You are on page 1of 32

_t_____0______o__0__g_______ ___g_ ___0 __o0_)t_|?lwF__?_r______0___t?__tt__/_______t_tn_l______r__,__ _e___________ ____v_______________t__ot___ l_l__ _ _____y__0_____0;____?__________0____o________o___0__0_t____00_____n00J_uc___0_tqr___t__________0_?_r____0______r_________po____l_t_______l__t______t_____;o____?_________g_0_________t_r______l_0tc___t_n_w____0___?__e_00___?________?_________0_000_f___?_0__0_____,__0__?_u,__0___o__,0n____9______,_____r__c_n______l__n__________yt__________t_?__________o___f__?_0____t__l_____o___,_______n_0________c__v_________0___0_______t____,_?_0__?___0?______0___?_c0______l_0____?__'_________?___e________o_____0o___tc__o_____u__no_______,____0____o_,_0?____0c__noo_________0_____?_9____0_____0__?_'c90o____n__ _ ___'__'__'_? wo- _"_-'':';''_'.j_;___=_:/:_=_'.,_'' :" '' ' .

- ,_"- _ - - - '' ' --,-._-'_/-'._'_t__'-v_x___;'_i'_t5'___0_'',''_?u ' '' ,o__ '_ d0 _ _,_0 e__d 'c0 _ '_'_;',_, '.'_- _. _.. ' _ - - __ _, ;'_t J.v/ _ - . ' '-='' -_ ',-_=-'__t__ ,,^__m_n_n ' _''__0____, __^ ,,u _ _ _,___0_0____'?__: ;_ :_ _T.-_i_ ; _ 't_ ':'__ - '!,.f, . ' '' , -__-_: ;n?-i!' _,___?_,__,_'_____8?__,0?o ___ ,__ ,_J0 _ ' ,_ '?__?B_ '_.____.' -. '' _' ' ' _ ' '' __._,_,__ .._ ' . 'm_4_,t____u_____,,0___?,____,_'qJ_n__,_6_ __________^,, _, _ ____.__ ___-;'..-_-_'. _ _ ' ' '' ' '_' ,__, . ' _- ' _ . _ .. -' ' .' ,.it. '___,_.___-__' ' ______,__u?m____''________,e'__ ___?, '' _' ::.' _ '. ' - ' ' --'__-n -;,_.___' , ' J _.__,' _ .__0___00_,D_ln__e', _._-_'--' v, -_ . - _ _' -__i_.._0,,_,,,__n__0,0,',__'- ,i._'____6__a_'___D___'___,_0 '''_ ' _ _-__ - - _' _ . ' __.'-_ _^__a'___,_, _'=nng, ,'00__'___'____ _____, _ '-' __ , : - ' - - ._-__, 'j_ n_._____',,____.-_i9_e__''_ __ '_'__ , ' ' '-_;-__.'=.i - - '^_i1 '_-_ __ _._-_--_ '_____ __._.__ ____?__,__ _ m-'_, _ - - _ . __'__,.__.,,__,,_;'-_;_-__t _,.____0,__o_'_,___0o_ __ _:_-,_'''-_-_ - - ' -_ ' ', _ _- :-:__ - 'J' '____ ^c'^-,,_-_,0__g_=,O,_i,,____ _? ^_ _ -- - . ';_ = ,-- __~:___, ,_it'____ _.__?__, ___'_.___,_ _ ,,_e 0- - ' ' ' L _ _ , __ _' _ _' ' _- _ _, __o, _' _? _ _ ,_ , ' - _'__ __.'__' _' .,_, __ 0_ ___V , ,_, ,_n, 0''_ _?'_ _, ' _ ._ _ - _' ;___s______m-'__J'__,M__e___'_,__O _. -- - _ ' i,_-__ . _. - d ' .__, ,i4__r___;,,;__ n__,,, _,,_6__0___'_ , ,, '__ _____ : '.d _._''_ _._.,,___g _ _ _____ i_ ,___ ' __ ' . . x_ _,_._,'__4)__ __. , _'____, '^- - __^_ _''?_ '_-^__,____! .___ '_i ,?___O ?__ ''_ ! _. __ v:,_:';__ .__ 0.,__e_0, _80,,0__,F' - '_. _-'7__ _-''-_-',i. '' '':____ ,_h_ ,., ' - ?' _: ___ ,_._ _d __ , ^ _e_ g _ ' _ ' -'_'_-_'o. w ,_ '' ' .. _-'_ ___'1_______. j_,_C__ ___,__ ,__ -'_ O, ' _ _' q__r __,,_>, .__,_ O'?_,_0___'e'_Ol, ''-' _ ;" ' '_:,-,'' __'-_0_ __- _n ''_____'?___'0__ _,'___ __''_' _''''_ _' , _ -?.ij(:'__l___ ,u_ ' _ , ' ' :.'-- __0,i,, . _-_ _ _ , ' ____ __n' ' ..____ '' N_'0 __,0_,?,_ ,_ ', _ ' 9_-_ ^''O__ '' '-_- ,____,_' _J:_-~__,i.-__ _,_a_ - ' '- __ --+__-_____,,__6? _ , '' i, ._ '_' __i,9''?____ '- . ., _'_ 'i,' i, ____7''D______' ' ' ' ' F'._ ._' ' ,' _._6__L _ ' ' ' ''^_00AC_ _ ,,_,__'__O', _ _ ' ' _ _' _-__^_'__ _',_____N--__ _'_ n^?'',__,? _ .- ? _,'_U'' O., _'__',_'9 - _ '_ _ _ _0 _ _ ' 0 __ _ __ 0 ., ' ,_ _ _ _ _ _ _, ' ' D - ' _' _ ' q ' '' _ _ 0 a _ __ ' ' ? _ _ ' ' ' ' _ __. , -_-_, _. ._q. _,_' v,-,.u_, _ ?,0_'___ ': " _ _ y. _____,n'_,_ _ __,?,,_''__' __ ' i_-'-;._'-'.''_!!'_t' __R^ _ -n_';_'X 0'!_>_, '_ _n? ' -'. N' '_ ._ _ --^' _n-_.'_____ '', ,,__?,J___0 ,_,_??,_,'_ _ _, _ - __ , ' ,__, , _ _;.; _ _ ,o o,0 = 0____ , , _ ,,, , ^ '_ _ :',,.,. _0 ____,._'_ _ __ _, n__ d " '''_. ^''u '_-___',n,, _ ^_ , ;'; ; , - -. . i ' ,'_._____Jc? ____,,_0_ __ _,0 ,_ J, _' _ ,_i "': '; ',,, _ _ e _ e - -e____!^__' - !,,,_'_'d?-_______/____,,. _,. ! __',;,___,_ _, '?__,,_,___,,_,,___,_0L,__J_i ,.._,_, .,K.._.., _,.._ , . o '': _''_, , , _ ;'_ ?,U 8_ ,'______' o _,, - _-_' , _ ,'' '',et_ ,_ ' ___ 0_'__ _ _, _ ,' __ ' ____ ' 0_,__0c^_, _'F.__'''_, '_-_ __ ' f _ ,--, _ _ __0, "', '' C_ , '' ____ _,i_, .i_,'' _ 0 _' '___' ;'--'!:'--g _ ^- .--_ ' - - __o____ _? _ ._ ' ,, _'''^__? '___,,'__'Y , _ _' w _ _!,_ '_.J! -_ ._ _, _?, ',_,n^0 _ ^O , ___ - '_' _ _0__cn,,._,_____,__=-i-__'_'__ _' ;' _ ,,/, !_ - ' ' !_ __ !! ' J__ _,_, _,_ '_, ..___ _'',','=' ".',"_^ '' , ,'e_0,, ,_,,__,__,__'.--? ;^__N____;__' . ____:; '' _ ,_;' -.''' ' ' _,_8o, _,,'' _ ' ___, ' ?_ ^ ' ',_;__,- _'_V',' __:^-;N--i!,__; _7' ,. n,__,_ uu_0^_,a'_ i ' _,__ ,___,_,_ - '_,0_ _ '-_;___' ' ,_ _ _._ --'_' "' ,_ __" ,o, ___ _'__'_,, ' _._,_,-_'' __;'_ ;;',--',',?_ ____;' =.__,o, _ ' :','" _> _ _0_ O D_ __,_e?v___'i0_u_,__ B__,, , ___, __ .' _ __'_ ;' '_ ,'_ '_ ''',_8_ _,B' _'_,,__ _ a_ _ _ __'' ' _, ; n _- _, _ ,,, __,,__,_ ____ _? _' d'_' ,_?__,__ _ J! _ __i __ '___ ?_ ' ' ,,u,, _____,? 0___ __'U__'?__ _ _ ?.Co '_____, _ 0,_g^?n ,, _D__ ,__0_0_ _ ,_ _,?_, _ ,i Ca _, _'__0_ _ _n? _0__,e , ^_ ,__'^0__

_ paaggee 2_89 Table of Contents purpose statement Pa_e 3 po_icy Appl'_cabiliy and legal ComPliance Pa_e 3 TransparenN and AccountabiliN Pa_e _ _nformation Page4 Acquiring and _eceivin_ lnformation Pa_e 8 _nformation Qualiy Page 9 Collatjon and Analysis Pa_e 10 Mer_ng of lnformation from DiNerent Sources Page 10 Sharing and Disclosure Page 11 lnformation Retention and Destru_ion Page 1_ AccountabiliN and Enforcement Page 1_ Training _age 17 Sharing of Information among Participants page _7 Use/Ditclosure of Information Originating from another Pa_ic'_pat'_ng AgenN page 1g Appendix A - Terms and Definitons p Appendix B - State and federal Law Relevant to Seeking, Retain_ng, and Disseminating Juttice Information

p_

PurposeStatement The purpose ofthis poli_ is to establish privaN, civil ri_hts and civil libe_ies prote_ion guidelines for the _elaware valley lntelligence centeF (DVIC). The DVlC is an information sharing and anaIysis _ci IiN with an all threats and all ha2ards appFoach through the collation, analysis, and dissemination of intelliBence and investiBat'_ve information within the melve-county, four-sta_e area inc lu d ing Southeastern pennsylvanja, southern New Jersev, and No_hern Delavvafe. The Center is not intended to supplant the activitjes ofthe numerous investjgative and operational bodies currently fun_ioning in these states, but _jll enable them to be more effectjve and focused in their tasks Whi le enSUring t he rights and privacy of its citizens.

Policy ApplicabiliN and Legal Compliance 1. All DvIc personnel and law enforcement, public and pr'_vate sector, contractors and other authori2ed users with dire_ access to _v_c infoFmation, includin_ lnformation Sharin_ Environment (lSE) participating centers and agencies, will comply with the Dvlc privacy poli_ and with the U.S, and pennsyfvania constitutions, pennsylvan__a consolidated statutes (Pa C.5.) _tle 18, Crimes and O_enSeS, Chapter g1 and subsections, thereof, as _ell _s applicable federal laws (refer to AppendiX B l PrOte_ inB riva_, civil rig_ts and civil libe_ies in the colle_ion, use, analysis, retention, destruction, sharin_ and disclosure of information. Federal regulat'_on 28 cfR part 23 sha l l be adhered to in the titUatiOnS wherein it is applicable to criminal intelligence information. 2. Dvlc has adopted __nternal operating policies that are in compliance with applicabIe laws (refer to Appendix B) prote_ing privacy, c'_vil rjghts, and civil Ijberties in the collection, use, analysis, reten_on, destru_ion, s_aring and disclosure of '_nformation jn the system. A_l information provided by DVIC from ou___de sources must be verjf'_ed from those sources ifthe information is to be used in an inVest igat iVe capaciN. . 3. All _v_c personnel, pa_icipating agen_ personnel, personnel providing information technolo&r se_'_ces to Dvlc, private contractors, Bovernmental agencies including ISE pa_icipating a_encies an d centers, and users wil_ tomply w'_th the applicable laws prote_ing privaN, civi1 righ_, and civil li be_ies __n the colle_ion, use, analysis, retent'jon, destru_ion, sharing, and disclosure of information, including, but not limited to t_ose _isted __n Append__x B. pennsylvania agencies receivinB prote_e d in format ion as de_ned n 1g pa c.s. gg1o6 (b) must submit appropriate policies and procedures reviewed or adopte d bY the omce ofthe Attorney General '_n consultation wjth the Pennsylvania State Police for diSSeminatiOn of protected information.

2_st 2_ _ ee4 _ _ 2 0or _____e__slt______4t_nw__n__n__t__v_ltec_m_h_t_tree___e__utdrme_t0mrrt_btla_e_hmv_tcn__e__t__tenam____mn____l___e_e__fttm__nm?_____me__p_____t____m_nstd__o___t_eh______e__________nm____

__n5_F__N and Accoun_abiliN _. ma DV_C man_ement Board a_ as _he pol Icy m_kl__ _edv r_r _he Dv_ i_ __mpr__ 0f_e So_hea_ern Pennsylva_Ia _?t_nmt cuu___r_Ter__r_sm ___4 F nrea Re_i_nal Tnnj_ SecuriN Work GroUp, N_w J_rsey 0M1ce mF _ome _nn4 s an_ _he Phta_e1pha Po1ice Depa_ment. The 0VtC M__n_eme_t ____rd n____t_ __e _____r. 2. me Fusinn _e_er Oire_or has the pr_ma_y f_sFan___l l_N __F ___ n,_y _u _ _u__ _e_, o__tionS, and cDordination or p_rs____l,_ eh_ _e___v1_e, se_kt e_1uati_n _f in__a_on; information q_al iN, _n_ ly__s, __s__ue_fun , ?h a r _ _ _ _ r d ; s _ _ _ _ r, _ en_rnmen_ o_ _5 po_i_. ' 3. D_lC p___nel _il1 follow 18 Pa C.5_ _g_oG, n_d 4 _ _ _ f _ l_i_latu_ and 5_gned by the Governor per___nln _ t_ _h_ _ _ __ _ _ _ t _ ll , c 0 _ _ a _ _ de5__an, shann_ and di5closure of 1ntell1___ce 1n__rm__;__, 4rt_tve_ ;n_ef_,n_;__ ___ ___ _nfa_ma_0n. D_C h_ _b__hed guidel1nes For _ccoun____11c y _n_ _ _ m _ t _ _ ee _ _ _ _ _ an_p_n_. 4_ D_fs PyaN Pat_ Commi_ee is eu_ded by a tr_lned mr__N a_recer {__ t_t_ _r_0r _f _e _n_r- The Priva_ Of_icer r_ce_ve_ rep_r__ rcgmr4_ne ___g ?ed er__ _ _ ! m _ _ _ p__ion_ of _i_ Po_iN, recewe_ _nd coord_na___ com__n_nt f_sa__;_ p0tiN, and se_ as the lia_son for the ISE, en_ur1__ th_t _r_v_cv pf__ect_ eMa_ tu_ _ _ning, b_sjne_5 _roce_s c_an _e_, m__ _ y _ t _ m enhan_ngt_ndld___, Any qu___onc rnE_r_ln e _h__ _F_ Ge _ _ c _ n _ _

_e_aware _atlev 1n_f1'_ence Cent_r _ Bt 11_ft Fh1lade1phja, Ph __4S l21s)897_ Em_i_:0Yl_PMttAG0Y

4 , _ ' _ __,' ""' ''''_;T_9>___: '';'____,;_

____

S, The 0V1C'S Pf1VYfY 0Mcef __sUreS th_t enfortement procedures and sann'jons o_t_1n__ ;n __ Accounta_)11y and Enrorcem_nt _e_l0n aF _his pol _cy are adequate and enforced.

lnformation 1. The DVIC's Watch Center seNes as the focal po1nt for the rece,jpt and d'_ssemination of tfimin_l and terrorism in Format1o_. _V1C's 1nFormation is rece'_ved from, and d_sseminated to, lo_l, state, fedef_I, and triba_ IaW enforCement; other Fusion Centers; the public,' and to private entjties, as appropriate, 2. The DVIC will seek or retain In_ormat'jon th_t; _ Is based on a Cf_mln_l pred icate or threat to public safeN,_ or _ It based on reasonable s_sp_cion that an _dentifiable individual or organi2ation has commi_ed a criminal o_ente or is involved _n, and/or p_anning, criminal (includ._ng terrorist) con4u_ of a_ViN that Pr_sents a threa_ to any _nd1v_dual, commun'_y, or the na_on, and that the informa_ion _s relcvan_ t0 the criminal ('_nc_ud'_ng terror1_) conduct or a_jviN; or _ tS releV___ to the _nvestleatIon and pro_ecution of suspe_ed criminal (including terrori St} t_Cidents; the result1ne Ju_tce synem re_ponse,' the enforcement of sanctions, orders, a_d Se_tenCet/ af _he prevent1un of tr1me; or _ It UsefUl ln crtm_ a_alYs_s, or 1n _he _dm1ni_traton of crim_nal ust'_ce and public safet y _1ncludin g top_cal searGhes); and _ The source of th_ 1_ Farma_lan __ rel1ab_e and veri_able, _nd/of ltm'_tat'jons on _he qual_ty oF the informat1on are id_ntifled; and _ Thc 1_fofmat_o_ was colle_e_ __ a f__r and lanrFu( manner not o_he_lse proh_bfted by l_w, _1th _e consent oF the a Nected fnd_v1_ua1 tQ share _e _nformation being clearly noted vvhen such c_ntent has been provtded_ 3_ All DVlC 1nform__io_ w11I be t__g__, retaned, s_ared, or d___cIose4 under the a p pfo pr_ate poI1c y provis1on_ app l 1c_ble to the cl___1_ca_1on of the __nforma__on. 4. The _VIC W1ll n0t 5e_h af ret_in lnformtt1on about 1ndv.jd_als or organi_tions solely on t_e basi_ oF their rel_gIous, polltlcaf, _r 5_c)_l v_evv_ or a_iv-_t__e_ _, t_eir pa__c_ p a _ i o n i n a p a n i c u _ a F n o n c r. _ m' _ n a t orga_i2at_on or la_ul _ve_t; or th__F r_e, ethn1ciN, Gi_i2enship, pl__ of or_ gin, a ge, d__ab___ y, gender, Of seXUat or_e_tat_on. Informatlon r_l@ted to th_e fa__rs may be re__ned if there 1s a reasonable felationship or relevance to such jnfofm___on and t_e e_o_ to deten, anticipate, or prevent cr_m_n_l a_iV1W and this 1nformatlon ;S not the sole basjs far re_ent_on or ndex;ng, VVhen there _s reasonable 5USpiCion that a crimI_al relation_h_p exIsts, the _nformat_on concerning __e cr_m_n,_ condu_ of anlv_ maY be reta1ned or 1,nde_ed_ _t _s the responsibil_N or the source agen_ or _v__personne_ ta asen__n a_d cle_rly a_1rm the relat_onsh_p to _he _gy e_eme,t of c,imi,a_ anivit y prio, __ the fe_en__qn 0f 1ndex_ng ofthe _nfQrm_tio_. y _ ,' 5

_t t ver_lfy)_. t _ r _ _ _ 5. The 0VIC may retain informaton that js based on a level of suspicion that is les5 than llr%sona_l_ SUSPICiOn'', SUch as tips, leads, and Sus_icious A___v__N Repo_s (SAR) informa_ion, sube_ to _ha pD1jci_ and Pracedures specified in this poliN. 6. The DVIC applies labe_s to center originated jnformation (or ensures that originat_ng agency ha_ appl ied labels) to indicate to the accessjng authori2ed user that: _ The information is ''protected information"' to include ''personal da_a'' on _ny individUal (5e_ Appendix A, Defjnitions) and, to the e_ent expres5ly provided in this po1iN, includeS or_a n izationa l entities. _ The informatjon js subJe_ to the laws in Append ix B restri_ing access, use, or diStI05Ufe 7, The Dvlc requires certain basic descr_ptive information to be entered and ele_ron_ta IlY ass0ci_d with data (oF content) or SARs that are to be acces5ed, used and discfosed includin_; _ The name of the oriBinating depa_men_ or source agenN and the name of _he DVIC _u__ _nformation sy,stem (or database) from which the information is disseminated, , _ The date the information was colle_ed and to the extent possjble, the date its acc_ra_ WaS taX veri_ed. _ The title and conta_ infoFmation for the person to _ho questions regarding the in _D_at iO_ _ho4ld be dire_ed and vvho '_s accountable for the decision to submjt the informatiOn a_ d assurin_ it is beIieved to otherwise conform the DVIC submission standards, _ _ Any particu lar limitations to the use or disclosure of the information. g. upon the receipt of information, DVlC personnel will evaluate the information to determne iU n_tufe, usab'_l'_N, and quality. Personnel wi Il assess information to ensure proper seBregaton, such as: _ whether the information is based upon a standard of reasonable suspicion of crimnal a_iN; _ whether the information consists of tips and leads, data, or suspicious actviN reports; _ The nat_re of the source of the information as it affe_s its veracty (for example, whether from , an anonymous tp, trained interviewer or investi_ator, public record, private se_or); and _ The val'_dity of the content (for example, veri_ed, pa_ially veri_ed, unverfied, or unable to _ what leveI of prote_ion is to be a_orded the information based upon the Npe _ information rece'_ved (e.g. informatIon about U.S. citizens or la_ul permanent residen__ and to What _ent , it mav be shared through the ISE. g. At t_e t'_me a dec'_s'_on is made to retain information, it wi ll be categori2ed (including the appl1_tion of Iabels and/or metadata tags) pursuant to applicable limitations on access and sensitiviy of diStlO_Ufe n orderto: _ pfote_ con_dent__a l sources and law enforcement undercover techn iques and methodSi _ _revent jnte_erence wjth or compromise pend in_ crimjna I or terrorsm inve_i_a__On_; _ Prote_ an individua l's ri_ht of privaN, civil rgh_, and civil libe_ies; and

Ny

_ provide lega_ly requ_red pro_e_io_ based on the indiVidUal'S statUs, such a_ in the _5g _ a Juvenile, 10. The c_ass__f_'catjon of ex._sting jnformation Will be reevalUated WheneVer.. _ Ne_ information j_ added tha_ ha_ an im_a_ On aCCeSS limitatiOnt or the 5ensitiy_N _f disclosure ofthe information; of _ There '_s a change in the use of the infofmat10n a_e_in_ aCCeSS Or diSCl Osure limitat_on5; f_f example, the information becomes part of cou_ Proceedin_S fOr Which there are diYere_ public access Iaws. 11. DVlc personnel, pa_ners and particip_tine agencies will be required tO adhefe to specific pn__ and procedures for the receipt, colle_ion, assessment, markinB, _O__e, a_Cess, dissemnatton, retention, and securjN of tps and leads, and SAR informati0n. Center personnel Wifl = _ Prior to a flo_-_ng access to or dissem ina_ion of the information, enSUre that a_emp_ _ va_idate or refute the j_nformation have taken place and that the information has been assess_d f0r sensitiviN and confidence by subJe_ing t to an eva lua_on 0r screen ing proces_ to determne _ credibiliN and value and categor12e the information as unsubstantiated or uncorroborated if attemp_ to va lidate or determine the reliabiIy of the information have been unsuccessful_ The center wil1 use a standard report1ng forma_ and data collect!on codes for SAR informa_ion. _ Store the nformatjon ut_g the same storage methad used ror data which riset'to the 1evel o_ reasonable susp1cion and which 1ntludes an audit and intpe_ion process, suppo__ng documentation, and labelin_ of th_ data to delneate it from ather _nformation. _ Allow access to or dsseminate thc 1nformation using the s_me _or a more re_ri_ive_ ac_e_s oi di5semina_ion standard tha_ is u_ed for datn that ris__ to the level of reasonable susp_con (f0r example, ''need_to-hnowJ" and ''right_tonhn0_ access or dissem_nation foF persona_l identifia ble 1nformation). _ Regu1arly provide access to or dissem1nate the information 1n response _o an inte__genN i_qui for law enforcement, homeland securiN, or public safeN and anal_ical purposes or prov1de _n assessment of the informa_on to any agency, entN, individual, or the publ_c when _edibfe inf_rmation indi_tes potentiaf imminent danger t0 fife or propeFty. _ Retain information for one year n ofder to w_rk an unvalidated tip, lead, or 5AR .t_fo_a__0n _ determine its credibiliN and value or as_ign a "dspos_ion'' Iabel (For example, unde_erm__ed oF unresolved, cleared or unfounded, ver__e_ d, or under a_ive _nves_gation_ so that a subsequen_ authorized user knows the status and _urpose for the retent_on and will re_in the 1nforma_'0n based on the reten_on period a5sociated w1th the disposition label. _' _ Adhere tO and fOllOW the Center'S _hySICa_, adml_lSt_tlVe, a_d teChnl_l SetUrN mea__fg_ t0 _nsure the prote_ion and securiN of tips, Ieads, and SAR nformation. __ps, teads, and SA_ information will be secured in a _stem that is the same as or smilar ta the sy_tem _hat __s da_ that ri__es to the leve1 of reas_nable suspicion. _

t_ _2. The _V1c w__ll -_n_rpo.rate the gathering, processing, repon1ng, analy21ng, and sha_ng of terror_m_ re_ated susp'_cous a_jvities and incidents (SAR process) into exitting pfocesses and sy5tems u_d t0 manage other cr'_me-related jnformation and criminaI intelli_ence, thus leVefaging existing poIities and ?atac_ls ut.fl_f2ed to protect the informatjon es vvell as constitutional rights, including perSOn_t prVaN and 0ther iviI libe_ies. 13. for purposes of sharng information jn the ISE, the DVlC wil l ide_ti_ and feview all tefrOrSm_related _te_ed informa_on that may be accessed from or disseminated bY the center and provde the enhanted prjvacy pfotemons for such informa_on as are speci__ed in this poIi_ for sharing the informatian through the lSE. 1_. The DVlC _jll track jnformation access and dissemjnation to CleafIY indica_e, thf_U_h _ OtiCe mehanisms (metadata or data label fl'elds), the nature of the prote_ed infocmaton and anY Ie_al restri_ions on nformatjon sharjng based on iniormation sensitiviN, natUfe of ptote_ed infOtmatiOnI Or classi_1cation. 15. The Dvlc pa_icjpatinB agen_ personnel wjll, upon receipt of inf0rmation, to inclUde SAR informa_ion, assess the information to determ?tne jts nature and purpose. Membefs of the DVIC _iII assign information to cateeories to indicate the result of the assessment such as; _ Whether the information is generaI data, tips and leads, SAR or crimina l in_elligen Ce infOrmatiO_ _ The nature of the source (i.e. anonymous tip, interview, publc or printe sector) as it a_e_ veraciN; and, _ The reliabi l iN of the source ; _ Reliable -Source has been determjned to be reljable. _ Unreliable _ the reli_biliN of the source s doub_ul or has been determined to be unrel iable. _ Unknown_the rel1abil1tycannotbe_udged _rasses_ed. _ The validiN 0f the content is con_rmed, doub_wl or cannot be jud_ed. 16_ The _VIC wi l l keep a record of the source of a ll information sough_ and col te_ed by Xhe _nter. Acquiring and Receiving Information 1_ lnfoFmation gathering and investigative techniques used by the 0VIC and participating agences will tOm_ly with and adhere to regulations and guidelines inc1uding, but n_t fmted to: _ The federa_ and state laws and constitu__onat guarantees li_ed in nppendix B prote_ng PfiV_N, c_vil rights and civil liberties or cjti2ens, ncluding the Bill of R1gh_ amendmen_ lo the U_S_ Consttution, the _ectarat1on of R'_gh_ to the penns_vania Cons_tutio_ and the Pen_ Sylvania HUman Relatjons A_ and the federal civjl _igh_ A_,_ _ 28 CfR Pa_ 23 regarding crimjnal intel_jgence '_nforma_'on,. ' APPll_ble crminal intell_gence gu_de_ines _b_shed undef the u_s. Depa_ment of JU_ce'5 l_0__ NOtion_l Crimino/ IntelIIgence ShorI'ng PI_n _NC_SP)_

p___

2. Regardle_s of _he cr1m1nal act1vity 1nvolved, no information which a user has reason _o believe may have been obta1ned in v1olation of law shall be entered into DVIC systems or submi_ed to or received by theDVIC. 3. Agencies whIch participa_e and provide informat1on to the DVIC are governed by state and lo_l laws and ruIes Boverning them, as well as by appli_ble federal laws, The _VIC will contra_ only Wi_h commercial database entitEes tha_ provide _n assurance that they gather personally identi_able informa_jon in compliance with loc_l, state, tr'jbal, _err__tor'jal and fede Fal laws and use method_ Whi Ch are not based on misleading in Format1on Golle_1o_ pract__ces. _. The DVIC will not dire_ly or in_irectly receive, seek, accept or retan 1nformation from_ _ An jndividual or non__overnmental informa_jon prov'_der who may or may not releiVe a fee Of bene_it for provding the '_nformation _f the center knows or has reason to believe that _he jndividual or inform_t'_on provider is le_ally prohbted from obtaining or dsclosin_ the information;or _ The source used proh1bi_ed means to gather the information. 5, The Dv_c's sAi process provides human review and vetting to ensure that info_aton is both le_allY _athered and, whe_ applicable, de_ermined to have a terrori5m nexus. La_ enforcement o_cerS and ersonnel at source agencies vvho acquire sAR informatjon that may be shared with the DVlC Will be trained to recogni2e behaviar that is indicative of crjminal a_iviN refated to terrofiSm_ The responsibility for ths training resjdes with the contributing agency. 6. The DVIC's sAR process 'jncludes s_feguards to ensure, to the greate_ deBree possible, that only informatjon regardjn_ indjviduals involved in actjvities that have been determned to be consi_ent With crimjnal activities associ_ted with terrorism will be documented and shared through the ISE. Thete safeguards are jntended to ensure _hat information that could violate civit righ_ (race, religion, national ori_in, ethniciN, etc.} and civil libeMes (speech, assembly, religious exercise, etc.) will not be _ntentionaIly or inadvertently gathered, documented, processed, and shared. 7. When a cho_ ice of information gathering and investi_ative techniques is available, information documented by _n originating agency should be acquired or investigated using the least intr_sive fea5ible means, taking jnto account such fa_ors as the e_e_ on jndividual's privaN and potential damage to repu_at,_on. l n Fo rmatio n Qu a l '_N 1_ TO the maxtmum eX_ent pra_1cal, _he DVlC wjll implement the ''fa_tr _nfo_ation _ra_ites'' as detailed bY the _epa_ment of Jus_ice's _ loba l lnitiative, recogni2ing that some of the pra_ices (such as aIlowng IndiVidUaIS abo4t whom information is retained to review 1nformat'_on for accura__ do not applv _o an lntelliBenCe_gathefin_ nitiat1ve. All contributors of jnformation to the Dv1c shou_d be famiIiar wjth the GIOba1 Fa1r lnfofmation Pfa_ices and wjIl apply t_ose pra_ices to t_e best extent prani_b_e to the InfOfmation _athered, retained and repo_ed to the Dv_c.

on_ _ _ t y 2- _ Th_ _Vl_ w__l _1_4__ ___N __ms_f_,J_l_ 4__4_ ia ensure th__ information sought or fe_aind, to __c1_d_ _m_ 1n_rM4?__n, f_ __(lYe_ ___m c1eme_muble _nd _rust_o__y sources,_ accurate,_ current,. an_ _m_let_, t_clu_l__ '_l__ _wlev4nl- __rtt_x_ ltt _nlch l_ w__ _ough_ or received,, and merged with ot_er informa___n a__4_ _t_ex __me l__lvl____I _r ern_nE2_l_lo_ onty __en i_ meets the standard '_n the mere1n_ _ ln Form__1__ rr__ _I_re____ ___r___ s_c_l__ 1n _h1_ poli 3_ A_ _he t'l___ eF r___n_la_ l_ ____ _y__mm, ___ lnrorm_t1on _il_ be assessed and _abeled re_ard'_ng it_ level or 9__l1_Y (__l___le__, __rr__l', v_rlFE_?l_, ynd re___b_et. T_e 0v_c investi _ates, in a timel y manner, alleged _ff_f_S _1__ merl_l_Mcl_s, a__ lM co_J4nc__on w1_h t_e origina_ing agen_, corre_s, deletes, or rerra1n_ rr_m u_I_n mr___c_e4 ____rm____n rou_d to be erroneou_ or deficient. T_e label'_ng of re_1ned 1n Forma_t__ w1ll __ r_yval__, _?4 by __e _vlc w_?n new inform,t_on _s received that has an impa_ on the con F_dence (v_lI_1_y _nJ r_l Ia_tll_y) _F _h_ mr?v__us_y r_a_ned _nformati 4_ Th_ _VlC wll l ___kn _v_ry __mn?____e e_f_or_ _o ensure that information __1l be corre_ed, deleted from _he SY_t_m_ __ M__ 4___ _pe_ I__rnln_ or de?erm_n1ng _hat such '_nformation is erroneous, miSleadi__, ObSal_t__ 0f Otl__r_I_e _nf_l___le,_ _he source or the informa_ion did not have euthori N to gathef the fnfor__tta__ ar __ _r0vl_4 _he ___o_mat_an _o the agen_,. or t_e source used prohib'_ted means to gathef the 1nrormmtl__, eXcep_ w__n tl)e _ource d_4 not _ct as ,n agent to a bona _de taw enforcement o_icef_ S. Of1elnatIng __encl__ ex__fn_l _o _h_ _v_c _re responsible for the qua1_N and accuracy o_ the data _CC_S___ _y, of pfoVfd__ _o the DVlc, The Dvlc _ill advise, _n writing, the appropr_jate conta_ persO_ Of the of1g1n_tl_e ae_ncy 1f Its ____ _s _lleged, suspe_ed, or found to be inaccurate, jntomplete, out or date, or unverlr__ble. 6. Th_ _VIC w_ll u_e n wrl__en ar documented e_e_ronic means of not_f'_cat__on to jnform recipient __CnC1_S Wh_n I___rm_C1on _fev_ously provided _o _he recip_ent agency is de_eted or thanged by the _VIC_ because _h_ _nr_rma_fon 1_ deeerm_ned to be efroneous, _ncludes incor Fe__y merged information, 1S OUt ar dat_, c_n_0t _e V_r__fed, or l_ch_ adequ_te conte_ such that the rihts of the jn_'v1duaf may be aMe_e_.

C0lla__an _nd AnaIvs__ __ lnfofm__lon acqulre4 0_ rec__ved by the 0v_c, or accessed from _ther sour ces, wi_ f b e a na _ y2ed on_ bY 9ualI_ed lnd_vl_uals _ho _ave slJtce5sfully tompleted a bac_ground check and ,e_in appropriate S_CUf_tY Cleafanc_, Ir a_ml_t_ble, _nd wh0 have been sele_ed, app,oved, and tra-_ned actording_y. Dv_c P_rSO_nel W1ll Comply _lth l__s rea__4_ne pr_vaN, civi_ rights, and civt _ibeni 2_ Informatlon s?bJ_ct to c4ll___on _nd analys_s is _nfo,mat__on as de_ned a,d _'ndent.__ed ,_, t_ lnformation senl0n aF _h_t po1_c Inform_t10n ac___red or rece_ved by th l SS fOm O ef SOUfCeS, It a Pf10r1t__t and ne_ds _nly_o_

1O

_ Fu_her crime prevention (including terrorism), law enforcement, publjc safe N, force depIoyment, or prosecuton obje_ives and priorities established by the 0VIC. _ Provide ta_ical and/or strategic intelligence on the exi_ence, identi_cation, and capab_l_ N of indivduals and or_ani2ations suspe_ed of having engaged in, or en_agin_ in criminal or terrorist a_ivities. 3. DVIC requires that a Il analytical products be reviewed and approved by the Priva_ O_icer to ensure that they prov1de appropriate privaN, civil rights, and civil liberties prote_ions prior to dissemination or sharing by the center.

Merging of Information from Di_erent Sources 1. Records about an indivdual or organi2ation from Nvo o,r more sources will not be merged unlus there is suMcient identiFying information to reasonabIy conclude that the information is aboutthe same individual or organization. The set of identi_ers su_icient to allow merging wiIl consist of alI availabIe attributes that can contribute to higher accura_ of a match, including: date of bi_h; law enforcement or corre_ions system identi_cation number; individual identi_ers such as _ngerprin_, photographs, physicaI description, height, weight, eye and hair co1or, race, ethniciN, tattoos, marks or scars; social securiN number; drve_s license number; oF other biometrics such as 0NA, retinal scan, or facial recognition. ldentifiers or chara_eristics that, when combined, could clearly establish that the information from multipfe records is about the same organization may include the or_anization's name, fedenl or state tax l_ number, office address, and telephone number. 2. If the matchin_ requirements are not fully met, but there is an 1denti_ed partiat match, the information may be associated if accompanied by a clear statement that it has not been adequatety estab_ished that the information relates to the same individual or organi2ation.

Sharing and _isclosure _. Credentia Ied, role-based access criteria will be used by the OVIC, as appropriate, to control: _ The informaton to which a partcular group or class of users can have access based on the group orcIass. _ The information a cfass of users can add, change, delete, oF print. _ To whom, individually, the information can be distlosed and under what circumstances. 2. Infarmation retained by the DvlC will only be provided to persons _ithin the criminal justice system WhO are aUthorj2ed to receive the information and only for fegitjmate la_ enforcement, publlc PfOteCUtion, or jUS_te purposes.

11 __ '_'___';_

. 3. InteIligence information placed in an automated information system may only be disseminated '_f; (a) the nformation is reliabIe as determined by an authorized intelligence officer; (b) the agency reque_t'_n_ _he _nformation is a criminal justice agency _hich has policies and procedures consistent with 18 Pa C.5. 9106; and (c) the 1nformation requested is in connecton with the duties of the criminal justice a Ben_ and the request is based on speci_c identNing information_ 4. lnformation retained by the DVlt may be accessed by or disseminated to those responsible For public protection, public safey, or public hea Ith, onlv for public prote_1on, public safeN, or pubIic health purposes and only in the pe__rmance of official duties in accordance vvith applicable laws and procedures. Nothng in this polcy shall limit the di_semination, including unsolicited, of an assessmen_ of criminal intelIigence information to a _overnmen_ oMicial or to any other individual, when necessaN t_ avoid imminent danger or certain daneer ta ltfe or _r0perty, 5. _nformation gathered af c0llected and fec_fds re_a__ed by DVlC m_y be accessed or disSeminated fOr specific purposes upon request _y pers0_s authori2ed by l_w to have such access and onIY for th0Se uses and purposes spec__ed by la_. An aud_t tra'_l su_cient _o allovv the identi_cation oF each indiVidUal who requested, accessed, or received 'jnformat'_on retained by the center; the nature of the i_fOrmatiO_ re9uested, accessed, ar received; _nd the specifi_purpose will be kept for a minimum of 2 YearS bY the center. 6. lnformation athered or collected and records retajned by DVIC may be accessed or disclosed tO a member of the public only if _he information is de_ned by law to be a public record or othe_iSe appropriate for release to fuFtheF the cente_s mission _nd is not exempt from discfosure bY law. SUCh lnformation may be discIosed only in accordance with the law and procedures applicable to the center for this Npe of information. 7- The existence, nonexistence, content, and source ofthe nformation will not be made avalable by the DVlC to any person or agen_ that would not be eligible to receive the information, unIess otherwise required by law, when: _ Disclosure would interfere with, compromise, or delay an ongoing investigation or prosec_tion (Commonwealth of Pennsylvania Right to Know Law Act 3 of 2008); _ Disclosure would endan_er _hg health or safeN of an individual, organi_ation, or communiy (Common_ea lth of Pennsvtvania R__ht to Know Law A_ 3 of 2008); _ The information is in a criminaf information system subje_ to 28 CfR _a_ 23 and _8 _a C,5. 91o6; _ The information source does not reside vvjth the DVIC or DVIC djd not originate and does not have a rght to disclose _he information (_8 _a C.S. g91o6). 8. Ifthe information djd not originate in the Dvlc, the source agency will be not__ed and a request for its determi_atiDn that djsclosure by Dvlc or feferral of the requestor by 0vlc _o the source agenN '_s _eithef reqUired nor appropriate under applicable _aw.

_2

9_ The indiv1dual who h_s r_q4_sted 4isc_o_4re w.___ b _ . e _lVen feaSO_S if diSClOSUf_ or requ__ts __r COffe_lOnS O I_ OfmatiO_ th_t hat been disclosed 1s dened b the Dv_c he. . informed of the procedure for _ppe_ t per the commonwea_th of pen _ . R. nSY Vanla l_ t tO KnOW _WJ ACt of 2008 when the _VIC has cited an exemptian for _he type of informat_l COffe_ Challen_ed infOfma__on to the sat1sfa_'_on of the _nd_v_dua_ to _hom the __nformat__ record wil 1 be kept of a l l requests r0r correct'_ons _nd the resu lti,g an._on, __f 10. InfOfmatiOn POSSeSSed bY DVIC iS consjdered _onpubl1c Fecord and wi_l only be disc_o_ed to _n indiVidUal as the fe5Ult _f th_ itSUance of _ proper subpoena Duces Tecum or, if the subpoena is Ob_e_ed tO, a SUbSeqUent CQ__ ofdef. ln such a case, upon satisfacto_ verf_cat1on (finBerpr_n_, dfiVe_S liCenSe, Or Othef speci_ed identi_ing documentation) of his or her identity and subje_ to the COnd1tiOnS S_etified in 7., above, an _ndividual is entltled to know the existence of and to rev_ew the information about him or her th_t h_s bee_ gathered _nd retained by 0v1c. The individual may obtain a COpy Of the 1nfOfmatiOn fOf the pur_ose of challeng_ne the accuraN or completeness of the information (corfe_ion)_ The center's response to the request for N_nformation will be madg within a rea5onable time and in a fOrm that is readily __telligjble to the ind'_vidua_. A record w__ll be kept of all requests and of what information is ditclosed ta an Indiv1dual. 11. There are severa l cate_ories of records that wi I l not be prov._ded to the public: _ Records required to be kept confdential by laws that are exempted from disc1o_ure requirements under Commonwea lth of Pennsylvania RiBht to Know law A_ 3 of 2008_ i lnformation that mee_ the deftnition of ''class'jfjed informati0n" as that term 5 de_ned __ the National SecurjN A_, public la_ 235, sect'_on 6o6 and in accord with Executive Order 13549, Classified Natona _ Securjty tnformatjon _rogram for State, local, Tribal, and Private Se_Of Entities, August 18, 20_0; _ InvestiBatoN records of law enforcement agencies that are exempted from disclosure requirements under Commonwea Ith of Pennsylvania Right to Know Law A_ 3 of 2008. However, certain law enforcement records must be made available for inspe_ion and COpYin_ under Commonwealth of Pennsylvanla Right to Know Law A_ 3 of 2008; _ A record or part of a record the public disclosure of which would have a reasonable 11kelihood 0f threaten1ng public safeN by exposing a vu InerabiliN to terrorist attack is exempted from disclosure requirements under Commonwealth of Pennsylvania Right to Know _w An 3 Of 2oo8. This includes a record mainta1ned by an agency in connectjon with the militaN, homeland security, national defense, law enforcement or other public safeN aniviN that if disclosed would be reasonably l ikely to Jeopardize or threaten public safeN or preparedness or publiC protection a_1vity or a record that is designated classi_ed by an appropriate federal or S_te m i l ita N a uthority; _ Prote_ed federal, state, local, or triba l records, which may include records ori_inated and controlled by another agencv that cannot, under 18 Pa C.S. _9J06, be 5hared without permission; and, _ A violation of an authorized nondisclosure agreement 4nder _8 Pa C.S. _9_O6.

13

1_ _ ; _,

28oo s 2o t B_4 6 2 fl _ n _ h __ _ _ h pA _ p ___nts

12_ An audit _rail _uFF1c_ent to al Inw the jdentin_cation of each indiv_dual who __e_sed _nformat_ ' feta1ned bY _VIC _nd _he na_Ur_ of the 1nformation accessed wi_ _ be kept by 0vlc, t3, _VlC wiIl adhere to th_ current version of t_e _sE-sAR fun_ional standard for the report_ng of _effOfiSm_felated _U__1cioUs a_jviN in the fsE, __nclud'_ng the use of a standard repo_ng format _nd COmmOnIY aCC__t_d da_ collecton code5 and a shar'_ng proce_s that compl_es wjth _he l5E_5AR func_1onal S_andard for suspicious a_iviN potent__aIly rela_ed _o terror'jsm. 14, If an indiV_dUal ha5 a comptaint with regard to the accuracy or complteness of terrori_m-related _fOte_ed informatio_ that: _a_ i_ eXempt from disclo_ure, (b) has been or may be shared throUgh the IS_, (1) i_ held bY DVIC and (2) alleeedly has resulted '_n demonstrable harm to the complainan_/ DVIC wll inform the individua l or the procedure for s_bmittjn_ an4 resolv'lng such comptain_. Comptain_ _n be tent bY mail to the centCr'_ Priva_ o1Mcer _t the foflowjng address. Delavvare Valley Intelligen Ce Centef_ th st nd . , 1g1_s com _ai . fe_, _ , 00f, Atte_tion: DVtC Privacy O icef P l a e p la_ _ Can aISO be reCeiVed bY the Privacy Policy om_cer v'_a telephone at (215) 897-0800_ The PriVaN O_ICer Will refer the complaint to the pr;vacy po_jcy commttee, where i_ will be fevieWed and f neCeSSaN, referred to legal counseJ. The commi_ee w___ not confirm t_e existence or nonexistenCe Of the infOfmation to the Complainant unless othe_jse required by law. _f the informatio_ did _0_ OfiBI_ate with the center, _he Privacy o_'lcer w'lll no_i_ the originating agency in writn_ or ele_roniCallY Wi_hi_ 10 daYS and_ uPon re9uest, a_sist such agency to correct any identified data/record defiCienCIeS, PUr_e the information, or veriN that the record is accurate. Al_ nformation held by 0VIC that is the sUbJe_ Of a complaint Will be revi@wed withjn 3o days and confirmed or corre_edJpufged if determi_ed tO be i_aCcUrate or incomplete, to include incorre_ly merged information, or to be out of d_t__ tf there lS nO resolution wthn 30 days, _Vlc will not 5hare the jnformation until such time as the compIai__ haS bee_ reSOlVed. A record will be kept by DVlC of all complaints and the resulting a_ion taken i_ reSPOnSe tO the complaint.

_5. To delineate prote_ed information shared through the lSE from other data, the DVIC manta_S records of agencies 5haring terrorism-related information and employs system mechanisms to identi_ _he originating agenN when the nformation is shared.

lnformation Retenton and De_ru_'_on

___lr

_, lnformation retained by Dv_c w_ll __ r_ufewm_ r__ m_f_l__ On a_ __nUal baSi_ aS e__a_l_shed by 18 Pa C.S. 91o6. VVhen informa_ton h_s n_ _urtl__r v_lM_ _f mC__5 _h_ Cfitef1a fOf fe_OV_l Undef 18 Pa C.S_ 91o6 and 2g cfR pa_ 23, i_ _fl_ _e _ur__4; cl_sLr4y_d, __le__d_ or f?tUf__d tO the SUbmi_ing source. A record of information _o be rev___ed __r __?__tl__ Wlll _e _a__?_1_ed bY DVlC_ a_d fOf appropriate systems, not'_ce w'_ll be gj'ven _o the __bml_tl_e ______Y _t l__tt 3_ d__YS Pr_0r tO th_ re9U_fed reVieW and validation/purge date. No appr_v_l will __ re_ul__m rr4m _h_ orI_in_ti__ __enCY befOre infOrmation held by _vlc is destroyed or fetur_e_ f_ _cc4r____e_ WI__ _h1S __l1CY Of _S Oth_fWiSe a_feed U_On With the origj'nat'_ng agency in _ p___cfp__1__ _r m_m___stl2p _ef__m_nt_ The pUf_in_ Of femOVal Of da_ shall be approved by a sup@rv'__of 1_ __ord___e vvt_h ____1__bl_ OVlC _dm1_iStfatVe fe_UIatiOnS. 2. According to 1g pa c.s. gg1a_, _vlc _fl! _ur_? _n__ll_6_nC_ i_fOfmat10n Under the fOllOWing condi_ions: (a) the data __s no laneer r_lev__t _r __c____ry _o th_ __al_ and obieC_iV_t Of the DVICJ (b) the data has become obsolete, ma____ __ unref___le Fof _re_e__ _U_po___ _nd _h_ Utiliy Of UPdatin_ the data would be wo_hless, or (c) th_ da_a Gann0e b_ u_Ilf2__ rur _____eeIc ar ta_iC_I _telli_en Ce StUdieS-

AccountabiliN and Enforcement 1. The poIjcy establish4fng pro_ections 0F priv_cy, civ1I r_chts, and civil libe_ieS wilI be made aVailable tO the public on request and w'_l_ be posted on _he DVfC public web_ite (GUrfentlY bein_ eStabliShed and poli_ will be posted as soon as the site is ubli_hed_. 2. DVIC personnel or other author'j2ed users shall repo_ errors and suspe_. ed or confirmed violations of center poIicies relatin_ to prote_ed information to the cente_s Privaty O__cer, who will refer the ma_er to the 0vlC PrivaN Comminee. DVfC has established a Pr1vacY Po1icY Commi_ee which is _ responsible for receivng and responding to inquir1es and camplaints about privacYF civiI rights, and civil libenies prote_ions in the information systcm_ Commt_tee members shalI receive training in the prote_ion of priva_, civil rights, and civil Iiberties. The comm1ttee's point of contact is the DVIC Privacy Omcer or fusion Center Director, who can be contacted by phone at (215) 897-0800. Additionally external inquiries and complain_s can be directed to the commi_ee through the PubIfc Information O_icer. The Public _nformat1on ONicer can be con_acted by phone at (215) 897-0800. Any compla'_nts Or reports of viol_tions of depanment poficie5 by _VIC personnel vvill be handled through appropr'_ate Internal DVIC policies and procedures. Inqulr_es or compfaints that _re received by the commjttee InVolving non-DVlC personnel will be directed to the Privacy O_icer and Fuslon Center 0irector _ho __ll fePO_ the ma_er to the employee's age_cy, Inrorma_ion rec_ived bY the 0VIC pe_a1n1ng to civl rights Or Civil libe_ies, wilI be immed1ately rorw_rded t0 the Pr_vacy Comm1ttee for consideration and/or a_ion. 3. Pfimay responsibiliN for the operat_on oF thi5 Ju_ttce lnformation _ystem, includng operat'_ons,_ COOfdination of personnel; the receiv_ng, seek1ne, retentlon, evaluation, 1nf0rmat_on qualiN, analys_s, de_fU_ion, Sharin_, and disclosure o_ information; _nd the enf_rcement of this po_jN is assigned to th Dire_or of the 0elaware Vallev Intel ljgence Center, _5

6pr7d8s___t_pr_ese1t0__ls2tDAnDctu_vgecvrrTocd_tt__ Nc0eycousertswpcdewhlrsltte_eetl_o_lava_olreet0nrtave_d_vnettoplcutcpruepoeror/ue_lfgln*__b_f__rcfn__e._doa___fecp_por5ssmprerlomte_x__lhnlctc_eaaaoae_lt_otbbrpl4ndo_t___e_sn_wl,__ebd_u_tl_ylnt_nt__nshpdcdbp_e_l_ewcoe5ll__rmo_h AsaunroomaRraen_uhneln__n_atneeervdaf__lde0r_es_rraboo_m2uuenar__aeclny_h_hndct;to_m_0F_rt0_ne___t_h2_lcaaeep___er_nnd_anetr_lte_o_t_gd23rtb___he__?pta___pa_tNpea_nfg_re__rrD_oyal5_n5_e__ebuged_c_dFth_g_aavtmFpc0nda0he_5Fd_50_xe_att___d0rageN_y9_)wptosn1x_e_oslla_em_d6__s_mttt_na__00_0ep_tnmdr_oso__lbnrvtaedue_lnd__ssdnxdeteltngdcoJgtluaoyrter__bsenc4eesdtsw_Dudstvretlat____etd_hcasl i_nated _vlc Fus1_n ce_?_r _ecur_y ____r _ruIl___me ____ 1_ ) __ re5__ t b te fo_ ha_ d 1 i_g _n at_ons w_t_ reg_fd __ thf_ _o__cy. 7he _ec__y o___r 5haE t r__i_e appr0pr 1at_ tr_ in ing _afegu__dng and _ecuri_y of nrorm___on, The _ac4rify _c_r s_al_ r_pok al l error_ ar tlo_atio,_ of th__ pol1cy _o x_e pr_v_?y Commi__e_ _nd _he Fus1on __f _ire_r, itl est_b_1sh procedur__, pra_ice_/ and _ystem pro__M _5 an d u_e 5o mvare, in forma_ ion to0_s, and p_ys_cal _ecur'jty mea_ure_ that _r_e_ jnr____0n _om _nauthori_ed access, if_cat_on, the_, or sab__ee, whether _n_cr_al or ex_ernal, nn_ _he_er due to natu_l or human sasters or _n_rusi0_5. The meth_d_ and technque5 ___ d 5 ha l l c0mp ly w i t h secur i y requ'_remen_s outl1ned in _8 P_ C,S_ _9_O6,

regulations. require such access,_ who h_ve succes_fuIly comp_eted _ bar_g_0_n_ _he_ k an d r_a in aPProPr a te g. auer'_es made _o Dv_c's _a_a applica__a_s vIl b_ log_ed __o _h_ d_ N_em _ den _ Fv in_ the user _nitating the queN. 1o. Dv1c wi tl utfize _atch logs _o m__nt_ 1n __d _t _r_l_ o_ reque5_e _ an d d j_5e_ na te d i nrorma t on, 11. 0v_c wilI adopt and fol1ow p_oc_d__e_ and pra___ _ mh__h t _n __5ure an d eva Iu_ te t he mpliance of users _nd the system j__el_ with the pr__isi0n5 __ __s _____ am d app __ b l_ law, T h 1_ w i l l '_nclude log_'jn_ accest to the_e _ystems and perad_c a_d_ng Of __ ___m, so a_ fo not es ta b l is h a attern of t_e _udits. These _ud_ts w__lI be m_ndated a_ 1_a_ an__al_ _n_ a _e_rd o f _ he au d i_ w l l be maintained by the _V1C s?curity oMcer. publ_cly avalable data. the just_ce '_nformat_on system. The audI_ wilf b_ co_du_d ann_a __y an d nn d__ Iy by a des gna te d manner so as ta protect the confide_tial iN, sens___viN, and p_Na_ 0_ in_orm_on, 1_. _vlC w1_l requ1re any ind1v_dual5 a_thor_2_d to u_e __e N__ _ a _o_ _ gd_e re_ 1_ t o f t h e P o l } Y __rmat, wiIl be made ava'_lable to alI ind_vi_uals autho_z_ _ w_ _e 5yst_m,

15. DVlC reseNes the right to restti_ the qua_ifications and n_mber of personnel hav'_ng access to Dvlc informaton and to suspend of Withhold seNite and deny access to any pa_icjpat'_ng agen_ or participating __enN personnel vialating DVlC's privaN policy. 16. The Privacy Policy Commi_ee Will liaiSe with the communiN to ensure that privaN and civil righ_ are protected as provided in _his poIicy and by the center's nformatian-gathering and coIlection, retenti0n, and dissemination pfOceSSes and procedures. The commi_ee will annualIy rev'_ew and update the provisions prote_ing priva?y, civil rights, and civil libenies in its pol'_c__es and make appropriate chanBes in response to changes in applicable law _nd pubfic expe_ations. This document can be altered and expanded a_ the ISE and other sharing systems are deFined and implemented. 17. lf a user is suspe_ed of or found to be not complying with the provisions of this pol iN regarding the colle_ion, use, retention, destru_ion, sharing, classifica_ion, or disclosure of information, DVIC will: (a) suspend or discontinue access to inFormation by the user; (b) su_pend, demote, transfer, or terminate the person as permitted by applicable personnel policies; _c) apply other san_ions or administrative a_ions as provided in agen_ personnel policies; (d) reques_ the agenN, organzation, contra_or, or seNice provder employing the user to initiate proceedin_s to discipline th_ user or enforce the poIi_s prouisions; or (e) refer the matter to appropriate authorities for crimina l prosecution, as necessaN. 18. In compliance with Pennsylvania's Breach of Personal _nformation Noti_cation A_, DVIC will notitjr individuals if their persona l information is compFomised by a breach of computer securiN.

Traning 1. The 0VIC will require annual training for the following individuals regarding implementation of and adherence to the privacy policy: _ Any person that is granted dire_ access to DVIC information _ Personnel authorized to share protected information through the Information Sharing Environment. 2, The DVtC's priva_ poliN tra ining program will cover: _ Purposes ofthe privaN, civil rights, and civit liberties prote_ion poliN; _ Substance and inten_ of the provisions of the policy rel_ting to cofle_ion, use, anaIYsis, retenton, destru_ion, sharing, and disc_osur_e 0f information retained by the DVIC; _ Ori_inating and pa_icipating agenN responsibilities and obli_ations under applicable law and poliN; _ Ho_ to impIement the policy in the day-to-day work of the user, whether a paper or systemt USef; _ The impa_ of improper a_ivities associated with infractions within, or through, the agen_; _ Mechanisms for repo_ing violations of DVlC privaN-prote_ion polic_es; and _7

? The n__Y?_ ___ m_____le __f___?__t f_r P0___ Vi_f_t__5, __cE_d1_e ?_5_;b__ __n__ef, ___m;,_x ___m____ t1_b1t1_y_ and _mmun_t_, _f _ny_

_ha_'__g _f lnfa_____n _m0n_ PaM_pan_ _, _a_?ttpa_j__ aeent_es ___h a mem_F__dU_ Of ___r_nding 0t p01_ies a_d pFQcgdu_5 ___ _____ '_nternat pol;c_s _nd or___durct r_qU_rjn_ _he pa_i_patng _gen_, i_ pe_0nnel, __n_a_o__ amd ___ eo: (a} 0nly _eek 0r re____ ___urmat__ _ha_ is 1egattY permjs_bJe f0r the age__ t_ 5ee4 _r ___n w_dgf Jaw_ appI2cab_e t_ th_ _e__?; lb_ O__Y U__ la_I meanS _o _ee_ _a_mat?on; {c_ an1_ seek __d fe___ nf_rma__o_ _h_t __ ref__blY _CtuFate, cUFFe_, and c0mp_ete, n_udJng the c_mplete, re_gyan_ c__t?_x_ (d) t_he app___ria__ s_ep_ _he_ merging info_a_n a__ a_ n___d_al _r 0_ani_at?_Qn ___ __ __ m_r_ t_urce5 _o _n5Ur_ _hat t_e jnf_rma_Dn is a__ the same ndi_dual _f 0__n____^_0n and _ refGrenced a_ to Xhe _owrce; (__ inve5tig_te in a _mefy manne_ anv at1e_ed erran a__ corre_ Q_ de_gtc _nrorrn__}on f__nd __ b_ erroneous; (_ _e__n nr0rma_on _a_ght ar recej_ed an_y s_ lo_e _s 4_t _s cet_vant a_d _me_y, _n_ _el___ _r r__?rn 1_fo_mati_n that 5 nac_nt__ Du_dated, ar __h_rw__ no l___eF _t___ __ hn0wn _r _____c__d _r1m_nal, ncI__in_ terr___t, n_ivj_5e5; fg! manta1n ___rm_t_o_ and s_t__ c_mta_n_rl 1nF4rm__1_n _n _ _hy_2ca_1y nn_ cJe_ranjul__ 5e__r_ envr0nme__ artd _r___cte_ fr_m na_r__ _r man___de _1c__Lers _r _r1___5__n_; __) cnnm__ in c_t_a_;__ an_ _n_l___ _f '___rm_ti__ __ _ m__n_r e_aE c____rmm _n een_r_l_y tcce__c_ mr__t_ce_; (!t e__a__;_h __Me_ure_ _h__ __mmty _1th th _ml1_t_s ___ mr_v____5 _r th_ ju__1__ _nF_r_m____ s_ari__ sv____ f_T a______ _n___m____n Thr_u_h t__ ___t_?_p____ __ency; __ mnly mll__ __(hu_l2__ ____ _m acc_5_ thE ;____Matj__ t_ __e _h____ _y9t_m _?_4 _n__ f0_ Fu__e5__ ___l_t__ t_ _l__ __rI?_mm_cc _f __c_! _1__J_ ___ic_; ___ sh_F? __f_r___m_ w9_h _4_her!_em ___ a_ 4theF tu_t_c_ _y_t_m __r__c__ _____ __lv G_ s ^_h_x___n__? a__ _ m__e___m_m__wN ___f_; _n_ _?) e_;__I___; ___ t_m?_v w_l_1 _;__a_mat?__ M_@____M __ 4_____;__ ______fe__ g_ t_f_fm_____ __;ml___ __a_ _V__ m__ __t _ 4__ _ __1i___ 4xl____ _er p?1_y___ __her th__ _h__ _me_?Tt_4 __ _h_ ___m?___?__ __ ____r__?n4__, _m_____n __n_ __ _l?, __m__s_eU, __4___ge_, __ ___c___c_ ?_; _mm_r_?I ____?s___ __s____ _ ___t__h_ _t__ _F(_F _____v?l _ ___ c_n_F_b?_?__ a_en_v; 0_ _ 1__?_ fm__4 tn ?_aw?h__1__ ___m_

___ __d _1_e_a_u_ 0_ ________ Q___?__ __ an___ _M___g &gm_ __ lnf0t_at_nu_ q_____e_4 3n_ ___t____ _ _ _ __R______ a__y_ __t t_ ____e_ _ __ ___em_n_t__ __ _ ______?___ ____N _F _? _ ___ _ _iS_e____ _ _ Eh:Cd __ W_____ ___ cX_r__s c_n_e_t Q_ t_e a_____t__ a_e_N_ 2_ _he_ _ __ME______n ____N Ga_heM _ __ fm_____m __ 5_Mt_ ___ __M___ _f_e_n__lne _r__ 0n_t__r 4_e_ m__ b5 a_r___s, _a_ __e ______ m___ _M___ _ lme_ _e__u__ ____ _he _ft___ e___ __ _ __m__ _m ___rM _ _ ___ ______ _ _ er______6 _____ t_ _____ ___ a_l_e_ er_r_x __

__

AppendixA_Terms and De_nitions Atce5s-_at_ afceSS_ refefS tO _he abl liN tO _et tO (USUa IlY haVin_ _efmiStion to use) pa_icular da_a' on g computeF, Web acte_S fefefS tO _aVin_ a COnne__On tO the WOfId Wide Web through an access pfov9der or _n online seNice pravider_ _a_a acceSs iS UsUally s_ecified as read-only or read/write access. W1th regard to the Informat10n Sh_fin_ EnVifOnment, aCCeSS fefefs t0 the business rules, means, _nd proce_tes bY, and thfOU_h Wh_Ch, IrtfOrmatOn Sharin_ EnVrO_ment pa_icipants obtajn terror_m_ related inform_tion, to include homeIand secufiN information, terrorism informa_on, _nd faw enforcement inf0rmatio_ _cqu_red n the first instance bY another Information Sharing Environment p_rticipant. Access Cont_ol-Mechanisms f0r Iimiting acccs_ to ce_ain information based on a use_s ident__N and membership in various prede_jned groups, Access contral can be mandatoN, discretionaN, or rolebased. Acquistion-The means by whlch an lnformation 5haring Environment pa_cipant obtans nfo_mation through the exercise of its author1ties; For example, throu_h human intel1i_ence colle_ion or _om a foreign partner. For the purposes of this definition, acquisition does not refer to the obtainin_ 0_ information _idely available to othef In Formation Sharing Environment pa_icpants, for _mple, through news repo_s or by abtaining information from another Informaton Sharing Environment pa_icipant who original Iy acquired the information, ABen_-Agency refers to the DVIC and all agencies that access, contribute, and share informati_n in the DVICJs Justice information system. Audjt Trail-A _enerjc term for recording (logging} a sequence of a_ivties. In computer and neNvoFk conte_s, an aud'_t trail _racks the sequence of activities on a system, such a_ user log-ins and tog-ou_. more expans__ve aud_jt tra_I mechanisms would record each user's a_iviN in detail; what commands were ssued to the system, _hat records and files were accessed or modified, etc. Aud_t trails _re a fundamental pa_ of computer securty and are used to trace _albeit, us_ally retr0spe_ively_ unaut_orj'2ed users and uses. They _n also be u_ed to assist wth information re_oveN in the event of a system fai1ure. Authentication_The process of valida___ng the credentials of a person, computer proc_s, or devi_, Authentication requ_res that _he person, process, or device making the reauest provides adequate credentials _hat prove identiN. common forms of credentials are digital ce_i_cates, digital si_natures, sma_ cards, biometrics data, and _ combjnation of uSef names and pas Swords, See BiOmetfiM. Aut_ori_ation_T_e process of granting a person, CompUter pfOteSs, Of deViCe aCCeSS tO C__in ;nforma_on, seN;ces, or fun_ionality. Autho Fizat_on is derjved from the ldentiN of the _efSOn, ter pr_cess, o, device requesting access, and that is veri_ed throuBh aUthenti__On_ See Authentjcation .

__ _ he _rst toemnp

Authori_ed User-A pef_on that _s gran_ed dlre_ _cces5 to _vtc info_mati Biometri_-BiOmetficS method5 can _E divided nto mo _te__r__s; physiofog__ Implemen_t0ns ofthe former include face, eye (retina or __r'js_, nnger _nngen_p, th pa_ern), palm (Print Or tOPO_ra_hY), and hand eeametN. _mplementations of _he _,ne, _,nc_ud vo'_ceprin_ and h_ndwri_en signa_ures_ Cv_l _be_ie5-Civil libe_ie_ are fundam_ntal individu_l r__gh_ such as freed religion; due prDcess of faw; and other l1mitations on the power of t_e eovernment to rg_,ain or d;m the a_ions of individual5. mey are the freedoms that are guaranteed by the B_l_ of R;gh_, t Amendments to the Con_titution of the _nited States* civil lbe___es o_er prote_ion to nd;vidu,_s fr _mprOpef _OVernment a_iOn and arbi_raN governmental nte_erence, GeneraIly, the term _Jcivil rg_ts__ _nvoIVeS _OSitiVe (OF amfmative} _oVefnme_t a_ion, _hile the te Fm "'civ1l libe_ies7_ invo_ves res_fi_ions ongovernment, CiviI Rights-The _erm ''civil righ_"' is used to imply that the state has a role 'jn e_surjn 6 that afl c'_.j2ens have equal ptOte_ion under the law __d equal opportuniN t_ exercise the prvjleees of c'jt_j2enshj regardle_s of race, religion, ge_der, or other chara_eristjcs _nrela_ed to the _o__ of the _ndv_'dual,N therefor_ civil rgh_ a_e obliea_ions imposed on goveF_ment ta pr0m0te equaliy. more spec._n_cally_ they are th_ righ__ to personal libe_ guaranteed to all Unted sntes c_'t'_2ens by _he Th'__eenth _nd fou_eenth Amndments and by a_ of Congress, Computcr _ecurity-The prote__on of informat1on ___et5 _hrou_h the u__ o-ftachnolo_, proces5es, and _raining. Confident__litv_C_nf1denta__N __ clo_ely retated ta pr1v__ _ut i_ not _d_nt1c_l, It refer_ t_ the oblieat_ons oF lnd1v_dual5 a_ nd ln_titut1an_ ta us_ _nr_rmal_o_ under the_r control appr0pr__teIy ance it ha_ been d'_sclosed ta them, One _b5eNe_ ru_e_ _f con_dent1aIW 0ut or resp_ct for, and __ pr__@ct _nd pre_eNe, th_ privacy oF __hers' Se_ Pr_ay_ credent_afs-lnfofm_t_on that includes ident__ca_an and pr_0_ 0f Idcn_i__t_on thm_ _s u_ed to _ain accss to toc_l and ne_work fesource_. Exampf_s of credent1als ar_ user name_, pas5word5, sm_rt _rd_, andce_i__cates. cr_jm'_nal _ntell'_gence _n_rmat1on or 0ata-ln_Drmatan deemed relevant _o the iden_ftat_on oF, and the cr'_m;n_l a_'_v_j_ engaged _n, b_ an indiv_du__ or organlzatan _hat s reatonab1y suspe_ed Of involvement _'n cf_jmjn_I a_. The rgc_rd _ ma_n_ined _n a tr_m___l fntelI_B_nce sy_em per 28 CfR Pa_ 23. Rea5dnable susp;cian applcs _o the inform_tion_ Dat__lne_ symbols, sgns, descrip_ons, or mea_Ur_S_ Dat_ pFDte_-_on_Data protg_ian encompasses the ranB_ 0f legal, tegul_foN, and 1_S__tUtiOn_t mecha__sms _hat gu_jde the colle_ion, use, prote_ion, _nd discl0sure of Informat_0_x

2O

t Di5ClO_Uf_-The f_leaSe_ tfanSfefI prOViSiOn OF acceSS to, sharing, publication, or divu_g__ information in anY mannef_eIe_fOnit, Verbal, or in writing-to an individua_, agen_, or organ___t-, ou_ide the agencY that colle_ed it. Disclosure is an aspe_ or pr'jvaN, focusing on ;nformat-_o, wh_, may be avai lable On IY tO Ce_ain peOpIe for Ce_ai_ pUrpoSe_, but _hjch js not ava_1able t EIe_roni_IlY Maintained-lnformation stored by a computer or on any ete_ronic med_um from w_._ the information may be fetfieved by a computer, for example ele_ron'jc memoN c_ips, maBnetic t magnetic disk, or compa_ disc aptica I medi_ , Ele_fOni_lIY TranSmi_ed-lnfOrmatio_ exchan_ed with a computer using elenronjc media such as t_e movement of informaton from one location to another by ma_netic or optical media, or transmission oVer the lntefnet, intfanet, e_ranet, leased lines, dial-up li_es, priVate net_orks, telephone voice feS_OnSe_ Of _XbaCk _YStems. It does no_ include faxes, telephone ulls, video teleconferencing, or messages 1eft on voicemaiI. Fair Information Pra_ices-The fair Information Pra_ices (fIPs_ are contained within the or_ani2at'_on for Economic Co-operation and Developmen_s Guide Jines on t_e Prote_ion oJPJi_acy ond Trans-border _/ows oJ Person_/ Doto, The5e were developed around commercial transactions and the trans-border exchange of information; hawever, they do provide a straigh_onNard descrpton of underlying prvacy and information exchange principles. They provide a simple framework for the legaI analysis that needs to be done with regard to privacy in integrated justice sy_ems. Some of the indivdual princ1ples may not apply in all instances of an integrated justice system. TheeightFIPsare: 1. Colle_on Limitation Prnciple 2. 0ata Qualiy Principte 3. Purpose Specification Prnciple _. Use Limitation Princip_e 5. SecuriN SafeguaFds Princple 6. OpennesS Principle 7. lndividual Participation Principle 8. AccountabiliN Principle f_rewall_A securJty sofution t_at segregates o_e po_io_ of a ne_ork from an Othef PO_iOn, allOWin_ Dnly authori2ed ne_or_ _ra_jc _o pass throUgh aCCofdin_ tO t_MC-filtefin_ rUleS, Gene,a_ _nfo_at.,o, or 0a___nformation that may intlude fe Cofds, document5, Or fileS Pe_ainin_ tO -_ons such as compu_er_a'_ded dispatch tCA_) data, incident data_ and .fnfofm,t_,on, and ._nform,tion that is maintaingd in a reCords ma_agement, CA_ SY_em, ._st._caf ,etr._eva_ ur oses _nformation may be either resolved or unreSoIVed. The feCOrd iS maintained per _atute, rule, or poliN, ,_ y _,fo,mat-_on_As de_ned in se_ion gg2(_(1) of the Hometand SecurN A_ Of 2002 n 4g2 _ _ome_,nd secu,iN i,formation means any informaton paSSetSed bY a_d tOdi ed at 6 U.S,C. , 21

a federal, state, or loca l a_en Cy that (a) feIates to a threat of terrorist a_iv_N,_ (b) relates to the ab__l prevent, tnterdi_, of ditrU_t teffOrst a_iV1y; (c) wouId improye the __dentification or _nve,t_gat._,n of suspe_ed teffOfiSt Or teffOfiSt Or_ani2atiOn_ Of (d) WOUld improve the response to a terrors_ a_. _dentifi_ton-A pfOteSS WhefebY a feal-World entiN is recognized and ._ts _dentiN es_ab_is_ed. _denti is operationalized in the abstra_ warld of information systems as a set of information about an ent; that uniquely di_erentiates it from other similar entities. The set of 'jnformation may be as sma__ single code specifica 1lY desgned as an identifier, or a collection of data such as a given and fami_ date of b_h, and addfess_ An or_anization,s identification process consjsts of the acquisit_on of t_e reIevant identiFying information. Individual Ret_OntibiliN-Since a privacy policy 1s not self-implementing, an ?jndividua_ within an organization's _ru_ure must also be assigned responsbiliN for enactin_ and implemenn_ng t_e pol i_. lnformation-lnformation ncludes any data about people, organ12ations, events, _jnc'_den_, or obJe_, regardless of the medium in which it exists. Information received by taw enforcement agenc__es can be categorized inta four generaI areas: general data tips and leads data, susp-_c'_ous a___v'jN repo_/ and criminal intelligence infarmation. Info_ation QualiW_lnformation qua IiN refers to vario4s aspe_s of the 'fnformation such as the accuracy and validiN of the a_ual values of the data, data structure, and database/data reposto_ design. Traditi,onal1Y, the basic elemen_ of information quaIiN have been identi_ed as accu_N, completeness, currency, reliabiliN, and context/meanin_, Today, information quali_ is being more fully described in multidimensional mode(s, expanding conventional views of the topic to include considerations of accessibiliy, security, and priva_. lnvasion of PrivaN-lnvasion of privaN can be defined as intrusion on one's solitude or into one's private affairs, public disclosure of embarrassing private information, publiciN that puts one in a fa1se liBht to the public, or appropriation of one's name or pi_ure for personal or commercial advantage. See a/so Right to Pri__cy. _w-As used by this policy, law includes any local, state, or federal conXitution statute, ordinance, regulation, executive order, policy, or court rule, decision, or order as construed by appropriate locat, state, or federal omcials or agencies. law Enforcement Information-for purposes of the lnformation Sharing Environment, law enforcement information means any information obtained by, or of interestto, a Iaw enforcement agenN or o_icial that is both (a) related to terrorism or the securiN of our h0meland; and (b) relevant to a law enforcement miss._on, __ncluding, but not limited to/ information pertaining to an a_ual or potential criminal, civif, or administrative investigation, or a foreign intelligence, counterintel1igence, or counterterrorism investiBation; assessment of, or response to, criminal threats and vutne_biliti_; the existence, organi_at__on, capabilties, p1ans, intentions, vulnerabilities, means, methods, or a_ivjties of individuals or Broup_ involved, or suspe_ed of invo Ivement, in criminal or unla_ul cond__; or aSSi Stin_, or assocjated _ith, crimjnal or unlavvful condu_; the existence, identi_cation, dete_io_, pfeVe_tiOn, 22

interdi_ion, of diSfUptiOn Of, Or feS_OnSe tO CriminaI a_ a_d Viola_ons _ the la_,, identi___ti0n, apprehenSion, proseCUtiOn, reIeaSe, detentiOn, adjudication, supeNision, or rehabili_ation of accused persans or criminal o_enders; and vi_im/witness assi_ance La_UI Permanent ReSide_t-A fOrei_n natio_al who has been granted the privilege of permanentl living and working in the United States. leaSt Pivilege Admini StratiOn-A reCOmmended securiN pra_ice in which eveN user is prov.jded w'fth ' on ly the minimum privileges needed to accompl ish the tasks he or she is author'_zed to pe_orm. Logs-Logs are a necessaN pa_ of an adequate securiN system beuuse they are needed to ensure that data is properly tracked and _hat onfy authori2ed individuats have access to the data. see also Audit Troi/. Mantenance of Informaton-The maintenance of information applies to all forms of' information _orage. -rhis includes ele_ronic systems (for example, databases) and non-e_e_ronic storage systems _for example, __ling cabinets_. To meet access requiremen_, an organization is not required tD create new systems to maintain information, or to maintain information beyond a time when it no longer seNes an organzation's purpose. Metadata-in its simplest form, metadata is information (data) about information; more specifically, nfDrmation about a particular aspect of the colle_ed information. An item of metadata may describe an individual content item or a coIlection of content items- Me_data is used to faciIitate the understanding, use, and management of information. The metadata required for this will vaN based on the Npe of information and the context of use. Need to Know - ns a result of jurisdic_ional, organizationa1, or ope_tional necessities, access to sensitive informaton or nteIligence is necessaN for the condu_ of an indvidua1's Dmcial duties _s pa_ of an organization that has a right to know the informa_on in the pe_ormance 0f a law enforcement, h_meland secur'__, or counter-terrorism ac_iviN, such as to fu_her an investigaton or meet another law enforcement req ui remen_. Non-repud._at-_on-A technique used to ensure that s0meone pe_orming an a_iOn On a COmPUtef _nnot falsely deny t_at he or she pe_ormed that action. Non-repudiation providet unden1able pfOOf that a user took a spec__f'_c act'_on, such as transfefring moneY, authofizinB a _UfChaSe, Of Sendin_ a messa_e. pe_issions_Authorzation to pe_orm operations associated Wth a SpeCi_c shafed reSOUfCe, SUCh a5 a __le, direnoN, or pr_nter. perm_ssions must be granted by the SyStem admi_i Stfatof tO indiVidUal USef a_0un_ or admnistrative groups. pe_onal Data_pe,so,a_ d,ta refers to any information that relates to an ide_tifiable indiVidUal. See o Is0 Pe_sonally /dent__ble /n/ormation,

p_m___et;__NJ_ee_;_ _ _ PeM0_al_ tde_tm_ ab__ l_FOrm_t1a_-P_rsonafIV iden_ifiab1e i_fo_a_;0_ ;_ nne __ ___ ?f__ _e 1_f0fma_D_ _h___ _he_ C0_S_def_d to$ether or n _he con_ext of ha_ _he __;_cma_;Q_ ;? p______ _f __th____ _re __ti___tO _Peti_ a UniqUe __dYidual, The pieces of ;nf0rm_t_on __ _e__ ^ Pe_____ Ch_Fa_et!S_!4 ttUch as hei_ht, _e_ghc, gender, sexual or__en_t'_on, d_te 6e b__h, __n, __;r tDtOf_ e_C CO_0fI faCeI eth_itN, Stars, marks, tattoos, gang aml_atjon, relig_ou5 _ftjf;_t_m, ____e _ b__h_ M_he_5 m_ide_ _ame, diStingUShing features, and biometri_ jnf0_m___a_ ___ __ _n_e____, 0NA, and retnal scans). ' n U__9_e 5_t Of nUmberS Or _afa_er5 assigned to a speci_c indivdual (inc_udng name, _d__?__ _h0__ _Umber_ 50Cial __UrN __mber, e-maiI eddress, drjvefs ljcense number, _nan_;at a_Du__ _F _edt _rd _Umbef and assotiated PIN numbeF, _ntegrat_ Aut0ma_ed _?nBerpn'n_ _den__;0n Sy5_em _1AfISl id_n_ifier, 0_ booking or detenton sy_em number_. _ __SCnPt90_5 Of eVe_t(_t or p0jn_ in tjme (for _ample, inf_rmation in documen_ such a_ p____ te___, a_e_ rep___, and med_l fetords). _ 0eX_iP__0n_ Of 1o_ton(s) or place(5) _includng ge0gnphic jnformati0n sy5te_s E___J _0__a_e e___rOn_c b_ac_l_ moni_0ring information, etc.). P____5_m_tU_ive 0rdr 12333 de_ne_ "United 5tates pers0ns_ as _nited S_ates tit_zens, a_e_ _n_m b1 _e nte__igenc_ _genN c0_5idered to be permanen_ re_iden_ aliens, an un_n__?parate_ a__C____M SMb____l_y _mpa5ed of Un__ed 5t_tes cjtizems 0r pgfman_nt resi_ent _len_, _f a _rp__1__ _c_cF_Faed n _he U_t_d ___t_, gxcept fof a cofponti0n d_re_ed __d cantrQ_t_d by _ f_fc__n _N__nmen_ _r __vernmen_, For the j_tellegnce commun___ an_ f0r dame_t?t l_w enf_f__m_M_ a_e_c_, X_er5ans"" me_n5 United __tes ctzen_ and _a_u_ p_rm_ne_t r__im_nt_. pr___NH_rva_ f_fers __ _n___vdu_f_' _'__e_c_ _n m_v___1ne __e _n_p_r_er{?__ ce1_e__o__ WX_ __m te_e___ o_ __f5___l ___f0rm______ _f_'v_N __t_r___ ___ude pr1__N __ m_r____l beh_v__;, _C1V__ __ pgr?____ c0mm_n;c__'____, _n_ mriv__ _f m_rs_na_ d__, at__r _eF_____n5 ar Fr1v_N _ncf_d_ _h_ ___C__Y __ be _hv_;_l__ 1__ _l___ (_aIE___e),_ _0 __ f__e _f_m phv____t _n_mr__fe_c_, __f___, 4r u_w____ _44_hi_m f____u__, ____N_; __ __ ava___ __1n4 _een _ra_erheard __ _a_:_ta_ _4ntex_, ____N __1_y_ A _f;_e_, pu_1es___ ____e_cn_ _h_e a_c_l___5 _h_ p__tN p__t2Q_ 0_ _n a____12_____ _n 1___ _t __n__e_ _h_ __r____E l_fQrm_____ ____ _t ____e_ __d _X_ __ _h_ _QFMa_ ca_r5_ __ _U______ ThM ____d ;_c;_d_ inFa_M_t;0n rglatng e_ the pf0c____ __ __forma_!__ 4___e_f___ __m t ___ _1__n_n,e, _ts__;__t_pn_ _,_ ,c__5. The pufp0_g _ eh_ pf___N p_f_N __ X0 _M__ l_te _ __t t h_ ;_; _d__,, _a ___se _e__t r_u;r_em_ ___ age__J_nter po__N detctm;_____m_ th_ _n_ _md _h__;ne _f ;nfofm__!__ __ 04cuf _n a man_ef e___ pr_?_C_ p_f__ _ _f ___ ;nt_,g_m A w,___4ev__?p_d ,_d ;mpfeme,t_d pr_N _0t_N _s_ __5____ e__ity _e_urm5 _ __ ?V _ _ _ tfg_,___t_,h p,_t_ __, ____N, t_e ;__;v_dua_, and the __bI_c; __d pf_m0teS pYb__C ___t_ . __te_.o,_ A r0c__, 0f _ax;mx__;,_ _h_ p,,__;0_ af pf;yaN, c;vj_ __h_, aMd ___ ____m_ __,g an_ ,ha,__e _nf,_,_._,n _,, t_e p,___5 0f _f__e___g pu_I;c _a?eN and publ1_ h__h x _,nfo,m,__o, q____de_ penona_ ___ _b0_t ?_di__u___ _h__ __ __ __ ,r ot_,r leg,_ p,0,__0n_ _ _,,, _n__d;_e _e _,s. __s____ _ 0 _m0_a___ _ ._,_,,, _pp___b_e ?ede,_ _,tu_es amd f_gula___s, __ch a_ __ _ ng eF_

CFR Part 23; applicable State and tribaI consttutions; and applicable state, _o_l, and _iba_ laws and ordinances. Prote_iOn maY atSO be e_ended to organi2atio_s by center potiN or _te, lo_t, 0f trbal 1aw. publ'_c_P ub _ i c i ncludes: _ Any person and any for-pro_t or nonpro_t entiN, organization, or association; _ Any governmentat entiy for which there is no existing speci_c law authoriz__ng acce_ to the agenN's/cente_s inform ation; _ Media or_ani2ations; and _ Entities that seek, receive, or d isseminate information for whatever reason, regardless of whether it is done with the intent of making a pro_t, and without distin_ion as to the nature or intent of those requesting information from the agen_. Public does not include: _ Emp_oyees of the agency; _ Peopte or entities, private or governmental, who assist the a BenN/center n the opera_an of the justice information sy_em; and _ Public agencies whose authority to access information gathered and retained by the agenN/center is specified in law. Public Access-Publ ic access relates to what information can be seen by the pub__c, that is, informa_on whose availabiliN is not subject to privacy interests or rights. Record-Any item, collection, or groupng oF informat0n that includes personally denti_able information and is maintained, colle_ed, used, or disseminated by, or for, the colle_inB a_enN or organ ization, Redress-lnternal procedures to address complaints from persons regarding pr0_e___ informaton about them that s under the agenctfs/cente_s control. Repud1ation-The abiliy of a user to deny having pe_ormed an a_ion that ather pa__es cannot prove othe_ise; for example, a user who deleted a file can successfully deny d0ing so if no mechanism (such as audit files) can contradict th_t clai_. Retention-Re/er to Storage. Right to Mow - Based on _av__ng legal authoriy or responsibiliy or punuant to an a_hOr2ed agreement, an agency or ofganjzation is authori2ed to atcess senSi_Ve infotmation and ntelli_en_ n the pe_ormante of a la_ enforcement, homeland securiN, or counte_ertOfiSm a_iVi_.

Right to Privacy-The riBht to be le_ alone in the absence of some rea_onab_e publ_c -_nterest 1n gathering, retaininB, and sharing information about a person's a_ivities. Invasion ofthe r-j_ht to pr_Na can be the ba5s for a Iawsu it for dama_es aBa inst the person 0r entiN violat1n_ a _erson's pr'jvaN. Role-Based Authori_ation-A Npe of authori2ation that uses roIes to determine access FiBhts and privileges. A role is a symbol ic categoN of users that share the same seurity privile_e. Security-SecuriN refer_ to the range of administrative, techncal, and physical business pra_-_ces and mechanisms that aim to preseNe privaN and con_dent1ality by restri_inB information access to , authorized users for authorized purposes. Computer and communicatons securiN e_o_s also have the _oal of ensuring the accuracy and timety availabiliN of data for the le_itimate user set as well as promoting failure resistance in the eIe_ronicsy5t_ms overall. Storage-In a computer, storage is the place where data is heId in an ele_romagnetic or optical form for access by a computer processor. There are tNo general usages: 1. Storage is frequently used to mean the devices and data connected to the computer through input/output operations-that is, hard disk and tape systems and other forms of stora_e that do not incI4de computer memoN and other in-computer storage. This meaning is prabably more common in the IT industN than meaning 2. 2. In a more formal usage/ s_orage has been divded into (1) primaN storage, whch holds data in memoN (sometimes called random access memoN or RAM) and other ''buil_-in', devces such as the processo_s L1 cache; and (2) secondaN storage, which holds data on hard disks, tapes, and other devices requirin_ inpuf/output operations. Primay storage is much faster to access than seconday storage because of the proximiy of the storage to the processor, or because of the nature of the storage devices. On the other hand, secondaN storage can hold much more data than primary st_rage. With regard to the Information Sharng Environment, storage (or retention) refers to the storage and safeguarding ofterrorism-related information, to include homeIand security information, terrorism informaton, and law enforcement information relating to terrorism or the security of our homeIand, by both the originator of the information and any recipient of the information, S4spiciou_ A_iviN-Suspicious a_iviN is de_ned as "Jrepo_ed or obseNed a_iviy and/or behavior that, based on an otficer's traning and experience, is believed to be indicative of intetligence gathering or preoperational planning related to terrorism, criminal, or other llicit intention.'' Examples of suspicious activi_ incIude surveiIlance, photography of facilities, site breach or physical intruson, cyber a_acks, testing of securiy, etc. Suspicious A_ivity Repons-The obse_ation and documentation of a suspicious a_iviy, At the federal Ievel, there are two types of SARs: 1) Information Sharing Environment SARS that _e_ain tO teffOfiSm information,_ and 2) Banking SecreN Act SARs that pertain to s4spicious banhin_ a_iViN and are required to be completed by _nancial institutions. Suspicous a_iviy repo_ o_ef a Sta_dafdi2ed mea_S 26

_v9___ a _r __G___ ___________ __,____4_le_ __ u___ an_____s x___,, p,____ ___,_;_ M_V _e ____m_____ __ ___d;____mn ____ the rep___tng __,nN ___ ;_ ___?___e_ _____, __5 a_e __ _nt__ded e0 be uted t_ _ac_ a, fe_?_ ,_e_,__ __;N__e_;? ____;;_ 1_V__t_' ___Na______J__, ___ _Fe _hey de5gned _o sup___ ?_ntgra__n_ _t_ ;__ __m ___0f__M ______Mh________ __th s_'on 10_6(,)(q_ ,f _____, ,__ ;n_,_m____ _c;___ _ _ __ _ __ _Xt5_____ _f________, __a_j9N_ie_, pI_ns, jnten_0_s, yu1ng_b;____e_, ____s _ _____e __ ___'__5 ?____t_ 4? _________ _ ?_fe_g_ _r n_er_ation, _ _eff0___ _f_up_ ,_ e__x_?_v_?_ __ M? ___;J _n_iv______ X__J_?_ __ ____s_at;_ma_ te?fofism, (b) t_cea_ p,,_ _ t_m e,___, _? ;,_;____t_ _ n V_i___ __?__, _____ 5__e__ _efs_n5, 0r un_ted s_,t_ inte,_ 0, e, __e ;______ e_ ____ __e_0m_, _c; _mm____M___ _ __ _J __h ef_up5 or 'jnd_duals, 0r c_) 0mef _T__g __ (___w___ rg__m___ _e1__c_ __ _ _s___n_ _r _e____a_ed wit_ s,ch g,0ups or -_,d_m_ T_r______l3t_ ?_nrmati0___n _ccordance w__ _gTp_, ,5 ,e_,_v a_en__ __ ___ _J__ C_m_iS_i_m __ _______ __ __eu_t 3, 2oo7 (p._ 110_53), me _n____'a? 5h___e Env_F______ F_t)_t__5 ___ __h__i_g _ __?f4___m ;nf0fm,ton, __nc_ud_,n_ _g,_n5 ,_ _as, de______ t_ffm?_;_n, __m __m__a__ _n ____ __f__me_'j_n, __ def;ned in _RTpA se_;,_ _____@_ _s_ __d th_ __m___m_ xc4f____ __ _92__ ___ _5 ____C_ _ 4_2___ _1__, 5_e al5o rn___m_tJ'__ s__n'__ e_v____Jme_ _mpJ_________ P___( N_____ 2__ ___ _;_s_____t_f Gu_deting5 2 a__ 3 (__g l_________ ___?;n_ __vc_____X ___l T______m__ th_ _h_f__ _ 'eefr_r;__ _nrarma__an,a as den_ed m ____, m_ ___f __ ___ X______?_e _____?_;e_ __ __4__at_ __ _he _x__n; t__t __ey do not 0__e__se c___;____e _;_rr_Fe_m ____fm_;__n_= (_? h_____nd ____?_y _n__rm__jc__ _s 4en_ned _n _en;0n _92(tJ_1_ a_ _h_ __m_2_n_ ___f'?;y m_t _? 2_2 (_ ____C_ _ 4_2____?_; J__ _2_ ___ __fmfce_ene 1nf_em__;0_ re______ __ ___F___5_ _r _tt_ 5e_4r_? __ u__ h___(__4_, 5_ 5____i___l _n_m__Jt___ 1_clu_es ;n?_ll_4_n__ ___;______, _h_rd ___ M_____n____a__?_ _r_____t__ _n_ 4_n____j_4 _ _ ___C _ar?__mat__e a___N ___t 1_ __c______ __ _F _____m___4_4 __ _ p_rt___pm_1r_e _____ __ ___? _a_ ___ _? 4_s___i_a_e_ _n a __tt_ ___ _______ ?he 4x_____ C?ns___ _f ___ _f__?____? __c_N_ T1__ _n_ __?_ _X_m__0n _F o____un_?f_b_r_;e_ _e__ _F i___ma___ _a?e_4___ __Mm ______ __ ___!__ t__ _?_c4 __e; a?Ie_R_ __ _'_dmte5 sa_a _a_ n_ __:__ __Km5___ ___v_N, _m5 __4 _____ __ _l_a __ _e?___cS _ __ __s_;_____ 'j__t__n_ _e_n ____, __p____ _M'_N r___ _____, mm_J_f F____ f_t_N__ ____5 _1____ __e an_ _e_4s __F__n1____ d_5 _0t ______ ___4__t_ _ha_ ?_ M__ h_V_ _M at?___ a___m, _____gt h?____ r__F_s_ _r __ __, T_p_ a_4 ____5 ____e__5_n __ m________4 __ _ XCU__ _v___ 5_m____ __ ___ _5_ Fjse_ _o the l_vet __ ______ 5_5___ _ _p _r E___ _n _e __ _ v_r;___ __ s0__ces, ____r__ ___ _N t___e? __ __ _____ f____ 1___N__ t_PM_5, ___ ___5 0r _____en__a_ _o___y mi_ jn__rmst___ ma_ __ _y____ 4r M_M 5______ 4___ __ t_ _; w?t_4_ _Fme_ _nq__N _r __e___fs, t i_ 4____ __?hef _ ____?m_X___ __ _____ _r ____?x ___5 __ 5____ _x_r0_y_-0_ Fa_ls b__we_m ___g 0_ _a _x _ _ ________ __ _}N _______ _____ __M__'_ne __ the a___1ab1l^__ a_ t__c __d c___e__ __ _m_?__M i_ ___m2_J ___________xf, _1

__ 1 A__endiX B _ State and Fedefal laW ReleVa_t tO Seek_n_l Reta_r11?_y __d Di__eM___t_n_ _Y5_iCe In_ormaton ST_ELAW: Commonwealth of Pennsylvania Right to Know Law A_ 3 0f 2008 Declaration of Righ_ to the Pennsylvania Cons_'__4t__on Pennsylvania Human Relati0ns A_ Pennsylvania Cons0lidated Statu_es (Pa C,S.)T'_tle _8, Crimes and OMen_e_: , Subchapter A. General Provi5ions _0 9105. Oth_r criminal justice in Formation. __ 9__6, lnformation in central FepositoN or automated N_em_, Subchapter B. Completeness and Accuracy _ Duties of crim ina l justice agencies. _ MandatoN __ngerprinting. _ Disposition repo_ing by criminal justice agencies. _0 911_, Corre_ion of inaccurate information. Subchapter C. Djssemination of Criminal Hi_oN Record ^ Information _ General regulatians. _Expungement. _ Juvenile recards. _0 9124. Use of records by 1 _censin_ agenCieS. _ Use of rec_cds for employment_ SubchapteF D. _ecurity _ 5ecuriy req4irementt fof repOSitOf ieS, SubchapterE.Aud_ _u9141. Audi_.

_ _ __ 9242. Qualiy control. _0 9_Q3. Regulations. Subchapter F. Indjvidual Rght of Access and Review _ Rightto access and review. _ Procedure. _ Individual Fight_ on access and review. Subchapter G. Re5ponsibiliN of Attorney GeneraI _ _0 916__ Duties of the Attorney Genera1. Subchapter H. Publc Notice _ Requirements of repositories relating to public notice, Subchapter l. San_ions _0 91R_- General administrative san_ions. _n 9_83_ Civil a_ons. fEDERAlLAVV: Brady Handgun Volence Prevention A_, 18 U.S.C. __ 921, 922, 924, and 925A, United States Code, _tle 18, Part l, Chapter _, _ 921, 922, 92, and 925A Computer Match-_ng and Privacy A_ of 1988, 5 U .S.C. _ 552a(a), United States Code, _tle 5, Pa_ l, Chapter 5, Subchaptef II, 552a(a); see aIso Office of Management and Budget, Memorandum M-01-05, "'Guidance _n fnteragency sharing of Personal 0ata-Prote_ing Personat Prva__' December 20, 2000 conf_.dent._al'jty of _dentifiabIe Research and Statistical Informatian, 28 CfR Pa_ 22, C0de of federal Regulations, Title 28, Chapter l, Pa_ 22 Crime _dentification Technolo_, 42 U .S.C, _ 14601, U nited States Code, Ttle Q2, Chaptef 1aO, S_bchapter l, 1_601 Crimjnal HittoN Recordt Exchanged for Noncriminal _U5ti Ce PurpoSeS, 42 U.S.C_ 14611, United S_tes code, __t_e _2, chapter 1QO, Subchapter l l, _ 14611 crjmna_ _nte_ligence sy_ems operatng polices, 28 CFR Pa_ 23, Code of federal Re_UlatiOnS, T_le 28, Ch_pter 1/ Part 23 29

t_ lCriminal Justice InfOrmation Systems, 28 CfR Part 2o, code of Federa_ Regu_ations, T_t_e 2g, Chapter_,Part20 Dsposal of Consumer Repo_ Information and Records, 16 cfR pa_ 6gz, code of federa_ Regu1ati _tIe 16, Chapter l, Part 682 Ele_ronic Communcations PrvaN A_ of 1g86, _g u,s.c. gg 25__2522, 27o1-27og, united stat Code, Title 18, Pa_ I, Chapter _19, _9 251o-2522/ 2JoJ-27og, and 3121-3_25, publ_t La_ 9g_5og _air Credit Repo_ng A_, 15 _ .S.C. g 16g1, un ited states code, T_t_e 15, cha pter 4_, subcha pter _ __, 9168_ Fedenl Civil Rights Iaws, 42 _._.c, _ _gg3, united states code, Tit_e 42, cha pter 21, subc_a pter 1, 1983 Federal Record_ A_, _ _.S.c. g 33o1, united states code, __)e _, chapter 33, g 33o1 freedom of Infor_ation A_ (fo_A), 5 u.s.c, g _52, united states code, __tle 5, pa_ l, chapteF 5, - Subchapter _t, 552 HIP_, Health Insurance PortabiliNr and Ac_untab'_l'_N n_ or 19g6, 42 u.s.c_ g 2o1, Unit_d States code, Title a2, Chapter 6A, Subchapter l, 2o1,. pub_ic La_ 1oq-1g1 HIP_, 5tandard_ for Priv_N of fndividually _denti_ab_e Health lnformatjon, 4_ CfR Parts 160 an4 16_; Code of federal Regulations, _tle _5, pa_s 16o and 164 Indian Civil Right5 A_ of 1968, 25 U .S.C. 1301, Un ited States Code, _tle 25, Chapter _5, Subchapter l, 1301 _ntelliBence Reform and Te_or5m Preventon A_ oF 200_ (IRTPA), Se_ion 1016, as amended by the 9J11CommissionA_ National Child Proten._on A_ of 1993, Public law 103-209 (December 20, 1993l, 107 Stat. 2_90 NationaI Crime pr_ent-_on and prjvaN C0mpa_, 42 U.S.C. 1_616, Unted S_tes Code, Title _2, Chapter __, Subchapter I_, _ 1q6_6 PFivaN A_ of 1g7q, 5 u,s,c. g s52a, un _ted States Code, Title 5, Pa_ l, Chapter 5, SubchaPtef I l_ 552a PrivaN of consumeF Fjnan_a_ _nfo_ation, 16 CfR Pa_ 313, Code Of fedefal Re_UlatiO_S_ _ltte 16, Chapter l,Pa_3_3 3O

___ ___ _ _ _ MM_ _b___ _ CR P_M 46, C__ af _en_ __4_a__, __ 2g, ____ s, ___ 2,__M ___4__ ____ ___a___am, _6 CfR P__ 3___ _e 0f F_e__ __g4f_ t___, __ _g, ch__ t,___3_4 _____ __ _ 2__ _ U_____ Ch___ __ _ _Z__, ___ S__ C__, _;__ _, Ch_p_F __, _ _2__ _?_ ____, _;t_, F___, a__ 5_ __m___ ___ ___T _, ______ _ 1__56 f_ a_, 2___, __ s__ 2_

__1______ __, _?__ _____o___ _ __6_ ___?___ ?__ _m 2____, __ _ __ _4 _____r = _h &__ _ ___ ____ __ ___ ___ ?_____,__

____ __ 4 r_ _0 _ _____%_ ____ __p_?_ _____ _ ___ n_ _ lA)________tt9 _______w_____t_____l__________t__t___________nt_____t____t_____r)___4_____t____mt____,__t_________l___t________________t_______0_____t___v____t____t___0_t_____t_____r_____o__?_________r_______o_t_________t_____________t_tt_____t_t___v_______l____r0______a_r_______th_____t______0__tt___tn__9_t_?_te_0_t0?o______ot0___0_0_?__________o_0_9o_0_____r________?____c___o______c_______,0000t____________,_t_0____0__?__________________0__3_>__0_______,0_t9____tt_t_________t___________l_0____?t_tl_______y__n____x_______J______ i,__,,_,,e,_ _ 0,0_,_^6?,__ V____,___,__ 0_'_ _,__n__n',,,_'_ _'__cu,_,,, ^ ____^,_____'Pno___ _____,__?__, _'_' __ _ 08___, ._''__ ___ __ ____ __'___,?___ ,,_0', , ''_-___it' J _t __..__ ,_-;_' __,0o_,0_,_ , , ,0, ____? __0 ____,_-, ___ - ' ____i__'__ -'''_ T; _, 'r:-t _-',____ 0^_?'0 0,_g_'8u ' , _ 0,_ _m_j__, '_'__ 0' ,0'_;.__' _._,--' ''. _'' - 'v' __ _'_ ' n, __ -_?0_i0__'_ '_ __ 6__ ?,____._ ,_l'i''_;-. i;';.___.,_.' - '?! ' . ' : __ _ ,'- ,_-!._ 00_We____,,?c ' , ______i_____.0',_, ' _r_ ' _ -' - ' q'' _._h_____n ,__?, '0,___e,_'_'_-..i-'_ __ '. . ' _'.. _,. ,_i._'_m'_U_,_,o___6____,_,_ , _ 'e,_,' g'_,___;n_'_n__. ' .' ' , '_ 9__,__ i_ g______g_ ___,q ,c , , __u_i_, ___ ______, _^_'' ' ^'^_ - ' - ,_-_=-' ,_0 0____ _,,> -_n'-- _i_._-_^_av1 !-._0, _,__ _ _'_',_'_, _ ,' n_?'__'_?d__?__ ___l_ _ ,i__0?_ 0_o_u_e_0U___?0_ , , c,c_,_,_,_,___o___' _4. -.., ' . - _'__ _, _u_ .t___,__,___0,__ i0____,,,,?,____t_',;_'i> '' ' ' '_iJ __- ,0 _,-_'__,, --___'0_______ ' ,?o_ b_'___oV __,_ __ , , -' '-_'J___,_ ____'!, _" __',__ _ ' , ,,___c__0_! _ ''.-_,.._ _' . ' __0__ _'J'_,___,_u_ ', ?___c__o f-_._;,' :' - - ' '' _0. V ____ ___d______ _ __ '0__t?__, . _ J ' ' x.- _=' _ _________n____ __ ' .,,_ '- ' _ _,. ' -, - _ ' J '. , _ ;_ __._ ' _ _c _0D, n ___,_ _' _ _,_ _ _w ; g,, ' ' _,

- ' ,___'_"__ , '_' _' __-_:__',_ __,_; '_ -,.' ' '' ','' -_ _ P _. , ,1 _-_0._ ' _,,,m_____ :;__ 0_Bo___' ..?, '9,_^d,____u _ ' ' ' ? =s '_, .', ' ' '__1' '_ , ___ 8__do, ___ '' ,._,.,,i,_. '_ _ '.;'1 >.:________,0 '_

-. :__,_, _ '' ,_.. _''- -'_'____^^_____,_ ':':-,_'_; - -' '_-'- '''_+:0'_'__,,_ ,?_-;__i_. _ ' __.:.;_.,__0, -_,.,_._ :___,.

. .,;7_ ' ' '^ i--.,i_i ,d' _ -'_;, ___'_,__.,___._. __' ' ,' :' '_i-'__0 ' _

'__? ,__,=_t_' 0_ ' __t' ;-__ '' ^_

- - .; _,,_0_,____ '

':___ t. 0- ' '-

' _4_ ,,,0 , -' _'__.___' ,_

_-'' ' '__ _-;_ 4,_ __d , :.__

_. ' ' ' ' '; '. _, - J.. _^ L._. _,

_. ' ' ' i ' ' - _. ' _4 _, C _ - - ._..'_tti ' .'--'_ ... , __ ' _ ' __m_ -_, - ? -J'_'_:_'n _ 'i____?,__ . ,_ ::-t_. -'_o_ - , _-_? ._ ,K'._ _ .:q.= i-__ _^? _ . >;,'_ __-'_ '. ._'- _.- ' ,?_n', __o_,_c8__, ' . ' h-_'.:_-_ -.,_,.__'-''_' _.__ _. _-__ -' _' '''' ' __ ,+" .','_. __. _0'',,o____'__ i,_ ' ' 'x.__._ _= _. ,'_0___, '_ ____ . _.-___ _L___g ?a _^ _ _??'e .'_'_ , _-'__ _t_ ______ _ a ___ne,_ ' _ '_. ' _ __' JJ_____0 ' __e?_,_60_,'_'_ _ _t ' -: _ _ : _ ' =?l _ ? _ _??,_,, ? ._y _ -. ' '. _ ___ _0,6 __ _ '_ 8, S '_' - , ', -__ _ ___) ' _ ____' 0_'_ __ _, ,__ _;.- . , . ._ i:_m,,;'.I_-'_1_ii_'d_,,_n0,_ ''' _,c _'_" _'ii?' _ ' ; -. _ - _ ' ______"?, 'm',?_-Yoa0__ ,_ __ __ O'__ __ - ' : -_ _'__ _ ' n,_',_?_ _ _0o_'0o_m_6_''__-. '_-, , _ - . , . _,_. .; _ 0c __0_______0_,_n_06,O, 8 '____n___;___ ' - t_!' . ' _i''e ''''' '-tXt__?'''__o?__b,_0__'_''0g'_"__'_ _ __? _c __ ,_,-___-,,,._.,:'', __J . ,. .,,. '-_ ' > __ ___ -___'o0__,,_0'\___ __ -,,,_o,,,?,_a_u___u'__ , e_, , , ,____ ____'V,__a_--t.__ __'__'? __. _'____t&' ^'' , ._. ?':___!-,' .__,>,8__o0____?______,n'?_n_ '_"_ _ ' _ ,__0_____00o___0____-e,-'n____'x_- ..._ d'_ ._ ___ 0_,o,____' _ ___'___,_8 ' ____,_ ' __ ' '_?_,,_____, x_,,h_,____5' _ '_ ___._' ?_0_?'___' _8_'' n ' ' o___ ,_ _0_@_0__6 __ u__, 0_08 ,' , _e^0__e_M,D ' _' ' _a, n_ d__, 0 _o 9 _0____ __M,0___ _' ,_u' 0 _ _ _>' ,_ _ __, _ _ ' _',_ _^ ' ___,^ ,, i '_'' _ _ ' _, ,, _^___?l ____?

You might also like