Anda di halaman 1dari 3

Federal Register / Vol. 72, No.

37 / Monday, February 26, 2007 / Notices 8381

The Agency reviewed the status of the be made by using the voice and TTY Management and Administrative
land in light of the comments it numbers listed above. Matters.
received, the existing case law, and a Contact Person for More Information: PERSON TO CONTACT FOR INFORMATION:
November 3, 2006 opinion from the Stephen Llewellyn, Acting Executive Mr. Robert Biersack, Press Officer,
United States Department of the Interior Officer, on (202) 663–4070. Telephone: (202) 694–1220.
(DOI) Solicitor, who has special Dated: February 22, 2007.
expertise on Indian country questions. Mary W. Dove,
Stephen Llewellyn,
EPA also consulted with the Navajo Secretary of the Commission.
Acting Executive Officer, Executive
Nation pursuant to its federal trustee Secretariat. [FR Doc. 07–888 Filed 2–22–07; 2:26 pm]
relationship. BILLING CODE 6715–01–M
[FR Doc. 07–884 Filed 2–22–07; 1:30 pm]
On February 6, 2007, EPA issued its
final determination concluding that the
Section 8 land is part of a dependent FEDERAL TRADE COMMISSION
Indian community under 18 U.S.C.
1151(b) and, thus, ‘‘Indian country.’’ FEDERAL DEPOSIT INSURANCE
Public Workshop; Proof Positive: New
EPA is therefore the appropriate agency CORPORATION
Directions for ID Authentication
to consider underground injection Notice of Agency Meeting; Sunshine
control permit applications under the AGENCY: Federal Trade Commission
Act (FTC).
Safe Drinking Water Act (SDWA) for
that land. For a copy of the Pursuant to the provisions of the ACTION: Notice announcing a two-day
Determination and other supporting ‘‘Government in the Sunshine Act’’ (5 public workshop and requesting public
material, go to U.S.C. 552b), notice is hereby given that comment and participation.
region09/water/groundwater/permit- at 10 a.m. on Thursday, March 1, 2007,
determination.html. the Federal Deposit Insurance SUMMARY: The FTC and other
Corporation’s Board of Directors will participating agencies are planning to
Dated: February 15, 2007.
meet in closed session, pursuant to host a two-day public workshop to
Laura Yoshii, explore the role of authentication
section 552b(c)(2), (C)(6), (c)(8), and
Acting Regional Administrator, Region IX. processes in preventing identity theft.
(9)(A)(ii), Title 5, United States Code, to
[FR Doc. E7–3203 Filed 2–23–07; 8:45 am] consider matters relating to the The workshop will provide a forum for
BILLING CODE 6560–50–P Corporation’s supervisory and corporate discussion among public sector, private
activities. sector, and consumer representatives
The meeting will be held in the Board about better ways to authenticate the
Room on the sixth floor of the FDIC identities of individuals.
EQUAL EMPLOYMENT OPPORTUNITY Building located at 550 17th Street, DATES: Workshop, Proof Positive: New
COMMISSION NW., Washington, DC. Directions for ID Authentication, will be
Sunshine Act Meeting Requests for further information held on April 23, 2007 from 8:30 a.m.
concerning the meeting may be directed to 5 p.m. and April 24, 2007, from 8:30
AGENCY HOLDING THE MEETING: Equal to Mr. Robert E. Feldman, Executive a.m. to 12:30 p.m., in the Federal Trade
Employment Opportunity Commission. Secretary of the Corporation, at (202) Commission’s Satellite Building
898–7122. Conference Center located at 601 New
DATE AND TIME: Monday, March 5, 2007,
10 a.m. Eastern Time. Dated: February 22, 2007. Jersey Avenue, NW., Washington, DC.
PLACE: Clarence M. Mitchell, Jr. Federal Deposit Insurance Corporation. The events are open to the public and
Conference Room on the Ninth Floor of Robert E. Feldman, attendance is free of charge. There will
the EEOC Office Building, 1801 ‘‘L’’ Executive Secretary. be no pre-registration.
Street, NW., Washington, DC 20507. [FR Doc. 07–881 Filed 2–22–07; 12:53 pm] Participants: As discussed below,
STATUS: The meeting will be closed to BILLING CODE 6714–01–M written requests to participate as a
the public. panelist in the workshop must be filed
on or before March 9, 2007. Persons
FEDERAL ELECTION COMMISSION filing requests to participate as a
CLOSED SESSION: Litigation panelist will be notified on or before
Recommendation: General Counsel Sunshine Act Meetings Notice March 23, 2007, if they have been
Recommendation. selected to participate.
DATE AND TIME: Thursday, March 1, Comments: Whether or not selected to
Note: In accordance with the Sunshine Act,
the meeting will be open to public 2007, at 10 a.m. participate, persons may submit written
observation of the Commission’s PLACE: 999 E Street, NW., Washington, comments on the issues and topics set
deliberations and voting. (In addition to DC (Ninth Floor). out below. Such comments must be
publishing notices on EEOC Commission STATUS: This meeting will be open to the filed on or before March 23, 2007.
meetings in the Federal Register, the public. ADDRESSES: Interested parties are
Commission also provides a recorded
ITEMS TO BE DISCUSSED: Correction and invited to submit requests to participate
announcement a full week in advance on
future Commission sessions.) Approval of Minutes. and comments in accordance with the
Advisory Opinion 2007–03: Senator following instructions:
Please telephone (202) 663–7100 Barack Obama and the Obama
(voice) and (202) 663–4074 (TTY) at any Exploratory Committee by counsel, Requests To Participate as Panelist in
ycherry on PROD1PC64 with NOTICES

time for information on these meetings. Robert F. Bauer and Rebecca Gordon, of Workshop:
The EEOC provides sign language Perkins Coie LLP. Statement of Policy Parties seeking to participate as
interpretation at Commission meetings Regarding Commission Action in panelists in the workshop must notify
for the hearing impaired. Requests for Matters at the Initial Stage in the the FTC in writing of their interest in
other reasonable accommodations may Enforcement Process. participating on or before March 9,

VerDate Aug<31>2005 16:03 Feb 23, 2007 Jkt 211001 PO 00000 Frm 00045 Fmt 4703 Sfmt 4703 E:\FR\FM\26FEN1.SGM 26FEN1
8382 Federal Register / Vol. 72, No. 37 / Monday, February 26, 2007 / Notices

2007. Requests to participate as a there also will be time during the remove home contact information for
panelist should be captioned ‘‘ID workshop to ask questions. individuals from the public comments it
Workshop—Request to Participate, receives before placing those comments
P075402’’ and may be submitted by any on the FTC Web site. More information,
of the following methods. However, if The FTC requests that interested including routine uses permitted by the
the request contains any material for parties submit written comments on the Privacy Act, may be found in the FTC’s
which confidential treatment is issues raised below. Studies, surveys, privacy policy, at
requested, it must be filed in paper research, and empirical data are ftc/privacy.htm.
form, and the first page of the document especially useful. Comments should be FOR FURTHER INFORMATION CONTACT:
must be clearly labeled ‘‘Confidential.’’ 1 captioned ‘‘ID Workshop—Comment, Stacey Brandenburg, Joanna Crane, or
• E-mail: Requests to participate can P075402’’ and must be filed on or before Naomi Lefkovitz at (202)–326–2252.
be submitted electronically to: March 23, 2007. If the comment SUPPLEMENTARY INFORMATION: contains any material for which
• Mail or Hand Delivery: A request to confidential treatment is requested, it Background and Proposed Agenda
participate filed in paper form should must be filed in paper form, and the first Identity theft takes many forms and is
include ‘‘ID Workshop, P075402,’’ both page of the document must be clearly committed for various purposes,
in the text and on the envelope and labeled ‘‘Confidential.’’ 2 Otherwise, including financial gain, avoidance of
should be mailed or delivered to the comments may be submitted by any of criminal penalties, and facilitating
following address: Federal Trade the following methods. criminal activity (e.g., opening new
Commission/Office of the Secretary, • Electronic Filing: Comments filed in credit accounts or draining bank
Room H–135 (Annex N), 600 electronic form should be submitted by accounts, evading criminal arrest
Pennsylvania Avenue, NW., clicking on the following Web link: warrants, and facilitating terrorist activities). But in its most basic form, it
Washington, DC 20580. Because paper
idmworkshop and following the is a crime of deception relying on the
mail in the Washington area and at the
instructions on the Web-based form. To unauthorized use of identifying
Commission is subject to delay, please
ensure that the Commission considers information or credentials of another
consider submitting your request by e-
an electronic comment, you must file it individual. At present, many
mail, as prescribed above. The FTC is
on the Web-based form at https:// transactions that depend on correct
requesting that any request filed in identification are conducted either
paper form be sent by courier or
idmworkshop. remotely, or if in person, between
overnight service, if possible. • Mail or Hand Delivery: A comment
Parties should include in their individuals who are strangers. Because
filed in paper form should include ‘‘ID such transactions necessarily rely on an
requests a statement setting forth their Workshop, P075402,’’ both in the text
expertise in or knowledge of the issues individual’s use of identifying
and on the envelope and should be information or credentials in order to
on which the workshop will focus and mailed or delivered to the following
their contact information, including a prove his or her identity, there is a
address: Federal Trade Commission/ potential risk of identity theft. Thus, the
telephone number, facsimile number, Office of the Secretary, Room H–135
and e-mail address (if available), to ability to determine when an individual
(Annex N), 600 Pennsylvania Avenue, is not who he or she purports to be is
enable the FTC to notify them if they are NW., Washington, DC 20580. Because
selected. an important key to preventing identity
paper mail in the Washington area and theft.
FTC staff will select a limited number at the Commission is subject to delay,
of panelists to participate in the The Identity Theft Task Force (‘‘Task
please consider submitting your Force’’) was established by Executive
workshop, using the following criteria. comments in electronic form, as
1. The party has expertise in or Order of the President on May 10, 2006.
prescribed above. The FTC is requesting The Order directed the Task Force to
knowledge of the issues that are the that any comment filed in paper form be
focus of the workshop; deliver a strategic plan to the President
sent by courier or overnight service, if on the Federal Government’s response
2. The party’s participation would possible.
promote a balance of interests being to identity theft. The Task Force, which
The FTC Act and other laws the
represented at the workshop; and is chaired by the Attorney General and
Commission administers permit the
3. The party has been designated by co-chaired by the Chairman of the FTC,
collection of public comments to
one or more interested parties (who delivered an interim set of
consider and use in this proceeding as
timely file requests to participate) as a recommendations on September 19,
appropriate. All timely and responsive
party who shares group interests with 2006 that included the recommendation
public comments, whether filed in
the designator(s). to hold a workshop focused on
paper or electronic form, will be
The FTC will notify panelists on or promoting improved means of
considered by the Commission and will
before March 23, 2007, as to whether be available to the public on the FTC authenticating the identities of
they have been selected. The number of Web site, to the extent practicable, at individuals.3
parties selected will not be so large as To implement the Task Force’s
to inhibit effective discussion among recommendation and to begin greater
publiccomments.htm. As a matter of
them. For those not serving as panelists, study of this area, the FTC and other
discretion, the FTC makes every effort to
Task Force agencies 4 will hold a
1 Commission Rule 4.2(d), 16 CFR 4.2(d). The 2 Commission Rule 4.2(d), 16 CFR 4.2(d). The
workshop to explore the means by
comment must be accompanied by an explicit comment must be accompanied by an explicit
3 President’s Identity Theft Task Force Summary
request for confidential treatment, including the request for confidential treatment, including the
of Interim Recommendations (2006), available at
ycherry on PROD1PC64 with NOTICES

factual and legal basis for the request, and must factual and legal basis for the request, and must
identify the specific portions of the comment to be identify the specific portions of the comment to be
withheld from the public record. The request will withheld from the public record. The request will 4 For a list of the agencies comprising the Task

be granted or denied by the Commission’s General be granted or denied by the Commission’s General Force, see Executive Order: Strengthening Federal
Counsel, consistent with applicable law and the Counsel, consistent with applicable law and the Efforts to Protect Against Identity Theft (2006),
public interest. See Commission Rule 4.9(c), 16 CFR public interest. See Commission Rule 4.9(c), 16 CFR available at
4.9(c). 4.9(c). releases/2006/05/20060510–3.html.

VerDate Aug<31>2005 16:03 Feb 23, 2007 Jkt 211001 PO 00000 Frm 00046 Fmt 4703 Sfmt 4703 E:\FR\FM\26FEN1.SGM 26FEN1
Federal Register / Vol. 72, No. 37 / Monday, February 26, 2007 / Notices 8383

which identity theft can be prevented 2. Confirming the Established Identity— generate other consumer benefits (e.g.,
through better authentication of Current or Emerging Use of providing access to various commercial
individuals.5 The workshop will Authentication Technologies or or government services)?
facilitate a discussion among public Methods • How are other countries addressing
sector, private sector, and consumer • What are some current or emerging verification and authentication issues,
representatives and will focus on authentication technologies or methods particularly as the issues relate to
technological and policy requirements (e.g., biometrics, public key identity theft? What lessons can be
for developing better authentication infrastructure, knowledge-based learned?
processes, including the incorporation authentication) for confirming 4. Upcoming Challenges in
of privacy standards and consideration established identities? Describe the Authentication
of consumer usability. contexts in which they may be used and
To help in planning for the workshop, • As technologies converge to allow
their strengths and weaknesses. consumers to conduct financial or other
the FTC invites comments on ways to
• Please comment on the concept of sensitive transactions in new ways, how
improve authentication processes in
multifactor authentication and how it is can appropriate authentication
order to reduce the incidence of identity
being or should be applied. processes or technologies be
theft, including but not limited to,
• To what extent are consumer incorporated to ensure that consumers
comments on the issues and topics set
information databases being used to receive the intended benefits of these
out below:
authenticate individuals? One example advances without exposing them to new
1. Establishing Identity—Understanding of such use is to support knowledge- vulnerabilities?
Verification Processes based authentication tools, which
generate questions the answers to which By direction of the Commission.
• In what ways can identities be
only the consumer would know. Donald S. Clark,
established? How can individuals prove
their identities when establishing them • To what extent do current or Secretary.
in the first instance? emerging authentication technologies or [FR Doc. E7–3238 Filed 2–23–07; 8:45 am]
• Please comment on the strengths methods incorporate or rely on readily BILLING CODE 6750–01–P
and weaknesses of relying on traditional available identification information,
identification documentation or such as Social Security numbers? How
credentials such as birth certificates, might such reliance affect the risk of DEPARTMENT OF HEALTH AND
Social Security cards, driver’s licenses, identity theft? HUMAN SERVICES
and passports. • To what extent do these
• Please comment on the strengths technologies or methods meet consumer Office of the Secretary
and weaknesses of new or emerging needs, such as ease of use? To what
[Document Identifier: OS–0990–0000] [60-
tools for establishing individuals’ extent do these technologies or methods day notice]
identities. Examples may include raise privacy concerns, including
consumer information databases, which concerns about the tracking and Agency Information Collection
can be used to confirm whether a name profiling of an individual’s movements Activities: Proposed Collection;
and other personal information (e.g., or transactions by the public or private Comment Request
Social Security number) belong sector?
together, and fraud detection software, AGENCY: Office of the Secretary, HHS.
3. Comparing Verification and In compliance with the requirement
which can be used to identify Authentication Systems
anomalous patterns or behaviors that of section 3506(c)(2)(A) of the
may signal use of a false identity. • What are some of the different Paperwork Reduction Act of 1995, the
• What roles should the public sector models for verification and Office of the Secretary (OS), Department
or the private sector have in establishing authentication systems? Please of Health and Human Services, is
identification credentials? Within the comment on their strengths and publishing the following summary of a
public sector, what roles should weaknesses. For example, what are the proposed collection for public
different levels of government (i.e., relative merits of a centralized comment. Interested persons are invited
federal, state, local) have in establishing identification system where a single or to send comments regarding this burden
identification credentials? a limited number of organizations estimate or any other aspect of this
identify all individuals and issue collection of information, including any
5 The term ‘‘authentication’’ generally means the credentials that other entities can rely of the following subjects: (1) The
process of ensuring that an individual is who she upon versus a decentralized necessity and utility of the proposed
or he claims to be. However, this process is more identification system where each information collection for the proper
easily understood as comprising two distinct steps.
The first step is the identification of an individual
organization develops its own performance of the agency’s functions;
at the onset of the relationship between the procedures and separately verifies and (2) the accuracy of the estimated
individual and the verifying entity (e.g., an authenticates the individuals with burden; (3) ways to enhance the quality,
individual’s identity will be verified when he or she which it is involved? utility, and clarity of the information to
applies for a passport or opens a financial account).
The second step is the reaffirmation that the
• In considering the relative merits of be collected; and (4) the use of
individual is the same individual whose identity different systems, please comment on: automated collection techniques or
was initially verified (e.g., the individual’s passport Æ Consumer acceptance and to what other forms of information technology to
is checked when he or she travels in or out of the degree consumer education may minimize the information collection
country or the individual provides a password or
other credentials to the financial institution when
facilitate such acceptance; and burden.
Æ Any privacy concerns including Type of Information Collection
ycherry on PROD1PC64 with NOTICES

accessing an existing account). Although different

terms can be applied to these steps, the first step issues raised with respect to data Request: New collection.
is often labeled verification and the second step, collection, use, and storage. Title of Information Collection:
particularly with respect to online environments, is
often labeled authentication. For greater clarity,
• In addition to reducing identity Understanding Barriers and Successful
these distinctions are used in the invitation for theft, how might better systems or Strategies for Faith-Based Organizations
comment section set forth herein. processes for proving claims of identity in Accessing Grants.

VerDate Aug<31>2005 16:03 Feb 23, 2007 Jkt 211001 PO 00000 Frm 00047 Fmt 4703 Sfmt 4703 E:\FR\FM\26FEN1.SGM 26FEN1