Chapter 120-3 Accessing Personal Information
This chapter is promulgated in accordance with section 1347.15 of the Revised Code. For purposes of this chapter, the following definitions apply.
(A) "Access" as a noun means an instance of copying, viewing, or otherwise perceiving; "access" as a verb means to copy, view, or otherwise perceive.
(B) "Acquisition of a new computer system" means the purchase of a "computer system," as defined in this rule, that is not a computer system currently in place nor one for which the acquisition process has been initiated as of the effective date of the agency rule addressing requirements in section 1347.15 of the Revised Code.
(C) "Computer system" means a "system," as defined by section 1347.01 of the Revised Code, that stores, maintains, or retrieves personal information using electronic data processing equipment.
(D) "Confidential personal information" (CPI) has the meaning as defined by division (A)(1) of section 1347.15 of the Revised Code and identified by rules promulgated by the agency in accordance with division (B)(3) of section 1347.15 of the Revised Code that reference the federal or state statutes or administrative rules that make personal information maintained by the agency confidential.
(E) "Employee of the state agency" means each employee of a state agency regardless of whether that employee holds an elected or appointed office or position within the state agency. "Employee of the state agency" is limited to the specific employing state agency.
(F) "Incidental contact" means contact with the information that is secondary or tangential to the primary purpose of the activity that resulted in the contact.
(G) "Individual" means a natural person or the natural person's authorized representative, legal counsel, legal custodian, or legal guardian.
(H) "Information owner" means the individual appointed in accordance with division (A) of section 1347.05 of the Revised Code to be directly responsible for a system.
(I) "Person" means a natural person.
(J) "Personal information" has the same meaning as defined in division (E) of section 1347.01 of the Revised Code.
(K) "Personal information system" means a "system" that "maintains" "personal information" as those terms are defined in section 1347.01 of the Revised Code. "System" includes manual and computer systems.
(L) "Research" means a methodical investigation into a subject.
(M) "Routine" means commonplace, regular, habitual, or ordinary.
(N) "Routine information that is maintained for the purpose of internal office administration, the use of which would not adversely affect a person" as that phrase is used in division (F) of section 1347.01 of the Revised Code means personal information relating to employees and maintained by the agency for internal administrative and human resource purposes.
(O) "System" has the same meaning as defined by division (F) of section 1347.01 of the Revised Code.
(P) "Upgrade" means a substantial redesign of an existing computer system for the purpose of providing a substantial amount of new application functionality, or application modifications that would involve substantial administrative or fiscal resources to implement, but would not include maintenance, minor updates and patches, or modifications that entail a limited addition of functionality due to changes in business or legal requirements.
(A) Criteria for accessing confidential personal information. Personal information systems of the agency are managed on a "need-to-know" basis, whereby the information owner determines the level of access required for an employee of the agency to fulfill the employee's job duties. The determination of access to confidential personal information shall be approved by the employee's supervisor and the information owner prior to providing the employee with access to confidential personal information within a personal information system. The agency shall establish procedures for determining a revision to an employee's access to confidential personal information upon a change to that employee's job duties, including, but not limited to, transfer or termination. Whenever an employee's job duties no longer require access to confidential personal information in a personal information system, the employee's access to confidential personal information shall be removed.
(B) Individual requests for a list of confidential personal information. Upon the signed written request of any individual for a list of confidential personal information about the individual maintained by the agency, the agency shall:
(1) Verify the identity of the individual by a method that provides safeguards commensurate with the risk associated with the confidential personal information; and
(2) Provide to the individual the list of confidential personal information that does not relate to an investigation about the individual or is otherwise not excluded from the scope of Chapter 1347. of the Revised Code; and
(3) If all information relates to an investigation about that individual, inform the individual that the agency has no confidential personal information about the individual that is responsive to the individual's request.
(C) Notice of invalid access.
(1) Upon discovery or notification that confidential personal information of a person has been accessed by an employee for an invalid reason, the agency shall notify the person whose information was invalidly accessed as soon as practical and to the extent known at the time. However, the agency shall delay notification for a period of time necessary to ensure that the notification would not delay or impede an investigation or jeopardize homeland or national security. Additionally, the agency may delay the notification consistent with any measures necessary to determine the scope of the invalid access, including which individuals' confidential personal information invalidly was accessed, and to restore the reasonable integrity of the system.
Once the agency determines that notification would not delay or impede an investigation of the circumstances and involvement of an employee surrounding the invalid access of the confidential personal information, the agency shall disclose the invalid access to confidential personal information to the person who information was invalidly accessed.
(2) Notification provided by the agency shall inform the person of the type of confidential personal information accessed and the dates of the invalid access.
(3) Notification may be made by any method reasonably designed to accurately inform the person of the invalid access, including written, electronic, or telephone notice.
(D) Appointment of a data privacy point of contact. The agency director shall designate an employee of the agency to serve as the data privacy point of contact. The data privacy point of contact shall work with the chief privacy officer within the office of information technology to assist the agency with both the implementation of privacy protections for the confidential personal information that the agency maintains and compliance with section 1347.15 of the Revised Code and the rules adopted pursuant to the authority provided by that chapter.
(E) Completion of a privacy impact assessment. The agency director shall designate an employee of the agency to serve as the data privacy point of contact who shall timely complete the privacy impact assessment form developed by the office of information technology.
(A) Performing the following functions constitute valid reasons for authorized employees of the agency to access confidential personal information:
(1) Responding to a public records request;
(2) Responding to a request from an individual for the list of CPI the agency maintains on that individual;
(3) Administering a constitutional provision or duty;
(4) Administering a statutory provision or duty;
(5) Administering an administrative rule provision or duty;
(6) Complying with any state or federal program requirements;
(7) Processing or payment of claims or otherwise administering a program with individual participants or beneficiaries;
(8) Auditing purposes;
(9) Licensure (or permit, eligibility, filing, etc.) processes;
(10) Investigation or law enforcement purposes;
(11) Administrative hearings;
(12) Litigation, complying with an order of the court, or subpoena;
(13) Human resource matters, including but not limited to hiring, promotion, demotion, discharge, salary and compensation issues, leave requests, time card approvals, discipline matters, and investigations of work rule or policy violations;
(14) Complying with an executive order or policy;
(15) Complying with an agency policy or a state administrative policy issued by the department of administrative services, the office of budget and management or other similar state agency;
(16) Complying with a collective bargaining agreement provision.
(B) For the purpose of carrying out specific duties of the Ohio public defender, authorized employees would also have valid reasons for accessing CPI in the following circumstances:
(1) Employees of the office, co-counsel, contractors, interns, and volunteers may review CPI of individuals who are defendants, respondents, clients, plaintiffs, witnesses, relatives of these individuals; victims, jurors, experts, or persons appearing in any evidence or investigation relative to the legal representation of indigent defendants.
(2) Employees of the office may review CPI of individuals seeking to contract with the agency relative to personal service contracts, including but not limited to training programs.
(3) Employees of the office may review CPI of individuals relative to reimbursement and indigent defense expenses.
(4) Employees of the office and members of the Ohio public defender commission may review CPI of individuals relative to all the powers given and duties required to be performed by the Ohio public defender commission and the Ohio public defender pursuant to Chapter 120. of the Revised Code, agency 120 of the Administrative Code, and section 2941.51 of the Revised Code.
The following federal statutes and regulations, and state statutes and administrative rules make personal information maintained by the agency confidential, and identify the confidential personal information within the scope of rules promulgated by this agency in accordance with section 1347.15 of the Revised Code:
(A) Social security numbers: 5 U.S.C. 552a., unless the individual was told that the number would be disclosed.
(B) "Bureau of Criminal Investigation and Information" criminal records check results: section 4776.04 of the Revised Code.
(C) U.S. Code or Ohio Revised Code sections, and any rules requiring confidential treatment of personal information, including: section 149.43 of the Revised Code, lawyer-client privilege, sealed court records, constitutional right to privacy, medical records, psychological evaluations, Health Insurance Portability and Accountability Act of 1996, residential and familial information of exempt individuals, probation and parole records, adoption records, putative father registry records, DNA database records, and records from the department of rehabilitation and correction and the department of youth services.
(A) Access restrictions. Access to confidential personal information that is kept electronically shall require a password or other authentication measure.
(B) Acquisition of a new computer system. When the agency acquires a new computer system that stores, manages, or contains confidential personal information, the agency shall include a mechanism for recording specific access by employees of the agency to confidential personal information in the system.
(C) Upgrading existing computer systems. When the agency modifies an existing computer system that stores, manages, or contains confidential personal information, the agency shall make a determination whether the modification constitutes an upgrade. Any upgrades to a computer system shall include a mechanism for recording specific access by employees of the agency to confidential personal information in the system.
(D) Logging requirements regarding confidential personal information in existing computer systems.
(1) The agency shall require employees of the agency who access confidential personal information within computer systems to maintain a log that records that access.
(2) Access to confidential information is not required to be entered into the log under the following circumstances:
(a) The employee of the agency is accessing confidential personal information for official agency purposes, including research, and the access is not specifically directed toward a specifically named individual or a group of specifically named individuals.
(b) The employee of the agency is accessing confidential personal information for routine office procedures and the access is not specifically directed toward a specifically named individual or a group of specifically named individuals.
(c) The employee of the agency comes into incidental contact with confidential personal information and the access of the information is not specifically directed toward a specifically named individual or a group of specifically named individuals.
(d) The employee of the agency accesses confidential personal information about an individual based upon a request made under either of the following circumstances:
(i) The individual requests confidential personal information about him or herself.
(ii) The individual makes a request that the agency take some action on that individual's behalf and accessing the confidential personal information is required in order to consider or process that request.
(3) The agency may choose the form or forms of logging, whether in electronic or paper formats.
(E) Log management. The agency shall issue a policy that specifies who shall maintain the log, what information is to be captured in the log, how the log is to be stored, and how long information kept in the log is to be retained.
(F) Nothing in this rule limits the agency from requiring logging in any circumstance that it deems necessary.