PUBLIC LAW 110–53—AUG. 3, 2007
121 STAT. 363
dkrause on GSDDPC44 with PUBLAW
(A) a department or agency of the Federal Government, or a non-Federal entity acting on behalf of the Federal Government, is conducting the queries, searches, or other analyses to discover or locate a predictive pattern or anomaly indicative of terrorist or criminal activity on the part of any individual or individuals; (B) the queries, searches, or other analyses are not subject-based and do not use personal identifiers of a specific individual, or inputs associated with a specific individual or group of individuals, to retrieve information from the database or databases; and (C) the purpose of the queries, searches, or other analyses is not solely— (i) the detection of fraud, waste, or abuse in a Government agency or program; or (ii) the security of a Government computer system. (2) DATABASE.—The term ‘‘database’’ does not include telephone directories, news reporting, information publicly available to any member of the public without payment of a fee, or databases of judicial and administrative opinions or other legal research sources. (c) REPORTS ON DATA MINING ACTIVITIES BY FEDERAL AGENCIES.— (1) REQUIREMENT FOR REPORT.—The head of each department or agency of the Federal Government that is engaged in any activity to use or develop data mining shall submit a report to Congress on all such activities of the department or agency under the jurisdiction of that official. The report shall be produced in coordination with the privacy officer of that department or agency, if applicable, and shall be made available to the public, except for an annex described in subparagraph (C). (2) CONTENT OF REPORT.—Each report submitted under subparagraph (A) shall include, for each activity to use or develop data mining, the following information: (A) A thorough description of the data mining activity, its goals, and, where appropriate, the target dates for the deployment of the data mining activity. (B) A thorough description of the data mining technology that is being used or will be used, including the basis for determining whether a particular pattern or anomaly is indicative of terrorist or criminal activity. (C) A thorough description of the data sources that are being or will be used. (D) An assessment of the efficacy or likely efficacy of the data mining activity in providing accurate information consistent with and valuable to the stated goals and plans for the use or development of the data mining activity. (E) An assessment of the impact or likely impact of the implementation of the data mining activity on the privacy and civil liberties of individuals, including a thorough description of the actions that are being taken or will be taken with regard to the property, privacy, or other rights or privileges of any individual or individuals as a result of the implementation of the data mining activity.
VerDate Aug 31 2005
13:52 Jan 23, 2009