1919 Personally Identifiable Information Processing and Transparency Policy

Georgia State Seal

Department of Human Services
Online Directives Information System

Index:

POL1919

Revised:

06/02/2025

Next Review:

06/02/2027

Subject: DHS Information Security Policies

Policy

This policy establishes the Personally Identifiable Information Processing and Transparency Policy, for managing risk associated with information assets, information leakage, and network vulnerabilities. The Personally Identifiable Information Processing and Transparency Policy and associated plans, augment DHS mission, by proactively identifying threats and vulnerabilities, which can result in consequences (impact).

Authority

  1. United States Department of Commerce National Institute for Standards and Technology (NIST)

  2. United States Internal Revenue Service

  3. United States Department of Health & Human Services – Administration of Children and Families (ACF), Office of Child Support Services (OCSS)

  4. United States Department of Health & Human Services - Centers for Medicare & Medicaid Services (CMS)

  5. Georgia Technology Authority

  6. Social Security Administration

  7. Federal Bureau Investigation (Criminal Justice Information Services)

Applicability

The scope of this policy is applicable to all Information Technology (IT) resources owned or operated by DHS. Any information not specifically identified as the property of other parties, that is transmitted or stored on DHS IT resources (including e-mail, messages and files) is the property of DHS. All users (DHS employees, contractors, vendors or others) of IT resources are responsible for adhering to this policy.

Definitions

None

Responsibilities

DHS shall adopt the Personally Identifiable Information Processing and Transparency Policy and Procedures. The policy establishes a framework for the processing of Personally Identifiable information and ensures transparency in the management of risks associated with information assets, data breaches, and network vulnerabilities. The following subsections outline the Personally Identifiable Information Processing and Transparency standards that constitute DHS policy. Each DHS Business System is then bound to this policy, and shall develop or adhere to a program plan which demonstrates compliance with the policy related the standards documented.

PT-1 Personally Identifiable Information Processing and Transparency Policy and Procedures

  1. Develop, document, and disseminate to designated agency personnel:

    1. All organizational level Personally Identifiable Information Processing and Transparency policy that:

      1. Addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and

      2. Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and

    2. Procedures to facilitate the implementation of the Personally Identifiable Information Processing and Transparency policy and the associated access controls;

  2. Designate an agency official to manage the development, documentation, and dissemination of the Personally Identifiable Information Processing and Transparency policy and procedures; and

  3. Review and update the current access control:

    1. Policy every one (1) year (or if there is a significant change); and

    2. Procedures every one (1) year (or if there is a significant change).

PT-2 Authority to Process Personally Identifiable Information

  1. Determine and document the IRC § 6103 section that permits the receipt of personally identifiable information; and

  2. Restrict the access of personally identifiable information to only that which is authorized

PT-3 Personally Identifiable Information Processing Purposes

  1. Identify and document the organization-defined purpose(s) for processing Personally Identifiable Information (PII);

  2. Describe the purpose(s) in the public privacy notices and policies of the organization;

  3. Restrict the organization-defined processing of PII to only that which is compatible with the identified purpose(s); and

  4. Monitor changes in processing PII and implement organization-defined mechanisms to ensure that any changes are made in accordance with organization-defined requirements.

Implement organization-defined tools or mechanisms for individuals to consent to the processing of their Personally Identifiable Information (PII) prior to its collection that facilitate individuals’ informed decision-making.

PT-4 (3) Revocation:

Implement organization-defined tools or mechanisms for individuals to revoke consent to the processing of their Personally Identifiable Information (PII).

PT-5 Privacy Notice

Provide notice to individuals about the processing of Personally Identifiable Information (PII) that:

  1. Is available to individuals upon first interacting with an organization, and subsequently at organization-defined frequency;

  2. Presents clear and easy to understand information about PII processing in plain language;

  3. Identifies the authority that authorizes the processing of PII;

  4. Identifies the purposes for which PII is to be processed; and

  5. Includes any additional information the organization deems necessary to effect compliance with applicable laws, regulations, or policies.

PT-5 (1) Just-In-Time Notice:

Present notice of Personally Identifiable Information (PII) processing to individuals at a time and location where the individual provides PII or in conjunction with a data action, or at an organization-defined frequency.

PT-5 (2) Privacy Act Statements:

Include Privacy Act statements on forms that collect information that will be maintained in a Privacy Act system of records or provide Privacy Act statements on separate forms that can be retained by individuals.

PT-7 Specific Categories of Personally Identifiable Information

Apply organization-defined processing conditions for specific categories of Personally Identifiable Information (PII).

History

Date Change User Version

Evaluation

The Office of Information Technology (OIT), upon recommendation of the DHS Chief Information Security Officer (CISO), evaluates this policy annually by:

  1. Comparing its content and intent to evolving regulatory compliance standards imposed upon the Agency, such as, IRS 1075, NIST 800-53, and CMS MARS-E.

  2. Addressing any deficiencies or gaps discovered during periodic audits conducted by Georgia DOAA or other regulatory bodies, such as, IRS, CMS, SSA, FBI, etc.