Accessibility Skip to Top Navigation Skip to Main Content Home  |  Contact IRS  |  About IRS  |  Site Map  |  Español  |  Help  

Advanced Search   Search Tips

Performance Measures, Analysis & Reporting System

 

Privacy Impact Assessment – Performance Measures, Analysis & Reporting System (PMAR)

PMAR System Overview

The PMAR system is one of the Enterprise System Management stream for the IRS Modernization Project.  PMAR is responsible for measuring the performance of the IRS Modernized Systems against commitments and requirements defined by the Service Level Agreements.  The PMAR mechanism is intended to access data from the Integrated Enterprise System Management and store it in multi-dimensional data objects in the enterprise server.  PMAR developers use the enterprise data objects to generate detailed reports that document activities of the system.  The PMAR system is browser accessible and allows online query and offline report generation.  This provides visibility of information technology performance to IRS management and supports the ITS Balance Measures Program.

System of Record Number(s)

Treasury/IRS 34.037, IRS Audit Trail and Security Records System.

Data in the System

1.  Generally describe the information to be used in the system in each of the following categories: Taxpayer, Employee, Other.

Taxpayer
The Performance Measure, Analysis and Reporting (PMAR) system does not collect, store, or transmit taxpayer information.

Employee
The PMAR system contains user accounts for IRS employees and contractors who need to access the PMAR system to view, create, and edit performance data and reports. The user accounts include user ID and password, basic sign-on, and user-class membership information. User accounts are stored on the XXXXXXXXXXXX. For future use, the Directory has fields available for employee information such as first name, last name, e-mail address, and telephone number.

Additionally, user accounts for accessing the NT Windows 2003 operating system and the XXXX databases are requested and assigned to authorized PMAR users by using the Online Form 5081, Information User Registration/Change Request process.

User account data are is described in Appendix B. Table B-1, PMAR XXX XXXXXX XXXXX XXXX XXX, and Table B-2, PMAR XXXXX XXXXX XXXX XXXXXX XXXX, show the user account information associated with the PMAR application users. The PMAR user account information is managed by the PMAR site administrators.

SENTENCE REDACTED.  This user account information is managed outside of PMAR.

Other
For Release 2, the PMAR system processes XXXX data, which includes records of the XXXX XXXX XXX database, XXXX XXXX repository, Inventory database, XXXX database, and XXXX XXXX XXXX  XXXXX. The PMAR system extracts, transforms, loads, and stores network and systems management data and inventory data from the XXXX system.  The data is categorized into capacity utilization, system availability, system response time, and service availability information. 

2. What are the sources of the information in the system?

Employee
Employee information in the system consists of the IRS employee and contractor user IDs, passwords, and user-class membership information captured from user’s PMAR Online Form 5081. This information is physically stored and encrypted in the XXX XXXX System Directory that XXXXXX makes available as part of its installation package. The employee data fields (first name, last name, e-mail address, telephone number) in the Netscape directory are optional and  for possible future use. The seat data are obtained from the user’s PMAR  5081.

PMAR XXXX application employees’ user account and user class information are managed and maintained by the XXXX XXXX XXXX. Figure 12-1 is a modification to Figure 1-1 that shows the PMAR security components and architecture in more detail. Essentially, it shows the relationship of the XXXX XXXX XXXX to the other components. End users enter XXXX through the XXXX XXXX Server. Access to the XXXX Server is only possible from an IRS desktop.  Access to the IRS desktop for any workstation requires a valid NT user ID and password. A valid XXXX XXXX XXXX user ID and password is then needed for access to any other XXXX component. The user ID and password are physically stored in the Netscape Directory that XXXX makes available as part of its installation package.

DIAGRAM REDACTED

Other
The XXXX performance-related data in the PMAR system come from a set of XXXX XXXX-managed databases. These databases include XX asset data (but no links to employee data); systems and application performance and utilization data; network performance and utilization data and events.

PARAGRPAH REDACTED

a. What IRS files and databases are used?

PMAR uses IRS files and databases from the IRS Online 5081 form and the employee data, the employee data fields (first name, last name, e-mail address, telephone number) in the Netscape directory are optional and exist for possible future use. That data could be obtained from several sources and it is not known at this time which source, if any, would be used.

For the other performance-related data, the IRS databases used in the PMAR system are mainly the XXXX XXXX databases residing at the MCCXXXX.  These XXXX performance management databases include:
* XXX database, which stores events
* XXX XXXX XXXXX) database, which stores monitoring data
* XXXX XXX XXX database, which stores network monitoring data
* XXXX XXXX database, which stores XXXX data and Internet performance and availability data
* XXXX Inventory database, which stores hardware and software configuration information of computer systems in the XXXX environment

b. What Federal Agencies are providing data for use in the system?
No Federal Agencies provide data for use by the PMAR system.

c. What State and Local Agencies are providing data for use in the system?
No State or Local Agencies provide data for use by the PMAR system.

d. From what other third party sources will data be collected?
The PMAR system does not collect any data from third party sources directly, for either the employee data or the other performance-related data.
Some of the PMAR performance-related data is from the Registered User Portal (STIR RUP) and the Employee User Portal (STIR EUP).  These are IRS systems, but are managed on an outsourcing basis by a third party.

e. What information will be collected from the taxpayer/employee?
The PMAR system does not collects no data from the taxpayer. It does not collect information directly from the employee, but it does maintain IRS employee and contractor user IDs, passwords, and user-class membership information captured from user’s PMAR Online Form 5081. . These are needed for identification, authentication, and authorization purposes.

3.a.   How will data collected from sources other than IRS records and the taxpayer be verified for accuracy?

There is no taxpayer data in the PMAR application.  For employee data, accuracy of the user accounts can be verified by the users’ successes in entering their workstations, accessing the XXXX databases, and operating the PMAR XXXXXX applications. Furthermore, accuracy of the user accounts for the PMAR NT Windows 2003 operating system, the XXXX databases access, and the PMAR XXXXXX applications are verified against the completed Online Form 5081 and its attached Form 12222. These forms are used for user registration and change requests for accessing the  NT Windows 2003 operating system, XXXX databases, and PMAR system. Copies of the Form 5081 and Form 12222 are maintained for each user accessing the PMAR system.  At a minimum, IRS system users’ accounts are reviewed annually.

For the other performance-related data, PMAR Cubes are built by first extracting data from the XXX systems management databases into flat files using TDS XXXXXX tools. The accuracy of this data is verified by examining the status of the Cube build and scheduled tasks using the XXXX XXXX. The Task Server provides the following information about each task:
* Task ID
* Description
* Executed last at
* Executed next at
* Status
* Frequency
* Beginning on
* Ending on

b. How will data be checked for completeness?

For employee data, XXXXX XXXX manages and maintains user classes and employee user account information located in the Netscape XXX XXX System Directory Server. XXXX XXXX accesses interfaces with the Netscape XXX XXX System Directory Server each time user account information and database security information are created, modified, or deleted. The Netscape XXX XXX System directory log file will be  is examined to ensure all transactions with the Netscape XXXX XXX System Directory Server have been completed successfully and in a timely manner. Audit log reviews test adequacy of controls and detect any departures from established policies, rules, and procedures.

For the other performance-related data, the PMAR input databases are managed under the XXXX and XXX relational database management systems. Database integrity is monitored and validated by the XXXX database administrator as part of his/her normal job responsibilities.

Reviewing the audit logs for the status of the cube build and for scheduling tasks ensures that the PMAR data cubes are created accurately and completely.

c. Is the data current? How do you know?

For employee data, login data must be current in the currency of the Netscape XXX XXX System Directory Server database. If the information is incorrect, access will be denied. Information is validated by ensuring that all transactions performed by the XXXX Manager are successfully completed. The status of the transactions is shown in the Netscape XXX XXX System directory log file, and the audit log records are time-stamped.

For the other performance-related data, PMAR Cube builds are performed nightly. The Cubes are data files that are time-stamped.  Currency of the creation date of the Cube is checked by viewing creation dates on the cubes, located on the Shared File Server and the XXXXXX Enterprise Server, using the NT Windows 2003 Explorer.

4. Are the data elements described in detail and documented? If yes, what is the name of the document?

The PMAR Data Flow diagrams (Tables A-1, and Table A-2 in Appendix A) show the characteristics of the data elements used in the PMAR system, for both employee data and the other performance-related data. The PMAR source databases for the other performance-related data are the XXXX XXX databases. These tables and columns are documented in the XXX XXXX appendices.  The Cubes associated with XXXX are constructed by XXXX XXXXX.

Access to the Data

1. Who will have access to the employee data in the system (Users, Managers, System Administrators, Developers, Other)?


Only system administrators have access to any employee data that is maintained in the Netscape XXX XXX System directory.

Two user classes are defined in PMAR in Release 2: the administrator class, which includes the content administrators and site administrators, and the end user class. Users must submit a completed Online Form 5081 to request PMAR access and obtain a valid account and associated user ID. The Online Form 5081 list the PMAR responsibilities and user accounts required by each end user, content administrator, and site administrator to access the PMAR Windows 2003 servers, the PMAR applications, and the XXXX databases. This information identifies the appropriate authorization role(s) assigned to the different PMAR users. The forms are signed and authorized by the manager of the person requesting access to the PMAR system.

The end users (IT Analyst, IT Manager, IT Executive), content administrator, and site administrators are all given role-based access to XXXX via a Web browser on their desktop. 
* The PMAR end-users can access the XXXX interface to search, view, and organize XXXXXX data cubes and reports, as well as to perform report customization. The browser only displays reports and data (resources) and commands to which the users are granted access. They view PMAR data cubes, catalogs, and reports detailing activities of the XXXX only when granted access on a need-to-know basis.
* The PMAR content administrators are responsible for developing reports, analyzing enterprise performance information, generating Continuous Improvement Opportunity (CIO) Balanced Scorecard reports, and reviewing log files.
* The PMAR site and systems administrators have the ultimate responsibility for the PMAR system within their area including XXXXXX application server installation and management; XXX XXXXX maintenance; and setup of authentication source, authentication data, and security across applications

2. How is access to the data by a user determined? Are criteria, procedures, controls, and responsibilities regarding access documented?

The IRS Online Form 5081 process provides procedures for granting user access to the IRS-related systems. Online Form 5081 and its attachment Form 12222 list the PMAR responsibilities and user accounts required by each end user, content administrator, and site administrator to access the PMAR NT Windows 2003 servers, the PMAR applications, and the XXXX databases.

The senior site administrators are the single points of contact at the Region, Computing Center, Service Center, and National Office. The senior site administrator follows the on-line Form 5081/Form 12222 procedures to administer user accounts for site administrators, end users, and content administrators. This information identifies the appropriate authorization role(s) assigned to the different PMAR users. The forms are signed and authorized by the manager of the person requesting access to the PMAR system.

3. Will users have access to all data on the system or will the user’s access be restricted? Explain.     

Users do not have access to the employee data maintained in the Netscape XXX XXX System directory.

For the other performance-related data, access to the PMAR system is controlled by a user’s assigned role(s), resource access permissions, and assigned applications. These are set up for the user by the local PMAR Site Administrator (PSA), or Senior PMAR Site Administrator (SPSA).

The PMAR end-users can access the XXXX interface to search, view, and organize XXXXXX data cubes and reports, as well as to perform report customization. The browser only displays reports and data (resources) and commands to which the users are granted access. Moreover, PMAR content administrators can use the XXXXXX Client applications to analyze and create cubes, catalogs, and reports from data sources to which they have access. They can also grant and deny user access to business information reports and data sources.

In PMAR Release 2, there is no requirement restricting user access to specific PMAR data. Access to the PMAR data is role-based. The roles include the senior site administrator, site administrator, end user, content administrator, and system administrator.

End users have read access to the PMAR data and reports via a Web browser.  The end users are authenticated to PMAR with a username and password.  After a successful logon, the user is presented with the XXXXXX XXXX user interface that provides the user with a single point of personalized access to the PMAR data and reports.

Content administrators access the PMAR system via the XXXXXX-based client applications. The content administrators have access to PMAR Enterprise Server data or TDS databases to develop reports and analyze enterprise performance information, and to generate Scorecarding reports. The content administrators apply user class security to the PMAR data, if desired. The content administrators can also access the XXXX user interface via a Web browser. Content administrators can restrict end user read, write, and create permissions on the data and reports as they are created.

Only site administrators who have XXXX XXXX logon accounts can log onto the XXXX XXXX application. Using the XXXX XXXX, Site Administrators can identify and create users and group users with similar needs for access to information. They can give them memberships in user classes. The user classes are used to secure data sources. The XXXX XXXX interfaces with the Netscape XXX XXX System Directory Server to manage and maintain authentication data for the XXXXXX applications.

4. What controls are in place to prevent the misuse (e.g., browsing) of data by those having access?

For the employee data, auditing controls are in place that can be used in situations where misuse of data is suspected. The Windows Server operating system maintains a computer-generated record of security-related events. Access to this area is limited to authorized PMAR administrators. User activities are tracked in the audit trails. Three auditing logs are enabled at installation: access, error, and audit. The access log contains detailed information about client connections to the directory. The audit log contains detailed information about changes made to each database as well as to server configuration. The audit files are protected because only the XXXXXX XXXX XXXX Administrator can view the audit files.

For the other performance-related data, the PMAR end users only have read-access to the data. 

Content administrators have create, read, and write permissions to that data. A content administrator with access to the data may use and reproduce the data (for example, by exporting to an XXXX spreadsheet). At that point, the data is outside the control of XXXXXX and could be misused (by forwarding the XXXX spreadsheet to an authorized user, for example) without XXXXXX being aware of the misuse. However, access information is contained in the log files that are audited regularly by PMAR site, system, and content administrators. Existing policies and procedures that are established and implemented within the XXX allow management to conduct independent reviews of audit log activities. These reviews test the adequacy of controls, and detect and react to any departures from established policies, rules, and procedures.

Although there is no requirement in PMAR XXX, XXXXXX has the capability to limit user access to data elements.

5.a. Do other systems share data or have access to data in this system? If yes, explain.

PMAR does not share data or grant access to any other system.  System audit logs  are forwarded to the Security Audit and Analysis System (SAAS) for analysis and archiving in this release

b. Who will be responsible for protecting the privacy rights of the taxpayers and employees affected by the interface?

The PMAR technical solution owner and system owner, or their designees, are responsible for protecting the privacy rights of the taxpayer and employee.  As of today, the PMAR technical solution owner and system owner are located in the Austin Service Center. The PMAR system in this Release does not contain any taxpayer information.

A maximum of two hundred IRS employees is granted access to the system based on the number of purchased licenses. Each authorized employee is given a valid user ID and password, and the user account information is stored and protected in a Netscape XXX XXX System Directory that is managed by the XXXX XXXXX. Access to XXXXXX servers is protected by discretionary access controls of the Windows 2003 OS. Access rights (user classes) are granted from within the XXXXXX Access Manager.  Access rights of the employees are role based.  These roles include the end user, content administrator, senior site administrator, site administrator, and system administrator. These roles are described in Section 3, item 1.

6.a. Will other agencies share data or have access to data in this system (International, Federal, State, Local, Other)?

In accordance with federal regulations, data sharing may occur with other law enforcement and government agencies in accordance with established IRS procedures. These agencies could be the Treasury Inspector General Tax Administration (TIGTA), General Accounting Office (GAO), and United States Department of Justice (USDOJ), on a specific need-to-know basis.
All requests for accessing the data shall be directed to the PMAR technical owner, system owner, IRS Office Governmental Liaison & Disclosure, or designee. Each request is evaluated and granted based on a specific need-to-know basis.

b. How will the data be used by the agency?

The employee data being maintained in the PMAR system is only for identification, authentication, and authorization to the XXXXXX application. Its potential value and use to another agency is very limited: possibly, only for auditing situations.
The other performance-related data in the PMAR system is “Sensitive but Unclassified.” The PMAR system is used for the purpose for which it was designed. Data are used in accordance with established IRS and federal regulations for the identification, and possible law-enforcement action in cases of misuse. PMAR adheres to the following IRS and federal regulations:
* Public Laws (PL) and Regulations
* PL 100-235 – Computer Security Act of 1987
* PL 93-579 – The Privacy Act of 1974
* Office of Management and Budget (OMB) Circulars and Bulletins
* OMB Circular 90-08  - Guidance for Preparation of Security Plans for Federal  
Computer Systems that Contain Sensitive Information.

c. Who is responsible for assuring proper use of the data?

The PMAR system owner and designees are responsible for assuring the proper use of the data via the signing and approval of the MOU defined in Item 6a..
d. How will the system ensure that agencies only get the information they are entitled to under IRC 6103?

In accordance with federal regulations, Modernized Security Infrastructure (MSI) verifies that agencies only get the information they are entitled to under IRC 6103, pursuant to Internal Revenue Code 6103 (h) (1). MSI, in support of XXX XX, also will verifies that agencies only get the information they are entitled to under IRC 6103 pursuant to Internal Revenue Code 6103 (h) (1), These agencies could be the Treasury Inspector General Tax Administration (TIGTA), General Accounting Office (GAO), and United States Department of Justice (USDOJ), on a specific need-to-know basis.

All requests for accessing the data shall be directed to the PMAR technical owner, system owner, IRS Office Governmental Liaison & Disclosure, or designee. Each request is evaluated and granted on a specific need-to-know basis.

Attributes of the Data

1. Is the use of the data both relevant and necessary to the purpose for which the system is being designed?


Yes, for the employee data is both relevant and necessary to the purpose for which the system is being designed, the above is a true statement. PMAR user accounts information is required for user identification and authentication and for access to the PMAR applications, NT servers, and XXXX XXXX.


For the other performance-related data, the PMAR data are used to provide selected reports to the Performance Assessment Office (PAO) personnel and systems. The reports include the CIO Balanced Measures reports.

Specific measures have been approved by the IRS Commissioner and are defined in the Information Systems Balanced Measures Data Dictionary maintained by the IRS PAO. In Release 2, the balanced measures are partially supported by the multi-dimensional cubes created by TDS. In subsequent PMAR releases, these measures are supported by custom-developed cubes.  PMAR data does not include individual employee performance.

2.a. Will the system derive new data or create previously unavailable data about an individual through aggregation from the information collected?

No, the PMAR system does not create previously unavailable data about an individual through aggregation from the information collected.

b. Will the new data be placed in the individual's record (taxpayer or employee)?

No new data will be placed in an individual taxpayer or employee record.

c. Can the system make determinations about taxpayers or employees that would not be possible without new data?

PMAR system cannot make determinations about taxpayers or employees, as there is no such data in the source database or the XXXX Manager user accounts.

d. How will the new data be verified for relevance and accuracy?

Not applicable. The PMAR system does not derive new data or create previously unavailable data about an individual through aggregation from the information collected.

3.a. If data is being consolidated, what controls are in place to protect data from unauthorized access or use?

Employee data is not being consolidated.  For the other performance-related data, the reports created in PMAR are published to Web servers. The data and reports are protected by SENTENCE REDACTED.

b. If processes are being consolidated, are the proper controls remaining in place to protect the data and prevent unauthorized access? Explain.

PMAR is a new system and there is no consolidation of any existing processes.

4. How will the data be retrieved? Can it be retrieved by a personal identifier? If yes, explain.

No, the PMAR employee and other performance-related data cannot be retrieved by a personal identifier.

An end user accesses PMAR data cubes and reports from the XXXXXX XXXX user interface via a Web browser. An authorized user account is required. The end user can only view data cubes and reports to which their user classes have been granted access.

The content administrator can access PMAR data cubes and create reports using the XXXXXX client applications or the XXXX user interface. A content administrator can access data and reports to which their user classes have been granted access; content administrator can also review audit logs. An authorized user account is required.

The senior site administrator/site administrator can view the PMAR generated system log as part of the system administrative function. This function is normally performed when it is necessary to resolve a technical system problem involving system access problems.

The PMAR system administrators can audit and review operating system and application audit logs using existing utilities provided and recommended for the operating system and applications.

a. What are the potential effects on the due process rights of taxpayers and employees of consolidation and linkage of files and systems?

No taxpayer data or employee information is being collected and aggregated. Only user IP address is being captured in accordance with IRS regulations in support of web services security controls. The IP address allows the identification of the system attempting an unauthorized activity.

b. What are the potential effects on the due process rights of taxpayers and employees of derivation of data?

Multi-dimensional data cubes and reports derived from PMAR contain no taxpayer or employee data: only system performance data.

c. What are the potential effects on the due process rights of taxpayers and employees of accelerated information processing and decision making?

XXXX performance management data is extracted from the XXXX performance management databases using ODBC XXX connections. This data is used to build on-line analytical processing (OLAP) data cubes. The data cubes are used to generate and distribute standard reports on system performance metrics as identified within the cubes configuration via a web interface. The generated reports then appear in either line or bar chart format. In addition, they are used for generation of ad-hoc reports and “drill-down” analyses. The data cubes support management reporting for the ITS organization. Data cubes are also are used in the generation of CIO “Scorecard” type visualization. PMAR supplies management reports and analyses to the various operating divisions with IRS as appropriate and as requested.

The types of reports include Event Management reports, Server Performance  Prediction reports, Web Services reports, and XXXX Element/Segment Performance reports.

d. What are the potential effects on the due process rights of taxpayers and employees of use of new technologies?

The functionality required for PMAR is not currently provided in the baseline, current production environment (CPE). The PMAR requirements reflect new capabilities for the IRS. PMAR uses the TDS applications and the XXXXXX XXX XXX XXX platform. 

The TDS applications include the TDS Base Product and the Discovery Guides. The TDS Discovery Guides include the Event Management Guide, Server Performance Prediction Guide, Network Element Performance/Network Segment Guide, and Web Services Analyzer Guide.

The XXXXXX XXX XXX XXX Platform components include the XXXXXX XXXX Manager, XXXXXX XXXX, XXXXXX XXXXX Enterprise Server, XXXXXX Web Reports and XXXX Administrator, XXXXXX , and XXXXXX XXX XXXXX .

These technologies do not impact rights of taxpayers or employees, as the data they process is system management data, not taxpayer or employee data.

e. How are the effects to be mitigated?

Not applicable. The technologies in use do not have an impact on the rights of taxpayers or employees.

Maintenance of Administrative Controls

1.a. Explain how the system and its use will ensure equitable treatment of taxpayers and employees.

PMAR ensures the equitable treatment of employees because all privileged users go through the same 5081 security process, as applicable. The user class information for employees is maintained based on the employee’s job requirements. Taxpayers do not have access to the PMAR system.

b. If the system is operated in more than one site, how will consistent use of the system and data be maintained in all sites?

In Release 2, PMAR, the XXXXXX applications are run at the MCCXXXX and XXXX applications will run at the XXX. The XXXXXX Administrator is executed to extract and transform data from the XXXX performance management data sources into multi-dimensional data cubes, and store them in the TDS Shared File server. This processing is performed nightly. The data cubes are then copied daily from the TDS Shared File server at the MCC into the XXXXXX Enterprise Server at the using the map drive mechanism.

Other IRS XXXX Management Areas located at Detroit, Michigan; Ogden, Utah; Austin, Texas; and Memphis, Tennessee functions like the XXX , as deployment of the PMAR system is rolled out to different sites in subsequent releases.

c. Explain any possibility of disparate treatment of individuals or groups.

There is currently no known possibility of different individuals or groups receiving disparate treatment as a result of the design of PMAR. Although individual privileged users can be identified, each privileged individual follows the same 5081 security process.

The system does not have the capability to treat groups differently. In the future, if additional capabilities such as monitoring of individual IT assets need to be added to the PMAR system, an updated PIA is submitted to the Office of Privacy.

2.a. What are the retention periods of data in this system?

The retention period of the data in PMAR is governed by IRM 1.15.3 – GRS 20, Electronic Record. The retention periods for data in PMAR should be at least two years. Audit data are forwarded to the SAAS system, then backed up and retained on magnetic tape for 8 years.

b. What are the procedures for eliminating the data at the end of the retention period? Where are the procedures documented?

At the end of the retention period, magnetic tapes are erased (degaussed) and re-used. The retention periods are defined in IRM 1(15) 00, Records Administration. Degaussing is documented in IRM 25.10.1, Information Systems Security, paragraph 25.10.1.5.7.2. 

c. While the data is retained in the system, what are the requirements for determining if the data is still sufficiently accurate, relevant, timely, and complete to ensure fairness in making determinations?

In the PMAR system, the cube data is refreshed nightly. Automated tasks are creating cubes and reports by extracting and transforming XXXX performance data from the XXXX performance management databases. The resulting data then is copied from the TDS Shared File Server to the XXXXXX XXXX Enterprise Server daily. XXXX cubes and reports are published to the XXXX server daily.
XXXX reports are created and published to the XXXX Web Report server daily.  Visualization reports are created and published on the Visualization Server periodically.

The use of proven vendor products and the review of the status of cube builds and scheduled tasks ensure data extraction, cube creation, and storing activities are sufficiently accurate, relevant, timely, and complete to ensure fairness in making performance analysis of the XXXX system.

3.a. Is the system using technologies in ways that the IRS has not previously employed (e.g., Caller-ID)?

The PMAR system enables the IRS IT support organizations to do the following:
* Manage data
* Convert data into useful information
* Provide a way to evaluate and identify trends
* Gain insight into the way customers do business
* Make better decisions

PMAR provides quantifiable data and reports to enable the IRS operating divisions to analyze the system performance, availability, and utilization data quantitatively. PMAR data products and processes are utilized to extract and transform data from “load side” metadata and allow users to investigate complex database structures and explore them from various perspectives.

b. How does the use of this technology affect taxpayer/employee privacy?

The PMAR data is related to capacity utilization, systems availability, systems response time, and service availability.  Taxpayer/employee privacy is not affected.

4.a. Will this system provide the capability to identify, locate, and monitor individuals? If yes, explain.

No. The PMAR system does not provide the capability to identify, locate, and monitor individuals.  The XXXXXX XXXX only allows site administrators to manage and maintain user profiles and classes for all XXXXXX components from a single console. XXXXXX security addresses both authentication- or logon-security and authorization security, which determines what information users have rights to view. Database security and operating system (OS) security can be used for user authentication as well.  Any combination of Lightweight Directory Access Protocol (LDAP), OS, or Relational Database Management System (RDBMS) security can be used for authentication.

The PMAR does not provide the capability to locate and monitor individual workstations.

b. Will this system provide the capability to identify, locate, and monitor groups of people? If yes, explain.

Yes, the PMAR system can only identify groups of people, rather than individuals such as end user, content administrator, and XXXX XXXX administrator. This is a required function in order to administer the system, grant user access when approved, and form the groups of users (by division, section, etc.) in order to ensure the security of the reports on a strict need-to-know basis.  This functionality is not delegated to anyone other than the system administrators. It does not have the capability to locate and monitor groups of people.

c. What controls will be used to prevent unauthorized monitoring?

The greatest potential for misuse is with the system administrators.  However, by using audit trails, the security personnel can track the activities of all administrators.  Thus, a "check-and-balance" exists between the system administrators and the security officers. 

A management control system is in place that ensures only skilled personnel are assigned to manage PMAR. Plans have been developed to ensure that administrative, physical, and technical safeguards are incorporated into new applications and into significant modification to existing applications that process SBU information in accordance with IRS policies.

Policies and procedures have been established for the PMAR infrastructure to conduct periodic reviews (Internal Control Reviews under OMB Circular A-123) to ensure that management, operational personnel, and technical controls are functioning effectively. Identified Material Weaknesses are reported, and management plans are developed to mitigate the findings.