skip navigational linksDOL Seal - Link to DOL Home Page
Photos representing the workforce - Digital Imagery© copyright 2001 PhotoDisc, Inc.
www.dol.gov/cio
November 5, 2008    DOL Home > CIO > Privacy Impact Assessments

E-Procurement System (EPS)

EXECUTIVE SUMMARY REPORT

INTRODUCTION TO THE PIA

Office of the Secretary for Administration and Management (OASAM) at the U.S. Department of Labor (DOL) is sponsoring an initiative to provide the DOL acquisition management community with a modern, web-based E-Procurement system. Currently the project team is implementing a Commercial Off The Shelf (COTS) based procurement system. The solution is in the development stage, and there will be a Pilot release on July 1, 2003 across a selected group of DOL agencies. The Pilot will coincide with the shutdown of Purchase Request Information System (PRISM) as the E-Procurement system will replace the functionality of PRISM. The E-Procurement solution will be more innovative and efficient, will comply with legislative requirements, and will enable greater participation in government wide initiatives.

Purpose and Approach

The objective in conducting a Privacy Impact Assessment (PIA) is to determine if Personally Identifiable Information (PII) is collected, used, transmitted and/or stored by the E-Procurement system. In addition, the PIA addresses system and website privacy compliance issues. The PIA enables an assessment of the impact of potential privacy threats to information on the system. This PIA covers only the Pilot release of the E-Procurement system; each subsequent release (which includes additional functionality) will require the Project Team to conduct another PIA.

The PIA was performed by the Independent Review Team of the E-Procurement project using the guidelines established by DOL's Office of the Chief Information Officer in its Department of Labor Information Technology Privacy Impact Assessment Template. .

System Characterization

The core functionality of the web-based E-Procurement system can be divided into two primary areas: requisition processing and contract management. Requisition processing will automate the entire procurement cycle for micro and small purchases from initiation of the purchase request through closeout. Contract management functionality will support the full life cycle of a contract after receipt of the purchase request in the contracting office. This functionality encompasses solicitation development, contract award, FPDS reporting, contract administration processes, closeout and audit support. In addition to automating the procurement cycle, the system will provide robust data reporting, administration capabilities, and Federal Procurement Data System (FPDS) reporting.

Findings

Based on the responses to the PIA questionnaire, there are no high or medium risk privacy findings and three low risk privacy findings. These findings and remediation actions are discussed in this section.

High Risks: There are no high risks identified.

Medium Risks: There are no high risks identified.

Low Risks: The privacy assessment indicates that the E-Procurement system contains three instances of PII, and all three pose only a low risk privacy impact. The risks are described as follows:

1) The use of name as PII within the system - In some cases, the system may contain the names of individuals related to the procurement process. For example, the system may contain the name(s) for individual contact people at a particular vendor. This form of PII poses only a low risk as the names will not be shared with other departments. Furthermore only authorized personnel will have access to these names-in the case of a requisition containing a vendor contact name, only the requisitioner, approvers, contract officers, and system administrators will have access to the name.

2) The use of a social security number as PII within the system-In very infrequent cases, the system may contain the social security number or tax identification number of individuals. For example, small-scale vendors, such as individual consultants, may use a personal social security number as the vendor tax number. A Privacy Act Systems of Records Notice (PARN) has been published in the Federal Register, which details the usage of a social security number as PII in DOLAR$ under DOL/OCFO-2. Since the E-Procurement system's vendor database will be created from the vendor data DOLAR$ and PRISM, the E-Procurement system's usage of a social security number as PII is covered by the PARN for DOLAR$. Therefore, this usage of PIA poses only a low risk as the frequency will be extremely low and a relevant PARN has already been filed.

The only exception to the case above is the infrequent scenario in which a requisitioner needs to procure a good or service from a new vendor. In this case, a system administrator will need to create a vendor profile in the system. Again, this situation poses only a low privacy risk as the system administrator will be trained to use a standard process for obtaining the data from the vendor. The vendor will also be notified of the risk of using a individual social security number as the vendor tax number.

As an additional note, the usage of a social security number as PII will be obsolete in late 2003 due to the introduction of the Business Partner Network (BPN). The General Services Administration is currently implementing the BPN initiative, which will require all vendors receiving payment from the United States government to obtain a Data Universal Number System (DUNS) number. Thus, as all vendors will need to obtain a DUNS to comply with the BPN initiative, there will be no instance of a vendor using an individual social security number for procurement activity with DOL.

3) The voluntary submission of PII through free form fields - As with many systems and websites, users may potentially submit PII voluntarily to the E-Procurement system via free-form response fields. In this case, the configuration of the field is free-form and will not restrict users from inputting PII. For example, a requisitioner may include an individual's name as PII in the following comment, "The goods were purchased through Rose Jones rather than through the usual contact person, John Henry." To mitigate or reduce the frequency of voluntary PII submissions, users will be trained not to include PII in the free-form fields. Summary

As with all information on the system, this occurrence of PII will be maintained in the system. However, there will be no method for searching or directly retrieving this PII via a search of the comments field. Thus, this form of PII is a low privacy risk as the PII is not retrievable. In addition, the database will be restricted to system administrators, further reducing the potential risk.

Mitigation

For the identified uses of PII in the system, mitigation actions are discussed below. These actions include:

  • Establishing a process to ensure the secure storage and maintenance of PII in the system
  • Training users not to include PII in free-form fields
  • Training system administrators on the presence of PII in the system, the importance of PII security, and the possible implications of privacy violations.

Summary

The analysis contained in this PIA indicates that the E-Procurement system will pose only low privacy risks.





Phone Numbers