Enclosure (1) to COMDTINST 5260.4A
Privacy Impact Analysis: Given access and security controls, what privacy risks were identified
and describe how they were mitigated. For example, if a decision was made to tighten access controls by
restricting access to specific users, include such a discussion.
Section 9.0
Technology
The following questions are directed at critically analyzing the selection process for any
technologies utilized by the system, including system hardware, RFID, biometrics and other technology.
9.1
Was the system built from the ground up or purchased and
installed?
9.2
Describe how data integrity, privacy, and security were analyzed as
part of the decisions made for your system.
9.3
What design choices were made to enhance privacy?
Conclusion
The concluding section should inform the reader, in summary fashion, how you constructed your
system, program, rule, or technology based on privacy risks and mitigation strategies.
Responsible Officials
<<Privacy Officer/Project Manager>>
Department of Homeland Security
Approval Signature Page
________________________________ <<Sign Date>>
Maureen Cooney
Acting Chief Privacy Officer
Department of Homeland Security
28