skip navigational linksDOL Seal - Link to DOL Home Page
Photos representing the workforce - Digital Imagery© copyright 2001 PhotoDisc, Inc.
www.dol.gov/sol
November 4, 2008    DOL Home > SOL > Privacy Act Systems > DOL/ETA-16   

DOL/ETA-16

SYSTEM NAME:

Employment and Training Administration Investigatory File.

SECURITY CLASSIFICATION:

None.

SYSTEM LOCATION:

Special Program Services Unit, Employment and Training Administration, Frances Perkins Building, 200 Constitution Ave., NW, Washington, DC 20210, and each of the Employment and Training Administration regional offices.

CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:

Applicants, contractors, subcontractors, grantees, members of the general public, ETA employees, who are alleged violators of ETA laws and regulations.

CATEGORIES OF RECORDS IN THE SYSTEM:

Reports of alleged and confirmed problems, abuses or deficiencies relative to the administration of programs and operations of the agency, and of possible violations of Federal law whether civil or criminal; reports on resolution of criminal or conduct violations, and information relating to investigations and possible violations of ETA administered programs and projects; incident reports, hotline complaints, and investigative memoranda.

AUTHORITY FOR MAINTENANCE OF THE SYSTEM:

5 U.S.C. 301; Job Training Partnership Act (JTPA) (29 U.S.C. 1501 et seq.); Workforce Investment Act, 29 U.S.C. 2801 et seq.

PURPOSE(S):

To ensure that all appropriate records of problems, abuses or deficiencies relative to the administration of programs and operations of the agency are retained and are available to agency, Departmental, or other Federal officials having a need for the information to support actions taken based on the records.

ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES OF USERS AND THE PURPOSES OF SUCH USES:

The records and information in this system that are relevant and necessary may be used to disclose pertinent information to states, Workforce Investment Boards, and other DOL-funded grantees as necessary to enforce ETA rules and regulations; and other uses noted in the prefatory statement.

DISCLOSURE TO CONSUMER REPORTING AGENCIES:

None.

POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING, AND DISPOSING OF RECORDS IN THE SYSTEM:

STORAGE:

Case files are maintained in manual files and certain information from those manual files, e.g., case number, names and social security numbers, description of allegations, etc., are maintained in a computerized format on the local area network.

RETRIEVABILITY:

The manual case files are indexed by case number. Automated records are retrieved by case number, case name, or subject.

SAFEGUARDS:

Direct access to the manual case files is restricted to authorized staff members with a need to know the information in the performance of their official duties and responsibilities. Automated records can be accessed only through use of confidential procedures and passwords by authorized staff.

RETENTION AND DISPOSAL:

The records containing information or allegations which do not relate to a specific investigation are retained for 5 years after the case is closed, and are then destroyed by shredding. The records containing information or allegations that do result in a specific investigation are placed in an inactive file when the case is closed and destroyed, by shredding, after 10 years.

SYSTEM MANAGER(S) NAME AND ADDRESS(ES):

Administrator, Office of Financial and Administrative Management, 200 Constitution Ave., NW, Washington, DC 20210; and each Regional Administrator or Associate Regional Administrator of the ETA in the regional offices.

NOTIFICATION PROCEDURE:

Inquiries concerning this system can be directed to: System Manager, U.S. Department of Labor, Employment and Training Administration, Office of Financial and Administrative Management, 200 Constitution Avenue, NW, Washington, DC 20210 or to the appropriate ETA Regional Administrator or Associate Regional Administrator in the regional cities listed in the Appendix to this notice. Such inquiries should include the full name of the requester, name and address of the organization, service delivery area, and the ETA-administered program or project.

RECORD ACCESS PROCEDURES:

Individuals can request access to any record pertaining to himself/herself by mailing a request to the appropriate System Manager listed above under "Notification Procedure." Such inquiries should include the full name of the requester, name and address of the organization, service delivery area, and the ETA-administered program or project.

CONTESTING RECORD PROCEDURES:

Individuals desiring to contest or amend information maintained in this system should direct their written request, containing specific details of personal and professional data indicated, to the appropriate System Manager listed in "Notification Procedure" above. The request should state clearly and concisely what information is being contested, the reasons for contesting it, and the proposed amendment to the information sought.

RECORD SOURCE CATEGORIES:

Individuals, program sponsors, contractors, grantees, complainants, witnesses, Office of the Inspector General and other Federal, State and local government records.

SYSTEMS EXEMPTED FROM CERTAIN PROVISIONS OF THE ACT:

In accordance with 5 U.S.C. 552a(k)(2), investigatory material in this system of records compiled for law enforcement purposes is exempt from subsections (c)(3); (d); (e)(1); (e)(4)(G), (H), and (I); and (f) of 5 U.S.C. 552a, provided however, that if any individual is denied any right, privilege, or benefit that he or she would otherwise be entitled to by Federal law, or for which he or she would otherwise be eligible, as a result of the maintenance of these records, such material shall be provided to the individual, except to the extent that the disclosure of such material would reveal the identity of a source who furnished information to the Government under an express promise that the identity of the source would be held in confidence, or prior to January 1, 1975, under an implied promise that the identity of the source would be held in confidence.



Phone Numbers