
publicly available information as well as credit header information. 
The fraud prevention product provides identity verification and 
investigative tools primarily to the financial and insurance industries 
and to law enforcement agencies involved in fraud or criminal 
investigations. Within the four agencies, use of this reseller was 
reported only as part of TSA's Secure Flight commercial data test. 

[43] While a significant amount of reseller information comes from 
public records, resellers also use private companies, including other 
companies that aggregate information, as suppliers. For example, a 
reseller may contract with another private firm to obtain telephone 
book information. Further, resellers may contract with other private 
firms to collect information from public records sources. 

[44] In its settlement with ChoicePoint, the Federal Trade Commission 
alleged violations of the Fair Credit Reporting Act and section 5 of 
the Federal Trade Commission Act. Section 5 of the act prohibits 
"unfair or deceptive acts or practices in or affecting commerce." The 
Federal Trade Commission can issue orders, obtain injunctions, impose 
civil penalties, and undertake civil actions to enforce the act. 5 
U.S.C. § 45. 

[45] One reseller reported that, for certain products, it will delete 
information that has been identified as inaccurate. For example, if the 
reseller is able to verify that data contained within its directory or 
fraud products are inaccurate, it will delete the inaccurate data and 
keep a record of this in a maintenance file so the erroneous data are 
not reentered at a future date. 

[46] 5 U.S.C. § 552a (e)(1). The Privacy Act (at § 552a (j) & (k)) 
allows agencies to claim an exemption from this provision if the 
records are used for certain purposes. For example, records compiled 
for criminal law enforcement purposes or for a broader category of 
investigative records compiled for criminal or civil law enforcement 
purposes can be exempted from this requirement. 

[47] In two cases, agency components used reseller data to conduct 
broader searches for previously unidentified criminal behavior. These 
two cases were an application at DEA used to identify potential 
prescription drug fraud and efforts by Citizenship and Immigration 
Services to detect large patterns of potential fraud through address 
searches and other queries. 

[48] 5 U.S.C. § 552a(e)(5). The Privacy Act allows agencies to claim an 
exemption from this provision of the act for certain designated 
purposes. For example, records compiled for criminal law enforcement 
purposes can be exempt from this provision. A broader category of 
investigative records compiled for criminal or civil law enforcement 
purposes cannot be exempt from this provision. 

[49] Such uses are referred to as "routine uses" in the Privacy Act, 5 
U.S.C. § 552a (a(7)) and (b). 

[50] The task force's partner agencies include ICE, the Department of 
Defense Counterintelligence Field Activity Office, the Office of 
Personnel Management, and members of the intelligence community. 

[51] 5 U.S.C. § 552a(e)(10). 

[52] Although we did not assess the effectiveness of information 
security or compliance with FISMA at any agency as part of this review, 
we have previously reported on weaknesses in almost all areas of 
information security controls at 24 major agencies, including Justice, 
DHS, State, and SSA. For additional information see GAO, Information 
Security: Weaknesses Persist at Federal Agencies Despite Progress Made 
in Implementing Related Statutory Requirements, GAO-05-552 (Washington, 
D.C.: July 15, 2005) and Information Security: Department of Homeland 
Security Needs to Fully Implement Its Security Program, GAO-05-700 
(Washington, D.C.: June 17, 2005). 

[53] 5 U.S.C. § 552a(e)(4)(C) & (I). The Privacy Act allows agencies to 
claim an exemption from identifying the categories of sources of 
records for records compiled for criminal law enforcement purposes, as 
well as for a broader category of investigative records compiled for 
criminal or civil law enforcement purposes. 

[54] The act provides for its requirements to apply to government 
contractors when agencies contract for the operation by or on behalf of 
the agency, a system of records to accomplish an agency function. 5 
U.S.C. § 552a(m). 

[55] As we previously reported, this notice did not fully disclose the 
scope of the use of reseller data during the test phase. See GAO-05- 
864R. 

[56] The Privacy Act allows agencies to claim an exemption from 
identifying the categories of sources of records for records compiled 
for criminal law enforcement purposes as well as for a broader category 
of investigative records compiled for criminal or civil law enforcement 
purposes. 5 U.S.C. § 552a (j) and (k). One system of records notice for 
the Treasury Enforcement Communications System (the system identified 
by ATF as covering their investigative case files) claimed such an 
exemption. The Department of State identifies categories of sources in 
the system of records notices it identified but does not specifically 
identify use of reseller data. The State system of records notices also 
claim an exemption from identifying categories of sources but invoke 
that exemption only under certain circumstances (e.g., to the extent 
that a specific investigation would be compromised). 

[57] The notice was last updated in October 2002, before the service 
and benefit functions of the U.S. Immigration and Naturalization 
Service transitioned into DHS as U.S. Citizenship and Immigration 
Services. 

[58] The Privacy Act allows agencies to claim exemptions if the records 
are used for certain purposes. 5 U.S.C. § 552a (j) and (k). For 
example, records compiled for criminal law enforcement purposes can be 
exempt from the access and correction provisions. In general, the 
exemptions for law enforcement purposes are intended to prevent the 
disclosure of information collected as part of an ongoing investigation 
that could impair the investigation or allow those under investigation 
to change their behavior or take other actions to escape prosecution. 

[59] The E-Government Act requires agencies, if practicable, to make 
privacy impact assessments publicly available through agency Web sites, 
publication in the Federal Register, or by other means. Pub. L. No. 107-
347, § 208 (b)(1)(B)(iii). 

[60] The agency components that identified preparation of PIAs for 
systems or programs making use of information reseller data included 
USCIS for its Fraud Tracking System, TSA for its Secure Flight 
commercial data test, and FBI's FTTTF, which reported that it was in 
the process of finalizing a PIA. Only the PIA for TSA's test 
specifically identified the use of commercial data. We were unable to 
determine if FTTTF's PIA identified the use of commercial data since it 
was not yet final. 

[61] OMB, Guidance for Implementing the Privacy Provisions of the E- 
Government Act of 2002, Memorandum M-03-22 (Washington, D.C.: Sept. 26, 
2003). 

[62] The DHS Privacy Officer position was created by the Homeland 
Security Act of 2002, Pub. L. No 107-296, § 222, 116 Stat. 2155. The 
Privacy Officer is responsible for, among other things, "assuring that 
the use of technologies sustain[s], and do[es] not erode privacy 
protections relating to the use, collection, and disclosure of personal 
information, and assuring that personal information contained in 
Privacy Act systems of records is handled in full compliance with Fair 
Information Practices as set out in the Privacy Act of 1974." 

[63] Department of Homeland Security Privacy Office, Privacy Impact 
Assessments: Official Guidance (March 2006), p. 34. 

[64] USCIS officials stated that the PIA for the Fraud Tracking System, 
now called the Fraud Detection and National Security System, would be 
updated on an incremental basis and that a future update would identify 
information resellers as a data source. 

[65] Asia-Pacific Economic Cooperation, APEC Privacy Framework, Version 
4 (Santiago, Chile: Nov. 17-18, 2004), p. 4. 

[66] Dun & Bradstreet specializes in business information, which may 
contain personal information on business owners. 

[67] We obtained information on policies and practices from the 
following major components of Justice and DHS. For Justice: Bureau of 
Alcohol Tobacco, Firearms, and Explosives, Drug Enforcement 
Administration, Executive Office for U.S. Attorneys, Executive Office 
of the U.S. Trustees, Federal Bureau of Investigation, and the U.S. 
Marshals Service. For DHS: U.S. Citizenship and Immigration Services, 
U.S. Immigration and Customs Enforcement, Transportation Security 
Administration, U.S. Secret Service, U.S. Customs and Border 
Protection, and the Federal Emergency Management Agency. We did not 
obtain information on policies and management practices for smaller 
components. 

GAO's Mission: 

The Government Accountability Office, the investigative arm of 
Congress, exists to support Congress in meeting its constitutional 
responsibilities and to help improve the performance and accountability 
of the federal government for the American people. GAO examines the use 
of public funds; evaluates federal programs and policies; and provides 
analyses, recommendations, and other assistance to help Congress make 
informed oversight, policy, and funding decisions. GAO's commitment to 
good government is reflected in its core values of accountability, 
integrity, and reliability. 

Obtaining Copies of GAO Reports and Testimony: 

The fastest and easiest way to obtain copies of GAO documents at no 
cost is through the Internet. GAO's Web site ( www.gao.gov ) contains 
abstracts and full-text files of current reports and testimony and an 
expanding archive of older products. The Web site features a search 
engine to help you locate documents using key words and phrases. You 
can print these documents in their entirety, including charts and other 
graphics. 

Each day, GAO issues a list of newly released reports, testimony, and 
correspondence. GAO posts this list, known as "Today's Reports," on its 
Web site daily. The list contains links to the full-text document 
files. To have GAO e-mail this list to you every afternoon, go to 
www.gao.gov and select "Subscribe to e-mail alerts" under the "Order 
GAO Products" heading. 

Order by Mail or Phone: 

The first copy of each printed report is free. Additional copies are $2 
each. A check or money order should be made out to the Superintendent 
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or 
more copies mailed to a single address are discounted 25 percent. 
Orders should be sent to: 

U.S. Government Accountability Office 

441 G Street NW, Room LM 

Washington, D.C. 20548: 

To order by Phone: 

Voice: (202) 512-6000: 

TDD: (202) 512-2537: 

Fax: (202) 512-6061: 

To Report Fraud, Waste, and Abuse in Federal Programs: 

Contact: 

Web site: www.gao.gov/fraudnet/fraudnet.htm 

E-mail: fraudnet@gao.gov 

Automated answering system: (800) 424-5454 or (202) 512-7470: 

Public Affairs: 

Jeff Nelligan, managing director, 

NelliganJ@gao.gov 

(202) 512-4800 

U.S. Government Accountability Office, 

441 G Street NW, Room 7149 

Washington, D.C. 20548: