WorldWideScience

Sample records for facility security officer

  1. 77 FR 63849 - Facility Security Officer Training Requirements; Correction

    Science.gov (United States)

    2012-10-17

    ... SECURITY Coast Guard Facility Security Officer Training Requirements; Correction AGENCY: Coast Guard, DHS...), announcing a public meeting to receive comments on the development of a Facility Security Officer training program. The notice contains an inaccurate Internet link to RSVP for the public meeting. DATES: The...

  2. 33 CFR 106.210 - OCS Facility Security Officer (FSO).

    Science.gov (United States)

    2010-07-01

    ... within a reasonable proximity to each other. If a person serves as the FSO for more than one OCS facility... of stores and industrial supplies in compliance with this part; (4) Where applicable, propose...

  3. 33 CFR 106.205 - Company Security Officer (CSO).

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Company Security Officer (CSO...) Facility Security Requirements § 106.205 Company Security Officer (CSO). (a) General. (1) An OCS facility...; (6) Ensure the timely correction of problems identified by audits or inspections; (7)...

  4. Change of Computer Security Officer

    CERN Multimedia

    IT Department

    2008-01-01

    After many years of successfully protecting the CERN site in her role as Computer Security Officer (CSO), Denise Heagerty is being assigned to a new role within the IT Department. David Myers has been appointed to the position of CSO for one year from 1st September. W. von Rüden, IT Department Head

  5. Security culture for nuclear facilities

    Science.gov (United States)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  6. Office of Command Security Total Quality Management Plan

    Science.gov (United States)

    1989-07-01

    outlines the Office of Command Security instruction for TQM implementation. Keywords: TQM ( Total Quality Management ), DLA Office of Command Security, Continuous process improvement, Automatic data processing security.

  7. 6 CFR 27.200 - Information regarding security risk for a chemical facility.

    Science.gov (United States)

    2010-01-01

    ... information from chemical facilities that may reflect potential consequences of or vulnerabilities to a... chemical facility. 27.200 Section 27.200 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.200 Information...

  8. 12 CFR 605.501 - Information Security Officer.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Information Security Officer. 605.501 Section... Information Security Officer. (a) The Information Security Officer of the Farm Credit Administration shall be responsible for implementation and oversight of the information security program and procedures adopted by...

  9. 33 CFR 127.701 - Security on existing facilities.

    Science.gov (United States)

    2010-07-01

    ... (CONTINUED) WATERFRONT FACILITIES WATERFRONT FACILITIES HANDLING LIQUEFIED NATURAL GAS AND LIQUEFIED HAZARDOUS GAS Waterfront Facilities Handling Liquefied Natural Gas Security § 127.701 Security on...

  10. Perimeter security for Minnesota correctional facilities

    Energy Technology Data Exchange (ETDEWEB)

    Crist, D. [Minnesota Department of Corrections, St. Paul, MN (United States); Spencer, D.D. [Sandia National Labs., Albuquerque, NM (United States)

    1996-12-31

    For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned new construction at other facilities.

  11. 41 CFR 105-53.133 - Information Security Oversight Office.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Information Security... FUNCTIONS Central Offices § 105-53.133 Information Security Oversight Office. (a) Creation and authority. The Information Security Oversight Office (ISOO), headed by the Director of ISOO, who is appointed...

  12. 46 CFR 15.1113 - Vessel Security Officer (VSO).

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Vessel Security Officer (VSO). 15.1113 Section 15.1113 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Vessels Subject to Requirements of STCW § 15.1113 Vessel Security Officer (VSO). After July...

  13. 18 CFR 3a.51 - Designation of security officers.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers §...

  14. Assessing the Security Vulnerabilities of Correctional Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  15. 38 CFR 1.218 - Security and law enforcement at VA facilities.

    Science.gov (United States)

    2010-07-01

    ... VETERANS AFFAIRS GENERAL PROVISIONS Security and Law Enforcement at Department of Veterans Affairs Facilities § 1.218 Security and law enforcement at VA facilities. (a) Authority and rules of conduct... or concealed, whether loaded or unloaded (except by Federal or State law enforcement officers on...

  16. 33 CFR 104.210 - Company Security Officer (CSO).

    Science.gov (United States)

    2010-07-01

    ... inspections under 46 CFR part 2; (7) Ensure the timely or prompt correction of problems identified by audits... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Company Security Officer (CSO... MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.210 Company...

  17. Individual and typological characteristics of private security officers

    Directory of Open Access Journals (Sweden)

    N Е Aimautova

    2009-06-01

    Full Text Available The article is devoted to the study of sociological, social and psychological as well as individual and typological personality characteristics and essential professional qualities of the security officers specializing in various fields. The relevance of the research is entailed by the insufficient elaboration and representation of distinctive features, the correlation between the requirements of the specialized individual working places of security officers and personality characteristics as well as the essential professional qualities of security officers of Private Security Agencies (PSA in sociology, social psychology, psychology of labour and psychogiagnosis.

  18. The chief information security officer insights, tools and survival skills

    CERN Document Server

    Kouns, Barry

    2011-01-01

    Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills.

  19. Office of Chief Scientist, Integrated Research Facility (OCSIRF)

    Data.gov (United States)

    Federal Laboratory Consortium — Introduction The Integrated Research Facility (IRF) is part of the Office of the Chief Scientist (OCS) for the Division of Clinical Research in the NIAID Office of...

  20. Office Automation System and Its Security Design

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Analyzing the specialties of OAS network based on Internet/Intranet, aiming to these specialties design the OAS network's system structure. Analyzing the security threats that the OAS network faces to and the possible attacking means. This paper puts forward five security tactics and security design in detail, and a sensible conclusion is proposed at last.

  1. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy... regulation 41 CFR 101-6, announcement is made for a meeting of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program...

  2. Regional security assessments : a strategic approach to securing federal facilities

    OpenAIRE

    Consolini, Todd

    2009-01-01

    CHDS State/Local The 18 critical infrastructure sectors identified by the U.S. Department of Homeland Security form a vast and complex network of interdependent assets that supports the functioning of nearly every aspect of business, government, and commerce. The disruption of even one critical infrastructure sector by a terrorist attack or natural or manmade disaster is likely to have cascading effects on other sectors. As the Sector-Specific Agency for the Government Facilities Sector, t...

  3. 42 CFR 401.130 - Materials available at social security district offices and branch offices.

    Science.gov (United States)

    2010-10-01

    ... chapter IV . (4) CMS Rulings. (5) Social Security Handbook. (b) Materials available for inspection and... 42 Public Health 2 2010-10-01 2010-10-01 false Materials available at social security district... Confidentiality and Disclosure § 401.130 Materials available at social security district offices and...

  4. Professional burnout syndrome among correctional facility officers.

    Science.gov (United States)

    Harizanova, Stanislava N; Tarnovska, Tanya H

    2013-01-01

    Correctional facilities present unique work places--the employees there work in tough, demanding and hazardous working conditions, in real life-threatening environment, subjected to physical and mental fatigue, risk of infectious diseases, work in shifts, with inadequate pay, etc. The aim of this study was to find the prevalence and level of burnout syndrome among employees working in the District Prison of the town of Plovdiv. The study included all employees that had direct contact with the inmates in the prison. We recruited 106 employees that participated in the study anonymously and voluntarily. The main instrument we used was the questionnaire designed according to the methods developed by V. Boiko, which allows identification of professional burnout syndrome in its three phases with four symptoms in each of the phases. We found a high prevalence of burnout syndrome among the staff in the District Prison in Plovdiv (74.53%). All three phases of burnout were found to have a high prevalence rate--the stress phase: 48.11%, the resistance phase: 66.98%, the exhaustion phase: 41.51%. The rank in the service hierarchy was found to be a predictor in the stress phase, B = 0.701, p = 0.048, Exp(B) = 2.106, 95%CI [1.00; 4.04]. The single officers (83.33% of the divorced and 55.56% of the single employees) and those of the staff that were more highly educated (78.72%) had elevated levels of burnout syndrome, and these manifested during the first 5 years of their service in the prison (77.78%). In Bulgaria at present the burnout syndrome has not been studied among employees working in correctional facilities. We found a high prevalence of the syndrome among the employees of the District Prison - Plovdiv. The younger, the single and the more educated employees had greater levels of burnout syndrome, which manifest during the first 5 years of their service. The results suggest that there is a need to develop and implement effective strategies to reduce and prevent

  5. 47 CFR 4.5 - Definitions of outage, special offices and facilities, and 911 special facilities.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Definitions of outage, special offices and... Definitions of outage, special offices and facilities, and 911 special facilities. (a) Outage is defined as a...-911 tandems/selective routers for at least 30 minutes duration; or (3) One or more end-office or...

  6. Office of Science User Facilities Summary Report, Fiscal Year 2015

    Energy Technology Data Exchange (ETDEWEB)

    None

    2015-01-01

    The U.S. Department of Energy Office of Science provides the Nation’s researchers with worldclass scientific user facilities to propel the U.S. to the forefront of science and innovation. A user facility is a federally sponsored research facility available for external use to advance scientific or technical knowledge under the following conditions: open, accessible, free, collaborative, competitive, and unique.

  7. Trusted Mobile Client for Document Security in Mobile Office Automation

    OpenAIRE

    Xiaojun Yu; Qiaoyan Wen

    2011-01-01

    Mobile Office Automation is a popular application on the mobile platform. However, the mobile platform has no enough security protection in front of the open system, such as internet. The document security problem in this application has become a hot topic. This paper proposed a new solution to this problem. The solution based on the trusted computing technology, which implements the platform security by hardware. The solution also includes the transparent encryption technology that means app...

  8. POLICE OFFICE MODEL IMPROVEMENT FOR SECURITY OF SWARM ROBOTIC SYSTEMS

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-09-01

    Full Text Available This paper focuses on aspects of information security for group of mobile robotic systems with swarm intellect. The ways for hidden attacks realization by the opposing party on swarm algorithm are discussed. We have fulfilled numerical modeling of potentially destructive information influence on the ant shortest path algorithm. We have demonstrated the consequences of attacks on the ant algorithm with different concentration in a swarm of subversive robots. Approaches are suggested for information security mechanisms in swarm robotic systems, based on the principles of centralized security management for mobile agents. We have developed the method of forming a self-organizing information security management system for robotic agents in swarm groups implementing POM (Police Office Model – a security model based on police offices, to provide information security in multi-agent systems. The method is based on the usage of police station network in the graph nodes, which have functions of identification and authentication of agents, identifying subversive robots by both their formal characteristics and their behavior in the swarm. We have suggested a list of software and hardware components for police stations, consisting of: communication channels between the robots in police office, nodes register, a database of robotic agents, a database of encryption and decryption module. We have suggested the variants of logic for the mechanism of information security in swarm systems with different temporary diagrams of data communication between police stations. We present comparative analysis of implementation of protected swarm systems depending on the functioning logic of police offices, integrated in swarm system. It is shown that the security model saves the ability to operate in noisy environments, when the duration of the interference is comparable to the time necessary for the agent to overcome the path between police stations.

  9. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Science.gov (United States)

    2010-07-01

    ..., personnel identification documents and communication, alarm, lighting, access control, and similar systems...-keeping duties and risk of fatigue on facility personnel alertness and performance; (iv) Security training...

  10. 75 FR 55574 - Joint Public Roundtable on Swap Execution Facilities and Security-Based Swap Execution Facilities

    Science.gov (United States)

    2010-09-13

    ... COMMISSION SECURITIES AND EXCHANGE COMMISSION Joint Public Roundtable on Swap Execution Facilities and Security-Based Swap Execution Facilities AGENCY: Commodity Futures Trading Commission (``CFTC'') and... which invited participants will discuss swap execution facilities and security-based swap execution...

  11. Improvement of psychological support for Security Departments Officers in Russian Penal System

    Directory of Open Access Journals (Sweden)

    A. V. Kokurin

    2013-04-01

    Full Text Available We analyze the results of studies on predicting professional success of Security Departments Officers of penitentiary institutions and pretrial detention centers, and on socio-psychological climate in security units (2062 employees of eighteen territorial bodies of the Federal Penitentiary Service of Russia, as well as diagnosis and correction of borderline mental state of employees of these units (372 employees from four regional offices of the Federal Penitentiary Service of Russia. We describe the criteria for determining the psychological suitability to guardian activity in the context of penal system. Using “Questionnaire of social and psychological climate in special divisions of the correctional system in Russia”, we proposed a complex of measures aimed at optimizing the social and psychological climate in the security departments of penitentiary and detention facilities. The application of science based and experimentally tested diagnostic and corrective complex, we recommended a technology for short-term correction of borderline mental states in employees of these units.

  12. 76 FR 62439 - Order of Succession for the Office of Disaster Management and National Security

    Science.gov (United States)

    2011-10-07

    ... URBAN DEVELOPMENT Order of Succession for the Office of Disaster Management and National Security AGENCY... Secretary of HUD designates the Order of Succession for the Office of Disaster Management and National... Security Officer, Office of Disaster Management and National Security, Department of Housing and Urban...

  13. Information security management system planning for CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeu, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.

  14. An Expert System-Based Site Security Officer

    OpenAIRE

    Adeniran, Olusola; Ikuomola, Ronke; Sodiya, Adesina Simon

    2007-01-01

    A Site Security Officer (SSO) who is a network security staff that responds to alarms from an Intrusion Detection System (IDS), is always faced with the critical problem of low response time when the network becomes big. Even a skilled SSO is hard-pressed and less productive when collecting and analyzing IDS output manually as the frequency of intrusion increases. In this work, an Expert System-Based SSO (ExSSO) is designed to correct this problem. The design presents an architecture that enc...

  15. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  16. Secure chip based encrypted search protocol in mobile office environments

    Directory of Open Access Journals (Sweden)

    Hyun-A Park

    2016-05-01

    Full Text Available This paper deals with largely two security problems between the cloud computing service and trusted platform module (TPM chip as a mobile convergent technology. At first, we solve the social issues from inside attackers, which is caused by that we regard server managers as trustworthy. In order to solve this problem, we propose encrypted DB retrieval system whose server manager cannot access on real data (plaintexts in mobile office environments of the cloud datacenter. The other problem is that cloud computing has limitless computing resources; however, it faces with the vulnerability of security. On the other hand, the TPM technology has been known as a symbol of physical security; however, it has the severe limitation of use such as hardware constraints or limited amount of non-volatile memory. To overcome the weakness and produce synergic effects between the two technologies, we combine two applications (cloud datacenter service, TPM chip as a mobile convergent technology. The main methods are TPM-security-client and masked keys. With these methods, the real keys are stored in TPM and the faked keys (masked keys are implemented for computations instead of real keys. Thus, the result of the faked keys is the same as the real keys. Consequently, this system is secure against both of the insiders and outsiders, the cloud computing service can improve security weaknesses.

  17. 76 FR 62433 - Delegation of Authority to the Office of Disaster Management and National Security

    Science.gov (United States)

    2011-10-07

    ... Secretary delegates authority to the Chief Disaster and National Security Officer, Office of Disaster... delegates to the Chief Disaster and National Security Officer authority and responsibility to advise HUD... delegates all authority pursuant to the following authorities to the Chief Disaster and National Security...

  18. Implementation of Security Facilities in Simple Network Management Protocol (SNMP)

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    Simple Network Management Protocol (SNMP) is the most widely used network management protocol on TCP/IP-based networks. However, the lack of security features, notably authentication and privacy, is its weakness. To rectify this deficiency, a new version of SNMP, known as SNMPv3, is presented. The principal security facilities defined in SNMPv3 which include timeliness mechanism, authentication, privacy and access control are outlined, and a example on how to implement security features in a practical software system is given.

  19. 46 CFR 11.811 - Requirements to qualify for an STCW endorsement as vessel security officer.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Requirements to qualify for an STCW endorsement as vessel security officer. 11.811 Section 11.811 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... § 11.811 Requirements to qualify for an STCW endorsement as vessel security officer. (a) The...

  20. How to implement security controls for an information security program at CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeus, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  1. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility approval and safeguarding of National...

  2. 24 CFR 960.505 - Occupancy by police officers to provide security for public housing residents.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Occupancy by police officers to... HOUSING Occupancy by Over-Income Families or Police Officers § 960.505 Occupancy by police officers to provide security for public housing residents. (a) Police officer. For purpose of this subpart E,...

  3. SETT facility of International Nuclear Security Academy

    Energy Technology Data Exchange (ETDEWEB)

    Seo, Hyung Min [Korea Institute of Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2012-05-15

    After the Cold War was put to an end, the international community, especially the Western world, was concerned about Soviet nuclear materials falling into wrong hands, especially of terrorists. Later, the growing threat posed by terrorist networks such as the Taliban and al Qaeda led to a global campaign to deny such networks materials which may be used for the development of Weapons of Mass Destruction (WMD). The 9 11 attacks made a section of the international community highly apprehensive of WMD terrorism, especially its nuclear version. From this point of view, it is clear that nuclear facilities which contain nuclear materials are very attractive targets for those who have intention of nuclear terror

  4. 10 CFR 1016.12 - Termination of security facility approval.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Termination of security facility approval. 1016.12 Section 1016.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical... when: (a) There is no longer a need to use, process, store, reproduce, transmit, or handle Restricted...

  5. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Science.gov (United States)

    2010-07-01

    ... Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Pt. 105, App. A Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025)...

  6. 77 FR 76076 - Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory...

    Science.gov (United States)

    2012-12-26

    ... RECORDS ADMINISTRATION Information Security Oversight Office; State, Local, Tribal, and Private Sector... Security Oversight Office. ACTION: Notice of meeting. SUMMARY: In accordance with the Federal Advisory... committee meeting of the State, Local, Tribal, and Private Sector Policy Advisory Committee. To discuss...

  7. Recommendations and Justifications for Modifications for Use Restrictions Established under the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office Federal Facility Agreement and Consent Order with ROTC 1, Revision No. 0

    Energy Technology Data Exchange (ETDEWEB)

    Lynn Kidman

    2008-02-01

    Many Federal Facility Agreement and Consent Order (FFACO) Use Restrictions (URs) have been established at various corrective action sites (CASs) as part of FFACO corrective actions (FFACO, 1996; as amended January 2007). Since the signing of the FFACO in 1996, practices and procedures relating to the implementation of risk-based corrective action (RBCA) have evolved. This document is part of an effort to re-evaluate all FFACO URs against the current RBCA criteria (referred to in this document as the Industrial Sites [IS] RBCA process) as defined in the Industrial Sites Project Establishment of Final Action Levels (NNSA/NSO, 2006c). Based on this evaluation, the URs were sorted into the following categories: 1. Where sufficient information exists to determine that the current UR is consistent with the RCBA criteria 2. Where sufficient information exists to determine that the current UR may be removed or downgraded based on RCBA criteria. 3. Where sufficient information does not exist to evaluate the current UR against the RCBA criteria. After reviewing all the existing FFACO URs, the 49 URs addressed in this document have sufficient information to determine that these current URs may be removed or downgraded based on RCBA criteria. This document presents recommendations on modifications to existing URs that will be consistent with the RCBA criteria.

  8. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Declassification by the Director of the Information Security Oversight Office. 2400.19 Section 2400.19 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY...

  9. Budget execution: a management guide for Naval Security Group Commanding Officers, Officers in Charge and Department Heads

    OpenAIRE

    Lambert, Reiner W.

    1990-01-01

    Approved for public release; distribution is unlimited. The focus of this thesis is to identify some of the important elements of budget execution over which Naval Security Group Commanding Officers (CO), Officers in Charge (OIC) and Department Heads (DH) have some degree of control. This thesis is a compendium of information of Navy fiscal management directives, manuals, desk guides and instructions. This budget execution management guide, which addresses each element of the multi-faceted...

  10. Physician office readiness for managing Internet security threats.

    Science.gov (United States)

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done.

  11. The information systems security officer's guide establishing and managing an information protection program

    CERN Document Server

    Kovacich, Gerald L

    2003-01-01

    Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority you can trust. The new ISSO Guide is just what you need. Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information secur

  12. 12 CFR 551.150 - How do my officers and employees file reports of personal securities trading transactions?

    Science.gov (United States)

    2010-01-01

    ... of personal securities trading transactions? 551.150 Section 551.150 Banks and Banking OFFICE OF... TRANSACTIONS Securities Trading Policies and Procedures § 551.150 How do my officers and employees file reports of personal securities trading transactions? An officer or employee described in § 551.140(d)...

  13. 12 CFR 560.37 - Real estate for office and related facilities.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Real estate for office and related facilities... LENDING AND INVESTMENT Lending and Investment Powers for Federal Savings Associations § 560.37 Real estate for office and related facilities. A federal savings association may invest in real estate (improved...

  14. 77 FR 3787 - Notice of Submission of Proposed Information Collection to OMB; Office of Hospital Facilities...

    Science.gov (United States)

    2012-01-25

    ... URBAN DEVELOPMENT Notice of Submission of Proposed Information Collection to OMB; Office of Hospital... below has been submitted to the Office of Management and Budget (OMB) for review, as required by the... undertaken by Office of Hospital Facilities. DATES: Comments Due Date: February 24, 2012....

  15. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  16. Physical security and vulnerability modeling for infrasturcture facilities.

    Energy Technology Data Exchange (ETDEWEB)

    Nozick, Linda Karen; Jones, Dean A.; Davis, Chad Edward; Turnquist, Mark Alan

    2006-07-01

    A model of malicious intrusions in infrastructure facilities is developed, using a network representation of the system structure together with Markov models of intruder progress and strategy. This structure provides an explicit mechanism to estimate the probability of successful breaches of physical security, and to evaluate potential improvements. Simulation is used to analyze varying levels of imperfect information on the part of the intruders in planning their attacks. An example of an intruder attempting to place an explosive device on an airplane at an airport gate illustrates the structure and potential application of the model.

  17. 33 CFR 104.215 - Vessel Security Officer (VSO).

    Science.gov (United States)

    2010-07-01

    ... stowed aboard various vessel types; (E) Understanding of the operating principles of and proper use of... regulations and techniques. (v) Familiarity with key definitions, terminology, and operational practices... Transportation Security Act of 2002, Public Law 107-295. (ii) To be eligible to take a refresher Coast...

  18. DISSS/PSDB - Personnel Security Database Modernization Project: Compilation of data gathered from DOE Operations Office`s site visits

    Energy Technology Data Exchange (ETDEWEB)

    Carpenter, R.; Sweeney, D.

    1995-03-15

    This document is a compilation of the information gathered from visits to the DOE Operations Offices. The purpose of these visits was to gather requirements for the modernization of the personnel security database. The initial phase of visits were to sites which had known local systems to augment CPCI. They were; Rocky Flats, Richland, Las Vegas, Savannah River, Oak Ridge, and Oakland. The second phase of site visits were to; Headquarters, Schenectady, Pittsburgh, Idaho Falls, Chicago, and Albuquerque. We also visited the NRC. At each site we reviewed the current clearance process in use at the field office. If the site had a local personnel security database (PSDB), we also reviewed the current PSDB processing. Each meeting was began with the a discussion on the purpose of the meeting and the background of the redesign effort.

  19. 32 CFR 2004.10 - Responsibilities of the Director, Information Security Oversight Office (ISOO) [102(b)]. 1

    Science.gov (United States)

    2010-07-01

    ... Security Oversight Office (ISOO) . 1 2004.10 Section 2004.10 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Implementation and Oversight § 2004.10...

  20. 77 FR 55843 - Office of Facilities Management and Program Services; Submission for OMB Review; Background...

    Science.gov (United States)

    2012-09-11

    ... ADMINISTRATION Office of Facilities Management and Program Services; Submission for OMB Review; Background...: Please submit comments only and cite Information Collection 3090-0287, Background Investigations for... the new information collection requirement regarding the collection of personal data for background...

  1. 77 FR 31017 - Office of Facilities Management and Program Services; Information Collection; Background...

    Science.gov (United States)

    2012-05-24

    ...; Sequence 7] Office of Facilities Management and Program Services; Information Collection; Background....johnson@gsa.gov . ADDRESSES: Submit comments identified by Information Collection 3090- 0287, Background... the link ``Submit a Comment'' that corresponds with ``Information Collection 3090-0287, Background...

  2. Facilities Improvement for Sustainability of Existing Public Office ...

    African Journals Online (AJOL)

    Sultan

    2Faculty of Technology Management and Business, Universiti Tun Hussein Onn ... The features were classified into Spatial Plan, Structure and Facilities, ..... audio and emergency buttons that call into the ..... Existing School Buildings: A Case.

  3. 42 CFR 71.47 - Special provisions relating to airports: Office and isolation facilities.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Special provisions relating to airports: Office and.... Ports: Sanitary Inspection § 71.47 Special provisions relating to airports: Office and isolation facilities. Each U.S. airport which receives international traffic shall provide without cost to...

  4. Food security practice in Kansas schools and health care facilities.

    Science.gov (United States)

    Yoon, Eunju; Shanklin, Carol W

    2007-02-01

    This pilot study investigated perceived importance and frequency of specific preventive measures, and food and nutrition professionals' and foodservice directors' willingness to develop a food defense management plan. A mail questionnaire was developed based on the US Department of Agriculture document, Biosecurity Checklist for School Foodservice Programs--Developing a Biosecurity Management Plan. The survey was sent to food and nutrition professionals and foodservice operators in 151 acute care hospitals, 181 long-term-care facilities, and 450 school foodservice operations. Chemical use and storage was perceived as the most important practice to protect an operation and was the practice implemented most frequently. Results of the study indicate training programs on food security are needed to increase food and nutrition professionals' motivation to implement preventive measures.

  5. Application of Framework for Integrating Safety, Security and Safeguards (3Ss) into the Design Of Used Nuclear Fuel Storage Facility

    Energy Technology Data Exchange (ETDEWEB)

    Badwan, Faris M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Demuth, Scott F [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-06

    Department of Energy’s Office of Nuclear Energy, Fuel Cycle Research and Development develops options to the current commercial fuel cycle management strategy to enable the safe, secure, economic, and sustainable expansion of nuclear energy while minimizing proliferation risks by conducting research and development focused on used nuclear fuel recycling and waste management to meet U.S. needs. Used nuclear fuel is currently stored onsite in either wet pools or in dry storage systems, with disposal envisioned in interim storage facility and, ultimately, in a deep-mined geologic repository. The safe management and disposition of used nuclear fuel and/or nuclear waste is a fundamental aspect of any nuclear fuel cycle. Integrating safety, security, and safeguards (3Ss) fully in the early stages of the design process for a new nuclear facility has the potential to effectively minimize safety, proliferation, and security risks. The 3Ss integration framework could become the new national and international norm and the standard process for designing future nuclear facilities. The purpose of this report is to develop a framework for integrating the safety, security and safeguards concept into the design of Used Nuclear Fuel Storage Facility (UNFSF). The primary focus is on integration of safeguards and security into the UNFSF based on the existing Nuclear Regulatory Commission (NRC) approach to addressing the safety/security interface (10 CFR 73.58 and Regulatory Guide 5.73) for nuclear power plants. The methodology used for adaptation of the NRC safety/security interface will be used as the basis for development of the safeguards /security interface and later will be used as the basis for development of safety and safeguards interface. Then this will complete the integration cycle of safety, security, and safeguards. The overall methodology for integration of 3Ss will be proposed, but only the integration of safeguards and security will be applied to the design of the

  6. The National Criticality Experiments Research Center at the Device Assembly Facility, Nevada National Security Site: Status and Capabilities, Summary Report

    Energy Technology Data Exchange (ETDEWEB)

    S. Bragg-Sitton; J. Bess; J. Werner

    2011-09-01

    The National Criticality Experiments Research Center (NCERC) was officially opened on August 29, 2011. Located within the Device Assembly Facility (DAF) at the Nevada National Security Site (NNSS), the NCERC has become a consolidation facility within the United States for critical configuration testing, particularly those involving highly enriched uranium (HEU). The DAF is a Department of Energy (DOE) owned facility that is operated by the National Nuclear Security Agency/Nevada Site Office (NNSA/NSO). User laboratories include the Lawrence Livermore National Laboratory (LLNL) and Los Alamos National Laboratory (LANL). Personnel bring their home lab qualifications and procedures with them to the DAF, such that non-site specific training need not be repeated to conduct work at DAF. The NNSS Management and Operating contractor is National Security Technologies, LLC (NSTec) and the NNSS Safeguards and Security contractor is Wackenhut Services. The complete report provides an overview and status of the available laboratories and test bays at NCERC, available test materials and test support configurations, and test requirements and limitations for performing sub-critical and critical tests. The current summary provides a brief summary of the facility status and the method by which experiments may be introduced to NCERC.

  7. Green Facility Management in a Shanghai Office Building : A Case Study of the "Asia Building"

    OpenAIRE

    Yunqing, Liang

    2011-01-01

    This paper aims to explore how well green facility management has performed in Shanghai office building and finds the possible way to improve the situation. Together with two interviews, questionnaire based on benchmarking approach is conducted in a case study of the Asia Building, which lead to the conclusion that green facility management has done a fair work in Asia Building, and suggestions that laws and regulations related to green facility management should be established; governmental ...

  8. Securing Wireless LANs A Practical Guide for Network Managers, LAN Administrators and the Home Office User

    CERN Document Server

    Held, Gilbert

    2003-01-01

    Wireless LANs will enable small teams and communities to communicate via their mobile devices without cables. This new technology will facilitate communication in small businesses/teams such as in hospitals, on construction sites, warehouses, etc.Held provides a comprehensive guide to the implementation, planning and monitoring of all aspects of wireless LAN security in small offices/small to medium business (SMBs).Securing Wireless LANs is timely in addressing the security issues of this important new technology and equips its readers with the tools they need to make the appropriate choice fo

  9. The Impact of the Structure, Function, and Resources of the Campus Security Office on Campus Safety

    Science.gov (United States)

    Bennett, Patricia Anne

    2012-01-01

    The topic of this dissertation is college and university safety. This national quantitative study utilized resource dependency theory to examine relationships between the incidence of reported campus crimes and the structure, function, and resources of campus security offices. This study uncovered a difference in reported total crime rates,…

  10. 15 CFR 758.7 - Authority of the Office of Export Enforcement, the Bureau of Industry and Security, Customs...

    Science.gov (United States)

    2010-01-01

    ... Enforcement, the Bureau of Industry and Security, Customs offices and Postmasters in clearing shipments 758.7...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS EXPORT CLEARANCE REQUIREMENTS § 758.7 Authority of the Office of Export Enforcement, the Bureau of Industry and...

  11. Securitization markets and central banking: an evaluation of the term asset-backed securities loan facility

    OpenAIRE

    Sean D. Campbell; Daniel M. Covitz; William R. Nelson; Karen M. Pence

    2011-01-01

    In response to the near collapse of US securitization markets in 2008, the Federal Reserve created the Term Asset-Backed Securities Loan Facility, which offered non-recourse loans to finance investors' purchases of certain highly rated asset-backed securities. We study the effects of this program and find that it lowered interest rate spreads for some categories of asset-backed securities but had little impact on the pricing of individual securities. These findings suggest that the program im...

  12. A security vulnerabilities assessment tool for interim storage facilities of low-level radioactive wastes.

    Science.gov (United States)

    Bible, J; Emery, R J; Williams, T; Wang, S

    2006-11-01

    Limited permanent low-level radioactive waste (LLRW) disposal capacity and correspondingly high disposal costs have resulted in the creation of numerous interim storage facilities for either decay-in-storage operations or longer term accumulation efforts. These facilities, which may be near the site of waste generation or in distal locations, often were not originally designed for the purpose of LLRW storage, particularly with regard to security. Facility security has become particularly important in light of the domestic terrorist acts of 2001, wherein LLRW, along with many other sources of radioactivity, became recognized commodities to those wishing to create disruption through the purposeful dissemination of radioactive materials. Since some LLRW materials may be in facilities that may exhibit varying degrees of security control sophistication, a security vulnerabilities assessment tool grounded in accepted criminal justice theory and security practice has been developed. The tool, which includes dedicated sections on general security, target hardening, criminalization benefits, and the presence of guardians, can be used by those not formally schooled in the security profession to assess the level of protection afforded to their respective facilities. The tool equips radiation safety practitioners with the ability to methodically and systematically assess the presence or relative status of various facility security aspects, many of which may not be considered by individuals from outside the security profession. For example, radiation safety professionals might not ordinarily consider facility lighting aspects, which is a staple for the security profession since it is widely known that crime disproportionately occurs more frequently at night or in poorly lit circumstances. Likewise, the means and associated time dimensions for detecting inventory discrepancies may not be commonly considered. The tool provides a simple means for radiation safety professionals to

  13. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  14. Federal Facility Security: Staffing Approaches Used by Selected Agencies

    Science.gov (United States)

    2011-06-01

    those employed within the real estate industry ($29,110), casino hotels ($27,830), and amusement parks ($26,340). Compared with unarmed security guards...the use of security guards and experience in changing a security workforce, among other criteria . The selected agencies and private sector firms are...Smithsonian); and • Veterans Health Administration (VHA). We selected these agencies based on several criteria , including dispersed geographic

  15. Fuzzy-AHP-Based Comprehensive Evaluation on Facility Management System of High-Rise Office Buildings

    Institute of Scientific and Technical Information of China (English)

    ZHANG Peihong; WANG Kan; WAN Huanhuan; MA Zhongjiao

    2011-01-01

    The present building facility management status in China resulted in many problems such as highenergy consumption, failure of automation control, services failure and poor indoor air quality. Based onquestionnaires and interviews to professional engineers and building users, a comprehensive evaluation index system was established on facility management of high-rise office buildings. A Fuzzy AHP based upon hierarchy criteria system was established. A Fuzzy AHP Evaluation Model on Facility Management System was set up ;α-cut analysis was introduced and incorporated with expert knowledge together, which made up the optimism index λ. The fuzzy optimum crisp weight of each criterion was resulted from data-mining. Case investigations were processed in high-rise office buildings in Shenyang. The results illustrated that indoor air quality, thermal comfort and life cycle cost were the most important indexes in the evaluation of Facility Management System of high rise office buildings. Residents in high-rise buildings in Shenyang pay less attention to maintenance management and environment protection. By comparison with the analysis result of Export Choice, Fuzzy AHP-based evaluation model could act as a scientific reference for the establishment of governmental standards in facility management area in building.

  16. Post 9-11 Security Issues for Non-Power Reactor Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Zaffuts, P. J.

    2003-02-25

    This paper addresses the legal and practical issues arising out of the design and implementation of a security-enhancement program for non power reactor nuclear facilities. The security enhancements discussed are derived from the commercial nuclear power industry's approach to security. The nuclear power industry's long and successful experience with protecting highly sensitive assets provides a wealth of information and lessons that should be examined by other industries contemplating security improvements, including, but not limited to facilities using or disposing of nuclear materials. This paper describes the nuclear industry's approach to security, the advantages and disadvantages of its constituent elements, and the legal issues that facilities will need to address when adopting some or all of these elements in the absence of statutory or regulatory requirements to do so.

  17. Do provisions to advance chemical facility safety also advance chemical facility security? An analysis of possible synergies

    DEFF Research Database (Denmark)

    Hedlund, Frank Huess

    2012-01-01

    endanger neighbouring populated areas. Second, facilities where high-risk chemicals are present could present opportunities for theft. The concern is that relatively small amounts of highly toxic chemicals could be taken to another location selected for higher impact. The Directive on European Critical......The European Commission has launched a study on the applicability of existing chemical industry safety provisions to enhancing security of chemical facilities covering the situation in 18 EU Member States. This paper reports some preliminary analytical findings regarding the extent to which...... exist at the mitigation level. At the strategic policy level, synergies are obvious. The security of chemical facilities is important. First, facilities with large inventories of toxic materials could be attractive targets for terrorists. The concern is sabotage causing an intentional release that could...

  18. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  19. Implementing Iris in the Railway Control Office Application for Secure Saas in Cloud Environment

    Directory of Open Access Journals (Sweden)

    Dr. K. Meena

    2015-12-01

    Full Text Available Technology plays a vital role in each and every part of the world. In particular ―Cloud‖ computing - a moderately recent term, characterizes the path to develop the advancement in the world of computer science. Further, Cloud provides an affordable environment for its users through different forms of services such as SaaS (Software as a service, PaaS (Platform as a service, and IaaS (Infrastructure as a Service. Cloud computing is also an Internet-based computing where a large pool of systems are connected in private or public networks, and provide dynamically scalable infrastructure for application data as well as file storage. Security of Cloud computing is an evolving sub-domain of network security, computer security and information security. In spite of its advantages, Cloud environment has many security flaws such as loss of important data, data leakage and something related to cloning, resource pooling etc. Security of Cloud Computing is an emerging area for study. It includes several security and privacy issues with challenges and solutions for many security issues of cloud computing. The Control Office Application (COA is the latest addition to train operations related IT application of Indian Railways. Along with the Freight Operations Information System (FOIS, COA has led to a complete transformation in train operations and facilitates all information on train operations being computer generated. It is this application that feeds the National Train Enquiry System (NTES which provides passengers with up to date information on train running. COA also provides train operations information to FOIS and ICMS. The objective of the Indian Railways is to further improve the operations by using technological aids that enable quicker data capture and intelligent applications that provide better planning and forecasting tools. To overcome these issues, in Cloud computing, we can use SaaS (software as a service. In this paper, we have proposed

  20. Closure Report for Corrective Action Unit 116: Area 25 Test Cell C Facility, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Restoration

    2011-09-29

    This Closure Report (CR) presents information supporting closure of Corrective Action Unit (CAU) 116, Area 25 Test Cell C Facility. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; the U.S. Department of Energy (DOE), Environmental Management; the U.S. Department of Defense; and DOE, Legacy Management (FFACO, 1996 [as amended March 2010]). CAU 116 consists of the following two Corrective Action Sites (CASs), located in Area 25 of the Nevada National Security Site: (1) CAS 25-23-20, Nuclear Furnace Piping and (2) CAS 25-41-05, Test Cell C Facility. CAS 25-41-05 consisted of Building 3210 and the attached concrete shield wall. CAS 25-23-20 consisted of the nuclear furnace piping and tanks. Closure activities began in January 2007 and were completed in August 2011. Activities were conducted according to Revision 1 of the Streamlined Approach for Environmental Restoration Plan for CAU 116 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2008). This CR provides documentation supporting the completed corrective actions and provides data confirming that closure objectives for CAU 116 were met. Site characterization data and process knowledge indicated that surface areas were radiologically contaminated above release limits and that regulated and/or hazardous wastes were present in the facility.

  1. Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities

    OpenAIRE

    Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min; Yoo, Sooyoung

    2012-01-01

    Objectives The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. Methods The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, th...

  2. Do provisions to advance chemical facility safety also advance chemical facility security? An analysis of possible synergies

    DEFF Research Database (Denmark)

    Hedlund, Frank Huess

    2012-01-01

    The European Commission has launched a study on the applicability of existing chemical industry safety provisions to enhancing security of chemical facilities covering the situation in 18 EU Member States. This paper reports some preliminary analytical findings regarding the extent to which exist...

  3. Providing security for automated process control systems at hydropower engineering facilities

    Science.gov (United States)

    Vasiliev, Y. S.; Zegzhda, P. D.; Zegzhda, D. P.

    2016-12-01

    This article suggests the concept of a cyberphysical system to manage computer security of automated process control systems at hydropower engineering facilities. According to the authors, this system consists of a set of information processing tools and computer-controlled physical devices. Examples of cyber attacks on power engineering facilities are provided, and a strategy of improving cybersecurity of hydropower engineering systems is suggested. The architecture of the multilevel protection of the automated process control system (APCS) of power engineering facilities is given, including security systems, control systems, access control, encryption, secure virtual private network of subsystems for monitoring and analysis of security events. The distinctive aspect of the approach is consideration of interrelations and cyber threats, arising when SCADA is integrated with the unified enterprise information system.

  4. 76 FR 9815 - Grain Handling Facilities; Extension of the Office of Management and Budget's (OMB) Approval of...

    Science.gov (United States)

    2011-02-22

    ... Occupational Safety and Health Administration Grain Handling Facilities; Extension of the Office of Management... requirements specified in its Standard on Grain Handling Facilities (29 CFR 1910.272). DATES: Comments must be... working in grain handling facilities. Paragraph (d) of the Standard requires the employer to develop and...

  5. Modeling the Office of Science ten year facilities plan: The PERI Architecture Tiger Team

    Science.gov (United States)

    de Supinski, Bronis R.; Alam, Sadaf; Bailey, David H.; Carrington, Laura; Daley, Chris; Dubey, Anshu; Gamblin, Todd; Gunter, Dan; Hovland, Paul D.; Jagode, Heike; Karavanic, Karen; Marin, Gabriel; Mellor-Crummey, John; Moore, Shirley; Norris, Boyana; Oliker, Leonid; Olschanowsky, Catherine; Roth, Philip C.; Schulz, Martin; Shende, Sameer; Snavely, Allan; Spear, Wyatt; Tikir, Mustafa; Vetter, Jeff; Worley, Pat; Wright, Nicholas

    2009-07-01

    The Performance Engineering Institute (PERI) originally proposed a tiger team activity as a mechanism to target significant effort optimizing key Office of Science applications, a model that was successfully realized with the assistance of two JOULE metric teams. However, the Office of Science requested a new focus beginning in 2008: assistance in forming its ten year facilities plan. To meet this request, PERI formed the Architecture Tiger Team, which is modeling the performance of key science applications on future architectures, with S3D, FLASH and GTC chosen as the first application targets. In this activity, we have measured the performance of these applications on current systems in order to understand their baseline performance and to ensure that our modeling activity focuses on the right versions and inputs of the applications. We have applied a variety of modeling techniques to anticipate the performance of these applications on a range of anticipated systems. While our initial findings predict that Office of Science applications will continue to perform well on future machines from major hardware vendors, we have also encountered several areas in which we must extend our modeling techniques in order to fulfill our mission accurately and completely. In addition, we anticipate that models of a wider range of applications will reveal critical differences between expected future systems, thus providing guidance for future Office of Science procurement decisions, and will enable DOE applications to exploit machines in future facilities fully.

  6. Modeling the Office of Science Ten Year Facilities Plan: The PERI Architecture Tiger Team

    Energy Technology Data Exchange (ETDEWEB)

    de Supinski, Bronis R.; Alam, Sadaf; Bailey, David H.; Carrington, Laura; Daley, Chris; Dubey, Anshu; Gamblin, Todd; Gunter, Dan; Hovland, Paul D.; Jagode, Heike; Karavanic, Karen; Marin, Gabriel; Mellor-Crummey, John; Moore, Shirley; Norris, Boyana; Oliker, Leonid; Olschanowsky, Catherine; Roth, Philip C.; Schulz, Martin; Shende, Sameer; Snavely, Allan; Spear, Wyatt; Tikir, Mustafa; Vetter, Jeff; Worley, Pat; Wright, Nicholas

    2009-06-26

    The Performance Engineering Institute (PERI) originally proposed a tiger team activity as a mechanism to target significant effort optimizing key Office of Science applications, a model that was successfully realized with the assistance of two JOULE metric teams. However, the Office of Science requested a new focus beginning in 2008: assistance in forming its ten year facilities plan. To meet this request, PERI formed the Architecture Tiger Team, which is modeling the performance of key science applications on future architectures, with S3D, FLASH and GTC chosen as the first application targets. In this activity, we have measured the performance of these applications on current systems in order to understand their baseline performance and to ensure that our modeling activity focuses on the right versions and inputs of the applications. We have applied a variety of modeling techniques to anticipate the performance of these applications on a range of anticipated systems. While our initial findings predict that Office of Science applications will continue to perform well on future machines from major hardware vendors, we have also encountered several areas in which we must extend our modeling techniques in order to fulfill our mission accurately and completely. In addition, we anticipate that models of a wider range of applications will reveal critical differences between expected future systems, thus providing guidance for future Office of Science procurement decisions, and will enable DOE applications to exploit machines in future facilities fully.

  7. Modeling the Office of Science Ten Year Facilities Plan: The PERI Architecture Team

    Energy Technology Data Exchange (ETDEWEB)

    de Supinski, Bronis R. [Lawrence Livermore National Laboratory (LLNL); Alam, Sadaf R [ORNL; Bailey, David [Lawrence Berkeley National Laboratory (LBNL); Carrington, Laura [University of California, San Diego; Daley, Christopher [University of Chicago; Dubey, Anshu [University of Chicago; Gamblin, Todd [Lawrence Livermore National Laboratory (LLNL); Gunter, Dan [Lawrence Berkeley National Laboratory (LBNL); Hovland, Paul [Argonne National Laboratory (ANL); Jagode, Heike [ORNL; Karavanic, Karen [Portland State University; Marin, Gabriel [ORNL; Mellor-Crummey, John [Rice University; Moore, Shirley [University of Tennessee, Knoxville (UTK); Norris, Boyana [Argonne National Laboratory (ANL); Oliker, Leonid [Lawrence Berkeley National Laboratory (LBNL); Olschanowsky, Cathy [San Diego Supercomputer Center; Roth, Philip C [ORNL; Schulz, Martin [Lawrence Livermore National Laboratory (LLNL); Shende, Sameer [University of Oregon; Snavely, Allan [University of California, San Diego; Spea, Wyatt [University of Oregon; Tikir, Mustafa [San Diego Supercomputer Center; Vetter, Jeffrey S [ORNL; Worley, Patrick H [ORNL; Wright, Nicholas [San Diego Supercomputer Center

    2009-01-01

    The Performance Engineering Institute (PERI) originally proposed a tiger team activity as a mechanism to target significant effort optimizing key Office of Science applications, a model that was successfully realized with the assistance of two JOULE metric teams. However, the Office of Science requested a new focus beginning in 2008: assistance in forming its ten year facilities plan. To meet this request, PERI formed the Architecture Tiger Team, which is modeling the performance of key science applications on future architectures, with S3D, FLASH and GTC chosen as the first application targets. In this activity, we have measured the performance of these applications on current systems in order to understand their baseline performance and to ensure that our modeling activity focuses on the right versions and inputs of the applications. We have applied a variety of modeling techniques to anticipate the performance of these applications on a range of anticipated systems. While our initial findings predict that Office of Science applications will continue to perform well on future machines from major hardware vendors, we have also encountered several areas in which we must extend our modeling techniques in order to fulfilll our mission accurately and completely. In addition, we anticipate that models of a wider range of applications will reveal critical differences between expected future systems, thus providing guidance for future Office of Science procurement decisions, and will enable DOE applications to exploit machines in future facilities fully.

  8. 6 CFR Appendix A to Part 5 - FOIA/Privacy Act Offices of the Department of Homeland Security

    Science.gov (United States)

    2010-01-01

    ... Security Administration, TSA-1, FOIA Division, 400 Seventh Street, SW., Washington, DC 20590 3. United... 6 Domestic Security 1 2010-01-01 2010-01-01 false FOIA/Privacy Act Offices of the Department of... follows: A. Former components of the Department of Agriculture: 1. Animal and Plant Health...

  9. Energy security, public policy, and the role of the DOE Office of Energy Emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Bjornstad, D.J.; Curlee, T.R. (Oak Ridge National Lab., TN (United States)); Bohi, D.R. (Resources for the Future, Inc., Washington, DC (United States))

    1991-11-01

    This paper addresses the concept of energy security, the costs and benefits of energy security, and policies which could potentially alter these costs and benefits. These issues are considered from the perspective of the DOE's Office of Energy Emergencies, with the goal of determining if alternative or additional roles should be open to this Office. The approach taken is limited to the economic costs and benefits of energy security, reflecting our view that the bulk of important energy security issues can at least be approached from this perspective. An energy emergency results from a sudden change in the quantity, market price, and/or social value of energy, in combination with a domestic and/or world wide energy system that cannot rapidly adjust to that change. We do not believe that mitigating the impacts of such events is always necessary, nor that it is uniquely a governmental responsibility. In fact, the first recourse in emergency preparedness should always be to the private sector. Government should deal with three different aspects of emergency energy activities. First, it should condition the decision making environment by seeing that adequate information about energy conditions is available and that its own policy position is clear. Next, it should evaluate the preparedness measures undertaken by the private sector. Finally, if it finds private sector preparation to be inadequate, government has a variety of direct and indirect means with which to intervene. One direct measure currently used is the buildup and drawdown of the strategic petroleum reserve (SPR). Others include contingency plans to override market allocations during wartime, as might be developed under the graduated mobilization response (GMR). Indirect means include a variety of tax and transfer schemes that alter existing private sector incentives to prepare. Well conceived monetary and fiscal policies complete the tools. 1 fig., 1 tab.

  10. Low-Cost Security Measures for School Facilities

    Science.gov (United States)

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    This paper discusses a variety of school safety and security measures that may be implemented at little or no cost and without the use of complex technology. Measures are presented according to these categories: (1) General; (2) Outside the Building; and (3) Inside the Building.

  11. 6 CFR 37.41 - Security plan.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security plan. 37.41 Section 37.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Security at DMVs and Driver's License and Identification Card Production Facilities §...

  12. Computer/information security design approaches for Complex 21/Reconfiguration facilities

    Energy Technology Data Exchange (ETDEWEB)

    Hunteman, W.J.; Zack, N.R. [Los Alamos National Lab., NM (United States). Safeguards Systems Group; Jaeger, C.D. [Sandia National Labs., Albuquerque, NM (United States). Surety/Dismantlement Dept.

    1993-12-31

    Los Alamos National Laboratory and Sandia National Laboratories have been designated the technical lead laboratories to develop the design of the computer/information security, safeguards, and physical security systems for all of the DOE Complex 21/Reconfiguration facilities. All of the automated information processing systems and networks in these facilities will be required to implement the new DOE orders on computer and information security. The planned approach for a highly integrated information processing capability in each of the facilities will require careful consideration of the requirements in DOE Orders 5639.6 and 1360.2A. The various information protection requirements and user clearances within the facilities will also have a significant effect on the design of the systems and networks. Fulfilling the requirements for proper protection of the information and compliance with DOE orders will be possible because the computer and information security concerns are being incorporated in the early design activities. This paper will discuss the computer and information security issues being addressed in the integrated design effort for the tritium, uranium/lithium, plutonium, plutonium storage, and high explosive/assembly facilities.

  13. Computer/information security design approaches for Complex 21/Reconfiguration facilities

    Energy Technology Data Exchange (ETDEWEB)

    Hunteman, W.J.; Zack, N.R. [Los Alamos National Lab., NM (United States); Jaeger, C.D. [Sandia National Labs., Albuquerque, NM (United States)

    1993-08-01

    Los Alamos National Laboratory and Sandia National Laboratories have been designated the technical lead laboratories to develop the design of the computer/information security, safeguards, and physical security systems for all of the DOE Complex 21/Reconfiguration facilities. All of the automated information processing systems and networks in these facilities will be required to implement the new DOE orders on computer and information security. The planned approach for a highly integrated information processing capability in each of the facilities will require careful consideration of the requirements in DOE Orders 5639.6 and 1360.2A. The various information protection requirements and user clearances within the facilities will also have a significant effect on the design of the systems and networks. Fulfilling the requirements for proper protection of the information and compliance with DOE orders will be possible because the computer and information security concerns are being incorporated in the early design activities. This paper will discuss the computer and information security addressed in the integrated design effort, uranium/lithium, plutonium, plutonium high explosive/assembly facilities.

  14. 78 FR 48029 - Improving Chemical Facility Safety and Security

    Science.gov (United States)

    2013-08-07

    ..., distributed, and used, are essential to today's economy. Past and recent tragedies have reminded us, however..., local, and tribal governments and private sector partners, where joint collaborative programs can be... information sharing and collaborative planning between chemical facility owners and operators, TEPCs, LEPCs...

  15. Measures for assessing architectural speech security (privacy) of closed offices and meeting rooms

    Science.gov (United States)

    Gover, Bradford N.; Bradley, John S.

    2004-12-01

    Objective measures were investigated as predictors of the speech security of closed offices and rooms. A new signal-to-noise type measure is shown to be a superior indicator for security than existing measures such as the Articulation Index, the Speech Intelligibility Index, the ratio of the loudness of speech to that of noise, and the A-weighted level difference of speech and noise. This new measure is a weighted sum of clipped one-third-octave-band signal-to-noise ratios; various weightings and clipping levels are explored. Listening tests had 19 subjects rate the audibility and intelligibility of 500 English sentences, filtered to simulate transmission through various wall constructions, and presented along with background noise. The results of the tests indicate that the new measure is highly correlated with sentence intelligibility scores and also with three security thresholds: the threshold of intelligibility (below which speech is unintelligible), the threshold of cadence (below which the cadence of speech is inaudible), and the threshold of audibility (below which speech is inaudible). The ratio of the loudness of speech to that of noise, and simple A-weighted level differences are both shown to be well correlated with these latter two thresholds (cadence and audibility), but not well correlated with intelligibility. .

  16. Mitigating threat and risk in nuclear facilities through convergence of security systems

    Energy Technology Data Exchange (ETDEWEB)

    Flynn, Daniel John [Florida Institute of Technology (United States)

    2010-07-01

    The advancement of sensor and subsystems integration, facility network infrastructures, and situational awareness platforms now enable an integrated view of a comprehensive security solution on a single screen. A Radar Video Surveillance (RVS) system converges these aspects of security systems into a Geographic Information System (GIS) view, which conveys overall security status and reacts to potential threats. An overhead GIS view of the facility is populated with security sensors, including perimeter security sensors, CCTV cameras, access control equipment, radar sensors, and life safety equipment. The status and location of these sensors is displayed on the map, as well as the data from these sensors, such as intruder locations and live CCTV images. The software automatically directs PTZ cameras to the current location of a potential incident, displays that image, records it, and initiates an alarm and an automated response. This paper describes the concept of comprehensive security convergence, including sensor integration, situational awareness, automation of responses and notification, and the challenges and opportunities in providing true convergence as well as the benefits this approach delivers in a nuclear facility. (authors)

  17. 76 FR 68764 - Statement of Organization, Functions, and Delegations of Authority; Office of the Deputy...

    Science.gov (United States)

    2011-11-07

    ... planning, managing, and directing ACF's facility, safety, security, and emergency management programs. The... Workforce Planning and Development. In addition, it realigns the ethics, facilities, security and travel... Services (KPB) Office of Financial Services (KPC) Office of Workforce Planning and Development (KPD) Office...

  18. Use of video systems in securing nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Zakharko, Eleonora; Weizel, Udo [Gesellschaft fuer Anlagen- und Reaktorsicherheit mbH (GRS), Koeln (Germany); Rduch, Alexander

    2010-07-01

    Current paper considers application of video systems, so called Closed-Circuit Television (CCTV), in physical protection of nuclear facilities. CCTV is being used for general surveillance tasks, for alarm assessment, for detection purposes and is crucial for the efficient operation of physical protection system in whole. The main parts of general design layout are being analyzed: i.e. image obtaining, signal transmission, signal processing and signal visualization is being provided. It is underlined, that the general trend of high tech solutions in the field of physical protection is in particular based on innovations in the applications with video systems (orig.)

  19. Towards an Experimental Testbed Facility for Cyber-Physical Security Research

    Energy Technology Data Exchange (ETDEWEB)

    Edgar, Thomas W.; Manz, David O.; Carroll, Thomas E.

    2012-01-07

    Cyber-Physical Systems (CPSs) are under great scrutiny due to large Smart Grid investments and recent high profile security vulnerabilities and attacks. Research into improved security technologies, communication models, and emergent behavior is necessary to protect these systems from sophisticated adversaries and new risks posed by the convergence of CPSs with IT equipment. However, cyber-physical security research is limited by the lack of access to universal cyber-physical testbed facilities that permit flexible, high-fidelity experiments. This paper presents a remotely-configurable and community-accessible testbed design that integrates elements from the virtual, simulated, and physical environments. Fusing data between the three environments enables the creation of realistic and scalable environments where new functionality and ideas can be exercised. This novel design will enable the research community to analyze and evaluate the security of current environments and design future, secure, cyber-physical technologies.

  20. Structural design of a two storey office building and production facility

    OpenAIRE

    Nučič, Gregor

    2016-01-01

    The Graduation Thesis shows the process of structural analysis and design of key elements of the steel structure. The building has a rectangular floor shape, dimensions of 12.10 m and 32.20 m. Building height is 9.50 m. Construction is a two storey facility. On the ground floor is planed production and storage unit, on the first floor there would be offices. The project is designed in accordance with the valid European standards Eurocodes and related Slovenian national annex. Design of struct...

  1. Framework for Integrating Safety, Operations, Security, and Safeguards in the Design and Operation of Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Darby, John L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Horak, Karl Emanuel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); LaChance, Jeffrey L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Tolk, Keith Michael [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Whitehead, Donnie Wayne [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2007-10-01

    The US is currently on the brink of a nuclear renaissance that will result in near-term construction of new nuclear power plants. In addition, the Department of Energy’s (DOE) ambitious new Global Nuclear Energy Partnership (GNEP) program includes facilities for reprocessing spent nuclear fuel and reactors for transmuting safeguards material. The use of nuclear power and material has inherent safety, security, and safeguards (SSS) concerns that can impact the operation of the facilities. Recent concern over terrorist attacks and nuclear proliferation led to an increased emphasis on security and safeguard issues as well as the more traditional safety emphasis. To meet both domestic and international requirements, nuclear facilities include specific SSS measures that are identified and evaluated through the use of detailed analysis techniques. In the past, these individual assessments have not been integrated, which led to inefficient and costly design and operational requirements. This report provides a framework for a new paradigm where safety, operations, security, and safeguards (SOSS) are integrated into the design and operation of a new facility to decrease cost and increase effectiveness. Although the focus of this framework is on new nuclear facilities, most of the concepts could be applied to any new, high-risk facility.

  2. ICT security- aspects important for nuclear facilities; Information and Communication Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thunem, Atoosa P-J.

    2005-09-15

    Rapid application growth of complex Information and Communication Technologies (ICT) in every society and state infrastructure as well as industry has revealed vulnerabilities that eventually have given rise to serious security breaches. These vulnerabilities together with the course of the breaches from cause to consequence are gradually about to convince the field experts that ensuring the security of ICT-driven systems is no longer possible by only relying on the fundaments of computer science, IT, or telecommunications. Appropriating knowledge from other disciplines is not only beneficial, but indeed very necessary. At the same time, it is a common observation today that ICT-driven systems are used everywhere, from the nuclear, aviation, commerce and healthcare domains to camera-equipped web-enabled cellular phones. The increasing interdisciplinary and inter-sectoral aspects of ICT security worldwide have been providing updated and useful information to the nuclear domain, as one of the emerging users of ICT-driven systems. Nevertheless, such aspects have also contributed to new and complicated challenges, as ICT security for the nuclear domain is in a much more delicate manner than for any other domains related to the concept of safety, at least from the public standpoint. This report addresses some important aspects of ICT security that need to be considered at nuclear facilities. It deals with ICT security and the relationship between security and safety from a rather different perspective than usually observed and applied. The report especially highlights the influence on the security of ICT-driven systems by all other dependability factors, and on that basis suggests a framework for ICT security profiling, where several security profiles are assumed to be valid and used in parallel for each ICT-driven system, sub-system or unit at nuclear facilities. The report also covers a related research topic of the Halden Project with focus on cyber threats and

  3. Final report of the radiological release survey of Building 19 at the Grand Junction Office Facility

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, R.K.; Corle, S.G.

    1997-09-01

    The U.S. Department of Energy (DOE) Grand Junction Office (GJO) occupies a 61.7-acre facility along the Gunnison River near Grand Junction, Colorado. This site was contaminated with uranium ore concentrates and mill tailings during vanadium refining activities of the Manhattan Engineer District, and during sampling, assaying, pilot milling, storage, and brokerage activities conducted for the U.S. Atomic Energy Commission`s domestic uranium procurement program. The DOE Defense Decontamination and Decommissioning Program established the GJO Remedial Action Project (GJORAP) to clean up and restore the facility lands, improvements, and underlying aquifer. WASTREN-Grand Junction is the site contractor for the facility and the remedial action contractor for GJORAP. Building 19 and the underlying soil were found not to be radiologically contaminated; therefore, the building can be released for unrestricted use. Placards have been placed at the building entrances indicating the completion of the radiological release survey and prohibiting the introduction of any radioactive materials within the building without written approvals from the GJO Facilities Operations Manager. This document was prepared in response to a DOE-GJO request for an individual final release report for each GJO building.

  4. Final report of the radiological release survey of Building 54 at the Grand Junction Office Facility

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, R.K.; Corle, S.G.

    1997-09-01

    The U.S. Department of Energy (DOE) Grand Junction Office (GJO) occupies a 61.7-acre facility along the Gunnison River near Grand Junction, Colorado. This site was contaminated with uranium ore concentrates and mill tailings during vanadium refining activities of the Manhattan Engineer District, and during sampling, assaying, pilot milling, storage, and brokerage activities conducted for the U.S. Atomic Energy Commission`s domestic uranium procurement program. The DOE Defense Decontamination and Decommissioning Program established the GJO Remedial Action Project (GJORAP) to clean up and restore the facility lands, improvements, and underlying aquifer. WASTREN-Grand Junction is the site contractor for the facility and the remedial action contractor for GJORAP. Building 54 and the underlying soil were found not to be radiologically contaminated, and can be released for unrestricted use. Placards have been placed at the building entrances indicating the completion of the radiological release survey and prohibiting the introduction of any radioactive materials within the building without written approvals from the GJO Facilities Operations Manager. This document was prepared in response to a DOE-GJO request for an individual release report for each GJO building.

  5. Final report of the radiological release survey of Building 11 at the Grand Junction Office Facility

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, R.K.; Corle, S.G.

    1997-09-01

    The U.S. Department of Energy (DOE) Grand Junction Office (GJO) occupies a 61.7-acre facility along the Gunnison River near Grand Junction, Colorado. This site was contaminated with uranium ore concentrates and mill tailings during vanadium refining activities of the Manhattan Engineer District, and during sampling, assaying, pilot milling, storage, and brokerage activities conducted for the U.S. Atomic Energy Commission`s domestic uranium procurement program. The DOE Defense Decontamination and Decommissioning Program established the GJO Remedial Action Project (GJORAP) to clean up and restore the facility lands, improvements, and underlying aquifer. WASTREN-Grand Junction is the site contractor for the facility and the remedial action contractor for GJORAP. Building 11 and the underlying soil were found not to be radiologically contaminated; therefore, the building can be released for unrestricted use. Placards have been placed at the building entrances indicating the completion of the radiological release survey and prohibiting the introduction of any radioactive materials within the building without written approvals from the GJO Facilities Operations Manager. This document was prepared in response to a DOE-GJO request for an individual final release report for each GJO building.

  6. Final report of the radiological release survey of Building 29 at the Grand Junction Office Facility

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, R.K.; Corle, S.G.

    1997-09-01

    The U.S. Department of Energy (DOE) Grand Junction Office (GJO) occupies a 61.7-acre facility along the Gunnison River near Grand Junction, Colorado. This site was contaminated with uranium ore concentrates and mill tailing during vanadium refining activities of the Manhattan Engineer District, and during sampling, assaying, pilot milling, storage, and brokerage activities conducted for the U.S. Atomic Energy Commission`s domestic uranium procurement program. The DOE Defense Decontamination and Decommissioning Program established the GJO Remedial Action Project (GJORAP) to clean up and restore the facility lands, improvements, and underlying aquifer. WASTREN-Grand Junction is the site contractor for the facility and the remedial action contractor for GJORAP. Building 29 and the underlying soil were found not to be radiologically contaminated; therefore, the building can be released for unrestricted use. Placards have been placed at the building entrances indicating the completion of the radiological release survey and prohibiting the introduction of any radioactive materials within the building without written approvals from the GJO Facilities Operations Manager. This document was prepared in response to a DOE-GJO request for an individual final release report for each GJO building.

  7. 78 FR 7334 - Port Authority Access to Facility Vulnerability Assessments and the Integration of Security Systems

    Science.gov (United States)

    2013-02-01

    ... not have access to the Internet, you may view the docket online by visiting the Docket Management..., emergency preparedness and response, and communications capabilities (33 CFR 105.305). Facility Security... about the costs associated with these approaches as well as any potential benefit. These comments...

  8. 10 CFR 1016.39 - Termination, suspension, or revocation of security facility approval.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Termination, suspension, or revocation of security facility approval. 1016.39 Section 1016.39 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF... approval. (a) If the need to use, process, store, reproduce, transmit, or handle classified matter no...

  9. 10 CFR 1016.8 - Approval for processing access permittees for security facility approval.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF... approval. (a) An access permittee who has a need to use, process, store, reproduce, transmit, or handle...

  10. Acceptance criteria for the evaluation of Category 1 fuel cycle facility physical security plans

    Energy Technology Data Exchange (ETDEWEB)

    Dwyer, P.A.

    1991-10-01

    This NUREG document presents criteria developed from US Nuclear Regulatory Commission regulations for the evaluation of physical security plans submitted by Category 1 fuel facility licensees. Category 1 refers to those licensees who use or possess a formula quantity of strategic special nuclear material.

  11. Environmental Assessment: Construction and Operation of Security Forces & Command Post / Installation Control Center Facilities

    Science.gov (United States)

    2008-01-03

    Operation of Security Forces &Command Post/ICC Facilities January 03, 2008 91 6.0 PERSONS CONTACTED Russell Adams – 78th CEG/CEVQ Larry J. Allen...fPD believes the proposed project will have no adverse effect on Building 300, as defined in 36 CFR Parr 800.5(d)(l). Please note that historic and

  12. 78 FR 77606 - Security Requirements for Facilities Storing Spent Nuclear Fuel

    Science.gov (United States)

    2013-12-24

    ... COMMISSION 10 CFR Parts 72 and 73 RIN 3150-AI78 Security Requirements for Facilities Storing Spent Nuclear... requirements for storing spent nuclear fuel (SNF) in an independent spent fuel storage installation (ISFSI), and for storing SNF and/or high-level radioactive waste (HLW) in a monitored retrievable storage...

  13. 78 FR 48037 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Science.gov (United States)

    2013-08-07

    ...] [Pages 48037-48042] [FR Doc No: 2013-18947] NUCLEAR REGULATORY COMMISSION 10 CFR Part 95 [NRC-2011-0268... National Security Information, which was published in the Federal Register on January 5, 2010 (75 FR 707... implementation of the Executive Order, issued a final rule (75 FR 37254; June 28, 2010) amending 32 CFR...

  14. Development on Guidance of Cyber Security Exercise for the Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyundoo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber threats and attacks are increasing rapidly against infrastructure including energy and utilities industry over the world. Because of lack of human resource and incident response system to prevent or defend increased cyber threats, many governments and major national infrastructures perform cyber security exercises to improve capabilities of cyber security incident response. Accordingly there are exponential growth in the number of cyber security exercises over the past decade with the trend expecting to accelerate in the coming years. Even though there were many cyber security exercises in the Nuclear Facilities, this exercise was first which focused on mitigation and recovery of the system of the Nuclear Facility against cyber incident. So many insufficient items were deduced such as absence of a procedure for mitigation and recovery of cyber incident. These procedures should be developed and established through 3rd phase of Cyber Security Plan (CSP) and other technical complement actions under regulatory body’s guidance. Also developed and existed procedures should be regularly performed to make cyber incident response team and related people rapidly response against cyber incident through exercises or other training. The insufficient items come from the exercise should be reflected to developed and existed procedures by periods.

  15. Report on emergency electrical power supply systems for nuclear fuel cycle and reactor facilities security systems

    Energy Technology Data Exchange (ETDEWEB)

    1977-01-01

    The report includes information that will be useful to those responsible for the planning, design and implementation of emergency electric power systems for physical security and special nuclear materials accountability systems. Basic considerations for establishing the system requirements for emergency electric power for security and accountability operations are presented. Methods of supplying emergency power that are available at present and methods predicted to be available in the future are discussed. The characteristics of capacity, cost, safety, reliability and environmental and physical facility considerations of emergency electric power techniques are presented. The report includes basic considerations for the development of a system concept and the preparation of a detailed system design.

  16. Solar heating and hot water system for the central administrative office facility. Technical progress report

    Energy Technology Data Exchange (ETDEWEB)

    1978-11-01

    Progress on the solar heating and hot water system for the central administrative office facility of the Lincoln Housing Authority, Lincoln, NE is covered. An acceptance test plan is presented and the results of the test are tabulated. A complete blueprint of the system as built is provided. The monitoring system is drawn and settings and installation are described. An operation and maintenance manual discusses procedures for start up, shut down and seasonal changeover and include a valve list and pictures and specifications of components and materials used. Photographs of the final installation are included, and technical data and performance data are given. Finally, there is a brief description of system design and operation and a discussion of major maintenance problems encountered and their solutions. (LEW)

  17. Security Transition Program Office (STPO), technology transfer of the STPO process, tools, and techniques

    Energy Technology Data Exchange (ETDEWEB)

    Hauth, J.T.; Forslund, C.R.J.; Underwood, J.A.

    1994-09-01

    In 1990, with the transition from a defense mission to environmental restoration, the U.S. Department of Energy`s (DOE`s) Hanford Site began a significant effort to diagnose, redesign, and implement new safeguards and security (SAS) processes. In 1992 the Security Transition Program Office (STPO) was formed to address the sweeping changes that were being identified. Comprised of SAS and other contractor staff with extensive experience and supported by staff experienced in organizational analysis and work process redesign, STPO undertook a series of tasks designed to make fundamental changes to SAS processes throughout the Hanford Site. The goal of STPO is to align the SAS work and organization with the new Site mission. This report describes the key strategy, tools, methods, and techniques used by STPO to change SAS processes at Hanford. A particular focus of this review is transferring STPO`s experience to other DOE sites and federal agency efforts: that is, to extract, analyze, and provide a critical review of the approach, tools, and techniques used by STPO that will be useful to other DOE sites and national laboratories in transitioning from a defense production mode to environmental restoration and other missions. In particular, what lessons does STPO provide as a pilot study or model for implementing change in other transition activities throughout the DOE complex? More broadly, what theoretical and practical contributions do DOE transition efforts, such as STPO, provide to federal agency streamlining efforts and attempts to {open_quotes}reinvent{close_quotes} government enterprises in the public sector? The approach used by STPO should provide valuable information to those examining their own processes in light of new mission requirements.

  18. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    Energy Technology Data Exchange (ETDEWEB)

    Madden, Michael S.

    2010-05-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  19. An Assessment of the New York State Enhanced Security Guard Training Legislation and Its Efficacy on Security Officer Preparedness

    Science.gov (United States)

    2011-12-01

    Relations ................................60  c.  Training with Security Technology ........................................60  d.  Training in Report...128  Table 27.  Training in Security Technology ...................................................................129  Table 28...and the program sites of financial institutions, stock markets and money markets.” Banks like Goldman Sachs, Citibank , JP Morgan Chase, Barclays

  20. US Department of Energy Grand Junction Projects Office Remedial Action Project, final report of the decontamination and decommissioning of Building 36 at the Grand Junction Projects Office Facility

    Energy Technology Data Exchange (ETDEWEB)

    Widdop, M.R.

    1996-08-01

    The U.S. Department of Energy (DOE) Grand Junction Projects Office (GJPO) occupies a 61.7-acre facility along the Gunnison River near Grand Junction, Colorado. This site was contaminated with uranium ore and mill tailings during uranium refining activities of the Manhattan Engineer District and during pilot milling experiments conducted for the U.S. Atomic Energy Commission`s domestic uranium procurement program. The DOE Defense Decontamination and Decommissioning Program established the GJPO Remedial Action Project to clean up and restore the facility lands, improvements, and the underlying aquifer. The site contractor for the facility, Rust Geotech, also is the remedial action contractor. Building 36 was found to be radiologically contaminated and was demolished in 1996. The soil beneath the building was remediated in accordance with identified standards and can be released for unlimited exposure and unrestricted use. This document was prepared in response to a DOE request for an individual final report for each contaminated GJPO building.

  1. 47 CFR 4.13 - Reports by the National Communications System (NCS) and by special offices and facilities, and...

    Science.gov (United States)

    2010-10-01

    ... day in the FCC's Communications and Crisis Management Center in Washington, DC. Notification may be... 47 Telecommunication 1 2010-10-01 2010-10-01 false Reports by the National Communications System (NCS) and by special offices and facilities, and related responsibilities of communications...

  2. Urgent Care Facilities, Licensed Healthcare Facilities, Published in 2007, 1:24000 (1in=2000ft) scale, State of California - Office of the State Chief Information Officer.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Urgent Care Facilities dataset, published at 1:24000 (1in=2000ft) scale, was produced all or in part from Published Reports/Deeds information as of 2007. It is...

  3. Using virtual reality in the training of security staff and evaluation of physical protection barriers in nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Augusto, Silas C.; Mol, Antonio C.A.; Mol, Pedro C.; Sales, Douglas S. [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil); Universidade do Estado do Rio de Janeiro (UERJ), RJ (Brazil)], e-mail: silas@ien.gov.br, e-mail: mol@ien.gov.br, e-mail: pedro98@gmail.com, e-mail: dsales@ien.gov.br

    2009-07-01

    The physical security of facilities containing radioactive objects, an already important matter, now has a new aggravating factor: the existence of groups intending to obtain radioactive materials for the purpose of intentionally induce radioactive contamination incidents, as for example the explosion of dirty bombs in populated regions, damaging both people and environment. In this context, the physical security of such facilities must be reinforced so to reduce the possibilities of such incidents. This paper presents a adapted game engine used as a virtual reality system, enabling the modeling and simulation of scenarios of nuclear facilities containing radioactive objects. In these scenarios, the physical protection barriers, as fences and walls, are simulated along with vigilance screens. Using a computer network, several users can participate simultaneously in the simulation, being represented by avatars. Users can play the roles of both invaders and security staff. The invaders have as objective to surpass the facility's physical protection barriers to steal radioactive objects and flee. The security staff have as objective to prevent and stop the theft of radioactive objects from the facility. The system can be used to analysis simulated scenarios and train vigilance/security staff. A test scenario was already developed and used, and the preliminary tests had satisfactory results, as they enabled the evaluation of the physical protection barriers of the virtual facility, and the training of those who participated in the simulations in the functions of a security staff. (author)

  4. The development of mobile robot for security application and nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, B. S.; Lee, Y. B.; Choi, Y. S.; Seo, Y. C.; Park, Y. M

    1999-12-01

    The use of a mobile robot system in nuclear radioactive environments has the advantage of watching and inspecting the NPP safety-related equipment systematically and repairing damaged parts efficiently, thereby enhancing the safe operations of NPPs as well as reducing significantly personnel's dose rate to radioactive environment. Key technology achieved through the development of such robotic system can be used for security application and can offer new approaches to many of the tasks faced to the industry as well. The mobile robot system was composed of a mobile subsystem, a manipulator subsystem, a control subsystem, and a sensor subsystem to use in security application and nuclear radioactive environments. The mobile subsystem was adopted to synchro-drive method to improve the mobility of it. And the manipulator subsystem was developed to minimize the weight and easy to control at remote site. Finally, we developed the USB-based robot control system considering the expandability and modularity. The developed mobile robot for inspection and security was experimented for the collision avoidance and autonomous algorithm, and then it was confirmed that the mobile robot was very effective to the security application and inspection of nuclear facilities. (author)

  5. Assessment of the DoD Establishment of the Office of Security Cooperation -- Iraq

    Science.gov (United States)

    2012-03-16

    Cooperation, Defense Institute of Security Assistance Management “ Greenbook ”, 30th Edition, January 2010, pp. 1-1 – 1-6. 44...Management “ Greenbook ”, 30th Edition, January 2010, pp. 1-6 – 1-16, except for those items annotated with an asterisk (*) in the title. [Note: Items...Institute of Security Assistance Management Greenbook indicates that other sources for identifying DoD security cooperation programs include the

  6. 76 FR 12745 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-03-08

    ... and hair color; Distinguishing marks including scars, marks, and tattoos; Automobile registration... obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act...

  7. [Security Management in Clinical Laboratory Departments and Facilities: Current Status and Issues].

    Science.gov (United States)

    Ishida, Haku; Nakamura, Junji; Yoshida, Hiroshi; Koike, Masaru; Inoue, Yuji

    2014-11-01

    We conducted a questionnaire survey regarding the current activities for protecting patients' privacy and the security of information systems (IS) related to the clinical laboratory departments of university hospitals, certified training facilities for clinical laboratories, and general hospitals in Yamaguchi Prefecture. The response rate was 47% from 215 medical institutions, including three commercial clinical laboratory centers. The results showed that there were some differences in management activities among facilities with respect to continuing education, the documentation or regulation of operational management for paper records, electronic information, remaining samples, genetic testing, and laboratory information for secondary use. They were suggested to be caused by differences in functions between university and general hospitals, differences in the scale of hospitals, or whether or not hospitals have received accreditation or ISO 15189. Regarding the IS, although the majority of facilities had sufficiently employed the access control to IS, there was some room for improvement in the management of special cases such as VIPs and patients with HIV infection. Furthermore, there were issues regarding the login method for computers shared by multiple staff, the showing of the names of personnel in charge of reports, and the risks associated with direct connections to systems and the Internet and the use of portable media such as USB memory sticks. These results indicated that further efforts are necessary for each facility to continue self-assessment and make improvements.

  8. Safe Olympics Beijing's top police officers offer security assurances to 2008 Olympic Games

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With a formidable antiterrorism team, Beijing's top cops are ready to deal with any security incidents that might take place during the 2008 Olympics. This assurance was given by Lu Shimin, Deputy Director General of the Beijing Public Security Bureau, at a press

  9. Assessment of the Office of Security Cooperation-Iraq Mission Capabilities

    Science.gov (United States)

    2013-09-18

    Management,” ( Greenbook ) 32nd Edition, January 2013, pp. 1-1 – 1-7. 77 AECA, and originally served to provide credit (loans) as an effective...The Management of Security Cooperation, Defense Institute of Security Assistance Management,” ( Greenbook ) 32nd Edition, January 2013, pp. 1-7 – 1-26

  10. 76 FR 5603 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-02-01

    ... terrorists, drug cartel leaders or other persons known to have been involved in major crimes or terror of... to Homeland Security; and Known terrorists, drug cartel leaders or other persons known to have...

  11. Emergency preparedness source term development for the Office of Nuclear Material Safety and Safeguards-Licensed Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Sutter, S.L.; Mishima, J.; Ballinger, M.Y.; Lindsey, C.G.

    1984-08-01

    In order to establish requirements for emergency preparedness plans at facilities licensed by the Office of Nuclear Materials Safety and Safeguards, the Nuclear Regulatory Commission (NRC) needs to develop source terms (the amount of material made airborne) in accidents. These source terms are used to estimate the potential public doses from the events, which, in turn, will be used to judge whether emergency preparedness plans are needed for a particular type of facility. Pacific Northwest Laboratory is providing the NRC with source terms by developing several accident scenarios for eleven types of fuel cycle and by-product operations. Several scenarios are developed for each operation, leading to the identification of the maximum release considered for emergency preparedness planning (MREPP) scenario. The MREPP scenarios postulated were of three types: fire, tornado, and criticality. Fire was significant at oxide fuel fabrication, UF/sub 6/ production, radiopharmaceutical manufacturing, radiopharmacy, sealed source manufacturing, waste warehousing, and university research and development facilities. Tornadoes were MREPP events for uranium mills and plutonium contaminated facilities, and criticalities were significant at nonoxide fuel fabrication and nuclear research and development facilities. Techniques for adjusting the MREPP release to different facilities are also described.

  12. US Department of Energy Grand Junction Projects Office Remedial Action Project. Final report of the decontamination and decommissioning of Building 52 at the Grand Junction Projects Office Facility

    Energy Technology Data Exchange (ETDEWEB)

    Krabacher, J.E.

    1996-08-01

    The U.S. Department of Energy (DOE) Grand Junction Projects Office (GJPO) occupies a 61.7-acre facility along the Gunnison River near Grand Junction, Colorado. This site was contaminated with uranium ore and mill tailings during uranium refining activities of the Manhattan Engineer District and during pilot milling experiments conducted for the U.S. Atomic Energy Commission`s domestic uranium procurement program. The DOE Defense Decontamination and Decommissioning Program established the GJPO Remedial Action Project to clean up and restore the facility lands, improvements, and the underlying aquifer. The site contractor for the facility, Rust Geotech, also was the remedial action contractor. Building 52 was found to be radiologically contaminated and was demolished in 1994. The soil area within the footprint of the building has been remediated in accordance with the identified standards and the area can be released for unlimited exposure and unrestricted use. This document was prepared in response to a DOE request for an individual final report for each contaminated GJPO building.

  13. Security Police Officer Utilization Field, AFSCs 8111, 8116, 8121, and 8124.

    Science.gov (United States)

    1981-06-01

    STATEMENT A M C Approved for public release 82 0 4 26Distribution Unlimited C=DCC=D= APS 8 1 X CECI I CODING INSTRUCTIONS -- -- -" Print the booklet copy...m == NAME (Last, First, Middle Initial) DATE OF BIRTH SEX YR NO DAY (MALE -"(11-34) (3s-5- rayo (41) PRESENT GRADE: SOCIAL SECURITY ACCOUNT NUMBER...Branch - 11. OIC Missile Support Branch - __m 12. OIC Weapons Systems Security , 4 8 CODE 99 X ~.t ! AFS 81XX -mmm -C - . .’ .9 - =, BACKGROUND

  14. Secure Internet video conferencing for assessing acute medical problems in a nursing facility.

    Science.gov (United States)

    Weiner, M; Schadow, G; Lindbergh, D; Warvel, J; Abernathy, G; Dexter, P; McDonald, C J

    2001-01-01

    Although video-based teleconferencing is becoming more widespread in the medical profession, especially for scheduled consultations, applications for rapid assessment of acute medical problems are rare. Use of such a video system in a nursing facility may be especially beneficial, because physicians are often not immediately available to evaluate patients. We have assembled and tested a portable, wireless conferencing system to prepare for a randomized trial of the system s influence on resource utilization and satisfaction. The system includes a rolling cart with video conferencing hardware and software, a remotely controllable digital camera, light, wireless network, and battery. A semi-automated paging system informs physicians of patient s study status and indications for conferencing. Data transmission occurs wirelessly in the nursing home and then through Internet cables to the physician s home. This provides sufficient bandwidth to support quality motion images. IPsec secures communications. Despite human and technical challenges, this system is affordable and functional.

  15. 76 FR 61350 - DOE Response to Defense Nuclear Facilities Safety Board's Request for Clarification on...

    Science.gov (United States)

    2011-10-04

    ... Vorderbrueggen, Nuclear Engineer, Departmental Representative to the Defense Nuclear Facilities Safety Board, Office of Health, Safety and Security, U.S. Department of Energy, 1000 Independence Avenue, SW... Representative to the Defense Nuclear Facilities Safety Board, Office of Health, Safety and Security....

  16. Analysis of the Office Information Security%浅析办公系统中的信息安全

    Institute of Scientific and Technical Information of China (English)

    吴翔

    2011-01-01

    办公自动化系统是源于上世纪六七十年代发展起来的一门综合性技术系统,该系统不但能充分利用各种信息资源,服务于办公室里的办公人员,而且能够促进办公活动的制度化和规范化。尽管办公自动化系统有操作方便、快捷等各个方面的优点,但在网络办公时,由于网络中存在着信息泄露、非授权访问、破坏数据完整性、拒绝服务攻击、病毒和木马等许多不安全的因素,这使得办公系统中的信息和文件不能得到有效的安全管理和传输,甚至会出现机密泄露、系统瘫痪、设备损坏等严重后果,造成极大的负面影响。因此,保证办公系统中的信息安全已经成为现代网络办公自动化应用中最为关注的话题。本文通过分析办公自动化系统在网络中常见的安全问题以及针对这些安全问题提出有效的解决方案。%The office automation system it's a comprehensive technology system developed from 1960s and 1970s.The system not only makes full use of information resources and services the office staff,but also to promote the institutionalization and standardization of office activities.Although the office automation system easy to operate,fast and other aspect advantage,but to the network,due to the existence of the network information disclosure,unauthorized access,destruction of data integrity,denial of service attacks,viruses and trojan horses and many other factors of insecurity,which makes the information office and file systems can not be an effective safety management and transmission,or even a confidential disclosure,system failures,equipment damage and other serious consequences,resulting in significant negative impact.Therefore,the office system to ensure information security has become a modern office automation network applications in the most talked about.This paper analyzes the office automation system in the network security issues and common security issues

  17. User Facilities of the Office of Basic Energy Sciences: A National Resource for Scientific Research

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-01-01

    The BES user facilities provide open access to specialized instrumentation and expertise that enable scientific users from universities, national laboratories, and industry to carry out experiments and develop theories that could not be done at their home institutions. These forefront research facilities require resource commitments well beyond the scope of any non-government institution and open up otherwise inaccessible facets of Nature to scientific inquiry. For approved, peer-reviewed projects, instrument time is available without charge to researchers who intend to publish their results in the open literature. These large-scale user facilities have made significant contributions to various scientific fields, including chemistry, physics, geology, materials science, environmental science, biology, and biomedical science. Over 16,000 scientists and engineers.pdf file (27KB) conduct experiments at BES user facilities annually. Thousands of other researchers collaborate with these users and analyze the data measured at the facilities to publish new scientific findings in peer-reviewed journals.

  18. Materials and Security Consolidation Complex Facilities Radioactive Waste Management Basis and DOE Manual 435.1-1 Compliance Tables

    Energy Technology Data Exchange (ETDEWEB)

    Not Listed

    2011-09-01

    Department of Energy Order 435.1, 'Radioactive Waste Management,' along with its associated manual and guidance, requires development and maintenance of a radioactive waste management basis for each radioactive waste management facility, operation, and activity. This document presents a radioactive waste management basis for Idaho National Laboratory's Materials and Security Consolidation Center facilities that manage radioactive waste. The radioactive waste management basis for a facility comprises existing laboratory-wide and facility-specific documents. Department of Energy Manual 435.1-1, 'Radioactive Waste Management Manual,' facility compliance tables also are presented for the facilities. The tables serve as a tool for developing the radioactive waste management basis.

  19. 75 FR 69604 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2010-11-15

    ... (OPS), including the National Operations Center (NOC), proposes to establish a new DHS system of... Fusion System of Records.'' This system of records will allow DHS/OPS, including the NOC, to collect... natural disasters. The NOC serves as the nation's homeland security center for information sharing...

  20. Emergency positioning system accuracy with infrared LEDs in high-security facilities

    Science.gov (United States)

    Knoch, Sierra N.; Nelson, Charles; Walker, Owens

    2017-05-01

    Instantaneous personnel location presents a challenge in Department of Defense applications where high levels of security restrict real-time tracking of crew members. During emergency situations, command and control requires immediate accountability of all personnel. Current radio frequency (RF) based indoor positioning systems can be unsuitable due to RF leakage and electromagnetic interference with sensitively calibrated machinery on variable platforms like ships, submarines and high-security facilities. Infrared light provide a possible solution to this problem. This paper proposes and evaluates an indoor line-of-sight positioning system that is comprised of IR and high-sensitivity CMOS camera receivers. In this system the movement of the LEDs is captured by the camera, uploaded and analyzed; the highest point of power is located and plotted to create a blueprint of crewmember location. Results provided evaluate accuracy as a function of both wavelength and environmental conditions. Research will further evaluate the accuracy of the LED transmitter and CMOS camera receiver system. Transmissions in both the 780 and 850nm IR are analyzed.

  1. Final report of the decontamination and decommissioning of Building 44 at the Grand Junction Projects Office Facility

    Energy Technology Data Exchange (ETDEWEB)

    Widdop, M.R.

    1996-07-01

    The U.S. Department of Energy (DOE) Junction Projects Office (GJPO) occupies a 61.7 acre facility along the Gunnison River near Grand Junction, Colorado. This site was contaminated with uranium ore and mill tailings during uranium refining activities of the Manhattan Engineer District and during pilot milling experiments conducted for the U.S. Atomic Energy Commission`s domestic uranium procurement program. The DOE Defense Decontamination and Decommissioning Program established the Grand Junction Projects Office Remedial Action Project to clean up and restore the facility lands, improvements, and the underlying aquifer. The site contractor for the facility, Rust Geotech, is also the remedial action contractor. Building 44 was radiologically contaminated and the building was demolished in 1994. The soil area within the footprint of the building was not contaminated; it complies with the identified standards and the area can be released for unlimited exposure and unrestricted use. This document was prepared in response to a DOE request for an individual final report for each contaminated GJPO building.

  2. Final report of the decontamination and decommissioning of Building 34 at the Grand Junction Projects Office Facility

    Energy Technology Data Exchange (ETDEWEB)

    Widdop, M.R.

    1996-08-01

    The U.S. Department of Energy (DOE) Grand Junction Projects Office (GJPO) occupies a 61.7 acre facility along the Gunnison River near Grand Junction, Colorado. This site was contaminated with uranium ore and mill tailings during uranium refining activities of the Manhattan Engineer District and during pilot milling experiments conducted for the U.S. Atomic Energy Commission`s domestic uranium procurement program. The DOE Defense Decontamination and Decommissioning Program established the Grand Junction Projects Office Remedial Action Project to clean up and restore the facility lands, improvements, and the underlying aquifer. The site contractor for the facility, Rust Geotech, was also the remedial action contractor. Building 34 was radiologically contaminated and the building was demolished in 1996. The soil area within the footprint of the building was analyzed and found to be not contaminated. The area can be released for unlimited exposure and unrestricted use. This document was prepared in response to a DOE request for an individual closeout report for each contaminated GJPO building.

  3. 移动办公系统中的安全对策%Security Measures of Mobile Office System

    Institute of Scientific and Technical Information of China (English)

    王智辉

    2011-01-01

    移动办公为商务人士、企业领导等提供了全新的办公体验,极大地提高了办公效率。移动办公带来方便的同时,也面临着信息安全的问题。确保移动办公的安全是首先要考虑的问题,网络安全和身份认证是两个最主要的方面。只有安全的移动办公系统,才会得到客户的认可。%Mobile Office for business professionals,business leaders to provide a new office experience,which greatly improves the working efficiency.Mobile convenience,while also facing the problem of information security.Ensure the safety of mobile office is the f

  4. 75 FR 34441 - Office of Safe and Drug-Free Schools; Overview Information; Educational Facilities Clearinghouse...

    Science.gov (United States)

    2010-06-17

    ... facility planning, design, financing, construction, improvement, operation, and maintenance. This priority... (Clearinghouse) will provide technical assistance and training on the planning, design, financing, construction... latest research regarding the planning, design, financing, construction, improvement, operations, and...

  5. Environmental assessment of facility operations at the U.S. Department of Energy Grand Junction Projects Office, Grand Junction, Colorado

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-06-01

    The US Department of Energy (DOE) has prepared a sitewide environmental assessment (EA) of the proposed action to continue and expand present-day activities on the DOE Grand Junction Projects Office (GJPO) facility in Grand Junction, Colorado. Because DOE-GJPO regularly proposes and conducts many different on-site activities, DOE decided to evaluate these activities in one sitewide EA rather than in multiple, activity-specific documents. On the basis of the information and analyses presented in the EA, DOE has determined that the proposed action does not constitute a major Federal action significantly affecting the quality of the human environment, as defined by the National Environmental Policy Act (NEPA) of 1969. Therefore, preparation of an environmental impact statement is not required for facility operations, and DOE is issuing this Finding of No Significant Impact (FONSI).

  6. Final report of the radiological release survey of Building 30B at the Grand Junction Office Facility

    Energy Technology Data Exchange (ETDEWEB)

    Krauland, P.A.; Corle, S.G.

    1997-09-01

    The U.S. Department of Energy (DOE) Grand Junction Office (GJO) occupies a 61.7-acre facility along the Gunnison River near Grand Junction, Colorado. This site was contaminated with uranium ore concentrates and mill tailings during vanadium refining activities of the Manhattan Engineer District, and during sampling, assaying, pilot milling, storage, and brokerage activities conducted for the U.S. Atomic Energy Commission`s domestic uranium procurement program. The DOE Defense Decontamination and Decommissioning Program established the GJO Remedial Action Project (GJORAP) to clean up and restore the facility lands, improvements, and underlying aquifer. WASTREN-Grand Junction is the site contractor for the facility and the remedial action contractor for GJORAP. Building 30B and the underlying soil were found not to be radiologically contaminated; therefore, the building can be released for unrestricted use. Placards have been placed at the building entrances indicating the completion of the radiological release survey and prohibiting the introduction of any radioactive materials within the building without written approvals from the GJO Facilities Operations Manager. This document was prepared in response to a DOE-GJO request for an individual final release report for each GJO building.

  7. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  8. TRAINING OF DEVELOPMENT OF SKILLS OF PROFESSIONAL COMMUNICATION THE SECURITY OFFICER OF THE CRIMINAL INVESTIGATION DEPARTMENT OF THE INTERNAL AFFAIRS

    Directory of Open Access Journals (Sweden)

    Yuliya Leonidovna Lampusova

    2015-08-01

    Full Text Available Training is a form of active learning that is aimed at developing knowledge, skills, and attitudes. To improve operational security officers of Internal Affairs Agencies activity, we have schemed out training for the development of communication skills. This paper presents the exercises focusing on the professional communication skills of employees of the Criminal Investigation Department of the Interior development. Eight exercises are described, the main objectives of them are: learning to navigate the feelings of the partner, the ability to change the position of the interlocutor, the formation of the ability to listen to the end and not to interrupt, developing the ability to talk, improving the communicative competence and the development of the ability to accurately convey information.

  9. Pilot Implementation and Preliminary Evaluation of START:AV Assessments in Secure Juvenile Correctional Facilities.

    Science.gov (United States)

    Desmarais, Sarah L; Sellers, Brian G; Viljoen, Jodi L; Cruise, Keith R; Nicholls, Tonia L; Dvoskin, Joel A

    2012-01-01

    The Short-Term Assessment of Risk and Treatability: Adolescent Version (START:AV) is a new structured professional judgment guide for assessing short-term risks in adolescents. The scheme may be distinguished from other youth risk assessment and treatment planning instruments by its inclusion of 23 dynamic factors that are each rated for both vulnerability and strength. In addition, START:AV is also unique in that it focuses on multiple adverse outcomes-namely, violence, self-harm, suicide, unauthorized leave, substance abuse, self-neglect, victimization, and general offending-over the short-term (i.e., weeks to months) rather than long-term (i.e., years). This paper describes a pilot implementation and preliminary evaluation of START:AV in three secure juvenile correctional facilities in the southern United States. Specifically, we examined the descriptive characteristics and psychometric properties of START:AV assessments completed by 21 case managers on 291 adolescent offenders (250 boys and 41 girls) at the time of admission. Results provide preliminary support for the feasibility of completing START:AV assessments as part of routine practice. Findings also highlight differences in the characteristics of START:AV assessments for boys and girls and differential associations between the eight START:AV risk domains. Though results are promising, further research is needed to establish the reliability and validity of START:AV assessments completed in the field.

  10. Final report of the decontamination and decommissioning of Building 1 at the Grand Junction Projects Office Facility

    Energy Technology Data Exchange (ETDEWEB)

    Widdop, M.R.

    1996-08-01

    The U.S. Department of Energy (DOE) Grand Junction Projects Office (GJPO) occupies a 61.7-acre facility along the Gunnison River near Grand Junction, Colorado. This site was contaminated with uranium ore and mill tailings during uranium refining activities of the Manhattan Engineer District and during pilot milling experiments conducted for the U.S. Atomic Energy Commission`s domestic uranium procurement program. The DOE Defense Decontamination and Decommissioning Program established the GJPO Remedial Action Project to clean up and restore the facility lands, improvements, and the underlying aquifer. The site contractor for the facility, Rust Geotech, also is the remedial action contractor. Building 1 was found to be radiologically contaminated and was demolished in 1996. The soil beneath and adjacent to the building was remediated in accordance with identified standards and can be released for unlimited exposure and unrestricted use. This document was prepared in response to a DOE request for an individual final report for each contaminated GJPO building.

  11. Final report of the decontamination and decommissioning of Building 18 at the Grand Junction Projects Office Facility

    Energy Technology Data Exchange (ETDEWEB)

    Widdop, M.R.

    1996-08-01

    The U.S. Department of Energy (DOE) Grand Junction Projects Office (GJPO) occupies a 61.7-acre facility along the Gunnison River near Grand Junction, Colorado. This site was contaminated with uranium ore and mill tailings during uranium refining activities of the Manhattan Engineer District and during pilot milling experiments conducted for the U.S. Atomic Energy Commission`s domestic uranium procurement program. The DOE Defense Decontamination and Decommissioning Program established the GJPO Remedial Action Project to clean up and restore the facility lands, improvements, and the underlying aquifer. The site contractor for the facility, Rust Geotech, also is the remedial action contractor. The soil beneath Building 18 was found to be radiologically contaminated; the building was not contaminated. The soil was remediated in accordance with identified standards. Building 18 and the underlying soil can be released for unlimited exposure and unrestricted use. This document was prepared in response to a DOE request for an individual final report for each contaminated GJPO building.

  12. 76 FR 67472 - Order of Succession for the Office of the Chief Information Officer

    Science.gov (United States)

    2011-11-01

    ... Cyber Security and Privacy, Office of the Chief Information Officer, Department of Housing and Urban... Operations; (3) Deputy Chief Information Officer, for Cyber Security and Privacy; (4) Deputy...

  13. U.S. Department of Energy Office of Health, Safety and Security Illness and Injury Surveillance Program Worker Health at a Glance, 2000-2009

    Energy Technology Data Exchange (ETDEWEB)

    Strader, Cliff [US Dept. of Energy, Washington, DC (United States); Richter, Bonnie [US Dept. of Energy, Washington, DC (United States)

    2013-01-23

    The Worker Health at a Glance, 2000 – 2009 provides an overview of selected illness and injury patterns among the current DOE contractor workforce that have emerged over the 10-years covered by this report. This report is a roll-up of data from 16 individual DOE sites, assigned to one of three program offices (Office of Environmental Management, Office of Science and the National Nuclear Security Administration). In this report, an absences is defined as 40 or more consecutive work hours (5+ calendar days) off the job. Shorter absences were not included.

  14. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  15. 77 FR 67653 - Statement of Organization, Functions, and Delegations of Authority; Office of the Deputy...

    Science.gov (United States)

    2012-11-13

    ... is responsible for planning, managing, and directing ACF's facility, safety, security, and emergency... Planning and Development (KPD) Office of Grants Management (KPG) Grants Management Regional Units (KPGDI-X... of Financial Services, Office of Workforce Planning and Development, and the Office of Grants...

  16. 76 FR 26746 - Information Collection Requests to Office of Management and Budget; OMB Control Numbers: 1625...

    Science.gov (United States)

    2011-05-09

    ... SECURITY Coast Guard Information Collection Requests to Office of Management and Budget; OMB Control... submit Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of... the Docket Management Facility (DMF) at the U.S. Department of Transportation (DOT). To...

  17. 33 CFR 106.215 - Company or OCS facility personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... appropriate: (a) Knowledge of current and anticipated security threats and patterns. (b) Recognition and... screenings of persons, personal effects, stores and industrial supplies; (k) Familiarity with all...

  18. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Science.gov (United States)

    2010-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  19. 13 CFR 126.207 - May a qualified HUBZone SBC have offices or facilities in another HUBZone or outside a HUBZone?

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false May a qualified HUBZone SBC have... Assistance SMALL BUSINESS ADMINISTRATION HUBZONE PROGRAM Requirements to be a Qualified HUBZone SBC § 126.207 May a qualified HUBZone SBC have offices or facilities in another HUBZone or outside a HUBZone?...

  20. National Security sUAS Flight Restrictions over Select Facilities - Download data

    Data.gov (United States)

    Department of Transportation — As mandated by the FAA Extension, Safety, and Security Act of 2016 the Federal Aviation Administration has established, at the request of various Government agencies...

  1. DEVELOPMENT PROBABILITY-LINGUISTIC MODELS VULNERABILITY ASSESSMENT OF AVIATION SECURITY IMPORTANT TECHNICAL FACILITIES

    National Research Council Canada - National Science Library

    2016-01-01

    ... are justified, and the assessment problem of the protected object vulnerability is formulated. The main advantage of the developed model is the extensive opportunities of formalization of diverse information on the security status of the object...

  2. Formal indicators to assess the quality of radio systems perimeter security facilities

    Directory of Open Access Journals (Sweden)

    Kolesnik K. V.

    2012-08-01

    Full Text Available Quality estimation method based on the use of formal parameters, which greatly simplifies the process of creating effective radio systems for perimeter security of distributed objects in the design phase is proposed.

  3. Key Considerations in Providing a Free Appropriate Public Education for Youth with Disabilities in Juvenile Justice Secure Care Facilities. Issue Brief

    Science.gov (United States)

    Gagnon, Joseph C.; Read, Nicholas W.; Gonsoulin, Simon

    2015-01-01

    Access to high-quality education for youth is critical to their long-term success as adults. Youth in juvenile justice secure care facilities, however, too often do not have access to the high-quality education and related supports and services that they need, particularly youth with disabilities residing in such facilities. This brief discusses…

  4. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  5. 20 CFR 422.5 - District offices and branch offices.

    Science.gov (United States)

    2010-04-01

    ... Section 422.5 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES Organization and Functions of the Social Security Administration § 422.5 District offices and branch offices. There are over 700 social security district offices and branch offices located in the principal cities...

  6. Survey Analysis on Nuclear Security Culture Recognition of Nuclear Facility in 2014

    Energy Technology Data Exchange (ETDEWEB)

    Hong, Yunjeong; Lee, Jeongho; Kim, Jaekwang [Korea Institute of Nonproliferation and Control International Nuclear Security Academy, Daejeon (Korea, Republic of)

    2015-05-15

    All organizations involved in implementing physical protection should give due priority to the security culture, to its development and maintenance necessary to ensure its effective implementation in the entire organization. In this context, Korea Institute of Non-proliferation and Control(KINAC) confirms recognition about protection of people who work in nuclear field and developed questionnaire for utilizing fundamental data for nuclear security culture enhancement activity and conducted a survey. As a result, systematic education needs to employees. Choosing differentiated topic is required to consider employees because recognition level of age, position and division is different. And a variety of education technology as obligatory education such as filling the course time or the one-off thing has limitation. And taking complementary measures needs since there were many opinions that employees feel difficult to understand papers such as regulation and guidelines and so on related security. Finally, we hope to make fundament available to evaluate nuclear security culture recognition level based on the existing questionnaire would be changed to realistic and enhancement in recognition survey for future nuclear security culture.

  7. Emotional Exhaustion and Job Satisfaction in Airport Security Officers - Work-Family Conflict as Mediator in the Job Demands-Resources Model.

    Science.gov (United States)

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners' job performance. The present study bridges this research gap by applying the job demands-resources (JD-R) model and using work-family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD-R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed.

  8. 76 FR 80956 - Information Collection Request to Office of Management and Budget; OMB Control Number: 1625-0011

    Science.gov (United States)

    2011-12-27

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget; OMB Control Number... Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and Regulatory... identified by Coast Guard docket number to the Docket Management Facility (DMF) at the U.S. Department...

  9. 76 FR 27074 - Collection of Information Under Review by Office of Management and Budget; OMB Control Number...

    Science.gov (United States)

    2011-05-10

    ... SECURITY Coast Guard Collection of Information Under Review by Office of Management and Budget; OMB Control... Collection Request (ICR), abstracted below, to the Office of Management and Budget (OMB), Office of... by Coast Guard docket number to the Docket Management Facility (DMF) at the U.S. Department...

  10. 76 FR 77243 - Information Collection Request to Office of Management and Budget; OMB Control Number: 1625-0010

    Science.gov (United States)

    2011-12-12

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget; OMB Control Number... Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and Regulatory... may submit comments identified by Coast Guard docket number to the Docket Management Facility (DMF)...

  11. 76 FR 27073 - Information Collection Request to Office of Management and Budget; OMB Control Number: 1625-0109

    Science.gov (United States)

    2011-05-10

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget; OMB Control Number... Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and Regulatory... identified by Coast Guard docket number to the Docket Management Facility (DMF) at the U.S. Department...

  12. 76 FR 11502 - Information Collection Request to Office of Management and Budget; OMB Control Number: 1625-0003

    Science.gov (United States)

    2011-03-02

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget; OMB Control Number... Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and Regulatory... comments identified by Coast Guard docket number , to the Docket Management Facility (DMF) at the...

  13. 76 FR 8764 - Collection of Information Under Review by Office of Management and Budget: OMB Control Number...

    Science.gov (United States)

    2011-02-15

    ... SECURITY Coast Guard Collection of Information Under Review by Office of Management and Budget: OMB Control... Collection Request (ICR), abstracted below, to the, Office of Management and Budget (OMB), Office of... number to the Docket Management Facility (DMF) at the U.S. Department of Transportation (DOT) and/or...

  14. 76 FR 3644 - Collection of Information Under Review by Office of Management and Budget: OMB Control Number...

    Science.gov (United States)

    2011-01-20

    ... SECURITY Coast Guard Collection of Information Under Review by Office of Management and Budget: OMB Control... Collection Request (ICR), abstracted below, to the Office of Management and Budget (OMB), Office of... Management Facility (DMF) at the U.S. Department of Transportation (DOT) and/or to OIRA. To avoid...

  15. 75 FR 80512 - Collection of Information Under Review by Office of Management and Budget: OMB Control Numbers...

    Science.gov (United States)

    2010-12-22

    ... SECURITY Coast Guard Collection of Information Under Review by Office of Management and Budget: OMB Control...), abstracted below, to the Office of Information and Regulatory Affairs (OIRA), Office of Management and Budget... Management Facility (DMF) at the U.S. Department of Transportation (DOT) or to OIRA. To avoid...

  16. 76 FR 27071 - Collection of Information Under Review by Office of Management and Budget; OMB Control Number...

    Science.gov (United States)

    2011-05-10

    ... SECURITY Coast Guard Collection of Information Under Review by Office of Management and Budget; OMB Control... Collection Request (ICR), abstracted below, to the Office of Management and Budget (OMB), Office of... by Coast Guard docket number to the Docket Management Facility (DMF) at the U.S. Department...

  17. 76 FR 10385 - Information Collection Request to Office of Management and Budget; OMB Control Number: 1625-0106

    Science.gov (United States)

    2011-02-24

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget; OMB Control Number... Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and Regulatory... may submit comments identified by Coast Guard docket number to the Docket Management Facility (DMF)...

  18. United States Department of Energy National Nuclear Security Administration Sandia Field Office NESHAP Annual Report CY2014 for Sandia National Laboratories New Mexico

    Energy Technology Data Exchange (ETDEWEB)

    evelo, stacie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Miller, Mark L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-05-01

    This report provides a summary of the radionuclide releases from the United States (U.S.) Department of Energy (DOE) National Nuclear Security Administration facilities at Sandia National Laboratories, New Mexico (SNL/NM) during Calendar Year (CY) 2014, including the data, calculations, and supporting documentation for demonstrating compliance with 40 Code of Federal Regulation (CFR) 61, Subpart H--NATIONAL EMISSION STANDARDS FOR EMISSIONS OF RADIONUCLIDES OTHER THAN RADON FROM DEPARTMENT OF ENERGY FACILITIES. A description is given of the sources and their contributions to the overall dose assessment. In addition, the maximally exposed individual (MEI) radiological dose calculation and the population dose to local and regional residents are discussed.

  19. Ambulatory Surgical Facilities, Licensed Ambulatory Sugery Centers, Published in 2007, 1:24000 (1in=2000ft) scale, State of California - Office of the State Chief Information Officer.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Ambulatory Surgical Facilities dataset, published at 1:24000 (1in=2000ft) scale, was produced all or in part from Published Reports/Deeds information as of...

  20. Assisted Living Facilities, Licensed Nursing Homes, Published in 2007, 1:24000 (1in=2000ft) scale, State of California - Office of the State Chief Information Officer.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Assisted Living Facilities dataset, published at 1:24000 (1in=2000ft) scale, was produced all or in part from Published Reports/Deeds information as of 2007. It...

  1. Airborne particles in indoor environment of homes, schools, offices and aged care facilities: The main routes of exposure.

    Science.gov (United States)

    Morawska, L; Ayoko, G A; Bae, G N; Buonanno, G; Chao, C Y H; Clifford, S; Fu, S C; Hänninen, O; He, C; Isaxon, C; Mazaheri, M; Salthammer, T; Waring, M S; Wierzbicka, A

    2017-11-01

    It has been shown that the exposure to airborne particulate matter is one of the most significant environmental risks people face. Since indoor environment is where people spend the majority of time, in order to protect against this risk, the origin of the particles needs to be understood: do they come from indoor, outdoor sources or both? Further, this question needs to be answered separately for each of the PM mass/number size fractions, as they originate from different sources. Numerous studies have been conducted for specific indoor environments or under specific setting. Here our aim was to go beyond the specifics of individual studies, and to explore, based on pooled data from the literature, whether there are generalizable trends in routes of exposure at homes, schools and day cares, offices and aged care facilities. To do this, we quantified the overall 24h and occupancy weighted means of PM10, PM2.5 and PN - particle number concentration. Based on this, we developed a summary of the indoor versus outdoor origin of indoor particles and compared the means to the WHO guidelines (for PM10 and PM2.5) and to the typical levels reported for urban environments (PN). We showed that the main origins of particle metrics differ from one type of indoor environment to another. For homes, outdoor air is the main origin of PM10 and PM2.5 but PN originate from indoor sources; for schools and day cares, outdoor air is the source of PN while PM10 and PM2.5 have indoor sources; and for offices, outdoor air is the source of all three particle size fractions. While each individual building is different, leading to differences in exposure and ideally necessitating its own assessment (which is very rarely done), our findings point to the existence of generalizable trends for the main types of indoor environments where people spend time, and therefore to the type of prevention measures which need to be considered in general for these environments. Copyright © 2017 The Authors

  2. Virtual reality in the creation of a tool to support planning of physical security at nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Santo, Andre Cotelli do E.; Mol, Antonio Carlos de A.; Goncalves, Deise Galvao de S.; Marins, Eugenio; Freitas, Victor Goncalves G., E-mail: cotelli.andre@gmail.com, E-mail: mol@ien.gov.br, E-mail: deise.galvao@gmail.com, E-mail: eugenio@ien.gov.br, E-mail: vgoncalves@ien.gov.br [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio De Janeiro, RJ (Brazil)

    2013-07-01

    In recent years was observed the importance of improving the physical security of nuclear facilities, mainly due to the increasing advancement of brazilian nuclear program. The present work aims to develop a tool that allows the visualization and planning of action strategies in a virtual environment, in order to improve this security. To this end, was created a virtual model of the Instituto de Engenharia Nuclear (IEN), which is located on Ilha do Fundao - Rio de Janeiro - Brazil. This environment is a three-dimensional model, with representations close to reality, where virtual characters (avatars) can move and interact in real time. In this virtual world, it was developed a dynamic weather system, where is possible to change between day and night, and climate changes such as: rain, storms, snow, among other features. Furthermore, the tool has a surveillance system using virtual cameras, allowing the monitoring of the environment. This way, making possible to simulate strategies approach, allowing an evaluation of the procedures performed, as well as assisting in the training of security installations subject to radiation. (author)

  3. Secure Attachment Moderates the Relation of Sexual Trauma With Trauma Symptoms Among Adolescents From an Inpatient Psychiatric Facility.

    Science.gov (United States)

    Jardin, Charles; Venta, Amanda; Newlin, Elizabeth; Ibarra, Segundo; Sharp, Carla

    2015-06-09

    Experiencing sexual trauma has been linked to internalizing and externalizing psychopathologies. Insecure attachment has been shown to moderate the relation between sexual trauma and trauma symptoms among adults. However, few studies have explored relations among sexual trauma, attachment insecurity, and trauma symptoms in adolescence, and none have used developmentally appropriate measures. The present study sought to examine attachment security as a potential moderator of the relation between having a history of sexual trauma (HST) and trauma symptoms among adolescents at an inpatient psychiatric facility. Attachment to caregivers was measured by the Child Attachment Interview (CAI) and trauma symptoms by the Trauma Symptoms Checklist for Children (TSCC). HST was assessed with responses to two separate interviews that asked about traumatic experiences: the Computerized Diagnostic Interview Schedule for Children (C-DISC) and the CAI. Moderation analyses were conducted using univariate General Linear Modeling (GLM). Of the 229 study participants, 50 (21.8%) had a HST. The relation between HST and trauma symptoms was significantly moderated by insecure attachment with both mother, F(1, 228) = 4.818, p = .029, and father, F(1, 228) = 6.370, p = .012. Specifically, insecurely attached adolescents with a HST exhibited trauma symptoms at levels significantly greater than securely attached adolescents with a HST and adolescents with no HST. Results are consistent with previous research that suggests secure attachment may protect against the development of trauma symptoms among those who have experienced a sexual trauma. © The Author(s) 2015.

  4. Emergency Plan for the Armed Forces Radiobiology Research Institute and AFRRI Reactor Facility

    Science.gov (United States)

    1993-06-01

    briefing, which covers general responses to emergency conditions. iv) Security personnel (officer of the day and the security watchmen ) will receive a...facility operations boundary and (b) the security watchmen for announcement throughout AFRRI on a routine day-to-day operational basis, as required

  5. Highlighting High Performance: National Renewable Energy Laboratory's Thermal Test Facility, Golden, Colorado. Office of Building Technology State and Community Programs (BTS) Brochure

    Energy Technology Data Exchange (ETDEWEB)

    Burgert, S.

    2002-10-21

    The National Renewable Energy Laboratory's Thermal Test Facility in Golden, Colorado, was designed using a whole-building approach--looking at the way the building's systems worked together most efficiently. Researchers monitor the performance of the 11,000-square-foot building, which boasts an energy cost savings of 63% for heating, cooling, and lighting. The basic plan of the building can be adapted to many needs, including retail and warehouse space. The Thermal Test Facility contains office and laboratory space; research focuses on the development of energy-efficiency and renewable energy technologies that are cost-effective and environmentally friendly.

  6. The Future Security Environment: Why the U.S. Army Must Differentiate and Grow Millennial Officer Talent

    Science.gov (United States)

    2015-09-01

    incorporates a more per- sonalized management approach could help to motivate and retain millennial officers and better prepare them for senior leadership ...Center for Army Leadership . This Paper, however, focuses on specific policy recommendations that will enable the Army to differentiate talent within the...Senior Officer Talent Management : Fostering Institutional Adaptability, stress that, in order for differentiation to be successful, any system must

  7. Evolution of nuclear security regulatory activities in Brazil

    Energy Technology Data Exchange (ETDEWEB)

    Mello, Luiz A. de; Monteiro Filho, Joselio S.; Belem, Lilia M.J.; Torres, Luiz F.B. [Comissao Nacional de Energia Nuclear (CNEN), Rio de Janeiro, RJ (Brazil). Diretoria de Radioprotecao e Segurania Nuclear. Coordenacao de Salvaguardas e Protecao Fisica], e-mail: gpf@cnen.gov.br

    2009-07-01

    The changing of the world scenario in the last 15 years has increased worldwide the concerns about overall security and, as a consequence, about the nuclear and radioactive material as well as their associated facilities. Considering the new situation, in February 2004, the Brazilian National Nuclear Energy Commission (CNEN), decided to create the Nuclear Security Office. This Office is under the Coordination of Nuclear Safeguards and Security, in the Directorate for Safety, Security and Safeguards (Regulatory Directorate). Before that, security regulation issues were dealt in a decentralized manner, within that Directorate, by different licensing groups in specific areas (power reactors, fuel cycle facilities, radioactive facilities, transport of nuclear material, etc.). This decision was made in order to allow a coordinated approach on the subject, to strengthen the regulation in nuclear/radioactive security, and to provide support to management in the definition of institutional security policies. The CNEN Security Office develops its work based in the CNEN Physical Protection Regulation for Nuclear Operational Units - NE-2.01, 1996, the Convention on the Physical Protection of Nuclear Material and the IAEA Nuclear Security Series . This paper aims at presenting the activities developed and the achievements obtained by this new CNEN office, as well as identifying the issues and directions for future efforts. (author)

  8. 33 CFR 127.707 - Security personnel.

    Science.gov (United States)

    2010-07-01

    ...) WATERFRONT FACILITIES WATERFRONT FACILITIES HANDLING LIQUEFIED NATURAL GAS AND LIQUEFIED HAZARDOUS GAS Waterfront Facilities Handling Liquefied Natural Gas Security § 127.707 Security personnel. The...

  9. System Security Authorization Agreement (SSAA) for the WIRE Archive and Research Facility

    Science.gov (United States)

    2002-01-01

    The Wide-Field Infrared Explorer (WIRE) Archive and Research Facility (WARF) is operated and maintained by the Department of Physics, USAF Academy. The lab is located in Fairchild Hall, 2354 Fairchild Dr., Suite 2A103, USAF Academy, CO 80840. The WARF will be used for research and education in support of the NASA Wide Field Infrared Explorer (WIRE) satellite, and for related high-precision photometry missions and activities. The WARF will also contain the WIRE preliminary and final archives prior to their delivery to the National Space Science Data Center (NSSDC). The WARF consists of a suite of equipment purchased under several NASA grants in support of WIRE research. The core system consists of a Red Hat Linux workstation with twin 933 MHz PIII processors, 1 GB of RAM, 133 GB of hard disk space, and DAT and DLT tape drives. The WARF is also supported by several additional networked Linux workstations. Only one of these (an older 450 Mhz PIII computer running Red Hat Linux) is currently running, but the addition of several more is expected over the next year. In addition, a printer will soon be added. The WARF will serve as the primary research facility for the analysis and archiving of data from the WIRE satellite, together with limited quantities of other high-precision astronomical photometry data from both ground- and space-based facilities. However, the archive to be created here will not be the final archive; rather, the archive will be duplicated at the NSSDC and public access to the data will generally take place through that site.

  10. [A guide to good practice for information security in the handling of personal health data by health personnel in ambulatory care facilities].

    Science.gov (United States)

    Sánchez-Henarejos, Ana; Fernández-Alemán, José Luis; Toval, Ambrosio; Hernández-Hernández, Isabel; Sánchez-García, Ana Belén; Carrillo de Gea, Juan Manuel

    2014-04-01

    The appearance of electronic health records has led to the need to strengthen the security of personal health data in order to ensure privacy. Despite the large number of technical security measures and recommendations that exist to protect the security of health data, there is an increase in violations of the privacy of patients' personal data in healthcare organizations, which is in many cases caused by the mistakes or oversights of healthcare professionals. In this paper, we present a guide to good practice for information security in the handling of personal health data by health personnel, drawn from recommendations, regulations and national and international standards. The material presented in this paper can be used in the security audit of health professionals, or as a part of continuing education programs in ambulatory care facilities.

  11. Assisted Living Facilities, Licensed Long Term Care Facilities, Published in 2007, 1:24000 (1in=2000ft) scale, State of California - Office of the State Chief Information Officer.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Assisted Living Facilities dataset, published at 1:24000 (1in=2000ft) scale, was produced all or in part from Published Reports/Deeds information as of 2007. It...

  12. Emotional Exhaustion and Job Satisfaction in Airport Security Officers – Work–Family Conflict as Mediator in the Job Demands–Resources Model

    Science.gov (United States)

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners’ job performance. The present study bridges this research gap by applying the job demands–resources (JD–R) model and using work–family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD–R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed. PMID:27242581

  13. Emotional Exhaustion and Job Satisfaction in Airport Security Officers − Work−Family Conflict as Mediator in the Job Demands–Resources Model

    Directory of Open Access Journals (Sweden)

    Sophie eBaeriswyl

    2016-05-01

    Full Text Available The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners. Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners’ job performance. The present study bridges this research gap by applying the job demands–resources (JD−R model and using work–family conflict (WFC as an intervening variable to study relationships between work characteristics (workload and supervisor support, emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a supervisor support as a major job resource predicted job satisfaction among screeners; (b workload as a major job demand predicted their emotional exhaustion; and (c WFC proved to be a promising extension to the JD–R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed.

  14. Creating a clinical video-conferencing facility in a security-constrained environment using open-source AccessGrid software and consumer hardware.

    Science.gov (United States)

    Terrazas, Enrique; Hamill, Timothy R; Wang, Ye; Channing Rodgers, R P

    2007-10-11

    The Department of Laboratory Medicine at the University of California, San Francisco (UCSF) has been split into widely separated facilities, leading to much time being spent traveling between facilities for meetings. We installed an open-source AccessGrid multi-media-conferencing system using (largely) consumer-grade equipment, connecting 6 sites at 5 separate facilities. The system was accepted rapidly and enthusiastically, and was inexpensive compared to alternative approaches. Security was addressed by aspects of the AG software and by local network administrative practices. The chief obstacles to deployment arose from security restrictions imposed by multiple independent network administration regimes, requiring a drastically reduced list of network ports employed by AG components.

  15. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  16. 75 FR 59278 - Information Collection Request to Office of Management and Budget; OMB Control Numbers: 1625-0062...

    Science.gov (United States)

    2010-09-27

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget; OMB Control Numbers... submit Information Collection Requests (ICRs) and Analyses to the Office of Management and Budget (OMB... Management Facility (DMF) (M-30), U.S. Department of Transportation (DOT), West Building Ground Floor,...

  17. 75 FR 19413 - Information Collection Request to Office of Management and Budget; OMB Control Number: 1625-0089.

    Science.gov (United States)

    2010-04-14

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget; OMB Control Number... Collection Request (ICR) and Analysis to the Office of Management and Budget (OMB) requesting an approval for...) Online: http://www.regulations.gov . (2) Mail: Docket Management Facility (DMF) (M-30), U.S....

  18. 75 FR 57808 - Information Collection Request to Office of Management and Budget; OMB Control Numbers: 1625-0080

    Science.gov (United States)

    2010-09-22

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget; OMB Control Numbers... Collection Request (ICR) and Analysis to the Office of Management and Budget (OMB) requesting an extension of...://www.regulations.gov . (2) Mail: Docket Management Facility (DMF) (M-30), U.S. Department...

  19. 76 FR 34737 - Collection of Information Under Review by Office of Management and Budget; OMB Control Numbers...

    Science.gov (United States)

    2011-06-14

    ... SECURITY Coast Guard Collection of Information Under Review by Office of Management and Budget; OMB Control... forwarding Information Collection Requests (ICRs), abstracted below, to the Office of Management and Budget... number to the Docket Management Facility (DMF) at the U.S. Department of Transportation (DOT) and/or...

  20. 75 FR 6677 - Information Collection Request to Office of Management and Budget; OMB Control Number: 1625-0086

    Science.gov (United States)

    2010-02-10

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget; OMB Control Number... Collection Request (ICR) and Analysis to the Office of Management and Budget (OMB) requesting an extension of....gov . ] (2) Mail: Docket Management Facility (DMF) (M-30), U.S. Department of Transportation...

  1. 75 FR 57809 - Information Collection Request to Office of Management and Budget; OMB Control Numbers: 1625-0002...

    Science.gov (United States)

    2010-09-22

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget; OMB Control Numbers... intends to submit Information Collection Requests (ICRs) and Analyses to the Office of Management and... following means: (1) Online: http://www.regulations.gov . (2) Mail: Docket Management Facility (DMF)...

  2. 75 FR 39552 - Collection of Information Under Review by Office of Management and Budget; OMB Control Number...

    Science.gov (United States)

    2010-07-09

    ... SECURITY Coast Guard Collection of Information Under Review by Office of Management and Budget; OMB Control... Information and Regulatory Affairs (OIRA), Office of Management and Budget (OMB) requesting, a re-instatement... docket number to the Docket Management Facility (DMF) at the U.S. Department of Transportation (DOT)...

  3. 75 FR 31459 - Collection of Information Under Review by Office of Management and Budget: OMB Control Number...

    Science.gov (United States)

    2010-06-03

    ... SECURITY Coast Guard Collection of Information Under Review by Office of Management and Budget: OMB Control... Information and Regulatory Affairs (OIRA), Office of Management and Budget (OMB) requesting an extension of... identified by Coast Guard docket number to the Docket Management Facility (DMF) at the U.S. Department...

  4. 75 FR 39700 - Information Collection Request to Office of Management and Budget; OMB; Control Number: 1625-New

    Science.gov (United States)

    2010-07-12

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget; OMB; Control Number... Collection Request (ICR) and Analysis to the Office of Management and Budget (OMB) requesting an approval for....gov . (2) Mail: Docket Management Facility (DMF) (M-30), U.S. Department of Transportation (DOT),...

  5. 75 FR 28275 - Collection of Information Under Review by Office of Management and Budget; OMB Control Number...

    Science.gov (United States)

    2010-05-20

    ... SECURITY Coast Guard Collection of Information Under Review by Office of Management and Budget; OMB Control... Information and Regulatory Affairs (OIRA), Office of Management and Budget (OMB) requesting an extension of... number to the Docket Management Facility (DMF) at the U.S. Department of Transportation (DOT) or to...

  6. 75 FR 19414 - Collection of Information Under Review by Office of Management and Budget: OMB Control Number...

    Science.gov (United States)

    2010-04-14

    ... SECURITY Coast Guard Collection of Information Under Review by Office of Management and Budget: OMB Control... Information and Regulatory Affairs (OIRA), Office of Management and Budget (OMB) requesting an extension of... number to the Docket Management Facility (DMF) at the U.S. Department of Transportation (DOT) or to...

  7. Study on CDA Identification and Lesson Learned from the Result for the Cyber Security Regulation for Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Si Won [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2016-10-15

    It is the United States that shows the most enthusiastic preparation for the protection of NPPs from cyber threats. The United States has been trying to improve cybersecurity of NPPs since the 911 terror in 2001. In this process, the Nuclear Regulatory Commission (NRC) of the U.S. demanded the protection of the digital systems in NPPs to the licensee through 10 CFR 73.54. Moreover, RG 5.71 defined the assets, which should be protected from cyber threats, as Critical Digital Asset (CDA). Nuclear Energy Institute (NEI) provided the CDA identification guide through NEI 10-04. Meanwhile, International Electrotechnical Commission (IEC) presented the security program requirements of I and C computer in NPP, as well as category about systems and functions through IEC 61226 which is under revision. In Korea, Korea Institute of Nuclear Nonproliferation and Control (KINAC) established KINAC/RS-019, which is based upon NEI 10-04 and adapted to Korean circumstances. As time goes by, the digital systems in NPPs increase and the possibilities of cyber threats becomes greater. To protect these systems from cyber attacks, it is important to identify CDA, which is the target to be protect. For that, the standards to identify CDA were established, and according to the standards, the licensees could perform identification works and draw many CDAs. During the inspection processes for this, KINAC could find several problems and has been tried to look for the solutions. It is desired that such solutions will be actively used when identifying CDAs in NPPs, and also they should be applied to the systems which are added or changed during the whole facility life cycle.

  8. Office of Personnel Management Catch 62 Match

    Data.gov (United States)

    Social Security Administration — SSA provides the Office of Personnel Management (OPM) with tax returns, Social Security benefits, and military retirement information for the purpose of correctly...

  9. Research of Storage Facilities Layout of Large Office Park%大型办公园区仓储设施布局配置研究

    Institute of Scientific and Technical Information of China (English)

    王大伟

    2015-01-01

    Large office park puts forward higher demands on material support.Using system layout design method,the paper carries out research of the layout of storage facilities.According to the principle of “reasonable reserve,accelerating turnaround,quality available and perpetual inventory”,in order to minimize logistics costs,the paper adopts qualitative and quantitative methods to obtain reasonable layout of storage facilities,which lays a good foundation for a variety of convenient and efficient,comfortable and intelligent park services.%大型办公园区对物资保障具有很高要求,文中采用系统布置设计法对园区仓储设施布局开展研究,按照“合理储备、加快周转、保质可用、永续盘存”的原则,以物流成本最小为目标,采用定性与定量相结合的方法,求得园区仓储规划合理布局,由此为提供各类高效便利、舒适智能的园区服务打下较好的基础。

  10. Final Status Survey Report for Corrective Action Unit 117 - Pluto Disassembly Facility, Building 2201, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Jeremy Gwin and Douglas Frenette

    2010-09-30

    This document contains the process knowledge, radiological data and subsequent statistical methodology and analysis to support approval for the radiological release of Corrective Action Unit (CAU) 117 – Pluto Disassembly Facility, Building 2201 located in Area 26 of the Nevada National Security Site (NNSS). Preparations for release of the building began in 2009 and followed the methodology described in the Multi-Agency Radiation Survey and Site Investigation Manual (MARSSIM). MARSSIM is the DOE approved process for release of Real Property (buildings and landmasses) to a set of established criteria or authorized limits. The pre-approved authorized limits for surface contamination values and corresponding assumptions were established by DOE O 5400.5. The release criteria coincide with the acceptance criteria of the U10C landfill permit. The U10C landfill is the proposed location to dispose of the radiologically non-impacted, or “clean,” building rubble following demolition. However, other disposition options that include the building and/or waste remaining at the NNSS may be considered providing that the same release limits apply. The Final Status Survey was designed following MARSSIM guidance by reviewing historical documentation and radiological survey data. Following this review a formal radiological characterization survey was performed in two phases. The characterization revealed multiple areas of residual radioactivity above the release criteria. These locations were remediated (decontaminated) and then the surface activity was verified to be less than the release criteria. Once remediation efforts had been successfully completed, a Final Status Survey Plan (10-015, “Final Status Survey Plan for Corrective Action Unit 117 – Pluto Disassembly Facility, Building 2201”) was developed and implemented to complete the final step in the MARSSIM process, the Final Status Survey. The Final Status Survey Plan consisted of categorizing each individual room

  11. Review Facility Design Drawings M3FT-16LA040105011 - Safeguards and Security by Design for Used Fuel Extended Storage: 1.02.04.01.05 FT – 16LA04010501

    Energy Technology Data Exchange (ETDEWEB)

    Scherer, Carolynn P. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rauch, Eric Benton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-04-14

    This work package focuses on developing Best Practices for the design of security for, and domestic safeguarding (e.g. MC&A) of, a pilot-scale independent spent/used fuel storage facility consistent with conceptual design efforts in Nuclear Fuels Storage and Transportation (NFST) and Used Fuel Disposal (UFD) campaigns. This is a review of the basic design of the facility to determine a candidate list of accounting and control requirements that could be considered for safeguards and security purposes.

  12. Review Facility Design Drawings M3FT-16LA040105011 - Safeguards and Security by Design for Used Fuel Extended Storage: 1.02.04.01.05 FT – 16LA04010501

    Energy Technology Data Exchange (ETDEWEB)

    Scherer, Carolynn P. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rauch, Eric Benton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-04-14

    This work package focuses on developing Best Practices for the design of security for, and domestic safeguarding (e.g. MC&A) of, a pilot-scale independent spent/used fuel storage facility consistent with conceptual design efforts in Nuclear Fuels Storage and Transportation (NFST) and Used Fuel Disposal (UFD) campaigns. This is a review of the basic design of the facility to determine a candidate list of accounting and control requirements that could be considered for safeguards and security purposes.

  13. Grid Security

    CERN Document Server

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  14. 33 CFR 105.255 - Security measures for access control.

    Science.gov (United States)

    2010-07-01

    ... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices... specified in the approved FSP, excluding government-owned vehicles on official business when government... person is unable or unwilling, upon the request of facility personnel or a law enforcement officer, to...

  15. Application of IOT security and protection in area of nuclear facilities%物联网安防在核设施领域中的应用

    Institute of Scientific and Technical Information of China (English)

    2013-01-01

      介绍了几种先进的物联网技术在核设施安防中的典型应用,包括控制区域防护、周界防护、用RFID技术对核燃料存储和运输的管理、无线传感器网络数据采集、基于ZigBee技术的无线传输等。提出了基于物联网技术的核设施安防实现架构,包括前端实现、通信模式和后端实现等。最后通过分析,论证了物联网技术在核设施安防中的应用有效性和可靠性。%The typical applications of several advanced IOT technology in the security and protection of nuclear facilities are introduced, such as control area protection, perimeter protection, using RFID technology to manage the storage and transportation of the nuclear fuel, the data collection of wireless sensor network, wireless transmission based on ZigBee technology and so on. The implementation architecture of the security and protection of nuclear facilities based on IOT technology is proposed, including the front-end implementation, communication mode and back-end realization etc. Through the analysis, the validity and reliability of the IOT technology applied in the security and protection of nuclear facilities is demonstrated.

  16. Problems of the security of facility viewed from accident information; Jiko joho kara mita setsubi hozen no kadai

    Energy Technology Data Exchange (ETDEWEB)

    Nishikawa, K. [The High Pressure Gas Safety Inst. of Japan, Tokyo (Japan)

    1996-02-01

    In petroleum complexes and chemical complexes in which the control of operation of the plants is being automated, most of the accidents recently occurring are accidents occurring during, especially, works which are difficult to automate, such as non-steady work and maintenance work rather than accidents ascribed to erroneous operation. The number of aged facilities has increased, and the facility maintenance work tends to be subcontracted increasingly. The facility engineering will become a still more important problem in the future. The High Pressure Gas Safety Institute of Japan has issued a compendium on the safety of high pressure gas every year since 1987, and they issued a collection of examples of accidents in complexes in 1991. This paper introduces main examples of the accidents concerning the facility maintenance, extracted from the accident information recorded in the compendium and the collection of examples of accidents. Finally, lessons learned from the accident information are enumerated, and future problems are posed which include subcontraction of the facility maintenance work, the facility management cost and the facility safety. 6 refs., 1 fig., 1 tab.

  17. 76 FR 57749 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-09-16

    ... Control Systems for Facilities and Tank Vessels. OMB Control Number: 1625-0060. Summary: The information... control systems (VCS). The information is also needed to determine the qualifications of a certifying... SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast...

  18. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  19. Selection, training and retention of an armed private security department.

    Science.gov (United States)

    Hollar, David B

    2009-01-01

    To arm or not to arm security officers? One hospital which has opted for arming its officers is Cook Children's Healthcare System, Fort Worth, TX, an integrated pediatric healthcare facility with over 4000 employees. Because of its location in a major metropolitan area and based on several factors including demographics, exterior risk assessments and crime statistics, the hospital's Administration and its Risk Manager supported the decision to operate as an armed security force, according to the author. In this article he shares its current program and presents some thoughts and ideas that may benefit others who are considering this important step.

  20. 76 FR 34761 - Classified National Security Information

    Science.gov (United States)

    2011-06-14

    ... Classified National Security Information AGENCY: Marine Mammal Commission. ACTION: Notice. SUMMARY: This... information, as directed by Information Security Oversight Office regulations. FOR FURTHER INFORMATION CONTACT..., ``Classified National Security Information,'' and 32 CFR part 2001, ``Classified National Security......

  1. 75 FR 5609 - Privacy Act of 1974; Department of Homeland Security/ALL-024 Facility and Perimeter Access...

    Science.gov (United States)

    2010-02-03

    ... Presidential Directive--12 program, directing the use of a common identification credential for both logical... a National Special Security Event; and record source categories has been updated to include records...Gate System; (4) Automated Continuing Evaluation System (ACES) Pilot; (5) Personal Identity...

  2. USCG Facility Pollution

    Data.gov (United States)

    Department of Homeland Security — The Marine Casualty and Pollution Data files provide details about marine casualty and pollution incidents investigated by Coast Guard Offices throughout the United...

  3. Reducing Data Center Loads for a Large-Scale, Low-Energy Office Building: NREL's Research Support Facility (Book)

    Energy Technology Data Exchange (ETDEWEB)

    Sheppy, M.; Lobato, C.; Van Geet, O.; Pless, S.; Donovan, K.; Powers, C.

    2011-12-01

    This publication detailing the design, implementation strategies, and continuous performance monitoring of NREL's Research Support Facility data center. Data centers are energy-intensive spaces that facilitate the transmission, receipt, processing, and storage of digital data. These spaces require redundancies in power and storage, as well as infrastructure, to cool computing equipment and manage the resulting waste heat (Tschudi, Xu, Sartor, and Stein, 2003). Data center spaces can consume more than 100 times the energy of standard office spaces (VanGeet 2011). The U.S. Environmental Protection Agency (EPA) reported that data centers used 61 billion kilowatt-hours (kWh) in 2006, which was 1.5% of the total electricity consumption in the U.S. (U.S. EPA, 2007). Worldwide, data centers now consume more energy annually than Sweden (New York Times, 2009). Given their high energy consumption and conventional operation practices, there is a potential for huge energy savings in data centers. The National Renewable Energy Laboratory (NREL) is world renowned for its commitment to green building construction. In June 2010, the laboratory finished construction of a 220,000-square-foot (ft{sup 2}), LEED Platinum, Research Support Facility (RSF), which included a 1,900-ft{sup 2} data center. The RSF will expand to 360,000 ft{sup 2} with the opening of an additional wing December, 2011. The project's request for proposals (RFP) set a whole-building demand-side energy use requirement of a nominal 35 kBtu/ft{sup 2} per year. On-site renewable energy generation will offset the annual energy consumption. To support the RSF's energy goals, NREL's new data center was designed to minimize its energy footprint without compromising service quality. Several implementation challenges emerged during the design, construction, and first 11 months of operation of the RSF data center. This document highlights these challenges and describes in detail how NREL successfully

  4. Outreach, Diversity, and Education Supported by NSF Facilities LacCore and the Continental Scientific Drilling Coordination Office (CSDCO), University of Minnesota

    Science.gov (United States)

    Myrbo, A.

    2015-12-01

    Climatic and environmental change are a powerful hook to engage students and the public with geoscience. Recent lake sediments often feature visual and compositional evidence of anthropogenic changes, which can pique curiosity and serve as a gateway for interest in more remote past changes. Cores provide an integrative, place-based geoscience education/outreach platform: lake dynamics incorporate principles of chemistry, physics, and biology; lake basin formation and sedimentary signals trace back to numerous geoscience subdisciplines. Lakes reflect local changes, and so are inherently place-based and relevant to both rural and urban populations. The esthetics of lakes in the landscape and sediments under the microscope spark the artistic sensibilities of those who do not consider themselves scientists: lakes are readymade for STEAM education. LacCore has exploited the magic of lake sediment cores in its 15 years as an NSF Facility, and now expands to additional environments as the NSF Continental Scientific Drilling Coordination Office. Part of scaling up is the formalization of major support for the Broader Impacts (BI) activities of Facility users. LacCore/CSDCO now musters its collaborative experiences in site REUs and other undergrad research projects, in-depth training of students, teachers, and faculty, a long list of informal education experiences, and common-good software development, to provide assistance to researchers seeking meaningful broader impacts and educators seeking extra- or co-curricular field and laboratory research experiences for their students. Outreach, diversity, and education support includes dissemination of best practices, as well as coordination, administration, and basic capacity for such activities in collaboration with project PIs and students, through no-cost support, or collaborative proposals or supplements from NSF where necessary for project scale. Community-driven research and broadening participation are central to the

  5. Safeguards and security research and development: Program status report, February-July 1981

    Energy Technology Data Exchange (ETDEWEB)

    Henry, C.N.; Walton, R.B. (comps.)

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards.

  6. China's Social Security Policy——Information Office of the State Counc of the People's Republic of China

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    Social security is one of the most important socioeconomic systems for a country in modern times. To establish and improve a social security system corresponding to the level of economic development is a logical requirement for coordinated economic and social development. It is also an important guarantee for the social stability and the long-term political stability of a country.

  7. Influence of working pressure and character traits of public security officers on subjective well-being%公安干警工作压力及性格特征对其主观幸福感的影响

    Institute of Scientific and Technical Information of China (English)

    吴喜强; 叶百维; 谢胜群; 徐娟; 刘永忠; 叶郁葱; 邬东红

    2015-01-01

    目的:调查公安干警工作压力及性格特征对公安干警主观幸福感的影响。方法采用整群随机抽样方法抽取2013年1~6月惠州市一县一区管辖内的公安分局、派出所的公安干警进行调查研究。公安干警压力源、A型行为类型评定量表、Campbell幸福感量表对公安干警进行工作压力及幸福感进行调查分析,并对公安干警工作压力及性格特征与主观幸福感的相关性进行分析。结果共发放550份问卷,可利用问卷为525份,可利用率为95.5%。不同性格特征(A型和B型)的公安干警工作压力评分结果显示,“工作任务本身”平均得分比较,差异无统计学意义(t=0.87,P>0.05),“组织和管理协调、人际和社会、自我能力和工作职业发展”比较,差异均有统计学意义(t=7.71、8.56、6.67、5.21,均P<0.05)。不同性格特征(A型和B型)的公安干警主观幸福感评分结果比较,“总体情感指数、生活满意、主观幸福感总分”比较差异均有统计学意义(t=8.77、9.81、6.96,均P<0.05)。公安干警工作压力、不同性格特征与主观幸福感均呈负相关(均P<0.05)。结论工作压力和不同的性格特征均影响着公安干警的主观幸福感。应采用合适的管理办法减轻公安干警的工作压力,进而减缓其心理压力,提高主观幸福感。%Objective To investigate the influence of working pressure and character traits of public security officers on subjective well-being.MethodsTo extract public security officers of public security subbureau and police station in one county one district of Huizhou city from January to June 2013 according to cluster random sampling, to make investigation and study. To make investigation and analysis of working pressure and subjective well-being of public security officers according to the pressure source, the rating scale of A behavior type, the well

  8. Secure portal.

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing

  9. Armament Technology Facility (ATF)

    Data.gov (United States)

    Federal Laboratory Consortium — The Armament Technology Facility is a 52,000 square foot, secure and environmentally-safe, integrated small arms and cannon caliber design and evaluation facility....

  10. Federal Bureau of Investigation (FBI) Field Office Jurisdiction/Divisions

    Data.gov (United States)

    Department of Homeland Security — This dataset represents the FBI (Federal Bureau of Investigations) national field office jurisdiction/divisional boundary locations. The field offices are centrally...

  11. 办公室WL AN网络安全问题分析%Analysis of Network Security Threats to WLAN in Corporate Offices

    Institute of Scientific and Technical Information of China (English)

    徐珙; 许佳南

    2015-01-01

    WLAN因具有灵活性强、移动性强、组网简单、易于扩展、低成本等优点,被越来越广泛应用在办公环境,但它也会带来一些安全问题。文章首先从安全角度简要介绍WLAN,然后分析了办公环境下WLAN的几个安全问题,并给出相应的对策和建议。%In corporate ofifces, WLAN has been widely due to its lfexibility, mobility, scalability and low cost. But WLAN also has some network security threats compared with wired LAN. In this paper, we ifrst introduce WLAN in the view of network security, and then we analyze some network security threats to WLAN, and propose some guidelines to secure WLAN.

  12. Physician offices marketing: assessing patients' views of office visits.

    Science.gov (United States)

    Emmett, Dennis; Chandra, Ashish

    2010-01-01

    Physician offices often lack the sense of incorporating appropriate strategies to make their facilities as marketer of their services. The patient experience at a physician's office not only incorporates the care they receive from the physician but also the other non-healthcare related aspects, such as the behavior of non-health professionals as well as the appearance of the facility itself. This paper is based on a primary research conducted to assess what patients assess from a physician office visit.

  13. Argonne's performance assessment of major facility systems to support semiconductor manufacturing by the National Security Agency/R Group, Ft. Meade, Maryland

    Energy Technology Data Exchange (ETDEWEB)

    Harrison, W.; Miller, G.M.

    1990-12-01

    The National Security Agency (NSA) was authorized in 1983 to construct a semiconductor and circuit-board manufacturing plant at its Ft. Meade, Maryland, facility. This facility was to become known as the Special Process Laboratories (SPL) building. Phase I construction was managed by the US Army Corps of Engineers, Baltimore District (USACE/BD) and commenced in January 1986. Phase I construction provided the basic building and support systems, such as the heating, ventilating, and air-conditioning system, the deionized-water and wastewater-treatment systems, and the high-purity-gas piping system. Phase II construction involved fitting the semiconductor manufacturing side of the building with manufacturing tools and enhancing various aspects of the Phase I construction. Phase II construction was managed by NSA and commenced in April 1989. Argonne National Laboratory (ANL) was contracted by USACE/BD midway through the Phase I construction period to provide quality-assured performance reviews of major facility systems in the SPL. Following completion of the Phase I construction, ANL continued its performance reviews under NSA sponsorship, focusing its attention on the enhancements to the various manufacturing support systems of interest. The purpose of this document is to provide a guide to the files that were generated by ANL during its term of technical assistance to USACE/BD and NSA and to explain the quality assurance program that was implemented when ANL conducted its performance reviews of the SPL building's systems. One set of the ANL project files is located at NSA, Ft. Meade, and two sets are at Argonne, Illinois. The ANL sets will be maintained until the year 2000, or for the 10-year estimated life of the project. 1 fig.

  14. Argonne's performance assessment of major facility systems to support semiconductor manufacturing by the National Security Agency/R Group, Ft. Meade, Maryland

    Energy Technology Data Exchange (ETDEWEB)

    Harrison, W.; Miller, G.M.

    1990-12-01

    The National Security Agency (NSA) was authorized in 1983 to construct a semiconductor and circuit-board manufacturing plant at its Ft. Meade, Maryland, facility. This facility was to become known as the Special Process Laboratories (SPL) building. Phase I construction was managed by the US Army Corps of Engineers, Baltimore District (USACE/BD) and commenced in January 1986. Phase I construction provided the basic building and support systems, such as the heating, ventilating, and air-conditioning system, the deionized-water and wastewater-treatment systems, and the high-purity-gas piping system. Phase II construction involved fitting the semiconductor manufacturing side of the building with manufacturing tools and enhancing various aspects of the Phase I construction. Phase II construction was managed by NSA and commenced in April 1989. Argonne National Laboratory (ANL) was contracted by USACE/BD midway through the Phase I construction period to provide quality-assured performance reviews of major facility systems in the SPL. Following completion of the Phase I construction, ANL continued its performance reviews under NSA sponsorship, focusing its attention on the enhancements to the various manufacturing support systems of interest. The purpose of this document is to provide a guide to the files that were generated by ANL during its term of technical assistance to USACE/BD and NSA and to explain the quality assurance program that was implemented when ANL conducted its performance reviews of the SPL building's systems. One set of the ANL project files is located at NSA, Ft. Meade, and two sets are at Argonne, Illinois. The ANL sets will be maintained until the year 2000, or for the 10-year estimated life of the project. 1 fig.

  15. 75 FR 80514 - Collection of Information Under Review by Office of Management and Budget: OMB Control Numbers...

    Science.gov (United States)

    2010-12-22

    ... SECURITY Coast Guard Collection of Information Under Review by Office of Management and Budget: OMB Control... Management and Budget (OMB) requesting an extension of its approval for the following collections of...: You may submit comments identified by Coast Guard docket number to the Docket Management Facility...

  16. 75 FR 48357 - Collection of Information Under Review by Office of Management and Budget; OMB Control Number...

    Science.gov (United States)

    2010-08-10

    ... SECURITY Coast Guard Collection of Information Under Review by Office of Management and Budget; OMB Control... 19, 2010, or reach the Docket Management Facility (DMF) by that date. DATES: Please submit comments... Management, telephone 202-475-3523, or fax 202-475-3929, for questions on these documents. Contact Ms....

  17. 32 CFR 700.826 - Physical security.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Physical security. 700.826 Section 700.826... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate... officer shall take action to protect and maintain the security of the command against dangers from...

  18. Facility Modeling Capability Demonstration Summary Report

    Energy Technology Data Exchange (ETDEWEB)

    Key, Brian P. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Sadasivan, Pratap [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Fallgren, Andrew James [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Demuth, Scott Francis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Aleman, Sebastian E. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); de Almeida, Valmor F. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Chiswell, Steven R. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Hamm, Larry [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Tingey, Joel M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2017-02-01

    A joint effort has been initiated by Los Alamos National Laboratory (LANL), Oak Ridge National Laboratory (ORNL), Savanah River National Laboratory (SRNL), Pacific Northwest National Laboratory (PNNL), sponsored by the National Nuclear Security Administration’s (NNSA’s) office of Proliferation Detection, to develop and validate a flexible framework for simulating effluents and emissions from spent fuel reprocessing facilities. These effluents and emissions can be measured by various on-site and/or off-site means, and then the inverse problem can ideally be solved through modeling and simulation to estimate characteristics of facility operation such as the nuclear material production rate. The flexible framework called Facility Modeling Toolkit focused on the forward modeling of PUREX reprocessing facility operating conditions from fuel storage and chopping to effluent and emission measurements.

  19. Lecture 2: Software Security

    CERN Document Server

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  20. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-11-01

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office, National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  1. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-05-13

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office, National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  2. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... ] Industrial Security Program policy matters. Dated: February 23, 2012. Mary Ann Hadyka, Committee Management... number of individuals planning to attend must be submitted to the Information Security Oversight Office...

  3. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-02-07

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office, National Archives and Records... meeting. To discuss National Industrial Security Program policy matters. DATES: The meeting will be held...

  4. Comparison Analysis of Public Security Professional and Non Public Security Professional Students'Physique in Guangxi Police Officer College%广西警官高等专科学校公安专业与非公安专业大学生体质的比较

    Institute of Scientific and Technical Information of China (English)

    王湛海

    2015-01-01

    Using the mathematical statistics method, this paper makes a comparison analysis of the core element of the public security professional and non public security professional freshmen's physical health in Guangxi police officer college, aimed at providing the reference data for function departments and the school making physical fitness test development plan.Results show that the public security professional students constitution is better than that of the non public security professional students, which reflect the proactive and important significance of interview and physical fitness test of registering for examination for the public security major.%对比广西警官高等专科学校公安专业与非公安专业高考入学大一新生的体质健康的核心因素。对收集的数据进行统计学处理,得到广西警官高等专科学校公安类专业学生体质优于非公安专业学生体质,反映了报考公安类专业通过学校组织的面试、体能测试、体检具有前瞻性和重要意义。

  5. Report on the control of the safety and security of nuclear facilities. Part 2: the reconversion of military plutonium stocks. The use of the helps given to central and eastern Europe countries and to the new independent states; Rapport sur le controle de la surete et de la securite des installations nucleaires. Deuxieme partie: la reconversion des stocks de plutonium militaire. L'utilisation des aides accordees aux pays d'Europe centrale et orientale et aux nouveaux etats independants

    Energy Technology Data Exchange (ETDEWEB)

    Birraux, C

    2002-07-01

    This report deals with two different aspects of the safety and security of nuclear facilities. The first aspect concerns the reconversion of weapon grade plutonium stocks: the plutonium in excess, plutonium hazards and nuclear fuel potentialities, the US program, the Russian program, the actions of European countries (France, Germany), the intervention of other countries, the unanswered questions (political aspects, uncertainties), the solutions of the future (improvement of reactors, the helium-cooled high temperature reactor technology (gas-turbine modular helium reactor: GT-MHR), the Carlo Rubbia's project). The second aspect concerns the actions carried out by the European Union in favor of the civil nuclear facilities of central and eastern Europe: the European Union competencies through the Euratom treaty, the conclusions of the European audit office about the PHARE and TACIS nuclear programs, the status of committed actions, the coming planned actions, and the critical analysis of the policy adopted so far. (J.S.)

  6. Office of Personnel Management (OPM)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for the Office of Personnel Management. OPM will use the SSN verifications in its investigative...

  7. Safeguards technology and computer security training

    Energy Technology Data Exchange (ETDEWEB)

    Hunteman, W.J.; Zack, N.R.

    1992-01-01

    The Los Alamos National Laboratory Safeguards Systems Group provides a variety of training services to the federal government and its contractors. The US Department of Energy sponsors a Safeguards Technology Training Program at Los Alamos in which seminars are offered concerning materials accounting for nuclear safeguards, measurement control for materials accounting, and variance propagation and systems analysis. These seminars provide guidance and techniques for accounting for nuclear material, developing and quantifying quality nuclear material measurements, and assessing overall accounting system performance. The Safeguards Systems Group also provides training in computer and data security applications; i.e., a workshop and the Los Alamos Vulnerability/Risk Assessment System (LAVA), computer system security officer training, and nuclear material safeguards for managers training, which are available on request. This paper describes the purpose, content, and expected benefits of the training activities that can be applied at nuclear materials facilities or where there are computer and/or data security concerns.

  8. Safeguards technology and computer security training

    Energy Technology Data Exchange (ETDEWEB)

    Hunteman, W.J.; Zack, N.R.

    1992-09-01

    The Los Alamos National Laboratory Safeguards Systems Group provides a variety of training services to the federal government and its contractors. The US Department of Energy sponsors a Safeguards Technology Training Program at Los Alamos in which seminars are offered concerning materials accounting for nuclear safeguards, measurement control for materials accounting, and variance propagation and systems analysis. These seminars provide guidance and techniques for accounting for nuclear material, developing and quantifying quality nuclear material measurements, and assessing overall accounting system performance. The Safeguards Systems Group also provides training in computer and data security applications; i.e., a workshop and the Los Alamos Vulnerability/Risk Assessment System (LAVA), computer system security officer training, and nuclear material safeguards for managers training, which are available on request. This paper describes the purpose, content, and expected benefits of the training activities that can be applied at nuclear materials facilities or where there are computer and/or data security concerns.

  9. 17 CFR 200.26a - Office of Information Technology.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible...

  10. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  11. Park Facilities, Jefferson County Parks, Published in 2008, 1:2400 (1in=200ft) scale, Jefferson County Land Information Office.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Park Facilities dataset, published at 1:2400 (1in=200ft) scale, was produced all or in part from Published Reports/Deeds information as of 2008. It is described...

  12. 2014 Year End Report: Center for Development of Security Excellence

    Science.gov (United States)

    2014-01-01

    the increased availability of products available through Open eLearning and the first of its kind Facility Security Officer (FSO) Toolkit available...Toolkits 15 New Shorts 16 New Courses at CDSE 18 CDSE Webinars 18 CDSE Open eLearning Courses 19 International Engagements 19 CDSE Virtual Instructor...website or on the CDSE YouTube channel. Personnel can watch the webinars and download associated job aids and resources. CDSE OPEN ELEARNING COURSES

  13. 75 FR 17305 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-04-06

    ... Industrial Security Program Directive No. 1 AGENCY: Information Security Oversight Office, NARA. ACTION... Administration (NARA), has amended National Industrial Security Program Directive No. 1. This amendment to...). The Executive Order established a National Industrial Security Program (NISP) to safeguard Federal...

  14. Reducing Plug and Process Loads for a Large Scale, Low Energy Office Building: NREL's Research Support Facility; Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Lobato, C.; Pless, S.; Sheppy, M.; Torcellini, P.

    2011-02-01

    This paper documents the design and operational plug and process load energy efficiency measures needed to allow a large scale office building to reach ultra high efficiency building goals. The appendices of this document contain a wealth of documentation pertaining to plug and process load design in the RSF, including a list of equipment was selected for use.

  15. Best Practices for the Security of Radioactive Materials

    Energy Technology Data Exchange (ETDEWEB)

    Coulter, D.T.; Musolino, S.

    2009-05-01

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices

  16. Reducing software security risk through an integrated approach research initiative model based verification of the Secure Socket Layer (SSL) Protocol

    Science.gov (United States)

    Powell, John D.

    2003-01-01

    This document discusses the verification of the Secure Socket Layer (SSL) communication protocol as a demonstration of the Model Based Verification (MBV) portion of the verification instrument set being developed under the Reducing Software Security Risk (RSSR) Trough an Integrated Approach research initiative. Code Q of the National Aeronautics and Space Administration (NASA) funds this project. The NASA Goddard Independent Verification and Validation (IV&V) facility manages this research program at the NASA agency level and the Assurance Technology Program Office (ATPO) manages the research locally at the Jet Propulsion Laboratory (California institute of Technology) where the research is being carried out.

  17. Reducing software security risk through an integrated approach research initiative model based verification of the Secure Socket Layer (SSL) Protocol

    Science.gov (United States)

    Powell, John D.

    2003-01-01

    This document discusses the verification of the Secure Socket Layer (SSL) communication protocol as a demonstration of the Model Based Verification (MBV) portion of the verification instrument set being developed under the Reducing Software Security Risk (RSSR) Trough an Integrated Approach research initiative. Code Q of the National Aeronautics and Space Administration (NASA) funds this project. The NASA Goddard Independent Verification and Validation (IV&V) facility manages this research program at the NASA agency level and the Assurance Technology Program Office (ATPO) manages the research locally at the Jet Propulsion Laboratory (California institute of Technology) where the research is being carried out.

  18. School Operations and Maintenance: Best Practices For Controlling Energy Costs. A Guidebook for K-12 School System Business Officers and Facilities Managers

    Science.gov (United States)

    US Department of Energy, 2004

    2004-01-01

    Operations and maintenance (O&M) offers not only strategies for maintaining facilities, but also opportunities for reducing energy costs and increasing energy efficiency at existing schools, regardless of age. This Guidebook provides detailed and practical guidance on how K-12 school districts can plan and implement enhancements to their current…

  19. 77 FR 2729 - Office of the Secretary, Office of the Assistant Secretary for Administration; Statement of...

    Science.gov (United States)

    2012-01-19

    ..., information resources management, security, counterintelligence, strategic information, logistics, and travel... Business Management and Transformation (AJJ) Office of Security and Strategic Information (AJS) Program... Departmental liaison to central management agencies on related matters. OHR also provides leadership...

  20. Security in the Sahel

    DEFF Research Database (Denmark)

    Hahonou, Eric Komlavi

    of volatile security. In this policy brief, Eric Hahonou argues that without complementary activities, the multiplication of border offices could even expand opportunities for corruption. Instead, security policy should focus on creating a culture of effectiveness including systematic and regular staff...

  1. Security the human factor

    CERN Document Server

    Kearney, Paul

    2010-01-01

    This pocket guide is based on the approach used by BT to protect its own data security – one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.

  2. 76 FR 4123 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-01-24

    ... homeland security, results of a cyber security exercise, sharing information with others, and Southwest... would be a road map to those who wish to attack our cyber security, and hence, would certainly frustrate... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of partially...

  3. Nevada National Security Site Environmental Report 2016

    Energy Technology Data Exchange (ETDEWEB)

    Wills (editor), Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This Nevada National Security Site Environmental Report (NNSSER) was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2016 at the Nevada National Security Site (NNSS) and its two Nevada-based support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). NNSA/NFO directs the management and operation of the NNSS and six sites across the nation. In addition to the NNSA itself, the six sites include two in Nevada (NLVF and RSL-Nellis) and four in other states (RSL-Andrews in Maryland, Livermore Operations in California, Los Alamos Operations in New Mexico, and Special Technologies Laboratory in California). Los Alamos, Lawrence Livermore, and Sandia National Laboratories are the principal organizations that sponsor and implement the nuclear weapons programs at the NNSS. National Security Technologies, LLC (NSTec), is the current Management and Operating contractor accountable for the successful execution of work and ensuring that work is performed in compliance with environmental regulations. The six sites all provide support to enhance the NNSS as a location for its multiple

  4. Officer Training

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset shows the time spent by currently active Pittsburgh Police Officers in professional development training. Officers who are no longer employed in the...

  5. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  6. 77 FR 6571 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-02-08

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting.... FOR FURTHER INFORMATION CONTACT: Ms. Kenlinishia Tyler, Office of Information Management,...

  7. 77 FR 9951 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-02-21

    ... SECURITY Coast Guard Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting... FURTHER INFORMATION CONTACT: Ms. Kenlinishia Tyler, Office of Information Management, telephone...

  8. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    , but while creation of defensive alliances appears unrealistic, new defence laws appearing 1909 show strong resolve to defend Denmark’s status as a neutral power. The Great War proves that these laws provided an adequate tool to be wielded by the politicians actually in office during that conflict. Following....... Moreover, they estimated that armed defence was a priori hopeless and possibly even dangerous as it might attract unnecessary attention by a would-be belligerent. Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During...... the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe, but while creation of defensive alliances appears unrealistic, new defence laws appearing 1909 show strong resolve to defend Denmark’s status as a neutral...

  9. Back office to box office

    DEFF Research Database (Denmark)

    Haigh, Matthew

    sees a mounting unsecured debt where its members see practical value. Between the two, a steward who may not profit from its office delegates it to back-office agents whose fiduciary management is engendered by box office-sized bonuses. Standard theorisation has foundered. The architecture...

  10. Poultry Slaughtering and Processing Facilities

    Data.gov (United States)

    Department of Homeland Security — Agriculture Production Poultry Slaughtering and Processing in the United States This dataset consists of facilities which engage in slaughtering, processing, and/or...

  11. 17 CFR 140.1 - Headquarters office.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Headquarters office. 140.1..., FUNCTIONS, AND PROCEDURES OF THE COMMISSION Organization § 140.1 Headquarters office. (a) General. The headquarters office of the Commission is located at Three Lafayette Centre, 1155 21st Street, NW.,...

  12. 20 CFR 404.1006 - Corporation officer.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Corporation officer. 404.1006 Section 404.1006 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY... Corporation officer. If you are an officer of a corporation, you are an employee of the corporation if you are...

  13. 41 CFR 102-81.25 - Do the Interagency Security Committee Security Design Criteria apply to all new Federally owned...

    Science.gov (United States)

    2010-07-01

    ... facilities such as those classified by the Department of Justice Vulnerability Assessment Study as Level V... Security Committee Security Design Criteria apply to all new Federally owned and leased facilities? 102-81... Interagency Security Committee Security Design Criteria apply to all new Federally owned and leased facilities...

  14. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM))--Match Number 1307 AGENCY: Social Security Administration....

  15. Securing web-based exams

    NARCIS (Netherlands)

    Sessink, O.D.T.; Beeftink, H.H.; Tramper, J.; Hartog, R.J.M.

    2004-01-01

    Learning management systems may offer web-based exam facilities. Such facilities entail a higher risk to exams fraud than traditional paper-based exams. The article discusses security issues with web-based exams, and proposes precautionary measures to reduce the risks. A security model is presented

  16. Securing web-based exams

    NARCIS (Netherlands)

    Sessink, O.D.T.; Beeftink, H.H.; Tramper, J.; Hartog, R.J.M.

    2004-01-01

    Learning management systems may offer web-based exam facilities. Such facilities entail a higher risk to exams fraud than traditional paper-based exams. The article discusses security issues with web-based exams, and proposes precautionary measures to reduce the risks. A security model is presented

  17. Recovery of Information from the Fast Flux Test Facility for the Advanced Fuel Cycle Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Nielsen, Deborah L.; Makenas, Bruce J.; Wootan, David W.; Butner, R. Scott; Omberg, Ronald P.

    2009-09-30

    The Fast Flux Test Facility is the most recent Liquid Metal Reactor to operate in the United States. Information from the design, construction, and operation of this reactor was at risk as the facilities associated with the reactor are being shut down. The Advanced Fuel Cycle Initiative is a program managed by the Office of Nuclear Energy of the U.S. Department of Energy with a mission to develop new fuel cycle technologies to support both current and advanced reactors. Securing and preserving the knowledge gained from operation and testing in the Fast Flux Test Facility is an important part of the Knowledge Preservation activity in this program.

  18. Robotics Research Facility

    Data.gov (United States)

    Federal Laboratory Consortium — This 60 feet x 100 feet structure on the grounds of the Fort Indiantown Gap Pennsylvania National Guard (PNG) Base is a mixed-use facility comprising office space,...

  19. Robotics Research Facility

    Data.gov (United States)

    Federal Laboratory Consortium — This 60 feet x 100 feet structure on the grounds of the Fort Indiantown Gap Pennsylvania National Guard (PNG) Base is a mixed-use facility comprising office space,...

  20. Corrosion Testing Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Corrosion Testing Facility is part of the Army Corrosion Office (ACO). It is a fully functional atmospheric exposure site, called the Corrosion Instrumented Test...

  1. 17 CFR 200.15 - Office of International Affairs.

    Science.gov (United States)

    2010-04-01

    ... to international securities markets. OIA facilitates the development of and, where appropriate... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Office of International... Organization § 200.15 Office of International Affairs. (a) The Office of International Affairs (“OIA”)...

  2. Nevada National Security Site Environmental Report 2011

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  3. Environmental Assessment for Proposed Construction and Lease of New Facilities for the Department of Energy, National Nuclear Security Administration, Office of Secure Transportation (Albuquerque Transportation and Technology Center), Albuquerque, New Mexico

    Science.gov (United States)

    2006-07-01

    covering the sites and surrounding area is grasses. The surrounding grasslands are influenced primarily by the Chihuahuan Desert and the Great Basin biotic ...fulfilling the proposed action. The assessment was conducted in accordance with the American Society of Testing and Materials (ASTM) Standard Practice for...Additional access options would be provided by the developer via the planned Mesa Del Sol Interchange as the development matures. Construction of the

  4. Integrating Safeguards and Security with Safety into Design

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Bean; John W. Hockert; David J. Hebditch

    2009-05-01

    There is a need to minimize security risks, proliferation hazards, and safety risks in the design of new nuclear facilities in a global environment of nuclear power expansion, while improving the synergy of major design features and raising operational efficiency. In 2008, the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA) launched the Next Generation Safeguards Initiative (NGSI) covering many safeguards areas. One of these, launched by NNSA with support of the DOE Office of Nuclear Energy, was a multi-laboratory project, led by the Idaho National Laboratory (INL), to develop safeguards by design. The proposed Safeguards-by-Design (SBD) process has been developed as a structured approach to ensure the timely, efficient, and cost effective integration of international safeguards and other nonproliferation barriers with national material control and accountability, physical security, and safety objectives into the overall design process for the nuclear facility lifecycle. A graded, iterative process was developed to integrate these areas throughout the project phases. It identified activities, deliverables, interfaces, and hold points covering both domestic regulatory requirements and international safeguards using the DOE regulatory environment as exemplar to provide a framework and guidance for project management and integration of safety with security during design. Further work, reported in this paper, created a generalized SBD process which could also be employed within the licensed nuclear industry and internationally for design of new facilities. Several tools for integrating safeguards, safety, and security into design are discussed here. SBD appears complementary to the EFCOG TROSSI process for security and safety integration created in 2006, which focuses on standardized upgrades to enable existing DOE facilities to meet a more severe design basis threat. A collaborative approach is suggested.

  5. 77 FR 55218 - Homeland Security Advisory Council

    Science.gov (United States)

    2012-09-07

    ... violent extremism domestically; the current threat environment; evolving threats in cyber security... receive a briefing on evolving threats in cyber security. This will include lessons learned and potential... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Notice of...

  6. 76 FR 81516 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-12-28

    ...) Frequent Traveler Program; examine evolving threats in cyber security; and provide information on the... (EMP) Threat--Lessons Learned and Areas of Vulnerability, and Evolving Threats in Cyber Security. Basis... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Closed...

  7. 22 CFR 8.7 - Security.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security. 8.7 Section 8.7 Foreign Relations DEPARTMENT OF STATE GENERAL ADVISORY COMMITTEE MANAGEMENT § 8.7 Security. (a) All officers and members of a committee must have a security clearance for the subject matter level of security at which the...

  8. 75 FR 37253 - Classified National Security Information

    Science.gov (United States)

    2010-06-28

    ... Special access programs. 2001.50 Telecommunications, automated information systems, and network security... Telecommunications, automated 4.1, 4.2 information systems, and network security. 2001.51 Technical security 4.1 2001... and Records Administration Information Security Oversight Office 32 CFR Parts 2001 and 2003...

  9. 20 CFR 726.106 - Type of security.

    Science.gov (United States)

    2010-04-01

    ...-insure based on a deposit of negotiable securities, in the amount fixed by the Office, shall deposit any negotiable securities acceptable as security for the deposit of public moneys of the United States under...

  10. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-05-17

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection...'s National Security Telecommunications Advisory Committee (NSTAC). The document contained...

  11. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-01-12

    ... RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY: Information Security Oversight Office, NARA. ACTION... Federal Register of November 30, 2009, regarding the National Industrial Security Program Directive No. 1...

  12. 78 FR 29375 - Protected Critical Infrastructure Information (PCII) Office Self-Assessment Questionnaire

    Science.gov (United States)

    2013-05-20

    ... critical infrastructure information not customarily in the public domain and related to the security of... SECURITY Protected Critical Infrastructure Information (PCII) Office Self- Assessment Questionnaire AGENCY... Protection and Programs Directorate (NPPD), Office of Infrastructure Protection (IP),...

  13. Mail office

    CERN Multimedia

    2006-01-01

    Members of the personnel are kindly requested to empty their mail boxes. Any mail remaining in mail boxes will be collected and resorted by Mail Office staff on 6 April. Only specifically addressed mail will be re-delivered.

  14. Mail Office

    CERN Multimedia

    2006-01-01

    Members of the personnel are kindly requested to empty their mail boxes. Any mail remaining in mail boxes will be collected and resorted by Mail Office staff on 1st June. Only specifically addressed mail will be re-delivered.

  15. Assisted Living Facilities, Homeland Security Infrastructure Program- nursing homes, Published in 2010, 1:24000 (1in=2000ft) scale, Georgia Department of Community Affairs.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Assisted Living Facilities dataset, published at 1:24000 (1in=2000ft) scale, was produced all or in part from Other information as of 2010. It is described as...

  16. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  17. Occupational Radiation Exposure at Commercial Nuclear Power Reactors and Other Facilities 2010, Prepared for the Nuclear Regulatory Commission, Office of Nuclear Regulatory Research, May 2012

    Energy Technology Data Exchange (ETDEWEB)

    D. E. Lewis D. A. Hagemeyer Y. U. McCormick

    2012-07-07

    This report summarizes the occupational exposure data that are maintained in the U.S. Nuclear Regulatory Commission’s (NRC) Radiation Exposure Information and Reporting System (REIRS). The bulk of the information contained in the report was compiled from the 2010 annual reports submitted by five of the seven categories of NRC licensees subject to the reporting requirements of 10 CFR 20.2206. Because there are no geologic repositories for high-level waste currently licensed and no NRC-licensed low-level waste disposal facilities currently in operation, only five categories will be considered in this report. The annual reports submitted by these licensees consist of radiation exposure records for each monitored individual. These records are analyzed for trends and presented in this report in terms of collective dose and the distribution of dose among the monitored individuals. Annual reports for 2010 were received from a total of 190 NRC licensees. The summation of reports submitted by the 190 licensees indicated that 192,424 individuals were monitored, 81,961 of whom received a measurable dose. When adjusted for transient workers who worked at more than one licensee during the year, there were actually 142,471 monitored individuals and 62,782 who received a measurable dose. The collective dose incurred by these individuals was 10,617 person-rem, which represents a 12% decrease from the 2009 value. This decrease was primarily due to the decrease in collective dose at commercial nuclear power reactors, as well as a decrease in the collective dose for most of the other categories of NRC licensees. The number of individuals receiving a measurable dose also decreased, resulting in an average measurable dose of 0.13 rem for 2010. The average measurable dose is defined as the total effective dose equivalent (TEDE) divided by the number of individuals receiving a measurable dose. In calendar year 2010, the average annual collective dose per reactor for light water reactor

  18. Overview of the Facility Safeguardability Analysis (FSA) Process

    Energy Technology Data Exchange (ETDEWEB)

    Bari, Robert A.; Hockert, John; Wonder, Edward F.; Johnson, Scott J.; Wigeland, Roald; Zentner, Michael D.

    2012-08-01

    Executive Summary The safeguards system of the International Atomic Energy Agency (IAEA) is intended to provide the international community with credible assurance that a State is fulfilling its safeguards obligations. Effective and cost-efficient IAEA safeguards at the facility level are, and will remain, an important element of IAEA safeguards as those safeguards evolve towards a “State-Level approach.” The Safeguards by Design (SBD) concept can facilitate the implementation of these effective and cost-efficient facility-level safeguards (Bjornard, et al. 2009a, 2009b; IAEA, 1998; Wonder & Hockert, 2011). This report, sponsored by the National Nuclear Security Administration’s Office of Nuclear Safeguards and Security, introduces a methodology intended to ensure that the diverse approaches to Safeguards by Design can be effectively integrated and consistently used to cost effectively enhance the application of international safeguards.

  19. Nevada National Security Site Environmental Report 2012

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy

    2013-09-11

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is

  20. 30 January 2012 - Ecuadorian Ambassador Gallegos Chiriboga, Permanent Representative to the United Nations Office and other International Organisations at Geneva and San Francisco de Quito University Vice Chancellor C. Montùfar visiting CMS surface facilities and underground experimental area with CMS Collaboration L. Sulak and Collaboration Deputy Spokesperson T. Camporesi, throughout accompanied by Head of International Relations F. Pauss.

    CERN Multimedia

    Michael Hoch

    2012-01-01

    30 January 2012 - Ecuadorian Ambassador Gallegos Chiriboga, Permanent Representative to the United Nations Office and other International Organisations at Geneva and San Francisco de Quito University Vice Chancellor C. Montùfar visiting CMS surface facilities and underground experimental area with CMS Collaboration L. Sulak and Collaboration Deputy Spokesperson T. Camporesi, throughout accompanied by Head of International Relations F. Pauss.

  1. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  2. 75 FR 3950 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving Proposed...

    Science.gov (United States)

    2010-01-25

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving Proposed..., the International Securities Exchange, LLC (``ISE'' or ``Exchange'') filed with the Securities...

  3. 77 FR 4852 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed...

    Science.gov (United States)

    2012-01-31

    ... From the Federal Register Online via the Government Publishing Office ] SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed... International Securities Exchange, LLC (the ``Exchange'' or ``ISE'') filed with the Securities and...

  4. 76 FR 59472 - Self-Regulatory Organizations; International Securities Exchange, Inc., Order Granting Approval...

    Science.gov (United States)

    2011-09-26

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; International Securities Exchange, Inc., Order Granting Approval of... International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the Securities and...

  5. Do I hear... anyone here? Tax-exempt healthcare facilities have taken a hit on auction-rate securities as the mortgage meltdown has investors skittish.

    Science.gov (United States)

    Evans, Melanie

    2008-02-25

    The crisis in auction-rate securities is coming down hard on tax-exempt providers. Buyers are disappearing, sending interest rates soaring. Some hospitals and other healthcare borrowers are being forced to pay maximum interest. "Basically, the investor pool has all but vanished," says Melissa Williams, left, of Christus Health.

  6. 17 CFR 200.23a - Office of Economic Analysis.

    Science.gov (United States)

    2010-04-01

    ... Office also assists the Commission's enforcement effort by applying economic analysis and statistical... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Office of Economic Analysis... Organization § 200.23a Office of Economic Analysis. The Office of Economic Analysis is responsible...

  7. 基于分级保护的OA系统应用层访问控制%An application layer access control model based on gradational security protection in an office automation system

    Institute of Scientific and Technical Information of China (English)

    张天白; 王晶

    2011-01-01

    本文着眼于一个涉密信息系统的建设角度,在应用层访问控制上深化分级保护的思想,并提出了合理的解决方案.系统采用C/S与B/S相结合的结构,引入主客体分级保护和部门属性,来改进基于角色的访问控制以实现用户和权限的分离、并采用管理员角色分权制衡、系统数据库的综合审计和对审计日志的分布式存储等技术手段,实现了应用层上的分级保护访问控制.这些方法充分体现了将系统访问控制环节的对象差异化,对重点对象进行重点防护和特殊对待的分级保护思想.该方法能够使目前涉密信息系统的安全性得到有效提升,充分保护其系统的安全.%Nowadays the access control in a security office automation (OA) system focus on three layers of the International Standards Organization (ISO) seven-layer architecture, namely the physical layer, the network layer and the application layer. Here new methods are adopted in a model where the system architecture is composed of Client/Server (C/S) and Browser/Server (B/S) , such as the improved role-based access control (RBAC) method with a correlation between the subjects and objects of the access course, the subdivision and restriction of administrator users, an integrated audit to database, as well as the distributed storage of the audit logs. Discriminating between the objects in the access control process in this way affords gradational security protection to national standards, and offers operational benefits.

  8. Office of Personnel Management (OPM) Earnings

    Data.gov (United States)

    Social Security Administration — Each year the Office of Personnel Management (OPM) sends SSA a file to be verified and matched against the Master Earnings File (MEF) and Employer Information File...

  9. Nevada National Security Site Environmental Report Summary 2016

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This document is a summary of the full 2016 Nevada National Security Site Environmental Report (NNSSER) prepared by the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/ NFO). This summary provides an abbreviated and more readable version of the full NNSSER. NNSA/NFO prepares the NNSSER to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the Nevada National Security Site (NNSS) to protect the public and the environment from radiation hazards and from potential nonradiological impacts. It is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. The NNSS is currently the nation’s unique site for ongoing national security–related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access as well as by lands that are open to public entry. In 2016, National Security Technologies, LLC (NSTec), was the NNSS Management and Operations Contractor accountable for ensuring work was performed in compliance with environmental regulations. NNSS activities in 2016 continued to be diverse, with the primary goal to ensure that the existing U.S. stockpile of nuclear weapons remains safe and reliable. Other activities included weapons of mass destruction first responder training; the controlled release of hazardous material at the Nonproliferation Test and Evaluation Complex (NPTEC); remediation of legacy contamination sites; characterization of waste destined for the Waste Isolation Pilot Plant in Carlsbad, New Mexico, or the Idaho National Laboratory in Idaho Falls, Idaho; disposal of low-level and mixed low-level radioactive waste; and environmental research. Facilities and

  10. 10 CFR 95.33 - Security education.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  11. Addendum to the Closure Report for Corrective Action Unit 113: Area 25 R-MAD Facility, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Restoration

    2011-02-24

    This addendum to the Closure Report for Corrective Action Unit 113: Area 25, Reactor Maintenance, Assembly, and Disassembly Facility, Building 3110, Nevada Test Site, Nevada, DOE/NV--891-VOL I-Rev. 1, dated July 2003, provides details of demolition, waste disposal, and use restriction (UR) modification for Corrective Action Unit 113, Area 25 R-MAD Facility. Demolition was completed on July 15, 2010, when the last of the building debris was disposed. Final field activities were concluded on August 30, 2010, after all equipment was demobilized and UR signs were posted. This work was funded by the American Recovery and Reinvestment Act.

  12. 76 FR 70470 - Extension of Agency Information Collection Activity Under OMB Review: Law Enforcement Officer...

    Science.gov (United States)

    2011-11-14

    ... OMB Review: Law Enforcement Officer Flying Armed Training AGENCY: Transportation Security..., state, and authorized railroad law enforcement agencies who have requested the Law Enforcement Officer... other forms of information technology. Information Collection Requirement Title: Law Enforcement Officer...

  13. Mail Office

    CERN Document Server

    2012-01-01

    Members of the personnel are kindly requested to empty their mail boxes. Any mail remaining in mail boxes will be collected and re-sorted by Mail Office staff on Wednesday 31st of October. Only specifically addressed mail will be re-delivered.

  14. Mail Office

    CERN Multimedia

    GS Department

    2009-01-01

    Members of the personnel are kindly requested to empty their mail boxes. Any mail remaining in mail boxes will be collected and resorted by Mail Office staff on Thursday 8 October 2009. Only specifically addressed mail will be re-delivered.

  15. Assessment on security system of radioactive sources used in hospitals of Thailand

    Energy Technology Data Exchange (ETDEWEB)

    Jitbanjong, Petchara, E-mail: petcharajit@gmail.com; Wongsawaeng, Doonyapong [Nuclear Engineering Department, Faculty of Engineering, Chulalongkorn University, 254 Phayathai Road, Pathumwan, Bangkok 10330 (Thailand)

    2016-01-22

    Unsecured radioactive sources have caused deaths and serious injuries in many parts of the world. In Thailand, there are 17 hospitals that use teletherapy with cobalt-60 radioactive sources. They need to be secured in order to prevent unauthorized removal, sabotage and terrorists from using such materials in a radiological weapon. The security system of radioactive sources in Thailand is regulated by the Office of Atoms for Peace in compliance with Global Threat Reduction Initiative (GTRI), U.S. DOE, which has started to be implemented since 2010. This study aims to perform an assessment on the security system of radioactive sources used in hospitals in Thailand and the results can be used as a recommended baseline data for development or improvement of hospitals on the security system of a radioactive source at a national regulatory level and policy level. Results from questionnaires reveal that in 11 out of 17 hospitals (64.70%), there were a few differences in conditions of hospitals using radioactive sources with installation of the security system and those without installation of the security system. Also, personals working with radioactive sources did not clearly understand the nuclear security law. Thus, government organizations should be encouraged to arrange trainings on nuclear security to increase the level of understanding. In the future, it is recommended that the responsible government organization issues a minimum requirement of nuclear security for every medical facility using radioactive sources.

  16. Lecture 1: General Security

    CERN Document Server

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  17. 19 CFR 19.47 - Security.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Security. 19.47 Section 19.47 Customs Duties U.S... WAREHOUSES, CONTAINER STATIONS AND CONTROL OF MERCHANDISE THEREIN Container Stations § 19.47 Security. The... § 19.46. A suitable working and office space for the use of Customs officers and employees...

  18. New Prototype Safeguards Technology Offers Improved Confidence and Automation for Uranium Enrichment Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Brim, Cornelia P.

    2013-04-01

    An important requirement for the international safeguards community is the ability to determine the enrichment level of uranium in gas centrifuge enrichment plants and nuclear fuel fabrication facilities. This is essential to ensure that countries with nuclear nonproliferation commitments, such as States Party to the Nuclear Nonproliferation Treaty, are adhering to their obligations. However, current technologies to verify the uranium enrichment level in gas centrifuge enrichment plants or nuclear fuel fabrication facilities are technically challenging and resource-intensive. NNSA’s Office of Nonproliferation and International Security (NIS) supports the development, testing, and evaluation of future systems that will strengthen and sustain U.S. safeguards and security capabilities—in this case, by automating the monitoring of uranium enrichment in the entire inventory of a fuel fabrication facility. One such system is HEVA—hybrid enrichment verification array. This prototype was developed to provide an automated, nondestructive assay verification technology for uranium hexafluoride (UF6) cylinders at enrichment plants.

  19. Back office to box office

    DEFF Research Database (Denmark)

    Haigh, Matthew

    Consider the representation of value in the organizations we rely on for our long retirements. Social security has been symbolized by private mechanisms such as the employment-related pension scheme, yet, reporting requirement would impute its fitness for financial trading. A scheme's financier...

  20. 10 CFR 95.17 - Processing facility clearance.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Processing facility clearance. 95.17 Section 95.17 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Physical Security § 95.17 Processing facility clearance....

  1. 10 CFR 95.23 - Termination of facility clearance.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Termination of facility clearance. 95.23 Section 95.23 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Physical Security § 95.23 Termination of facility clearance....

  2. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  3. Mail Office

    CERN Document Server

    GS Department

    2009-01-01

    The Mail Office wishes to remind users that the CERN mail service is exclusively reserved for official CERN mail. All external official mail must be sent to the Mail Office in an unstamped envelope on which your name and Department must be clearly indicated below the official CERN address (see example) to help us to find you in the event that it cannot be delivered. If you wish to send private mail from the CERN site you must use the post offices at Meyrin (63-R-011) or Prévessin (866-R-C02). Please use "PRIORITY" envelopes only in the case of urgent mail. Any mail containing merchandise (i.e. anything other than documents) must be sent using an EDH shipping request form. INTERNAL MAIL Please remember to include the recipient’s MAILBOX number on the internal mail envelopes, either in the relevant box (new envelopes) or next to the name (old envelopes). This information, which can be found in the CERN PHONEBOOK, simplifies our t...

  4. The Spanish system of Physical Security of the facilities, activities and radioactive nuclear fuels; El sistema Espanol de Seguridad Fisica de las instalaciones, actividades y materiales nucleares radiactivos

    Energy Technology Data Exchange (ETDEWEB)

    Gil, E.; Gutierrez, M.

    2008-07-01

    The use of nuclear and radioactive materials has, from the very beginning, been characterized by the implementation of significant safety measures that are developed in parallel to the technology itself. The two facets of nuclear safety technological and physical have evolved at the same time as the technological advances, and also in terms of the social environment and awareness. Thus, the TMI and Chernobyl accidents were an important incentive for the evolution of technological safety, and the new context of the need for overall safety is providing the impetus for the evolution of physical security around the world. In Spain this impetus has materialized in the design and implementation of a physical security system for nuclear and radioactive installations, activities and materials, and putting it into practice has required the joint efforts of the public authorities and the private sector. The system is developed on the basis of three main components: installation protection, crime prevention, and preparation of the response to emergency situations caused by criminals acts. It is complemented by a series of horizontal actions aimed at improving institutional coordination, international collaboration, training of the agents involved in its implementation, and updating of the applicable regulatory framework. (Author)

  5. Safeguards-by-Design: Early Integration of Physical Protection and Safeguardability into Design of Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    T. Bjornard; R. Bean; S. DeMuth; P. Durst; M. Ehinger; M. Golay; D. Hebditch; J. Hockert; J. Morgan

    2009-09-01

    The application of a Safeguards-by-Design (SBD) process for new nuclear facilities has the potential to minimize proliferation and security risks as the use of nuclear energy expands worldwide. This paper defines a generic SBD process and its incorporation from early design phases into existing design / construction processes and develops a framework that can guide its institutionalization. SBD could be a basis for a new international norm and standard process for nuclear facility design. This work is part of the U.S. DOE’s Next Generation Safeguards Initiative (NGSI), and is jointly sponsored by the Offices of Non-proliferation and Nuclear Energy.

  6. Field Survey of Cactus Crater Storage Facility (Runit Dome)

    Energy Technology Data Exchange (ETDEWEB)

    Douglas Miller, Terence Holland

    2008-10-31

    The US Department of Energy, Office of Health and Safety (DOE/HS-10), requested that National Security Technologies, LLC, Environmental Management directorate (NSTec/EM) perform a field survey of the Cactus Crater Storage Facility (Runit Dome), similar to past surveys conducted at their request. This field survey was conducted in conjunction with a Lawrence Livermore National Laboratory (LLNL) mission on Runit Island in the Enewetak Atoll in the Republic of the Marshall Islands (RMI). The survey was strictly a visual survey, backed up by digital photos and a written description of the current condition.

  7. Office of Aviation Safety Network Infrastructure -

    Data.gov (United States)

    Department of Transportation — The AVS LAN/WAN is physically and logically distributed across numerous AVS facilities throughout the United States such as Flight Standards District Offices (FSDO),...

  8. RCRA Permit for a Hazardous Waste Management Facility Permit Number NEV HW0101 Annual Summary/Waste Minimization Report Calendar Year 2012, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Arnold, P. M.

    2013-02-21

    This report summarizes the U.S. Environmental Protection Agency (EPA) identification number of each generator from which the Permittee received a waste stream, a description and quantity of each waste stream in tons and cubic feet received at the facility, the method of treatment, storage, and/or disposal for each waste stream, a description of the waste minimization efforts undertaken, a description of the changes in volume and toxicity of waste actually received, any unusual occurrences, and the results of tank integrity assessments. This Annual Summary/Waste Minimization Report is prepared in accordance with Section 2.13.3 of Permit Number NEV HW0101, issued 10/17/10.

  9. Presentation of the process External communications on the nuclear facilities operation of the Adjunct Head Office of Nuclear Safety of Comision Nacional de Seguridad Nuclear y Salvaguardias; Presentacion del proceso Comunicaciones externas sobre el funcionamiento de instalaciones nucleares de la Direccion General Adjunta de Seguridad Nuclear de la Comision Nacional de Seguridad Nuclear y Salvaguardias

    Energy Technology Data Exchange (ETDEWEB)

    Espinosa V, J. M., E-mail: jmespinosa@cnsns.gob.mx [Comision Nacional de Seguridad Nuclear y Salvaguardias, Dr. Barragan No. 779, Col. Narvarte, 03020 Mexico D. F. (Mexico)

    2012-10-15

    The Comision Nacional de Seguridad Nuclear y Salvaguardias (CNSNS) in use of their attributions granted by the Regulation Law of the constitutional Art. 27 in nuclear matter began the development of the called process External communications on the nuclear facilities operation, with the purpose of negotiating the evaluation of the concerns related with the safety of the nuclear facilities received these of external people to the CNSNS. The process External communications on the nuclear facilities operation will allow to the public's members and the workers that carry out activities inside the mark regulator imposed by the CNSNS that report to this Commission their concerns related with safety for several means (for example, directly to the personnel of the assigned Office, official and public statements, phone communication, electronic mail, etc.) The present article presents the legal mark confers the CNSNS the attributions to develop the mentioned process and exposes the most important elements that compose it. The term External communication on the nuclear facilities operation is defined and also is described how these communications are received, evaluated and closed by the assigned Office. Of equal way the objectives that intents to reach this process are indicated. The intention of the mentioned process is to strengthen the actions that the CNSNS carries out in the execution of its functions to maintain the safety standards in the operation of the nuclear facilities in Mexico. (Author)

  10. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  11. Information Assurance Security in the Information Environment

    CERN Document Server

    Blyth, Andrew

    2006-01-01

    Intended for IT managers and assets protection professionals, this work aims to bridge the gap between information security, information systems security and information warfare. It covers topics such as the role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; and, more.

  12. Making the Grade with School Security.

    Science.gov (United States)

    Fickes, Michael

    2000-01-01

    Shows how technology is helping school security directors prevent violence and protect students. One school's use of a state-of-the-art security system involving closed-circuit television, access control for doors, vehicles equipped with global positioning technology, and hand-held computers for security officers is discussed. (GR)

  13. 32 CFR 2400.45 - Information Security Program Review.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Program Review. 2400.45 Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science...

  14. 75 FR 17956 - Office of Juvenile Justice and Delinquency Prevention; Agency Information Collection Activities...

    Science.gov (United States)

    2010-04-08

    ... of Justice Programs Office of Juvenile Justice and Delinquency Prevention; Agency Information... collection under review; (Extension, without change, of a currently approved collection). Juvenile Residential Facility Census The Department of Justice (DOJ), Office of Justice Programs, Office of...

  15. Passport officers' errors in face matching.

    Directory of Open Access Journals (Sweden)

    David White

    Full Text Available Photo-ID is widely used in security settings, despite research showing that viewers find it very difficult to match unfamiliar faces. Here we test participants with specialist experience and training in the task: passport-issuing officers. First, we ask officers to compare photos to live ID-card bearers, and observe high error rates, including 14% false acceptance of 'fraudulent' photos. Second, we compare passport officers with a set of student participants, and find equally poor levels of accuracy in both groups. Finally, we observe that passport officers show no performance advantage over the general population on a standardised face-matching task. Across all tasks, we observe very large individual differences: while average performance of passport staff was poor, some officers performed very accurately--though this was not related to length of experience or training. We propose that improvements in security could be made by emphasising personnel selection.

  16. Environmental Protection Agency (EPA) Facilities

    Data.gov (United States)

    Department of Homeland Security — This SEGS layer shows the names, locations and biographical information of EPA facilities in the U.S. and its territories. Included in this layer are headquarters...

  17. Safeguards and Security progress report, January--December 1989

    Energy Technology Data Exchange (ETDEWEB)

    Smith, D.B.; Jaramillo, G.R. (comps.)

    1990-11-01

    From January to December 1989, the Los Alamos Safeguards and Security Research and Development (R D) program carried out the activities described in the first four parts of this report: Science and Technology Base Development, Basic Systems Design, Onsite Test and Evaluation and Facility Support, and International Safeguards. For the most part, these activities were sponsored by the Department of Energy's Office of Safeguards and Security. Part 1 covers development of the basic technology essential to continuing improvements in the practice of safeguards and security. It includes our computer security R D and the activities of the DOE Center for Computer Security, which provides the basis for encouraging and disseminating this important technology. Part 2 treats activities aimed at developing methods for designing and evaluating safeguards systems, with special emphasis on the integration of the several subsystems into a real safeguards system. Part 3 describes efforts of direct assistance to the DOE and its contractors and includes consultation on materials control and accounting problems, development and demonstration of specialized techniques and instruments, and comprehensive participation in the design and demonstration of advanced safeguards systems. Part 3 also reports a series of training courses in various aspects of safeguards that makes the technology more accessible to those who must apply it. Finally, Part 4 covers international safeguards activities, including both support to the International Atomic Energy Agency and bilateral exchanges. Part 5 reports several safeguards-related activities that have sponsors other than the DOE/OSS. 87 refs., 52 figs.

  18. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  19. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  20. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  1. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  2. LTE security

    CERN Document Server

    Forsberg, Dan; Moeller, Wolf-Dietrich

    2010-01-01

    Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em

  3. Final Deactivation Project report on the Alpha Powder Facility, Building 3028, at Oak Ridge National Laboratory, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-04-01

    This report documents the condition of the Alpha Powder Facility (APF), Building 3028, after completion of deactivation activities. Activities conducted to place the facility in a safe and environmentally sound condition for transfer to the U.S. Department of Energy (DOE) Office of Environmental Restoration (EM-40) program are outlined. A history and profile of the facility prior to commencing deactivation activities and a profile of the building after completion of deactivation activities are provided. Turnover items, such as the post-deactivation surveillance and maintenance (S&M) plan, remaining hazardous materials, radiological controls, safeguards and security, quality assurance, facility operations, and supporting documentation provided for in the DOE Nuclear Materials and Facility Stabilization Program (EM-60) turnover package are discussed.

  4. Intelligent OkiKoSenPBX1 Security Patrol Robot via Network and Map-Based Route Planning

    Directory of Open Access Journals (Sweden)

    Mbaïtiga Zacharie

    2009-01-01

    Full Text Available Problem statement: With an increased demand for security and limited numbers of trained security personnel, some security mangers have a lot of ground to police and limited staff to cover it. To compensate for shortages of security staff and to reduce the stress of security managers, we have developed an intelligent patrol robot system called "OkiKoSenPBX1". The system integrates a variety of sensors to gather environmental information and to detect abnormal events including intruders. Approach: In our approach, the route planning procedure was based on determining a sequence of intermediary goal points or coordinates x and y composing the robot trajectory. Results: A qualitative running experimental evaluation had been performed on the 1st floor of the Okinawa national college of technology as a preliminary practical implementation and its real-time performance was excellent, where a student like-guard can take control of the camera pan and tilt functions remotely. Conclusion: The real-time performance of the developed system that can leave security personnel hands-free for other important tasks is an irresistible system that can be put into practical use in a public offices facility, manufacturing facilities and various construction sites-everywhere there’s a need for advanced frontline security.

  5. 33 CFR 127.705 - Security systems.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security systems. 127.705 Section... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall... manned television monitoring system is used, to detect— (a) Unauthorized personnel; (b) Fires; and (c...

  6. Office of Child Care

    Science.gov (United States)

    ... for Children & Families Office of Child Care By Office Administration for Native Americans (ANA) Administration on Children, ... Care Partnerships. Review the profiles. > What is the Office of Child Care (OCC)? The Office of Child ...

  7. Office of Child Care

    Science.gov (United States)

    ... for Children & Families Office of Child Care By Office Administration for Native Americans (ANA) Administration on Children, ... Learn more about this project > What is the Office of Child Care (OCC)? The Office of Child ...

  8. Facilities: The Tech Edge.

    Science.gov (United States)

    Farmer, Lesley S. J.

    2002-01-01

    Examines the impact of technology on school library facilities and suggests some low-impact ways to optimize its use. Highlights include considering the role technology can play; educational goals; interior environmental factors; circulation desk needs; security; storage for hardware and software; handicapped accessibility; and future planning.…

  9. New Mandatory Computer Security Course

    CERN Multimedia

    CERN Bulletin

    2010-01-01

    Just like any other organization, CERN is permanently under attack - even right now. Consequently it's important to be vigilant about security risks, protecting CERN's reputation - and your work. The availability, integrity and confidentiality of CERN's computing services and the unhindered operation of its accelerators and experiments come down to the combined efforts of the CERN Security Team and you. In order to remain par with the attack trends, the Security Team regularly reminds CERN users about the computer security risks, and about the rules for using CERN’s computing facilities. Since 2007, newcomers have to follow a dedicated basic computer security course informing them about the “Do’s” and “Dont’s” when using CERNs computing facilities. This course has recently been redesigned. It is now mandatory for all CERN members (users and staff) owning a CERN computer account and must be followed once every three years. Members who...

  10. Reminder: Mandatory Computer Security Course

    CERN Multimedia

    IT Department

    2011-01-01

    Just like any other organization, CERN is permanently under attack – even right now. Consequently it's important to be vigilant about security risks, protecting CERN's reputation - and your work. The availability, integrity and confidentiality of CERN's computing services and the unhindered operation of its accelerators and experiments come down to the combined efforts of the CERN Security Team and you. In order to remain par with the attack trends, the Security Team regularly reminds CERN users about the computer security risks, and about the rules for using CERN’s computing facilities. Therefore, a new dedicated basic computer security course has been designed informing you about the “Do’s” and “Dont’s” when using CERN's computing facilities. This course is mandatory for all person owning a CERN computer account and must be followed once every three years. Users who have never done the course, or whose course needs to be renewe...

  11. How to Keep Your Health Information Private and Secure

    Science.gov (United States)

    ... health information technology and keeping your health information private and secure, visit our website at http: / / www. healthit. gov. For information and resources on HIPAA privacy and security issues, visit the Office for Civil Rights website ...

  12. 75 FR 26089 - Securities Held in TreasuryDirect

    Science.gov (United States)

    2010-05-11

    ..., online system for purchasing, holding, and conducting transactions in Treasury securities. This final... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE TREASURY... marketable Treasury security purchases, enhancing the process of scheduling reinvestments of...

  13. 8111/8116 Security Police Staff Officers 8121/8124 Security Police Officers AFSC: 81XX

    Science.gov (United States)

    1992-02-01

    4. 04 S -4C S. 4.4 .4.C At Oq- U o C u..444 a4 x 01 C C -0 - P1 .A.- !4 4q0 L A. aU LU I a4 a C0 A.XV a L 0 1 -U S.0.0 4 CL A40 0NC 4.a SC C a E43 C~ z...L - - R~ . ( *U # ACCa .4 % 40 a - 4- 1 4 4-L 0 *-46.40 50 a .40C CL 0 Ŕ 1 0. 0 OUUCC>CU.U0C4-LSa LC .CaC CW~ift-4C .4,4f L .4 -S(( a-..CA a COC *-. 4...Ni .C! o ~ a -N 4 Ř’,-4 .C.M-M4"-40.M.𔃾 M M -4 M4. .4 P1 M M4 .4.M4.󈧒 14 C L me a > 0. IL 0 c C. CD𔃺A1 a 4’L 0. C%-’ti "~nn =O~ 0N N? - 0W 0% 14

  14. Nuclear and radiological Security: Introduction.

    Energy Technology Data Exchange (ETDEWEB)

    Miller, James Christopher [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-02-24

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  15. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Science.gov (United States)

    2010-02-01

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match Number 1308 AGENCY: Social Security Administration...

  16. 77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-06-11

    ... RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY... made for the following committee meeting. To discuss National Industrial Security Program policy... must be submitted to the Information Security Oversight Office (ISOO) no later than Friday, July 6...

  17. 75 FR 4626 - Order Granting a Temporary Exemption From Certain Government Securities Act Provisions and...

    Science.gov (United States)

    2010-01-28

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE TREASURY... default swaps that reference government securities. Treasury is also soliciting public comment on this... Treasury regulates transactions in government securities \\1\\ by government securities brokers \\2\\...

  18. 75 FR 11627 - Order Granting Temporary Exemptions From Certain Government Securities Act Provisions and...

    Science.gov (United States)

    2010-03-11

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE TREASURY... Provisions of the Government Securities Act and Treasury's Government Securities Act Regulations in... customer CDS transactions that reference government securities. Treasury is also granting a...

  19. 75 FR 733 - Implementation of the Executive Order, ``Classified National Security Information''

    Science.gov (United States)

    2010-01-05

    ... December 29, 2009 Implementation of the Executive Order, ``Classified National Security Information... entitled, ``Classified National Security Information'' (the ``order''), which substantially advances my... Information Security Oversight Office (ISOO) a copy of the department or agency regulations implementing...

  20. 76 FR 60112 - Consent Based Social Security Number Verification (CBSV) Service

    Science.gov (United States)

    2011-09-28

    ... service, visit our Internet site, Social Security Online, at http://www.socialsecurity.gov . Gerard R... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Consent Based Social Security Number Verification (CBSV) Service AGENCY: Social...

  1. 78 FR 56266 - Consent Based Social Security Number Verification (CBSV) Service

    Science.gov (United States)

    2013-09-12

    ...-6401, , for more information about the CBSV service, visit our Internet site, Social Security Online... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Consent Based Social Security Number Verification (CBSV) Service AGENCY: Social...

  2. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Science.gov (United States)

    2010-07-01

    ... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically...

  3. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-10-17

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on November 14, 2012 from 10:00 a... number of individuals planning to attend must be submitted to the Information Security Oversight Office...

  4. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on July 17, 2013 from 10:00 a.m... number of individuals planning to attend must be submitted to the Information Security Oversight Office...

  5. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-10-25

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on November 14, 2013 from 10:00 a... number of individuals planning to attend must be submitted to the Information Security Oversight Office...

  6. 78 FR 69861 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency...

    Science.gov (United States)

    2013-11-21

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security, Federal Emergency...: Department of Homeland Security, Privacy Office. ACTION: Notice of Privacy Act System of Records. SUMMARY: In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes to update and reissue...

  7. 48 CFR 833.212 - Contracting officer's duties upon appeal.

    Science.gov (United States)

    2010-10-01

    ... AFFAIRS GENERAL CONTRACTING REQUIREMENTS PROTESTS, DISPUTES, AND APPEALS Disputes and Appeals 833.212... construction contracts administered by the Office of Construction and Facilities Management, copies of the... sent to the Director, Office of Construction and Facilities Management.) (b) Within 20 days of receipt...

  8. 6 CFR 27.204 - Minimum concentration by security issue.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Minimum concentration by security issue. 27.204... FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by... is present in a mixture, and the concentration of the chemical is equal to or greater than one...

  9. Lecture 3: Web Application Security

    CERN Document Server

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture focuses on security aspects of Web application development. Various vulnerabilities typical to web applications (such as Cross-site scripting, SQL injection, cross-site request forgery etc.) are introduced and discussed. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support servic...

  10. 75 FR 18872 - Ginnie Mae Multiclass Securities Program Documents

    Science.gov (United States)

    2010-04-13

    ... below has been submitted to the Office of Management and Budget (OMB) for review, as required by the... Multiclass Securities program is to increase liquidity in the secondary mortgage market and to attract new... Desk Officer, Office of Management and Budget, New Executive Office Building, Washington, DC 20503; fax...

  11. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... Security Management System of Records AGENCY: Privacy Office; DHS. ACTION: Notice of Privacy Act system of... to update and reissue Department of Homeland Security/ALL--023 Personnel Security Management System... routine uses of this system have been reviewed and updated to reflect the personnel security...

  12. CHANGE OF CONTRACTOR FOR THE FACILITIES MANAGEMENT ACTIVITIES AT CERN

    CERN Multimedia

    2003-01-01

    The Facilities Management contract at CERN, under the responsibility of ST Division, Group FM, is in charge of the maintenance and minor works on tertiary installations (i.e. all structures and installations that have no direct relation to the running of the accelerators) for the following trades: - Technical: heating, ventilation, air conditioning, plumbing, electricity, civil engineering (painting, roofing, glazing, blinds, fencing, masonry etc.), cleansing, passenger and goods lifts, automatic and powered doors, kitchen equipment, roads, signs, keys and locks, office furniture, - Services: waste collection, security, green areas, cleaning and sanitary supplies, disinfection, rodent control and insect control. Starting from the 1st June the present contractor will stop some activities that will be taken under its responsibility by the new one, INGEST Facility. Others activities will be moved on the 1st July. Minor perturbation in the service might occur. The contact number will not change and will be opera...

  13. CHANGE OF CONTRACTOR FOR THE FACILITIES MANAGEMENT ACTIVITIES AT CERN

    CERN Multimedia

    2003-01-01

    The Facilities Management contract at CERN, under the responsibility of ST Division, Group FM, is in charge of the maintenance and minor works on tertiary installations (i.e. all structures and installations that have no direct relation to the running of the accelerators) for the following trades: - Technical: heating, ventilation, air conditioning, plumbing, electricity, civil engineering (painting, roofing, glazing, blinds, fencing, masonry etc.), cleansing, passenger and goods lifts, automatic and powered doors, kitchen equipment, roads, signs, keys and locks, office furniture, - Services: waste collection, security, green areas, cleaning and sanitary supplies, disinfection, rodent control and insect control. Starting from the 1st June the present contractor will stop some activities that will be taken under its responsibility by the new one, INGEST Facility. The remaining activities (including cleaning) will be moved on the 1st July. Minor perturbation in the service might occur. The contact number will ...

  14. US statutes for enforcement by security inspectors

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.

  15. Node security

    CERN Document Server

    Barnes, Dominic

    2013-01-01

    A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

  16. Being Secure

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    As the world wrestles with challenges from nontraditional security threats, a new concept of security management is emerging Security has traditionally been seen as the means of defending a territory, primarily through the use of military power. However, as the world evolves through the process of globalization, so too does the concept of security. It now incorporates military, political, economic, societal and environmental issues, as well as the many links that bind them. Yet for most people in the wor...

  17. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  18. End of support for Windows 2000, Office 2000 and Office XP at CERN

    CERN Document Server

    2006-01-01

    With the approval of the Desktop forum, support for Windows 2000, Office 2000 and Office XP at CERN will cease at the end of December this year. As a consequence, security patches will no longer be provided for Windows 2000 / Office 2000 / Office XP, and central services to reinstall Windows 2000 / Office 2000 / Office XP will not be available. After this date, only Windows XP and Office 2003 will be supported. Users still running Windows 2000 will be notified by e-mail and are recommended to install Windows XP / Office 2003 (as described at http://cern.ch/Win/Help/?kbid=100001). Users of Office XP will be automatically upgraded to Office 2003 as of January 2007. In the meantime, they can proactively upgrade to Office 2003 by removing 'MS Office XP' and selecting the 'MS Office 2003 SP2' package on CMF's 'Add/Remove CMF Packages' web page. Users who absolutely need to keep Windows 2000 or other obsolete software will need to maintain their systems themselves. For help during the migration, please contac...

  19. Port security in the Persian Gulf

    OpenAIRE

    Munson, Mark B.

    2008-01-01

    The United States and the international community have implemented numerous measures since 2001 designed to improve the security of maritime commerce. Special attention has been paid to the vulnerability of port facilities to exploitation by terrorists or other illicit actors. While the implementation of enhanced port security measures in Saudi Arabia, UAE, and Iraq may have improved some aspects of maritime security, significant vulnerabilities remain. While strong physical security at ...

  20. Facility Decontamination and Decommissioning Program Surveillance and Maintenance Plan, Revision 2

    Energy Technology Data Exchange (ETDEWEB)

    Poderis, Reed J. [NSTec; King, Rebecca A. [NSTec

    2013-09-30

    This Surveillance and Maintenance (S&M) Plan describes the activities performed between deactivation and final decommissioning of the following facilities located on the Nevada National Security Site, as documented in the Federal Facility Agreement and Consent Order under the Industrial Sites program as decontamination and decommissioning sites: ? Engine Maintenance, Assembly, and Disassembly (EMAD) Facility: o EMAD Building (Building 25-3900) o Locomotive Storage Shed (Building 25-3901) ? Test Cell C (TCC) Facility: o Equipment Building (Building 25-3220) o Motor Drive Building (Building 25-3230) o Pump Shop (Building 25-3231) o Cryogenic Lab (Building 25-3232) o Ancillary Structures (e.g., dewars, water tower, piping, tanks) These facilities have been declared excess and are in various stages of deactivation (low-risk, long-term stewardship disposition state). This S&M Plan establishes and implements a solid, cost-effective, and balanced S&M program consistent with federal, state, and regulatory requirements. A graded approach is used to plan and conduct S&M activities. The goal is to maintain the facilities in a safe condition in a cost-effective manner until their final end state is achieved. This plan accomplishes the following: ? Establishes S&M objectives and framework ? Identifies programmatic guidance for S&M activities to be conducted by National Security Technologies, LLC, for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) ? Provides present facility condition information and identifies hazards ? Identifies facility-specific S&M activities to be performed and their frequency ? Identifies regulatory drivers, NNSA/NFO policies and procedures, and best management practices that necessitate implementation of S&M activities ? Provides criteria and frequencies for revisions and updates ? Establishes the process for identifying and dispositioning a condition that has not been previously identified or

  1. The Impact of Leadership Styles and Knowledge Sharing on Police Officers' Willingness to Exert Extra Effort to Provide Better Security: A Study in the Riot Unit of the Turkish National Police

    Science.gov (United States)

    Tombul, Fatih

    2011-01-01

    The motivation for this study is to understand the factors affecting police officers' willingness to exert extra effort for providing better service through knowledge sharing in different working environments such as riots. Since managers' leadership styles may be important factors affecting subordinates' willingness to exert extra effort, this…

  2. The Impact of Leadership Styles and Knowledge Sharing on Police Officers' Willingness to Exert Extra Effort to Provide Better Security: A Study in the Riot Unit of the Turkish National Police

    Science.gov (United States)

    Tombul, Fatih

    2011-01-01

    The motivation for this study is to understand the factors affecting police officers' willingness to exert extra effort for providing better service through knowledge sharing in different working environments such as riots. Since managers' leadership styles may be important factors affecting subordinates' willingness to exert extra…

  3. Nevada National Security Site Environmental Report 2011 Summary

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed

    2012-09-12

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  4. Assisted Living Facilities, Prince George's County Health Department Licensed Nursing Homes, Published in 2009, 1:2400 (1in=200ft) scale, Prince George's County Office of Information Technology and Communications.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Assisted Living Facilities dataset, published at 1:2400 (1in=200ft) scale, was produced all or in part from Published Reports/Deeds information as of 2009. It...

  5. Facilities & Leadership

    Data.gov (United States)

    Department of Veterans Affairs — The facilities web service provides VA facility information. The VA facilities locator is a feature that is available across the enterprise, on any webpage, for the...

  6. 75 FR 11000 - Security Zone; Freeport LNG Basin, Freeport, TX

    Science.gov (United States)

    2010-03-10

    ... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA87 Security Zone; Freeport LNG Basin, Freeport, TX AGENCY... in the Freeport LNG Basin. This security zone is needed to protect vessels, waterfront facilities... notice of proposed rulemaking (NPRM) entitled Security Zone; Freeport LNG Basin, Freeport, TX in...

  7. 10 CFR 95.53 - Termination of facility clearance.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Termination of facility clearance. 95.53 Section 95.53 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.53 Termination of facility...

  8. Biochemistry Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Biochemistry Facility provides expert services and consultation in biochemical enzyme assays and protein purification. The facility currently features 1) Liquid...

  9. Underground Test Area (UGTA) Closure Report for Corrective Action Unit 98: Frenchman Flat Nevada National Security Site, Nevada, Revision 1 ROTC-1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2016-08-01

    This Closure Report (CR) has been prepared for Corrective Action Unit (CAU) 98, Frenchman Flat, Nevada National Security Site (NNSS), Nevada. The Frenchman Flat CAU was the site of 10 underground nuclear tests, some of which have impacted groundwater near the tests. This work was performed as part of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity in accordance with the Federal Facility Agreement and Consent Order (FFACO). This CR describes the selected corrective action to be implemented during closure to protect human health and the environment from the impacted groundwater

  10. 1st Quarter Transportation Report FY2017: Waste Shipments To and From the Nevada National Security Site (NNSS), Radioactive Waste Management Complex

    Energy Technology Data Exchange (ETDEWEB)

    Gregory, Louis [National Security Technologies, LLC. (NSTec), Las Vegas, NV (United States)

    2017-01-31

    This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of waste shipments to the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. This report summarizes the 1st quarter of fiscal year (FY) 2017 low-level radioactive waste (LLW), mixed low-level radioactive waste (MLLW) and classified non-radioactive (CNR) shipments. There were no shipments sent for offsite treatment from a NNSS facility and returned to the NNSS this quarter of FY2017.

  11. 75 FR 70924 - Office of the National Coordinator for Health Information Technology; HIT Policy Committee's...

    Science.gov (United States)

    2010-11-19

    ... Policy Committee's Workgroups: Meaningful Use, Privacy & Security Tiger Team, Enrollment, Governance..., privacy and security, enrollment, governance, or adoption/ certification. If background materials are... HUMAN SERVICES Office of the National Coordinator for Health Information Technology; HIT...

  12. 75 FR 65485 - Office of the National Coordinator for Health Information Technology; HIT Policy Committee's...

    Science.gov (United States)

    2010-10-25

    ... Policy Committee's Workgroups: Meaningful Use, Privacy & Security Tiger Team, Enrollment, Governance... exchange, privacy and security, enrollment, governance, or adoption/ certification. If background materials... HUMAN SERVICES Office of the National Coordinator for Health Information Technology; HIT...

  13. 76 FR 9782 - Office of the National Coordinator for Health Information Technology; HIT Policy Committee's...

    Science.gov (United States)

    2011-02-22

    ...., meaningful use, information exchange, privacy and security, enrollment, governance, or adoption... Policy Committee's Workgroups: Meaningful Use, Privacy & Security Tiger Team, Enrollment, Governance... HUMAN SERVICES Office of the National Coordinator for Health Information Technology; HIT...

  14. 6 CFR 17.410 - Comparable facilities.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Comparable facilities. 17.410 Section 17.410... the Basis of Sex in Education Programs or Activities Prohibited § 17.410 Comparable facilities. A recipient may provide separate toilet, locker room, and shower facilities on the basis of sex, but such...

  15. 77 FR 74685 - Chemical Facility Anti-Terrorism Standards (CFATS) Chemical-Terrorism Vulnerability Information...

    Science.gov (United States)

    2012-12-17

    ... SECURITY Chemical Facility Anti-Terrorism Standards (CFATS) Chemical- Terrorism Vulnerability Information... financial information, Chemical-terrorism Vulnerability Information (CVI), Sensitive Security Information... represents a national-level effort to minimize terrorism risk to such facilities. Its design and...

  16. 77 FR 68795 - Protected Critical Infrastructure Information (PCII) Office Self-Assessment Questionnaire

    Science.gov (United States)

    2012-11-16

    ... SECURITY Protected Critical Infrastructure Information (PCII) Office Self- Assessment Questionnaire AGENCY... Information (PCII) Office Self-Assessment Questionnaire. OMB Number: 1670-NEW. Frequency: Annually. Affected... rules and requirements, and the specific needs of their accredited programs. These assessments...

  17. 4 CFR 81.8 - Public reading facility.

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Public reading facility. 81.8 Section 81.8 Accounts GOVERNMENT ACCOUNTABILITY OFFICE RECORDS PUBLIC AVAILABILITY OF GOVERNMENT ACCOUNTABILITY OFFICE RECORDS § 81.8 Public reading facility. GAO maintains a public reading facility in the Law Library at...

  18. 45 CFR 63.37 - Leasing facilities.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Leasing facilities. 63.37 Section 63.37 Public... OFFICE OF THE ASSISTANT SECRETARY FOR PLANNING AND EVALUATION Special Provisions § 63.37 Leasing facilities. In the case of a project involving the leasing of a facility, the grantee shall demonstrate...

  19. Security-by-design handbook.

    Energy Technology Data Exchange (ETDEWEB)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  20. Perception Study on Workspace for Government Office in Malaysia

    OpenAIRE

    2014-01-01

    Nowadays, office workspaces consist of four (4) different generations; Veterans, Boomers, X-ers and Millenial, which different generation have different preferences. It is essential as Facilities Management Manager to understand the effects of the workspace design satisfactions on the generational of office employee and to improve the office working spaces. This research is focused only for government offices building in Selangor which consisted of ten (10) departments. This study aims to inv...

  1. Basic Science for a Secure Energy Future

    Science.gov (United States)

    Horton, Linda

    2010-03-01

    Anticipating a doubling in the world's energy use by the year 2050 coupled with an increasing focus on clean energy technologies, there is a national imperative for new energy technologies and improved energy efficiency. The Department of Energy's Office of Basic Energy Sciences (BES) supports fundamental research that provides the foundations for new energy technologies and supports DOE missions in energy, environment, and national security. The research crosses the full spectrum of materials and chemical sciences, as well as aspects of biosciences and geosciences, with a focus on understanding, predicting, and ultimately controlling matter and energy at electronic, atomic, and molecular levels. In addition, BES is the home for national user facilities for x-ray, neutron, nanoscale sciences, and electron beam characterization that serve over 10,000 users annually. To provide a strategic focus for these programs, BES has held a series of ``Basic Research Needs'' workshops on a number of energy topics over the past 6 years. These workshops have defined a number of research priorities in areas related to renewable, fossil, and nuclear energy -- as well as cross-cutting scientific grand challenges. These directions have helped to define the research for the recently established Energy Frontier Research Centers (EFRCs) and are foundational for the newly announced Energy Innovation Hubs. This overview will review the current BES research portfolio, including the EFRCs and user facilities, will highlight past research that has had an impact on energy technologies, and will discuss future directions as defined through the BES workshops and research opportunities.

  2. Nevada National Security Site Environmental Report 2010

    Energy Technology Data Exchange (ETDEWEB)

    C. Wills, ed.

    2011-09-13

    This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2010 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  3. 78 FR 12083 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-02-21

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting an..., Office of Information Management, telephone 202-475-3532, or fax 202-475-3929, for questions on...

  4. 78 FR 5192 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-01-24

    ... SECURITY Coast Guard Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting an... FURTHER INFORMATION CONTACT: Ms. Kenlinishia Tyler, Office of Information Management, telephone...

  5. 78 FR 54666 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-09-05

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting... 20593-7710. FOR FURTHER INFORMATION CONTACT: Mr. Anthony Smith, Office of Information...

  6. 76 FR 61369 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-10-04

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting... INFORMATION CONTACT: Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or...

  7. 78 FR 23573 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-04-19

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting an... CONTACT: Mr. Anthony Smith, Office of Information Management, telephone 202-475-3532, or fax...

  8. 76 FR 35228 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-06-16

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting... INFORMATION CONTACT: Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or...

  9. 78 FR 26798 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-05-08

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting an... FURTHER INFORMATION CONTACT: Mr. Anthony Smith, Office of Information Management, telephone...

  10. 76 FR 52338 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-08-22

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting.... Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475-3929,...

  11. 77 FR 27472 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-05-10

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting an... FURTHER INFORMATION CONTACT: Contact Ms. Kenlinishia Tyler, Office of Information Management,...

  12. 78 FR 19504 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-04-01

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting an... FURTHER INFORMATION CONTACT: Anthony Smith, Office of Information ] Management, telephone 202-475-3532,...

  13. 78 FR 74155 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-12-10

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting...: Contact Mr. Anthony Smith, Office of Information Management, telephone 202-475-3532, or fax...

  14. 76 FR 46827 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-08-03

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting.... Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475-3929,...

  15. 78 FR 19503 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-04-01

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting..., WASHINGTON DC 20593-7101. FOR FURTHER INFORMATION: Contact Anthony Smith, Office of Information...

  16. 77 FR 74686 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-12-17

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting an... FURTHER INFORMATION CONTACT: Ms. Kenlinishia Tyler, Office of Information Management, telephone...

  17. Hearing Office Dispositions Per ALJ Per Day Rate Ranking Report

    Data.gov (United States)

    Social Security Administration — A ranking of ODAR hearing offices by the average number of hearings dispositions per ALJ per day. The average shown will be a combined average for all ALJs working...

  18. Hearing Office Average Processing Time Ranking Report, February 2016

    Data.gov (United States)

    Social Security Administration — A ranking of ODAR hearing offices by the average number of hearings dispositions per ALJ per day. The average shown will be a combined average for all ALJs working...

  19. Facility effluent monitoring plan for the 327 Facility

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1994-11-01

    The 327 Facility [Post-Irradiation Testing Laboratory] provides office and laboratory space for Pacific Northwest Laboratory (PNL) scientific and engineering staff conducting multidisciplinary research in the areas of post-irradiated fuels and structural materials. The facility is designed to accommodate the use of radioactive and hazardous materials in the conduct of these activities. This report summarizes the airborne emissions and liquid effluents and the results of the Facility Effluent Monitoring Plan (FEMP) determination for the facility. The complete monitoring plan includes characterization of effluent streams, monitoring/sampling design criteria, a description of the monitoring systems and sample analysis, and quality assurance requirements.

  20. Mid-course Corrections: The Army Reserve’s Campaign to Mitigate Its Officer Vacancies during the Global War on Terror

    Science.gov (United States)

    2012-05-17

    Intelligence: Counter-Terrorism / Counter- Intelligence Cyber Security Engagement Theater Security Cooperation Allied Exercises Security...Sayce, and Sasha Rogers. "Junior Military Officer Retention: Challenges & Opportunities." Policy analysis exercise , Harvard University, 2011. Feidler...November 2011). McKenzie , Major Thurman C.C. “The Defense Officer Personnel Management Act – the Army’s Challenge to Contemporary Officer Management

  1. Leveraging Safety Programs to Improve and Support Security Programs

    Energy Technology Data Exchange (ETDEWEB)

    Leach, Janice [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Snell, Mark K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pratt, R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sandoval, S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-10-01

    There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.

  2. Library security better communication, safer facilities

    CERN Document Server

    Albrecht, Steve

    2015-01-01

    Through the methods outlined in this book, Albrecht demonstrates that effective communication not only makes library users feel more comfortable but also increases staff morale, ensuring the library is place where everyone feels welcome.

  3. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  4. Security Engineering

    Science.gov (United States)

    2012-01-31

    attacks cannot be completely addressed by traditional perimeter security solutions [ Wulf and Jones, 2009], as they have been in the past. A new...the mainstay of the current cyber security solution space [ Wulf and Jones, 2009]. This has enabled the system engineering and security communities...Number: H98230-08-D-0171 DO 002 TO 002 RT 028 Report No. SERC-2012-TR-028 January 31, 2012 UNCLASSIFIED 37 W. A. Wulf and A. K. Jones, Reflections on cyber security, Science Magazine, vol. 326, 2009, pp. 943-944.

  5. 75 FR 2880 - Homeland Security Advisory Council

    Science.gov (United States)

    2010-01-19

    ... SECURITY Homeland Security Advisory Council AGENCY: The Office of Policy, DHS. ACTION: Committee management... providing strategic, timely and actionable advice. ] The HSAC will meet publicly to swear in new Council members, receive observations and remarks from DHS senior leadership, and review and...

  6. 76 FR 46603 - Security Ratings

    Science.gov (United States)

    2011-08-03

    ... forms without regard to the size of their public float or the rating of debt securities being offered...: Blair Petrillo, Special Counsel in the Office of Rulemaking, Division of Corporation Finance, at (202... Nationally Recognized Statistical Rating Organizations, Release No. 33-9069 (Oct. 5, 2009) . Public...

  7. Burnout among Prison Caseworkers and Corrections Officers

    Science.gov (United States)

    Carlson, Joseph R.; Thomas, George

    2006-01-01

    The purpose of this paper is to compare burnout between prison caseworkers and correctional officers and examine reasons for the high turnover of caseworkers. The study was conducted through surveys at a maximum/medium men's prison and at an all security level women's prison in the Midwest. By using the Maslach Burnout Inventory, it was found that…

  8. 12 CFR 21.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... identifying persons committing crimes against the institution and that will preserve evidence that may aid in... hours of darkness, the area around the vault, if the vault is visible from outside the banking office... security officer determines to be appropriate, taking into consideration: (i) The incidence of...

  9. Martime Security: Ferry Security Measures Have Been Implemented, but Evaluating Existing Studies Could Further Enhance Security

    Science.gov (United States)

    2010-12-01

    vessels—vessels capable of carrying 500 or more passengers. The first report focused on cruise ship and cruise ship facility security and was issued in...April 2010.4 The report found that while governmental agencies, cruise ship operators, and other maritime security stakeholders have taken...border security—should consider obtaining additional information about cruise ship passengers to enhance its screening process. This report focuses

  10. Site maps and facilities listings

    Energy Technology Data Exchange (ETDEWEB)

    1993-11-01

    In September 1989, a Memorandum of Agreement among DOE offices regarding the environmental management of DOE facilities was signed by appropriate Assistant Secretaries and Directors. This Memorandum of Agreement established the criteria for EM line responsibility. It stated that EM would be responsible for all DOE facilities, operations, or sites (1) that have been assigned to DOE for environmental restoration and serve or will serve no future production need; (2) that are used for the storage, treatment, or disposal of hazardous, radioactive, and mixed hazardous waste materials that have been properly characterized, packaged, and labelled, but are not used for production; (3) that have been formally transferred to EM by another DOE office for the purpose of environmental restoration and the eventual return to service as a DOE production facility; or (4) that are used exclusively for long-term storage of DOE waste material and are not actively used for production, with the exception of facilities, operations, or sites under the direction of the DOE Office of Civilian Radioactive Waste Management. As part of the implementation of the Memorandum of Agreement, Field Offices within DOE submitted their listings of facilities, systems, operation, and sites for which EM would have line responsibility. It is intended that EM facility listings will be revised on a yearly basis so that managers at all levels will have a valid reference for the planning, programming, budgeting and execution of EM activities.

  11. Recommendations and Justifications To Remove Use Restrictions Established under the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office Federal Facility Agreement and Consent Order, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Birney, Cathleen; Krauss, Mark J

    2013-09-01

    This document is part of an effort to reevaluate 37 FFACO and Administrative URs against the current Soils Risk-Based Corrective Action Evaluation Process. After reviewing 37 existing FFACO and Administrative URs, 3 URs addressed in this document have sufficient information to determine that these current URs may be removed, based on the RBCA criteria. This document presents recommendations on modifications to existing URs that will be consistent with the RBCA criteria.

  12. Recommendations and Justifications for Modifications for Use Restrictions Established under the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office Federal Facility Agreement and Consent Order, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Lynn Kidman

    2008-02-01

    This document is part of an effort to re-evaluate all FFACO URs against the current RBCA criteria (referred to in this document as the Industrial Sites [IS] RBCA process) as defined in the Industrial Sites Project Establishment of Final Action Levels (NNSA/NSO, 2006c). Based on this evaluation, the URs were sorted into the following categories: 1. Where sufficient information exists to determine that the current UR is consistent with the RCBA criteria 2. Where sufficient information exists to determine that the current UR may be removed or downgraded based on RCBA criteria. 3. Where sufficient information does not exist to evaluate the current UR against the RCBA criteria. After reviewing all the existing FFACO URs, the 49 URs addressed in this document have sufficient information to determine that these current URs may be removed or downgraded based on RCBA criteria. This document presents recommendations on modifications to existing URs that will be consistent with the RCBA criteria.

  13. Recommendations and Justifications for Modifications To Downgrade Use Restrictions Established under the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office Federal Facility Agreement and Consent Order, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Birney, Cathleen; Krauss, Mark J

    2013-10-01

    This document is part of an effort to reevaluate 37 FFACO and Administrative URs against the current Soils Risk-Based Corrective Action Evaluation Process. After reviewing 37 existing FFACO and Administrative URs, 11 URs addressed in this document have sufficient information to determine that these current URs may be downgraded to Administrative URs based on the RBCA criteria. This document presents recommendations on modifications to existing URs that will be consistent with the RBCA criteria.

  14. ADP security plan, 320 Building, Room 110

    Energy Technology Data Exchange (ETDEWEB)

    Brauer, F.P.

    1985-08-27

    The enclosed document is a draft ADP Security Plan. This plan follows outline provided by DOE Order 5636.2. The outline is in the following format: (1) name of computing system security offices and ADP systems; (2) purpose and operational characteristics; (3) configuration and descriptions of ADP equipment; (4) percentage and level of classified work; (5) description of communication networks; (6) statement of threat; (7) security procedures; (8) contingency plans; and (9) NACSI 5004 evaluation.

  15. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  16. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  17. Office 365 For Dummies

    CERN Document Server

    Withee, Ken

    2012-01-01

    The information you need to create a virtual office that can be accessed anywhere Microsoft Office 365 is a revolutionary technology that allows individuals and companies of all sizes to create and maintain a virtual office in the cloud. Featuring familiar Office Professional applications, web apps, Exchange Online, and Lync Online, Office 365 offers business professionals added flexibility and an easy way to work on the go. This friendly guide explains the cloud, how Office 365 takes advantage of it, how to use the various components, and the many possibilities offered by Office 365. It provi

  18. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  19. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  20. Medical network security and viruses.

    Science.gov (United States)

    Fernandez Del Val, C

    1991-01-01

    Medical network as connecting Hospital Information Systems are needed in order to exchange, compare and make accessible data. The use of OSI standard communication protocols (open-network environment) will allow to interconnect multiple vendor systems and to accommodate a wide range of underlaying of communication technologies. The security of information on a given host may become dependent of the security measures employed by the network and by other hosts. Computer viruses modifies the executable code and thrive in network environment filled with personal computers and third-party software. Most networks and computers, permit users to share files; this, let the viruses to bypass the security mechanisms of almost every commercial operating system. However, computer viruses axes not the only threat to the information in a network environment. Other as deliberate (passive attacks -wire-tapping-) and accidental threat (unauthorized access to the information) are potential risks to the security information. Cryptographic techniques that now are widely used can resolve the external security problems of the network and improve the internal security ones. This paper begins describing the threats to security that arise in an open-network environment, and goes to establish the security requirements of medical communication networks. This is followed by a description of security services as: confidentiality, integrity, authentication, access control, etc., that will be provided to include security mechanisms in such network. The integration of these security mechanisms into the communication protocols allows to implement secure communication systems that not only must provide the adequate security, but also must minimize the impact of security on other features as for example the efficiency. The remainder of the paper describes how the security mechanisms are formed using current cryptographic facilities as algorithms, one-way functions, cryptographic systems (symmetric

  1. 17 CFR 200.14 - Office of Administrative Law Judges.

    Science.gov (United States)

    2010-04-01

    ... Organization § 200.14 Office of Administrative Law Judges. (a) Under the Administrative Procedure Act (5 U.S.C. 551-559) and the federal securities laws, the Office of Administrative Law Judges conducts hearings in proceedings instituted by the Commission. The Administrative Law Judges are responsible for the fair...

  2. 19 CFR 12.62 - Enforcement; duties of Customs officers.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Enforcement; duties of Customs officers. 12.62 Section 12.62 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...; duties of Customs officers. (a) In accordance with the authority contained in sections 10 and 12 of...

  3. 19 CFR 101.2 - Authority of Customs officers.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Authority of Customs officers. 101.2 Section 101.2 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY GENERAL PROVISIONS § 101.2 Authority of Customs officers. (a) Supremacy of delegated...

  4. Secure Objectives for School Security

    Science.gov (United States)

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  5. 76 FR 61360 - Notice of Intent To Prepare an Environmental Impact Statement for the Foreign Affairs Security...

    Science.gov (United States)

    2011-10-04

    ... administrative offices, dormitories, a dining hall, and emergency response facilities. During the initial...: September 22, 2011. Leonard Purzycki, Director, Facilities Management & Services Programs, U.S. GSA, Mid...

  6. National Ignition Facility project acquisition plan revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Clobes, A.R.

    1996-10-01

    The purpose of this National Ignition Facility Acquisition Plan is to describe the overall procurement strategy planned for the National Ignition Facility M Project. It was prepared for the NIP Prood Office by the NIF Procurement Manager.

  7. Environmental Protection Agency (EPA) Facility Registry Service (FRS) Emergency Response (ER) Risk Management Plan (RMP) Facilities - Oil and Hazardous Materials

    Data.gov (United States)

    Department of Homeland Security — The purpose of this web feature service is to provide users with access to integrated facility information from FRS, limited to the subset of facilities that link to...

  8. Environmental Protection Agency (EPA) Facility Registry Service (FRS) Emergency Response (ER) Toxic Release Inventory (TRI) Facilities - Oil and Hazardous Materials

    Data.gov (United States)

    Department of Homeland Security — The purpose of this web feature service is to provide users with access to integrated facility information from FRS, limited to the subset of facilities that link to...

  9. Working together: public law enforcement and private security.

    Science.gov (United States)

    Jones, Harold T

    2010-01-01

    Private security forces, including hospital security professionals, provide a vast largely untapped resource for public law enforcement in a number of critical areas affecting society, the author points out. At the same time, police agencies in some communities have programs which can be used to provide additional training for private security officers.

  10. 32 CFR 2700.51 - Information Security Oversight Committee.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Oversight Committee. 2700.51 Section 2700.51 National Defense Other Regulations Relating to National Defense OFFICE FOR MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Implementation and Review § 2700.51 Information Security Oversight Committee. The...

  11. 15 CFR 2008.16 - Security education program.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16... REPRESENTATIVE Safeguards § 2008.16 Security education program. (a) The Office of the Special Representative for... charged with the implementation of this security education program and shall issue detailed procedures for...

  12. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  13. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  14. Wireless Security

    CERN Document Server

    Osterhage, Wolfgang

    2011-01-01

    In the wake of the growing use of wireless communications, new types of security risks have evolved. Wireless Security covers the major topic of wireless communications with relevance both to organizations and private users. The technological background of these applications and protocols is laid out and presented in detail. Special emphasis is placed on the IEEE 802.11x-Standards that have been introduced for WLAN technology. Other technologies covered besides WLAN include: mobile phones, bluetooth and infrared. In each chapter a major part is devoted to security risks and provisions includin

  15. Fabrication Facilities

    Data.gov (United States)

    Federal Laboratory Consortium — The Fabrication Facilities are a direct result of years of testing support. Through years of experience, the three fabrication facilities (Fort Hood, Fort Lewis, and...

  16. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-02-08

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on March 20, 2013 from 10:00 a.m...

  17. 40 CFR 246.200-2 - Recommended procedures: High-grade paper recovery from smaller offices.

    Science.gov (United States)

    2010-07-01

    ... offices. The recovery of high-grade paper generated by office facilities of less than 100 office workers... paper recovery from smaller offices. 246.200-2 Section 246.200-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES SOURCE SEPARATION FOR MATERIALS RECOVERY GUIDELINES...

  18. Facility Microgrids

    Energy Technology Data Exchange (ETDEWEB)

    Ye, Z.; Walling, R.; Miller, N.; Du, P.; Nelson, K.

    2005-05-01

    Microgrids are receiving a considerable interest from the power industry, partly because their business and technical structure shows promise as a means of taking full advantage of distributed generation. This report investigates three issues associated with facility microgrids: (1) Multiple-distributed generation facility microgrids' unintentional islanding protection, (2) Facility microgrids' response to bulk grid disturbances, and (3) Facility microgrids' intentional islanding.

  19. Rescuing asset-backed securities markets

    OpenAIRE

    Sumit Agarwal; Crystal Cun; Mariacristina De Nardi

    2010-01-01

    On November 25, 2008, the Federal Reserve unveiled a loan facility to revive the market for asset-backed securities, which had essentially stopped functioning due to the global financial crisis. What are these securities and why is it important for these markets to continue to operate?

  20. Emerging Technology for School Security

    Science.gov (United States)

    Doss, Kevin T.

    2012-01-01

    Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…

  1. 75 FR 39283 - Agency Information Collection Activities: Submission for the Office of Management and Budget (OMB...

    Science.gov (United States)

    2010-07-08

    ... From the Federal Register Online via the Government Publishing Office NUCLEAR REGULATORY COMMISSION Agency Information Collection Activities: Submission for the Office of Management and Budget (OMB... complete the requirement or request: 365. 10. Abstract: NRC-regulated facilities and other...

  2. Ultra-secure RF Tags for Safeguards and Security - SBIR Phase II Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Twogood, Richard E [Dirac Solutions Inc., Pleasanton, CA (United States)

    2015-01-27

    This is the Final Report for the DOE Phase II SBIR project “Ultra-secure RF Tags for Safeguards and Security.” The topics covered herein include technical progress made, progress against the planned milestones and deliverables, project outcomes (results, collaborations, intellectual property, etc.), and a discussion on future expectations of deployment and impacts of the results of this work. In brief, all planned work for the project was successfully completed, on or ahead of schedule and on budget. The major accomplishment was the successful development of a very advanced passive ultra-secure RFID tag system with combined security features unmatched by any commercially available ones. These tags have high-level dynamic encrypted authentication, a novel tamper-proofing mechanism, system software including graphical user interfaces and networking, and integration with a fiber-optic seal mechanism. This is all accomplished passively (with no battery) by incorporating sophisticated hardware in the tag which harvests the energy from the RFID readers that are interrogating the tag. Based on initial feedback (and deployments) at DOE’s Lawrence Livermore National Laboratory (LLNL), it is anticipated these tags and their offspring will meet DOE and international community needs for highly secure RFID systems. Beyond the accomplishment of those original objectives for the ultra-secure RF tags, major new spin-off thrusts from the original work were identified and successfully pursued with the cognizance of the DOE sponsor office. In particular, new classes of less sophisticated RFID tags were developed whose lineage derives from the core R&D thrusts of this SBIR. These RF “tag variants” have some, but not necessarily all, of the advanced characteristics described above and can therefore be less expensive and meet far wider markets. With customer pull from the DOE and its national laboratories, new RFID tags and systems (including custom readers and software) for

  3. 76 FR 46668 - Business Conduct Standards for Security-Based Swap Dealers and Major Security-Based Swap...

    Science.gov (United States)

    2011-08-03

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 RIN 3235-AL10 Business Conduct Standards for Security-Based Swap Dealers and Major Security-Based Swap Participants Correction In proposed rule document number 2011-16758, appearing on pages...

  4. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  5. U.S. Mint - Bureau of Engraving and Printing (BEP) Facilities

    Data.gov (United States)

    Department of Homeland Security — United States Mint - Bureau of Engraving and Printing Facilities This dataset includes facilities of the United States Mint and facilities of the Bureau of Engraving...

  6. 78 FR 16698 - Chemical Facility Anti-Terrorism Standards (CFATS) Chemical-Terrorism Vulnerability Information...

    Science.gov (United States)

    2013-03-18

    ... SECURITY Chemical Facility Anti-Terrorism Standards (CFATS) Chemical- Terrorism Vulnerability Information... Collection Request, Chemical Facility Anti- Terrorism Standards (CFATS) Chemical-terrorism Vulnerability... minimize terrorism risk to such facilities. Its design and implementation balance maintaining economic...

  7. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  8. Security Studies

    OpenAIRE

    ,

    2005-01-01

    Security Studies has firmly established itself as a leading journal on international security issues. The journal publishes theoretical, historical and policy-oriented articles on the causes and consequences of war, and the sources and conditions of peace. The journal has published articles on balancing vs. bandwagoning, deterrence in enduring rivalries, the Domino theory, nuclear weapons proliferation, civil-military relations, political reforms in China, strategic culture in Asia and the P...

  9. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  10. Energy Security

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With an increasing number of countries becoming industrialized, energy, the so-called blood of modern economies, is becoming increasingly important Energy security has become an important factor that directly influences world economic stability and international relations. In an article posted on People's Daily Online, Liu Jianfei, professor at the International Strategic Research Center of the Party School of the Central Committee of the Communist Party of China, shares his opinions on energy security.

  11. Citizen Security

    OpenAIRE

    Beatriz Abizanda

    2011-01-01

    This is a presentation for the Caribbean Regional ConSoc Retreat held on June 16, 2011 in Kingston, Jamaica. This document outlines crime and violence as major roadblocks to development in the Caribbean; citing statistics and providing examples of the economic costs to the region. This presentation then goes on to describe the IDB's strategy with regard to citizen security and highlights IDB Funded security programs in the region. The presentation also identifies Civil Society as a potentiall...

  12. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  13. 17 CFR 200.25 - Office of Administrative and Personnel Management.

    Science.gov (United States)

    2010-04-01

    ... Personnel Management. 200.25 Section 200.25 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... General Organization § 200.25 Office of Administrative and Personnel Management. (a) The Office of Administrative and Personnel Management (OAPM) is responsible for providing a wide variety of programs for human...

  14. 8 CFR 103.1 - Delegations of authority; designation of immigration officers.

    Science.gov (United States)

    2010-01-01

    ... immigration officers. 103.1 Section 103.1 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION... immigration officers. (a) Delegations of authority. Delegations of authority to perform functions and exercise authorities under the immigration laws may be made by the Secretary of Homeland Security as provided by §...

  15. 17 CFR 200.24a - Director of the Office of Consumer Affairs.

    Science.gov (United States)

    2010-04-01

    ... Consumer Affairs. 200.24a Section 200.24a Commodity and Securities Exchanges SECURITIES AND EXCHANGE... General Organization § 200.24a Director of the Office of Consumer Affairs. The Director of the Office of Consumer Affairs is responsible to the Chairman for the Commission's investor education and...

  16. 17 CFR 200.20c - Office of Filings and Information Services.

    Science.gov (United States)

    2010-04-01

    ... Information Services. 200.20c Section 200.20c Commodity and Securities Exchanges SECURITIES AND EXCHANGE... General Organization § 200.20c Office of Filings and Information Services. The Office of Filings and Information Services is responsible for the receipt and initial handling of all public documents filed at...

  17. Location - Managed Facility - St. Paul District (MVP)

    Data.gov (United States)

    Army Corps of Engineers, Department of the Army, Department of Defense — St. Paul District - US Army Corps of Engineers Managed Facility locations. District headquarters, Natural Resource, Recreation, Lock and Dam, and Regulatory offices...

  18. Assisted Living Facilities - MDC_NursingHome

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — Label (point) feature class of Miami-Dade County Nursing Homes Facilities. As of May 2004 the Office of Emergency Management (OEM) will provide updates for Nursing...

  19. NICHD Biomedical Mass Spectrometry Core Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The NICHD Biomedical Mass Spectrometry Core Facility was created under the auspices of the Office of the Scientific Director to provide high-end mass-spectrometric...

  20. Assisted Living Facilities - MDC_NursingHome

    Data.gov (United States)

    NSGIC Local Govt | GIS Inventory — Label (point) feature class of Miami-Dade County Nursing Homes Facilities. As of May 2004 the Office of Emergency Management (OEM) will provide updates for Nursing...

  1. International biosecurity symposium : securing high consequence pathogens and toxins : symposium summary.

    Energy Technology Data Exchange (ETDEWEB)

    2004-06-01

    The National Nuclear Security Administration (NNSA) Office of Nonproliferation Policy sponsored an international biosecurity symposium at Sandia National Laboratories (SNL). The event, entitled 'Securing High Consequence Pathogens and Toxins', took place from February 1 to February 6, 2004 and was hosted by Dr. Reynolds M. Salerno, Principal Member of the Technical Staff and Program Manager of the Biosecurity program at Sandia. Over 60 bioscience and policy experts from 14 countries gathered to discuss biosecurity, a strategy aimed at preventing the theft and sabotage of dangerous pathogens and toxins from bioscience facilities. Presentations delivered during the symposium were interspersed with targeted discussions that elucidated, among other things, the need for subsequent regional workshops on biosecurity, and a desire for additional work toward developing international biosecurity guidelines.

  2. Human Services Offices

    Data.gov (United States)

    Fairfax County, Virginia — This data contains point features representing the human services offices within Fairfax County.“HS_Region” is the office for each human services region, “DFS_Area”...

  3. Interactive Office user's manual

    Science.gov (United States)

    Montgomery, Edward E.; Lowers, Benjamin; Nabors, Terri L.

    1990-01-01

    Given here is a user's manual for Interactive Office (IO), an executive office tool for organization and planning, written specifically for Macintosh. IO is a paperless management tool to automate a related group of individuals into one productive system.

  4. HUD's Local Office Directory

    Data.gov (United States)

    Department of Housing and Urban Development — HUD is organized in 10 Regions. Each Region is managed by a Regional Administrator, who also oversees the Regional Office. Each Field Office within a Region is...

  5. Study on Network Security Architecture for Power Systems

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    The wide application of network technology in power systems brings not only convenience and flexibility but also security threats. An architecture of network security for power system was proposed in this study,which protected data and facilities from being attacked by outside users by means of firewall, security monitor and control system. Firewall was basically the first line of defense for the intranet; the security monitoring system was a kind of IDS (Intrusion Detection System), while security control system provided authentication, authorization,data-encrypted transmission and security management. This architecture provides various security services, such as identification, authentication, authorization, data integrity and confidentiality.

  6. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  7. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

    Science.gov (United States)

    Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert

    2015-07-28

    Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.

  8. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

    Energy Technology Data Exchange (ETDEWEB)

    Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert

    2015-07-28

    Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.

  9. Office 2013 simplified

    CERN Document Server

    Marmel, Elaine

    2013-01-01

    A basic introduction to learn Office 2013 quickly, easily, and in full color Office 2013 has new features and tools to master, and whether you're upgrading from an earlier version or using the Office applications for the first time, you'll appreciate this simplified approach. Offering a clear, visual style of learning, this book provides you with concise, step-by-step instructions and full-color screen shots that walk you through the applications in the Microsoft Office 2013 suite: Word, Excel, PowerPoint, Outlook, and Publisher.Shows you how to tackle dozens of Office 2013

  10. Office 2013 for dummies

    CERN Document Server

    Wang, Wallace

    2013-01-01

    Office 2013 For Dummies is the key to your brand new Office! Packed with straightforward, friendly instruction, this update to one of the bestselling Office books of all time gets you thoroughly up to speed and helps you learn how to take full advantage of the new features in Office 2013. After coverage of the fundamentals, you'll discover how to spice up your Word documents, edit Excel spreadsheets and create formulas, add pizazz to your PowerPoint presentation, and much more.Helps you harness the power of all five Office 2013 applications: Word, Excel, PowerPoint,

  11. Validity of information security policy models

    Directory of Open Access Journals (Sweden)

    Joshua Onome Imoniana

    Full Text Available Validity is concerned with establishing evidence for the use of a method to be used with a particular set of population. Thus, when we address the issue of application of security policy models, we are concerned with the implementation of a certain policy, taking into consideration the standards required, through attribution of scores to every item in the research instrument. En today's globalized economic scenarios, the implementation of information security policy, in an information technology environment, is a condition sine qua non for the strategic management process of any organization. Regarding this topic, various studies present evidences that, the responsibility for maintaining a policy rests primarily with the Chief Security Officer. The Chief Security Officer, in doing so, strives to enhance the updating of technologies, in order to meet all-inclusive business continuity planning policies. Therefore, for such policy to be effective, it has to be entirely embraced by the Chief Executive Officer. This study was developed with the purpose of validating specific theoretical models, whose designs were based on literature review, by sampling 10 of the Automobile Industries located in the ABC region of Metropolitan São Paulo City. This sampling was based on the representativeness of such industries, particularly with regards to each one's implementation of information technology in the region. The current study concludes, presenting evidence of the discriminating validity of four key dimensions of the security policy, being such: the Physical Security, the Logical Access Security, the Administrative Security, and the Legal & Environmental Security. On analyzing the Alpha of Crombach structure of these security items, results not only attest that the capacity of those industries to implement security policies is indisputable, but also, the items involved, homogeneously correlate to each other.

  12. 41 CFR 102-83.65 - Are Executive agencies required to give first priority to the location of new offices and other...

    Science.gov (United States)

    2010-07-01

    ... required to give first priority to the location of new offices and other facilities in rural areas? 102-83... location of new offices and other facilities in rural areas in accordance with the Rural Development Act (7.... First priority to the location of new offices and other facilities in rural areas must be given...

  13. Data security.

    Science.gov (United States)

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement.

  14. Nuclear Cyber Security Issues and Policy Recommendations

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Cheol-Kwon; Lee, Dong-Young [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Na-Young; Hwang, Young-Soo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    The cyber-attack against computer systems causes the loss of function which brings about the big economic loss, and it becomes a national-wide issue. In recent days the cyber threat has occurred in the national critical infrastructure around the world. In the nuclear industry, while discussing responses to various threats against nuclear facilities since 2006, cyber-terrorism was also discussed. But at that time, cyber-attacks against control networks in nuclear facilities were not seriously considered because those networks were isolated from the Internet thoroughly and it was evaluated that cyber penetration would not be possible. However Stuxnet worm virus which attacked Iran's nuclear facilities confirmed that the cyber security problem could occur even in other nuclear facilities. The facilities were isolated from the Internet. After the cyber incident, we began to discuss the topic of NPP cyber security. It is very difficult to predict whether or when or how the cyber-attack will be occurred, which is a characteristic of cyber-attack. They could be always detected only after when an incident had occurred. This paper summarizes the report, 'Nuclear Cyber Security Issues and Policy Recommendations' by issue committee in the Korea Nuclear Society, which reviewed the cyber security framework for nuclear facilities in the Republic of Korea being established to prevent nuclear facilities from cyber-attacks and to respond systematically. As a result this paper proposes several comments to improve the security and furthermore safety of nuclear facilities Digital technology will be used more widely at the national critical infrastructure including nuclear facilities in the future, and moreover wireless technologies and mobile devices will be soon introduced to nuclear industry. It is therefore anticipated that the rapid advance in digital technology will accelerate the opportunity of hacking these facilities.

  15. Impressions of psychotherapists' offices.

    Science.gov (United States)

    Nasar, Jack L; Devlin, Ann Sloan

    2011-07-01

    For counseling settings, research suggests that softness, personalization, and order might affect the experience and the perceived expertness, trustworthiness, and social attractiveness of the therapist. This article discusses exploratory studies on college students' perception of the counseling office environment and whether the likely client experience was associated with the softness/personalization and order of the office. As stimuli, the studies used 30 color photographs of psychotherapists' offices viewed from the client's perspective. After obtaining ratings of the characteristics of each office, we obtained ratings from different groups of students of the quality of care and comfort expected in each office (Study 1) and how qualified, bold, and friendly the therapist in the office would be (Study 2). Additional studies examined the likelihood of choosing a therapist based on the office, and the first thought or feeling that came to mind about the office, the therapist, and the patient experience. There were strong correlations in response between groups (by whether they had experienced therapy; their level in school; their gender; and their major, location, and school size). The quality of care, comfort, therapist boldness, qualifications of the therapist, and the likelihood that one would choose a therapist based on the office improved with increases in the office's softness/personalization and order. Friendliness improved with increases in softness/personalization. The office choices, open-ended responses, and reported reasons for the ratings confirmed the importance of softness (comfort) and order. Research should test longer term exposure and behavior.

  16. Operating Nuclear Power Stations in a Regulated Cyber Security Environment

    Energy Technology Data Exchange (ETDEWEB)

    Dorman, E.

    2014-07-01

    The United States Nuclear Regulatory Commission (NRC) issued 10CFR73.54 to implement a regulated Cyber Security Program at each operating nuclear reactor facility. Milestones were implemented December 31, 2012 to mitigate the attack vectors for the most critical digital assets acknowledged by the industry and the NR C. The NRC inspections have begun. The nuclear Cyber Security Plan, implemented by the site Cyber Security Program (Program), is an element of the operating license at each facility. (Author)

  17. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  18. A data-driven model for estimating industry average numbers of hospital security staff.

    Science.gov (United States)

    Vellani, Karim H; Emery, Robert J; Reingle Gonzalez, Jennifer M

    2015-01-01

    In this article the authors report the results of an expanded survey, financed by the International Healthcare Security and Safety Foundation (IHSSF), applied to the development of a model for determining the number of security officers required by a hospital.

  19. 75 FR 75722 - Order Extending Temporary Exemptions From Certain Government Securities Act Provisions and...

    Science.gov (United States)

    2010-12-06

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE TREASURY Order Extending Temporary Exemptions From Certain Government Securities Act Provisions and Regulations... Temporary Exemptions from Certain Provisions of the Government Securities Act and Treasury's...

  20. 78 FR 46358 - Extension of Agency Information Collection Activity Under OMB Review: Security Programs for...

    Science.gov (United States)

    2013-07-31

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under... against acts of criminal violence and air piracy, and the introduction of explosives, incendiaries,...